From cypherpunks at Algebra.COM Sun Sep 1 09:07:36 2002 From: cypherpunks at Algebra.COM (cypherpunks at Algebra.COM) Date: Sun, 01 Sep 2002 11:07:36 -0500 Subject: $25 is a drop in the bucket for what you'll get in return! Message-ID: All our mailings are sent complying to the proposed H.R. 3113 Unsolicited Commercial Electronic Mail Act of 2000. Please see the bottom of this message for further information and removal instructions. PARENTS OF 15 - YEAR OLD - FIND $71,000 CASH HIDDEN IN HIS CLOSET! Does this headline look familiar? Of course it does. You most likely have just seen this story recently featured on a major nightly news program (USA). And reported elsewhere in the world (including my neck of the woods - New Zealand). His mother was cleaning and putting laundry away when she came across a large brown paper bag that was suspiciously buried beneath some clothes and a skateboard in the back of her 15-year-old sons closet. Nothing could have prepared her for the shock she got when she opened the bag and found it was full of cash. Five-dollar bills, twenties, fifties and hundreds - all neatly rubber-banded in labelled piles. "My first thought was that he had robbed a bank", says the 41-year-old woman, "There was over $71,000 dollars in that bag --that's more than my husband earns in a year". The woman immediately called her husband at the car-dealership where he worked to tell him what she had discovered.He came home right away and they drove together to the boys school and picked him up. Little did they suspect that where the money came from was more shocking than actually finding it in the closet. As it turns out, the boy had been sending out, via E-mail, a type of "Report" to E-mail addresses that he obtained off the Internet. Everyday after school for the past 2 months, he had been doing this right on his computer in his bedroom. "I just got the E-mail one day and I figured what the heck, I put my name on it like the instructions said and I started sending it out", says the clever 15-year-old. The E-mail letter listed 5 addresses and contained instructions to send one $5 dollar bill to each person on the list, then delete the address at the top and move the others addresses Down , and finally to add your name to the top of the list. The letter goes on to state that you would receive several thousand dollars in five-dollar bills within 2 weeks if you sent out the letter with your name at the top of the 5-address list. "I get junk E-mail all the time, and really did not think it was going to work", the boy continues. Within the first few days of sending out the E-mail, the Post Office Box that his parents had gotten him for his video-game magazine subscriptions began to fill up with not magazines, but envelopes containing $5 bills. "About a week later I rode [my bike] down to the post office and my box had 1 magazine and about 300 envelops stuffed in it. There was also a yellow slip that said I had to go up to the [post office] counter. I thought I was in trouble or something (laughs)". He goes on, "I went up to the counter and they had a whole box of more mail for me. I had to ride back home and empty out my backpack because I could not carry it all". Over the next few weeks, the boy continued sending out the E-mail." The money just kept coming in and I just kept sorting it and stashing it in the closet, barely had time for my homework".He had also been riding his bike to several of the banks in his area and exchanging the $5 bills for twenties, fifties and hundreds. "I didn't want the banks to get suspicious so I kept riding to different banks with like five thousand at a time in my backpack. I would usually tell the lady at the bank counter that my dad had sent me in to exchange the money] and he was outside waiting for me.One time the lady gave me a really strange look and told me that she would not be able to do it for me and my dad would have to come in and do it, but I just rode to the next bank down the street (laughs)." Surprisingly, the boy did not have any reason to be afraid.The reporting news team examined and investigated the so-called "chain-letter" the boy was sending out and found that it was not a chain-letter at all.In fact, it was completely legal according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, or Title 18, Section 3005 in the US code, also in the code of federal regulations, Volume 16, Sections 255 and 436, which state a product or service must be exchanged for money received. Every five-dollar bill that he received contained a little note that read, "Please send me report number XYX".This simple note made the letter legal because he was exchanging a service (A Report on how-to) for a five-dollar fee. [This is the end of the media release. If you would like to understand how the system works and get your $71,000 - please continue reading. What appears below is what the 15 year old was sending out on the net - YOU CAN USE IT TOO - just follow the simple instructions]. +++++++++++++++++++++++++++++++++++++++++++++++++++ BE FINANCIALLY FREE LIKE OTHERS WITHIN A YEAR!!! Before you say "Bull", please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are "absolutely NO Laws prohibiting the participation in the program and if people can follow the simple instructions, they are bound to make some megabucks with only $25 out of pocket cost". DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. Note* follow the directons below, I had best results the second time when I hired a bulk email service in addition to following the reports instructions. In order for all of us to be successful, many, many emails must be sent so that the returns are many. I have been extremely successful using the following company. They send out the offers, and all I do is accept money for reports, then I send back to the people as soon as possible. This is what one had to say: "Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $610,470.00 in 21 weeks, with money still coming in". Pam Hedland, Fort Lee, New Jersey. +++++++++++++++++++++++++++++++++++++++++++++++++++ Here is another testimonial: "This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and walaa ..... 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything." More testimonials later but first, PRINT THIS NOW FOR YOUR FUTURE REFERENCE ++++ Order all 5 reports shown on the list below +++ For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer. Within a few days you will receive, vie e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happens to your computer. IMPORTANT - DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in step "1 through 6" or you will loose out on majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter, it will NOT work!!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! 1.... After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. 2.... Move the name & address in REPORT # 4 down TO REPORT #5. 3.... Move the name & address in REPORT # 3 down TO REPORT #4. 4.... Move the name & address in REPORT # 2 down TO REPORT #3. 5.... Move the name & address in REPORT # 1 down TO REPORT #2 6.... Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY! +++++++++++++++++++++++++++++++++++++++++++++++++++ **** Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. Save this on a disk as well just in case if you loose any data. To assist you with marketing your business on the internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD #1: BY SENDING BULK E-MAIL LEGALLY +++++++++++++++++++++++++++++++++++++++++++++++++++ Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000e-mails each. Let's also assume that the mailing receive only a 0.2% response (the response could be much better but lets just say it is only 0.2%. Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That equals 100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report #3. Those 1000 people send out 5,000 e-mails each for a total of 5 million e-mails sent out. The 0.2% response to that is 10,000 orders for Report #4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report #5. THAT'S 100,000 ORDERS TIMES $5 EACH=$500,000.00 (half million). Your total income in this example is: 1..... $50 +2.....$500 + 3.....$5,000 + 4..... $50,000 + 5..... $500,000....... Grand Total=$555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE OUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY! +++++++++++++++++++++++++++++++++++++++++++++++++++ REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone or half or even one 4th of those people mailed 100,000e-mails each or more? There are over 150 million people on the Internet worldwide and counting. Believe me, many people will do just that, and more! METHOD #2: BY PLACING FREE ADS ON THE INTERNET +++++++++++++++++++++++++++++++++++++++++++++++++++ Advertising on the net is very very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response. We strongly suggest you start with Method #1 and add METHOD #2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it. Always provide same day service on all orders. This will guarantee that the e-mail they send out with your name and address on it, will be prompt because they can not advertise until they receive the report. =ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (U.S. CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper or aluminum foil. On one of those sheets of paper, Write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS and your name and postal address. PLACE YOUR ORDER FOR THESE REPORTS NOW: +++++++++++++++++++++++++++++++++++++++++++++++++++ REPORT #1: The Insider's Guide to Advertising for Free on the Net Order Report #1 from: R. R. PO Box 18048 Chicago, IL 60618 __________________________________________________________ REPORT #2: The Insider's Guide to Sending Bulk e-mail on the Net Order Report #2 from: GM Boland 353 Jonestown Rd. Suite 125 Winston Salem, NC 27104 __________________________________________________________ REPORT #3: Secret to Multilevel marketing on the Net Order Report #3 from: R. Chernick PO Box 771661 C.S. Florida 33077 __________________________________________________________ REPORT #4: How to become a millionaire utilizing MLM & the Net Order Report #4 from: M. Eiseman PO Box 451971 Sunrise, Florida 33345-1971 ____________________________________________________ REPORT #5: How to send out 0ne Million emails for free Order Report #5 From: L.Samon PO BOX 31 Castletown Isle of Man IM 99 5XP +++++++++++++++++++++++++++++++++++++++++++++++++++ $$$$$$$$$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$$$$$$ Follow these guidelines to guarantee your success: +++ If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. =orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT #2. If you did not, continue advertising or sending e-mails until you do. +++ Once you have received 100 or more orders for Report #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a Different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business!!! +++++++++++++++++++++++++++++++++++++++++++++++++++ FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do Not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report#1 and moved others to #2 thru #5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on every one of them. Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent. IT IS UP TO YOU NOW! ++++++++++++++++ MORE TESTIMONIALS ++++++++++++++++ "My name is Mitchell. My wife, Jody and I live in Chicago. I am an accountant with a major U.S. Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving "junk mail". I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Jody totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received total $ 147,200.00....all cash! I was shocked. I have joined Jody in her "hobby". Mitchell Wolf, Chicago, Illinois +++++++++++++++++++++++++++++++++++++++++++++++++++ "Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back". "I was surprised when I found my medium size post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big". Dan Sondstrom, Alberta, Canada +++++++++++++++++++++++++++++++++++++++++++++++++++ "I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else......11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks". Susan De Suza, New York, N.Y +++++++++++++++++++++++++++++++++++++++++++++++++++ If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington,D.C. +++++++++++++++++++++++++++++++++++++++++++++++++++ This email was sent to you via Saf-E Mail Systems. Your email address was automatically inserted into the To and From addresses to eliminate undeliverables which waste bandwidth and cause internet congestion. Your email or webserver IS NOT being used for the sending of this mail. No-one else is receiving emails from your address. You may utilize the removal link below if you do not wish to receive this mailing. http://www.webtransit.net/remove.html From neibdfy at crezio.com Sun Sep 1 11:25:41 2002 From: neibdfy at crezio.com (Trixie Deleon) Date: Sun, 01 Sep 2002 14:25:41 -0400 Subject: Hello cypherpunks, All we do is bad credit tnlhe Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3700 bytes Desc: not available URL: From txtx332 at hotmail.com Sun Sep 1 14:57:19 2002 From: txtx332 at hotmail.com (YouMakeMoney) Date: Sun, 1, Sep 2002 14:57:19 -0700 Subject: Initiatives - vigilante politics is for everyone!!! Message-ID: <200209242210.g8OMAOmT019023@ak47.algebra.com> THIS BOOK IS THE FIRST OF ITS KIND!!! THE FIX, by David R. Myrland Every politically aware or politically active American should have this collection of initiatives, written by an analyst and researcher with remarkable insight and talent. For legal professionals and laypersons alike - a peaceful way to take the law into your own hands. Dozens of provisions proposed to solve the things about government we like the least. Initiatives to address the most intrusive encroachments on civil liberties, the excessive tactics of law enforcement, discrimination under licensing requirements - all in one book. A responsible and firm hedge against the "homeland security" measures that unreasonably infringe on our most treasured liberties. Decriminalize marijuana, limit pepper spray use, protect SS numbers, citizens' review panel, end state income taxes, limitations on the use of technology against the innocent, make gov't more friendly - who's the boss here anyway?!?! Fairness is lacking in so many instances involving gov't that somebody's got to do something. Complaining aside, let's look at some answers, dozens of them!!! THE FIX, by David R. Myrland To be removed - txtx332 at hotmail.com We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please send notification to txtx332 at hotmail.com. Please accept our apologies if you have been sent this email in error. We honor all removal requests. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4092 bytes Desc: not available URL: From gina at teenarousal.com Sun Sep 1 12:39:07 2002 From: gina at teenarousal.com (gina at teenarousal.com) Date: Sun, 1 Sep 2002 15:39:07 -0400 (EDT) Subject: Guess what happened to me this weekend Message-ID: <200209011939.g81Jd71Z045202@gateway.fasti.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8554 bytes Desc: not available URL: From adam at homeport.org Sun Sep 1 15:12:57 2002 From: adam at homeport.org (Adam Shostack) Date: Sun, 1 Sep 2002 18:12:57 -0400 Subject: Mitigating Dangers of Compromised Anonymity In-Reply-To: ; from wolf@priori.net on Sat, Aug 31, 2002 at 12:12:16AM -0700 References: <20020830214818.A70866@lightship.internal.homeport.org> Message-ID: <20020901181257.A86357@lightship.internal.homeport.org> On Sat, Aug 31, 2002 at 12:12:16AM -0700, Meyer Wolfsheim wrote: | On Fri, 30 Aug 2002, Adam Shostack wrote: | | > I'd like to suggest that while this may be fun, usability and getting | > millions of users to see that remailers are useful to them is a more | > useful goal. | | I agree, although I fail to see how working on this would interfere with | that goal in any way. Scarce resources (programmer time) go to this, not that. Given the small pool of people writing code, I'd like to try to convince them to write code that I think is more useful. I'd write it myself, but that just makes work for someone who says "My god, I need to re-write this!" ;) | > The anonymity set provided by the current extant systems is too small | > to protect anyone against anyone who is willing to kill or disappear | > people as part of their attacks against the remailers. | | I find this disbelievable. I suspect there are many groups which do not | have the capability of defeating the remailer system who would still like | to see it eliminated. Willingness to kill or disappear people isn't | necessarily tied to technical capability, though I agree that entities | which can defeat the remailer network without "disappearing" anyone are | unlikely to pose a threat to the remops. If our goal is to make remailers | harder to defeat, however, beforehand might be the right time to address | the problem of "missing remailer operators." Sorry, I think you missed my point a little. Let me explain, then I'll respond to what you said. If Charlie is willing to kill someone to achieve his goals, then he is pretty dedicated. He may be able to trade that willingness to commit violence for technical help, etc. I agree that there are groups who might not be able to defeat the remailer system who'd like it to go away, but its not clear to me how many of them would go to the extent of kidnapping or killing a remailer operator to achieve the goal of getting rid of the remailer system. | (Incidently, I could see this having uses outside the remailer operator | world.) So? | > Oh, yeah, and incidentally, if you build this system, the attacker can | > simply add a bit of rubber hosing to their remop elimination program. | | To pry the signing key out of the victim? That's a personal "how much | torture can I take" question for the victim to ask himself. He knows he'll | be permanently disappeared after coughing up the private key. | | In many cases also it might be far harder to rubber-hose someone than | simply cause an "accident". True, but how many groups are willing to go that far? Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From eugen at leitl.org Sun Sep 1 09:18:54 2002 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 1 Sep 2002 18:18:54 +0200 (CEST) Subject: NTK Now, 2002-08-30 (fwd) Message-ID: A relevant NTK Now issue. ---------- Forwarded message ---------- Date: Fri, 30 Aug 2002 16:33:18 +0100 From: Dave Green To: NTK recipient list Subject: NTK Now, 2002-08-30 Resent-Date: Sun, 1 Sep 2002 17:17:26 +0200 (CEST) Resent-From: Resent-To: Resent-Subject: NTK Now, 2002-08-30 _ _ _____ _ __ <*the* weekly high-tech sarcastic update for the uk> | \ | |_ _| |/ / _ __ __2002-08-30_ o join! mail an empty message to | \| | | | | ' / | '_ \ / _ \ \ /\ / / o ntknow-subscribe at lists.ntk.net | |\ | | | | . \ | | | | (_) \ v v / o website (+ archive) lives at: |_| \_| |_| |_|\_\|_| |_|\___/ \_/\_/ o http://www.ntk.net/ "A case in point is web designer Matt Jones, the man responsible for how BBC News Online looked when it launched. Since then, he has invented 'warchalking', which he recently described as a 'curse'..." http://news.bbc.co.uk/1/hi/2210091.stm - but you cannot turn against me! I... created you! >> HARD NEWS << stiffening sinews More hot summer days in the mailinglist alleyways, dangerously empty of sane postings, strewn with the rotting carcasses of broiling vacation messages. Hacktress and Silicon Valley's chief rat-keeper LILE ELAM, excitedly posts about a new open 802.11 network she's found. "I am here at the police station waiting to see a judge and I thought I would check to see if there is connectivity", she writes, somewhat recklessly, to the Bay Area Wireless list. Exit the rest of the Wifi community through the nearest window and out into the streets... where, cooling tempers, the Microsoft Palladium boys are on an endless summer tour, reassuring the experts that while, hmm, they *suppose* Pd could *theoretically* be used as a Hollywood DRM system, they truly have no plans to do any such thing. Cypherpunk and friend of freedom Lucky Green hears this; thinks up four or five of the obvious Palladium DRM implementations; sends them off to be patented in his name. Licensing funds, we imagine, will go on cracking his own DRMs. And so the mail loops on. http://lists.bawug.org/pipermail/wireless/2002-August/008507.html - administrivia: HI MOM, I'M IN JAIL http://www.mail-archive.com/cryptography at wasabisystems.com/msg02554.html - Green/Palladium, like Green Kryptonite Could Lucky get himself arrested under the DMCA for distributing a circumvention device? Worse: now we have the EUCD incoming, could he here in the UK? Will Alan Cox go to jail for posting detailed Changelogs? Will even the nicest UK cryptographer (or curious garage tinkerer) find themselves hauled up under our new and scarily DMCAish copyright regime? Find out the facts at the free FAIR DEAL FOR COPYRIGHT conference, organised by the irrepressible FOUNDATION FOR INFORMATION POLICY RESEARCH for Wednesday 2002-09-18 at the London School of Economics. All the usual fun from the creators of the Scrambling for Safety crypto cons: we confidently predict government spokesmen caught in headlights, wanton Dave Bird heckling, some industry bigwig fighting off the audience with a broken chairleg, and other epiphenomena of the interzone between legal minds and hacker ethics. Oh, and FIPR are still looking for a Programme Director, so if you're interested, let them know. We suggested a convention raffle (first prize: the director's job, second prize: Ross Anderson as your personal slave for a day). They say there's some rule that would break, though. http://www.fipr.org/vacancy.html - doesn't the Foundation use psychohistory for filling these positions? For those of us who can't read the abbreviation EULA without thinking of Martian fighting machines and their "deafening howls... which roared like thunder", we're sorry to report that this weekend's multimedia performance of Jeff Wayne's WAR OF THE WORLDS has been postponed due to "health and safety issues". The event was to feature computer graphics, fireworks, "60ft-tall Martian fighting machines" wreaking "havoc and destruction", and - most terrifyingly of all - the possibility of a David Essex tribute singer performing with Hawkwind, but UKP18 tickets for the Sat 2002-08-31 show at Manchester's Heaton Park will still be valid at a range of new venues next summer. Ironically, the Martians' original invasion plans were similarly thwarted by health and safety issues, "slain after all man's devices had failed by the humblest creatures that God, in his wisdom, has put upon this earth: bacteria. Minute, invisible, bacteria. For, directly the invaders arrived and drank and fed, our microscopic allies attacked them..." http://www.waroftheworlds.info/postpone.htm - "...From that moment, they were doomed." >> ANTI-NEWS << berating the obvious moving on from PUERILE GOOGLE MISSPELLINGS, weird search-and- replace artefact: http://www.google.com/search?q=consideyellow , Japanese fan sites for "plince", "steery dan", "def reppard" et al, plus the 18,000 or more self-referential Usenet .sigs: http://groups.google.com/groups?q=%22get+random+signatures%22 ...http://www.colocation-network.com/ "Zerodowntime" ad leads to: http://www.ntk.net/2002/08/30/dohzero.gif ... slightly harsh alt text: http://www.ntk.net/2002/08/30/dohover.gif ... US military discovers the only "translator" those bastards seem to understand: http://www.ntk.net/2002/08/30/dohgun.gif ... scary blue men herald return of the bizarre BBC hacking pics: http://news.bbc.co.uk/1/hi/1494091.stm ... reporter RYAN DILLEY http://news.bbc.co.uk/1/hi/uk/2202552.stm pulls his http://starwars.org.pl/galeria/e2/char/anakin/t001.jpg face ... banjo maestro GEORGE FORMBY still alive, cooking, black: http://www.readersheds.co.uk/readersheds/shop.cfm?WOSNAMES=Wosnames ... thanks guys, that ought to do it: http://www.eap.ca/ ... >> EVENT QUEUE << goto's considered non-harmful Controversially, we're all in favour of THE GUARDIAN GREAT BRITISH BLOG COMPETITION (closing date next Fri 2002-09-06, first prize UKP1000, entry free), in that any initiative that encourages this notoriously primadonna-ish "community" to try and engage with real-world notions of editorial quality surely has to be a good thing. Our only disappointment is that The Guardian appears to be focussing on the "best" of the entries, when everyone knows the real fun is to be had cruising the truly terrible examples that the genre has to offer, mentally allocating points for "Most Depressing Recycling Of Daypop Top 40 URLs", "Most Unsettling Revelations About Personal Life", plus of course "Most Tedious Linking/Reciprocal Linking To Other Bloggers In Absence Of Having Anything Interesting To Say". http://www.guardian.co.uk/weblog/bestbritishblog/ - "A strange game, Professor Falken..." http://media.guardian.co.uk/newmedia/comment/0,7496,765161,00.html - "...the only winning move is not to play." >> TRACKING << sufficiently advanced technology : the gathering The respective trademark holders will hate this, but Windows really *is* like the Sun. You have this big hulking mass of concentrated power in the middle, with a few small orbiting utilities - like WinZip, and PuTTY, and VNC. Occasionally one will get a bit too close to the OS, and Microsoft will suck it down and turn it into fuel for the System. One such discrete satellite remains FILEZILLA, the still-necessary ftp gui client for Windows. Those who know it won't need the introduction, although they might appreciate the note that it's getting close to v2.0 time. For dogged WS_FTP users, though, it's got multiple downloads, auto-restart of interrupted 'loads, queuing, and sftp and Kerberos support. It's also GPL'd which makes it a nice bit of source for anyone wanting to grok Win32 networking from something that works. http://filezilla.sf.net/ - talking of trademarks, will the Godzilla people strike before MS? >> MEMEPOOL << ceci n'est pas une http://www.gagpipe.com/ (Not safe for work) next year's RED NOSE DAY looks more fun than usual: http://www.threepillows.com/tour2.htm ... Mirrored Disaster Recovery Suite - to go with mirrored bathroom etc?: http://www.dovebid.com/Auctions/AuctionDetail.asp?AuctionID=1450 ... and then the kid can take you to court for mental cruelty: http://www.cnn.com/2002/TECH/ptech/08/27/turok.baby.reut/ ... "funny" prefixes in front of "chalking" #n+1 - the actually quite pragmatic: http://www.pinkbunny.co.uk/poochalking/ ... no longer knowing - or caring - if these are prank AMAZON reviews or not, for Potter's ever-popular "vibrating" broom: http://www.amazon.com/exec/obidos/tg/stores/detail/-/toys/B00005NEBW/ ... ditto "Use This Software At Your Own Risk" disclaimer for: http://www.palmgear.com/software/showsoftware.cfm?prodID=41030 ... DAFFY DUCK appears in dock - accused of "dethpicable" behaviour?: http://news.bbc.co.uk/1/hi/england/2223065.stm , http://www.ananova.com/news/story/sm_659889.html ... >> GEEK MEDIA << get out less TV>> celebrity cameo night tonight, with Brad Pitt in FRIENDS (9pm, Fri, C4), Sydney Pollack in WILL AND GRACE (9.30pm, Fri, C4), Dustin Hoffman in V GRAHAM NORTON (10.30pm, Fri, C4), and a singing, dancing peanut in globalised trade documentary ALT- TV (7.30pm, Fri, C4)... the BBC have kept McEnroe and the heart monitor, got rid of the live crocodiles in gimmicky quizshow THE CHAIR (6.40pm, Sat, BBC1)... and a month of "September 11th" specials kicks off with AVENGING TERROR (8pm, Sat & Sun, C4) - yet those responsible for BOWFINGER (9pm, Sat, C4) and NOTTING HILL (9pm, Sun, C4) still remain unpunished... John "The Last Seduction" Dahl's ROUNDERS (11pm, Sat, BBC2) turns out to be about high-stakes poker, rather than the girls' version of baseball... in the wake of DAVE GORMAN'S IMPORTANT ASTROLOGY EXPERIMENT (10.40pm, Sun, BBC2), how about a three-way challenge where he, Tony Hawks and Pete McCarthy battle to come up with the most lucrative pointless pretext for a book and TV show?... but we still have a soft spot for Ron "Alien: Resurrection" Perlman liberal self- flagellation THE LAST SUPPER (11.20pm, Sun, C4)... 9/11 CLEAR THE SKIES (9pm, Sun, BBC2) is a presumably uneventful account of "how US air defence systems responded to the events of September 11th"... inexplicably, the three finalists in THE TARTIEST MEN IN BRITAIN (10.30pm, Mon, ITV) all come from Leeds... Larry Clark takes a somewhat indirect approach to conveying his safe-sex message in New York filth-fest KIDS (1.15am, Tue, C4)... and the September 11th build-up continues with HOW THE TWIN TOWERS COLLAPSED (8pm, Mon, C4), LET'S ROLL: THE STORY OF FLIGHT 93 (10.30pm, Wed, ITV), plus THE MEYSSAN CONSPIRACY (11.05pm, Tue, C4) - ie the French guy behind: http://www.asile.org/citoyens/numero13/pentagone/erreurs_en.htm ... away from the polluted nightmare of modern living, a family seek out a new way of life in Earth Summit tie-in A LAND WORTH LOVING (7pm, Wed, BBC1)... which coincidentally also forms the plot of this week's second Heather "Bowfinger" Graham turkey, LOST IN SPACE (7.55pm, Wed, BBC1) - not to be confused with the return of those annoying posh women in WORLD'S WORST DRESSED (8pm, Wed, BBC2), who have at least shut up about their always-doomed hideously purple e-commerce site: http://news.bbc.co.uk/1/hi/business/712188.stm ... FILM>> the comic skills of Cameron Diaz, Christina Applegate and Parker Posey combine in a cross between a teen smut comedy and an episode of "Sex And The City", THE SWEETEST THING ( http://www.screenit.com/movies/2002/the_sweetest_thing.html : As [Diaz] and [Applegate] drive down the road still dressed in just their bras and underwear, [Applegate] drops her bottle of fingernail polish. [Diaz] then goes over to get it, with her panty-covered butt in the air and her head down toward [Applegate]'s legs and crotch; [Selma Blair] [has] her mouth stuck around a man's privates after apparently performing oral sex on him)... Robin Williams plays a surprisingly convincing Hannibal Lecter in morally complicated Alaskan Al Pacino murder madness INSOMNIA ( http://www.cndb.com/ : You can see [Crystal Lowe's] tits in autopsy photos and again - along with bush - when she's seen on a autopsy table. Nice boobs but she's dead)... it's Eddie Murphy, Randy Quaid, Jay "Jerry Maguire" Mohr, John Cleese and Pam Grier - together at last! - in blaxploitation sci-fi spoof THE ADVENTURES OF PLUTO NASH ( http://www.screenit.com/movies/2002/the_adventures_of_pluto_nash.html : the woman then causes the image of [Rosario "Kids" Dawson] to suddenly have much larger breasts and an exaggeratedly large rear end)... all of which, shockingly, are an improvement on John Woo interspersing lame battle scenes with agonising anti- racist philosophising in WW2 Navajo crypto clunker WINDTALKERS ( http://www.capalert.com/capreports/windtalkers.htm : gambling; beheading; brief partial nudity of a Japanese soldier; I have no doubt that such gore is present in war but must it be regurgitated in and as entertainment?)... >> SMALL PRINT << Need to Know is a useful and interesting UK digest of things that happened last week or might happen next week. You can read it on Friday afternoon or print it out then take it home if you have nothing better to do. It is compiled by NTK from stuff they get sent. Registered at the Post Office as "yeah, but bet we were banned first" http://www.b3ta.com/newsletter/issue54/ NEED TO KNOW THEY STOLE OUR REVOLUTION. NOW WE'RE STEALING IT BACK. Archive - http://www.ntk.net/ Unsubscribe? Mail ntknow-unsubscribe at lists.ntk.net Subscribe? Mail ntknow-subscribe at lists.ntk.net NTK now is supported by UNFORTU.NET, and by you: http://www.geekstyle.co.uk/ (K) 2002 Special Projects. Copying is fine, but include URL: http://www.ntk.net/ Tips, news and gossip to tips at spesh.com All communication is for publication, unless you beg. Press releases from naive PR people to pr at spesh.com Remember: Your work email may be monitored if sending sensitive material. Sending >500KB attachments is forbidden by the Geneva Convention. Your country may be at risk if you fail to comply. From adam at homeport.org Sun Sep 1 15:26:16 2002 From: adam at homeport.org (Adam Shostack) Date: Sun, 1 Sep 2002 18:26:16 -0400 Subject: Backround checks are more important than education... Message-ID: <20020901182615.A86530@lightship.internal.homeport.org> http://news.bbc.co.uk/2/hi/uk_news/education/2229196.stm > Thousands of teachers will not be able to take classes at the start > of the new term because character checks on them will not have been > completed, the government has admitted. [...] > Leicestershire was one of the first areas of the country to be > affected by the vetting backlog as pupils returned to school last > Thursday, with schools being told to turn away teachers who had not > yet been checked. -- "It is seldom that liberty of any kind is lost all at once." -Hume From vab at cryptnet.net Sun Sep 1 16:18:59 2002 From: vab at cryptnet.net (V. Alex Brennen) Date: Sun, 1 Sep 2002 19:18:59 -0400 (EDT) Subject: Cryptographic privacy protection in TCPA In-Reply-To: <11c0e2885327b026ee29db536c29abbd@dizum.com> Message-ID: On Mon, 2 Sep 2002, Nomen Nescio wrote: > It looks like Camenisch & Lysyanskaya are patenting their credential > system. This is from the online patent applications database: > > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=camenisch&OS=camenisch&RS=camenisch > > Does anyone know how to contact the PTO regarding proposed patents, > perhaps to point out prior art? It's best not to contact the PTO or the patent holder with prior art. Gregory Aharonian has written some interesting material on this in his Patent News newsletter. If you contact the patent holder or the PTO with the prior art, it will likely be listed in the patent, or future patents if the application has already been granted. In the case of an existing patents, presenting prior art to the PTO can result it the prior art being given a "previously reviewed" status. Prior art with a "previously reviewed" status, or prior art listed on the patent are both much less effective in a defense case against an infringement claim. Therefor alerting the patent holder or the PTO to prior art would actually make the patent stronger and less likely to be invalidated. Basically, the patent system is so corrupt, the best thing to do is to avoid participating it in. Just like the US democratic system. - VAB From profrv at nex.net.au Sun Sep 1 03:52:30 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 20:52:30 +1000 Subject: CEO's are Psychopaths. Message-ID: <5.1.0.14.0.20020901205008.009f5450@mail.nex.net.au> "As well, psychopaths have been known to excel as politicians and lawyers..." Chief executives should be screened to weed out psychopaths: researcher Thursday August 28, 2002 - 16:00:33 EST MICHAEL MACDONALD ST. JOHN'S, Nfld. (CP) - At the conclusion of a sobering presentation littered with photos of Mafia hit men and sex offenders, Canadian researcher Robert Hare turns his attention to a little-known subset of psychopaths: the corporate kind. Hare, a world-renowned expert on psychopaths, then makes the provocative suggestion that some of the recent, blue-chip accounting scandals could have been prevented if all chief executives were screened for psychopathic behaviours. Please see below for some traits shared by psychopaths "Why wouldn't we want to screen for them?" he said Wednesday after a speech to 150 members of the Canadian Police Association. "We screen . . . police, teachers. Why not people who are going to handle hundreds of billions of dollars?" The problem is that corporate head hunters rely on resumes and standard face-to-face interviews, which reveal little about a candidate's psychological profile. "The average psychopath has no trouble moving through that process," said Hare, who teaches at the University of British Columbia. "That's not even a hurdle." Hare estimates that about one per cent of the population - that's about 300,000 people in Canada - are clinical psychopaths. That's why he's working on something called the B-Scan, a rough checklist to help recruiters quickly spot psychopathic character traits among potential employees. It will be loosely based on a 90-item checklist called a P-Scan, which Hare developed for police officials, prosecutors, corrections personnel and hostage negotiators. Through his research, Hare has found psychopaths possess a cluster of personality traits, which are reflected in their relationships, emotions and lifestyle. Aside from having no hint of a conscience, psychopaths have a barren emotional life marked by few close relationships, impulsive behaviour and an inflated sense of self. They are deceitful, short-tempered and display early behavioural problems that later become anti-social. They also crave excitement and are irresponsible. "They are the central star in their universe," Hare told the crowd as photos of well-known business executives flashed on the big screen behind him. Most of the pictures were taken from recent newspaper articles related to the collapse of energy trader Enron Corp. and telecom giant WorldCom Inc. The deceptive accounting practices and fraudulent dealings of these and other companies in the United States and Canada have led to huge losses on the stock market, massive layoffs and a string of court cases. "These are callous, cold-blooded individuals . . . They don't care that you have thoughts and feelings. They have no sense of guilt and remorse." That's why the arrogant, manipulative behaviour of psychopaths often make them prime candidates for promotion within large corporations built on ruthless competition. As well, psychopaths have been known to excel as politicians and lawyers, Hare says, drawing a round of laughter from the crowd at a downtown hotel. "They have to make decisions very quickly, and they can't worry too much about the potential impact on individuals," Hare said afterward. More importantly, their utter lack of empathy makes them perfect for carrying out budget cuts and layoffs. "That's when the psychopath moves in: rightsizing, downsizing, upsizing. When there's chaos, when the rules no longer apply - enter stage right the psychopath. A psychopath flourishes in that atmosphere." Still, identifying a psychopath isn't easy. Even a checklist isn't much use unless the interviewer has access to the candidate's family, friends and colleagues. "If an agency is willing to spend the money to do a proper job, then you can screen a lot of these people out," Hare said. "If you interview family members and friends, you'll realize there are lots of clues." - Some traits shared by psychopaths: Emotions: Glib, superficial, arrogant, narcissistic, egocentric, ruthless and short-tempered with a distinct lack of empathy and no conscience or sense of remorse. Relationships: Few close relationships and deceitful, but can be incredibly manipulative and charming despite shallow emotions. Lifestyle: Irresponsible, impulsive and sensation seeking but quite rational and able to act in real world. Early social problems often develop into anti-social behaviour later in life. Not rare: Estimated two million psychopaths in North America. Causes: Not scientifically known. Studies suggest a combination of nature and nurture, including abnormal brain functioning. No effective therapy. Source: Without Conscience, by Robert Hare (Guilford Press, 1999) © The Canadian Press, 2002 http://www.therecord.com/business/b082837A.html From profrv at nex.net.au Sun Sep 1 03:57:15 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 20:57:15 +1000 Subject: NYT a Holocaust denier. Message-ID: <5.1.0.14.0.20020901205542.009f2340@mail.nex.net.au> In the years that followed the Second World War, Lord Beaverbrook's old Sunday Express would regale its readers with the secret history of the 1939-45 conflict: "What Hitler would have done if England was under Nazi occupation"; "How Ike almost cancelled D-Day"; "Churchill's plans for using gas on Nazi invaders." Often – though not always – the stories were true. After war come the facts. It's not so long ago, after all, that we discovered that Nato's mighty 1999 blitz on Serbia's army netted a total of just 10 tanks. But it took Eric Lowe of Hayling Island in Hampshire to remind me of the inversion of history, the way in which historically proven facts, clearly established, come to be questioned decades later or even deleted from the record for reasons of political or moral weakness. Eric runs a magazine called Palestine Scrapbook, a journal for the old British soldiers who fought in Palestine – against both Arabs and Jews – until the ignominious collapse of the British mandate in 1948. In Mr Lowe's magazine, there are personal memories of the bombing of British headquarters at the King David Hotel in Jerusalem – a "terrorist" bombing, of course, except that it was carried out by a man who was later to become Prime Minister of Israel, Menachem Begin. Dennis Shelton of the King's Royal Rifle Corps writes a letter, recalling an Arab attack on a British Army lorry in Gaza. "We opened up on them, the ones who could still run away. We found two [British] army bods under the wagon, both badly wounded. I went in the ambulance with them to Rafah hospital. I was holding the side of one's head to keep his brains in. I often wondered if indeed they recovered." Mr Lowe has asked for information about the soldier whom Dennis Shelton tried to save. But he's probably wasting his time, because the British Army's first post-World War Two war – the 1945-48 conflict in Palestine – has been "disappeared", sidelined as something that no one wants to remember. According to Mr Lowe, many of the British campaign medals for Palestine were never issued. Dennis Peck, of the Sherwood Foresters, only realised he'd been awarded one in 1998. Until two years ago, the campaign was never mentioned at the Armistice parade in London. There's not even a definitive figure for the British troops who died – around 400 were killed or died of wounds. And it took over 50 years for British veterans to get a memorial for the dead: in the end, the veterans had to pay for it from their own pockets. But in the late Forties, all Britain was seized by the war in Palestine. When Jewish gunmen hanged two British sergeants, booby-trapping their bodies into the bargain, Britons were outraged. The British, it must be added, had just hanged Jewish militants in Palestine. But now – nothing. Our dead soldiers in Palestine, far from being remembered at the going down of the sun, are largely not remembered at all. So who are we frightened of here? The Arabs? The Israelis? And isn't this just a small example of the suppression of historical truth which continues over the 20th century's first holocaust? I raise this question because of a recent and deeply offensive article by Stephen Kinzer of The New York Times. Back in 1915, his paper – then an honourable journal of record – broke one of the great and most terrible stories of the First World War: the planned slaughter of 1.5 million Christian Armenians by the Turkish Ottoman government. The paper's headlines, based in many cases on US diplomats in Turkey, alerted the world to this genocide. By 16 September, a New York Times correspondent had spoken of "a campaign of extermination, involving the murdering of 800,000 to 1,000,000 persons". It was all true. Save for the Turkish government, a few American academics holding professorships funded by Turkey and the shameful denials of the Israeli government, there is today not a soul who doubts the nature or the extent of this genocide. Even in the 1920s, Winston Churchill himself called it a "holocaust". But not Mr Kinzer. Over the course of the past few years, he's done everything he can to destroy the integrity of his paper's brilliant, horrifying, exclusive reports of 1915. Constantly recalling Turkey's fraudulent claim that the Armenians died in the civil unrest in Asia Minor at the time, he has referred to the genocide as "ethnic cleansing" and treated the figure of 1.5 million dead as a claim – something he would surely never do in reference to the 6 million Jews later murdered by the Nazis. Recently, Mr Kinzer has written about the new Armenian Genocide museum in Washington, commenting artfully that there's "a growing recognition by advocacy groups that museums can be powerful tools to advance political causes". In other words, unlike the Jewish Holocaust museum – and the Jewish Holocaust itself, which would never be used by Israel to silence criticism of its cruel behaviour in the occupied territories – there might be something a bit dodgy about the Armenian version. Then comes the killer. "Washington already has one major institution, the United States Holocaust Museum, that documents an effort to destroy an entire people," Mr Kinzer wrote. "The story it presents is beyond dispute. But the events of 1915 are still a matter of intense debate." Are they hell, Mr Kinzer. But why should we be surprised at this classic piece of historical revisionism? Israel's own ambassador to present-day Armenia, Rivka Cohen, has been peddling more or less the same rubbish, refusing to draw any parallels with the Jewish Holocaust and describing the Armenian Holocaust as a mere "tragedy". She is, in fact, following the official Israeli Foreign Office line that "this [Armenian Holocaust] should not be described as genocide".Israel's top Holocaust scholar, Israel Charney, has most courageously campaigned against those who lie about the Armenian genocide – I advise readers to buy his stunning Encyclopaedia of Genocide – and he has been joined by many other Jewish scholars. But with Turkey's alliance with Israel, its membership of Nato, its possible EU entry, and its massive arms purchases from the United States, the growing power of its well-paid lobby groups has smothered even their efforts. Which raises one last question. Armenian academics have been investigating the identity of those young German officers who were training the Ottoman army in 1915 and who in some cases actually witnessed the Armenian Holocaust – whose victims were, in some cases, transported to their deaths in railway cattle-cars. Several of those German soldiers' names, it now transpires, crop up again just over a quarter of a century later – as senior Wehrmacht officers in Russia, helping Hitler to carry out the Jewish Holocaust. Even the dimmest of us might think there was a frightening connection here. But not, I guess, Mr Kinzer. Nor the modern-day New York Times, which is so keen to trash its own historic exclusives for fear of what Turkey – or Israel – might say. Personally, I'd call it all a form of Holocaust denial. http://argument.independent.co.uk/commentators/story.jsp?dir=140&story=328955&host=6&printable=1 From David_LaRock at yahoo.com Sun Sep 1 19:04:45 2002 From: David_LaRock at yahoo.com (David LaRock) Date: Sun, 1 Sep 2002 21:04:45 -0500 Subject: Create a PAYCHECK with your COMPUTER Message-ID: <265845-22002912244560@yahoo.com> You get emails every day, offering to show you how to make money. Most of these emails are from people who are NOT making any money. And they expect you to listen to them? Enough. If you want to make money with your computer, then you should hook up with a group that is actually DOING it. We are making a large, continuing income every month. What's more - we will show YOU how to do the same thing. This business is done completely by internet and email, and you can even join for free to check it out first. If you can send an email, you can do this. No special "skills" are required. How much are we making? Anywhere from $2000 to $9000 per month. We are real people, and most of us work at this business part-time. But keep in mind, we do WORK at it - I am not going to insult your intelligence by saying you can sign up, do no work, and rake in the cash. That kind of job does not exist. But if you are willing to put in 10-12 hours per week, this might be just the thing you are looking for. This is not income that is determined by luck, or work that is done FOR you - it is all based on your effort. But, as I said, there are no special skills required. And this income is RESIDUAL - meaning that it continues each month (and it tends to increase each month also). Interested? I invite you to find out more. You can get in as a free member, at no cost, and no obligation to continue if you decide it is not for you. We are just looking for people who still have that "burning desire" to find an opportunity that will reward them incredibly well, if they work at it. To grab a FREE ID#, simply reply to: david_larock at yahoo.com and in the body of the email, write this phrase: "Grab me a free membership!" Be sure to include your: 1. First name 2. Last name 3. Email address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your free Member Number. That's all there's to it. We'll then send you info, and you can make up your own mind. Looking forward to hearing from you! Sincerely, David LaRock P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This is different - there is value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. Unsubscribing: Send a blank email to: david_larock at yahoo.com with "Remove" in the subject line. Thank you for checking out our new ISP! http://snow.prohosting.com/harddrv From profrv at nex.net.au Sun Sep 1 04:08:42 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 21:08:42 +1000 Subject: In the Kingdom of Fear. Message-ID: <5.1.0.14.0.20020901210650.009f5700@mail.nex.net.au> Gonzomeister Hunter S Thomson on 9-11. Q: what I'd really like to know is your reactions on September 11th .. could I get you to tell that story ... A: ... in a low-key way, I had in fact just finished a sports column for ESPN, and no sooner gone over the wire, and I was on the phone with editor john walsh, he was saying you have to write about this disaster. I'd been gong to bed after, I guess my column was late -- TV was on, just for the news, and I happened to see the first plane hit in my fogged condition -- I'd been up all night writing the column ... I don't know why, I'd seen enough real -- yeah there was no mistaking the reality of that, didn't make much sense, and it still doesnâ??t really but -- here we go, this is a column I wrote, lets see -- "It was just after dawn in Woody Creek, Colorado when the first plane hit the WTC in NYC on Tuesday morning and as usual I was writing about sports. But not for long. Football suddenly seemed irrelevant compared to scenes of utter devastation coming out of NY on the television. Q: you went on to say in that article which I have in front of me that even ESPN was broadcasting war news. It was the worst disaster in the history of the US. do you think that the event completely transformed the way in which Americans see themselves and their vulnerability A: No, the event by itself would not have done that. I've seen planes hit the Empire State Building before, I've been blown totally out of my mind, people have been killed, but it was the way the administration was able to use that event and use it as a springboard for anything they wanted to do. Now that may tell you something. I remember when I was writing that column, you sort of wonder when something like that happens, well, who stands to benefit, You know, it's like murder, you know, who had the opportunity and the motive, you just kinda look at these basic things, and Uh, I don't know if I want to go into this on world-wide radio here, but Q: You may as well A: All right, I thought that the US government was gonna benefit, and the White House people. I thought, a distraction to take the mind of the public off of the crashing economy. Now you want to keep in mind that every time a person named Bush goes into office, the nation goes into a drastic --recession, they call it. Q: It sounds almost like the plot of that film Wag the Dog, where film producers sort of concocted a national event to inspire patriotism to take the public's mind off misdemeanors committed by the president, I mean, it seems a very long bow to me, but are you sort of suggesting that this worked in the favor of the Bush administration? A: absolutely, I sort of had time on the inside of the white house and of campaigns and I know enough to know that the public version of an event is never really what happened, and these people I think are willing to take that even further so that I don't assume that I know the truth about what went on that day and yeah, well, I just look around and who had the motive, who had the opportunity, the equipment, and the will. These people were looting the treasury and they knew that the economy was going into a spiral downward Q: from this distance though it does seem extraordinarily conspiratorial that you, that you could sit there and you could see the hand of the US government in that rather than saying international terrorists bent on somehow hurting America and the American people. What sort of reaction did your views get amongst other journalists? A: (Laughs) well, it was greeted universally with kind of nervousness and almost nobody agreed with me. No it was about 99 to 1. But since then... Q: Did you publish those views anywhere? A: I'm not sure if Iâ??ve said that, but if I haven't I meant to, let's see.. Q: I was going to ask you for the reaction to them, because I mean I don't want to seem Pollyanaish here but it does seem an extraordinary conspiracy theory that you're putting forward, that your first reaction was that it was the US government rather than an enemy of the US government A: well, you want to keep in mind that I have lived not just through but very close to a lot of real tragedies in this country, and let me ask you, do you think that you know who killed John Kennedy or Robert Kennedy? Q: Look, I have to say that I was a boy at the time, and no I havenâ??t read the warren commission report, but it seemed to me that in this case, there were so many more people involved, it would seem to be much less likely some sort of internal conspiracy A: well, it does, well I can see where you're a little edgy accepting this from me, Q: well, let me just ask you on that, you've pioneered a kind of journalism called gonzo journalism in which it's almost like thereâ??s no revision, what you see and feel is what goes down on and it's that first blush, that first image that hits the readership. Does that mean that in a way, it's hard for you to appear credible within the US media, people would say that "oh that's just another conspiracy theory from a drug-addled gonzo journalist like Hunter S. Thompson"? A: yeah, that's a problem, Iâ??m not sure if it's my problem or other people's -- or theirs. I mean in this column and the one after it -- I've been right so oftem, my percentages are so high, I'll stand by this column that I wrote that day, and the next one. So that, what appears to be maybe gonzo journalism... Well, I'm not sure, I'm not going to claim any prophetic powers but Q: One of the things you do say in that first article you wrote, you say, "It's now 24 hours later. we're not getting much information about the 5 Ws of this." Now by the "5 Ws" I'm assuming you mean, the who, what, why, how -- is that still how you feel, that a year later those key questions havenâ??t been answered? A: Absolutely, it's even worse now -- I mean this is just a suggestion, 24 hours later 5 Ws. We're still not getting -- well how much have we got beyond that? How much more do we have than we had a year ago? Damn little, I think. We know a lot about the firemen who died. A lot about the people who stole the money from their charity funds, A lot about the people who donated all that blood, the red cross had to throw away 5 tons of blood, something like that, that may be exaggeration, But no, I will stand by almost all my, uh, well, no no, get a grip on yourself, Doc, when you talk like that... Q: Well, just, Hunter S Thompson, let me ask you about your new book I mean "The Kingdom of Fear, Loathsome Secrets of a Star-Crossed Child of the American Dream". It's a very apocalyptic title. Has this book, this new book, has it come off your reflections about Sept 11th and how it was handled by the American media? A: well, it came off of yeah, the atmosphere in this country as of September 12. Yeah, kingdom of fear. That's the way I see this country and thatâ??s -- Iâ??m not writing just a long screed, you know, front to back, I'm not writing a political tract. But in the book, I'm trying to explain a little bit about how I got this way, and why you should pay attention to my predictions Q: is this a critical time for the credibility of US journalism, how this current war, how it's being covered and who it's being reported on and the sort of information US people get? Is this a critical test of the credibility of US journalism? A: I think definitely, but Iâ??m not sure how much credibility US journalism really has, given that we in 5 years we lost 2 presidents and a civil rights leader to mysterious bombs and assassins, you know, bushy haired strangers, and US journalism has never dug out the truth about that. One of my great shames as a journalist is that I still don't know who killed John Kennedy. There's no doubt that I don't know and there's not much doubt that journalism in general doesn't know, and in a lot of ways that may be because we haven't asked. When I say asked, I mean the people who uh --well most of the witnesses were killed, werenâ??t they? Q: but does that need for certainty, is that what underpins your critique, that US journalism has failed to provide in your life the key answers to key events that you needed answered? A: well, I would say that and would include myself, I worked as hard as anybody -- the rules really changed when Reagan came in and started these test invasions of other countries, and when they decided to test the policy of no more battlefield access for any journalist. See, Vietnam was totally different, and that's why we got that war ended. But, I start with Grenada and thatâ??s in this book too. You could see it forming right there. I'd never seen journalists beat up by military police and hogtied in the middle of the road. I'd always had press pass and access. But when the military -- the Pentagon reallyâ??-thatâ??s when they seized the advantage and never gave it up. The military still are not letting people know what's happening in Afghanistan and wherever they're fighting. Itâ??s always press releases or staged events Q: Hunter S Thompson, do you think that the so called gonzo style of journalism for which youâ??ve become famous and some would say notorious, do you think that there's a specific legacy that makes that type of journalism work, makes it more necessary at the moment? A: Well, I've never defined that term even for myself Q: what do you think it does mean ? A: Well, from my point of view it means being very skeptical of any pronouncements of authority, and that as a gambler, it's a bit of an even bet that if you question the statements and truths of the white house that more often than not youâ??ll be right, and I just try to get as close to the truth as possible in order to find out what's really happening, and in fact a lot of times itâ??s weirder than what happens in my stories. I mean the truth is usually stranger than fiction. At least in my life. Q: HST, will you be at home watching the commemoration programs on the 11th of September? Will you be among the audience which I imagine will number tens of millions that watch what happens in New York? A: that's a good point, thatâ??s a good question and, no I wonâ??t -- I think I'll take a road trip or just go off and have a little fun. Why sit around and watch that stuff? Now what I'm afraid of, see is that that's going to be a cover for a sudden move on Iraq -- you know, that that little monster will come on and take the TV and say "today we invaded Iraq". Now, this seems so impossible that I'd be happy to lose money on it if I bet on it, but it seems too logical for that kind of Texas thug mindset that this is a time to do it. I can't think of a better time if I was gonna do it, letâ??s put it that way. Q: Because the nation's effectively distracted by the commemorations in NY that itâ??s almost like saying "Quick while no oneâ??s paying attention let's invade another country" A: exactly, and itâ??s so cynical and so stupid and so self-defeating in the long run that youâ??d think that nobody in their right mind, no president would plunge us into a war like that, with no allies and no __the other side of the world Q: just out of interest, for these kinds of comments to be broadcast on this network, which is part of the public broadcasting network, it occurs to me that you probably wouldnâ??t hear those sorts of comments on many other outlets in the US. Where would ... to give voice to your conspiracy theories about the role of the US government.? A: well. I definitely will be when this book comes out in December. Now unfortunately we're going to have this election here in November. And that's going to be a really key time in this country to vote. I've been working on this book for so long, I feel like Iâ??ve been in a decompression chamber of some kind. Q: Where else would people hear views like yours. I know theyâ??re coming out later in the year in your book, But across the US media, where would these very critical comments such as the one you've been making come out? A: where else, eh? Where indeed. I know a lot of journalists across the country who would agree with me. But whether theyâ??re writing this stuff and saying it in public I donâ??t know. Now you could ask Maureen Dowd whether she feels Iâ??m right. Boy, it really is lonely out here. Q: HST, just as a final question -- it's a big question, let me ask it anyway. How did you see, as a critic on the left of â?¦ how do you see the future of journalism in your country? A: Well, I have a very dim view of it, I guess which I really thought was unbounded after Watergate but right now, thereâ??s not a hell of a lot of reason to be optimistic about it, because of the uh, not just because of this one huge scam they pulled off here, but because of the everyday reality of, uh, journalism is celebrity-driven. The news over here barely covers, ...I watch some BBC and some CNN foreign news, world news that doesnâ??t get into the country. I read Paris herald tribune that kind of news doesn't get through in this country. You have to read the NY Times very carefully to maybe see what they're talking about. But, I don't think my views would be seen as absurd or out of the question in most countries of the world. Q: Do you ever worry given the climate and the surge of patriotism in the country, that you could be personally at risk, that your own personal security might be threatened A: yeah, I think about it. Definitely could be true Q: have there been occurrences youâ??ve been threatened? A: oh yeah. I have been all my life. But in journalism, that sort of goes with the territory, thereâ??s going to be threats and thereâ??s going to be... people are very unhappy -- knock knock -- It's a matter of luck. I pretty well stuck to my battle plan, yeah they tried to come after me, the federal government, all kinds of governments, Iâ??ve had constant wars in courts, I keep some of the finest criminal lawyers on retainer. But that's how it goes -- the stork didn't bring the bill of rights, you have to fight for it. Q: So that's how you'd see yourself, as fighting for freedom of speech in America? A: Absolutely. http://www.indymedia.org/front.php3?article_id=201001&group=webcast From profrv at nex.net.au Sun Sep 1 04:18:43 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 21:18:43 +1000 Subject: What do you call 2 americans shot dead? Message-ID: <5.1.0.14.0.20020901211517.009f50b0@mail.nex.net.au> A good start. A top figure in a terrorist group has told his armed fighters to target American interests and to extort, kidnap and murder American citizens. "The United States has declared war," he said in a radio message to armed followers. "Your obligation is to fight them." Instructions from a bin Laden deputy holed up in a cave somewhere? Maybe a radical Islamic band in Pakistan? Or extremists in the land of our "ally" Saudi Arabia? None of the above. Wrong region. The threat comes from our very own hemisphere, and was issued by professor Rat. "Leading the world to higher consciousness through mockery and cheap publicity stunts." Face It: Mental Health Isn't for Everyone "...Professor Rat is fully responsible the lives of two Americans and one Indonesian who have been killed today, 31 August 2002. In his ceremonial speech at the 57th anniversary of the unitary Republic of Indonesia (NKRI) on 17 August 2002, he said, "Papua is not a conflict area!", which indicated: - that he does not care at all about and totally ignore the complexities of problems in his own country; - that he is one of the agents of and has already been bought up by the colonial power of NKRI in West Papua; - that he has betrayed his people and his country, and particularly those who died for their independence; Salossa furthermore claimed West Papua as a "Peace Zone" a term that Operasi Adil Matoa 2002 has been using to eliminate the independence movement. "West Papua is not a Peace Zone, it is absolutely a War Zone since 1961, when Trikora was declared in Yogyakarta (Indonesia, 19 December 1961)", says the courier quoting Gen. Murib. "West Papua does have complexities of problems, be it political, economic, human rights, legal, peace, security, and so on. West Papua has people who were killed, who are suffering and who are being chased day and night," Murib was quoted saying. It has flora and fauna as well as natural resources being exploited massively without any concern at all to the ecology and ecosystem of our heritage. Furthermore, he claimed, "Freeport MacMoRan, Copper & Gold Inc. is politically, environmentally and legally responsible for problems in West Papua. Freeport was the compensation given to the states for allowing West Papua to be occupied by ndonesia. "Freeport is a bloody political project of the modern world that has sacrificed the livelihood of tribal people in West Papua. Papuan people have something to do with it, if not today, it will be done tomorrow, surely, surely!"Gen. Murib also said, "West Papuan people have been demanding Indonesia to open a dialogue table, but has refused to do so and it has responded with brutal acts, by exploiting, raping, killing and hunting other humans into the jungles. The colonial governor of Papua is not listening to his people's demand for dialogue, but advocating its bosses' orders to implement special autonomy by force. "Jaap Salossa is indeed fully responsible to give answers to the world: "IS NOT WEST PAPUA A CONFLICT TERRITORY? www.westpapua.net From profrv at nex.net.au Sun Sep 1 05:38:46 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 22:38:46 +1000 Subject: Net Censorship au style. Message-ID: <5.1.0.14.0.20020901222528.009e6ec0@mail.nex.net.au> Indymedia is under repression,its happened twice before.The first shut down Seattle and the Ohio server is no longer with us.See the main board at FBI/legal updates.lower left. On sept 11 the police are charging a mentally disabled man with threats to kill them.One was a comment to a post made here on May 8 and another on june 1 of 01. The Ohio legal situation arose after some local LEO's decided to set up grand juries and issue subpoena's before actually writing to the address provided on the offending post. Vic.Police followed precedent by not seeking to write the address provided.They did use a ph no on one of the posts to 'sting' the MD man by pretending to be from his ISP and offering a 'special deal.' The 'deal' turned into an ordeal for Matt Taylor of Kyneton. He was rousted for two hours,had things stolen and was later threatened at the police station.Taylor was charged with some petty public order offence's committed at M1 last year.The good behavior bond issued for those expire in Oct. Apart from that there is no criminal history.The police kept a computer seized from Taylor and finally examined it. The computer policeman who examined it,(actually a 'ghost' copy of the hard drive.)said he found 21 items of interest on the computer. Two have been put forward as supposed evedence of the crime of 'threats to kill.'1 is a copy of an e-mail sent sometime after the May 8 post.It's datestamped and it differs from the posts timestamp. The second item is a copy of a post that went up on June 1. It is not timestamped apart from the time on the Indy site that it was made. The Police are seriously putting forth the proposition that a few Kbs of data out of Gigabytes that someone stored and/or sent from the laptop prove >beyond reasonable doubt < that Taylor is their man. That no one else had the means motive and opportunity? Give us a fucking break. When Ashley Gardiner of the Hun wrote to Declan Mc Cullogh he wrote,"we got your man!" Note the 'we'. The Hun provided the police with a small mountain of their surveillance tapes and photo's of M1. 25,000$ reward was offered for Taylor's arrest in mid May by the La Raza Nazi organization.Many Threats were directed at Taylor by various different sounding anonymous cowards.The nom de Guerre allegedly used by Taylor appears to have been used by other(s) and in a way as to discredit him. 250$ was regularly offered to punch Taylor in the face hard enough to knock him down.All this on IMC's If you search yourself you will find many posts under the name 'proffr' and 'profrv.'Do they all appear to be from the same man? We have all put up with the long standing Hatfield-McCoy fued of Mayne and Hoser.Thats not the only disputed ID war on Indymedia. The police themselves say in court,"this(indy)site is one where anyone can download." Therefore ANYONE online at the time those "threats," were made could have made them by the Police's own admission. So why delay a trial,bring frivolous charges and harass the defendant and even try and nobble him? FOI has already exposed much about this,no doubt much more will come out. Like who was the mysterious 'observer' at Taylors arrest? Who was in charge,State or Feds? or the (ASIO?) 'Observer.'? Why was a US SS agent overseeing the arrest? Does the US want to extradite Taylor as has been alleged by Taylors case worker,Julian Jamieson of Kyneton? What will happen to Indymedia when someone alleged to be a regular contributor is found guilty of offences carrying a 20 year penalty? If anyone can be found guilty of such an 'offence' in this way then is anyone contributing here safe? Is the ultimate aim of this prosecution to chill Indy comment? Where else is this occurring? This is from EFA.and FBI/legal link... http://www.sjgames.com/SS/ August 31. -- Closure of the outspoken Internet forum Baiyun Huanghe after students posted messages about the 1989 Tiananmen Square massacre. DFN and other NGOs reported about the closure on September 6. The Baiyun Huanghe bulletin board service (BBS - formerly hosted at http://bbs.whnet.edu.cn) belonged to the Huazhong University of Science and Technology (Wuhan, Hubei province). University officials announced that they were temporarily shutting down the BBS, which had 30,000 registered users, "due to technical problems." A school official told Reuters that the university's party committee would manage the BBS after the shutdown. Users would be required to register with their real names and identification numbers. DFN said "online discussion of the closure continues on other sites". "For example, an Internet forum for Huazhong University alumni (http://www.neurophys.wisc.edu/~cai/hust/) has been active since Baiyun Huanghe was shut down. The alumni forum is run by a nonprofit alumni organization based in the U.S." Last March, DFN added, the Sina.com Web site "erased hundreds of messages from its chat rooms which expressed outrage about an explosion that destroyed an elementary school ... killing 38 children. Government officials had claimed that the explosion was the result of a mad bomber, but parents said cash-strapped teachers forced children to assemble fireworks inside the school." "And last June, authorities closed online forums at the Southern Weekend weekly newspaper and the Xici Hutong Web site's Democracy and Human Rights Forum after people expressed concern about recent newspaper closures and firings." + Main source: DFN, Sept. 6 + An updated list of online forums closed in China (DFN) "...This approach is taken in Australian Commonwealth law (although it has not been enforced in this manner to date) and also in, for example, China, Saudi Arabia, Singapore, the United Arab Emirates and Vietnam. Some countries require Internet access providers to block material while others only allow restricted access to the Internet through a government controlled access point. http://www.efa.org.au/Issues/Censor/cens3.html "...In contrast to Australia, governments in comparable countries including Canada, New Zealand, the United Kingdom and various European countries have chosen to legislate to give citizens a right in domestic law to freedom of expression similar to that contained in the International Convention on Civil and Political Rights (ICCPR). Such a right is by no means absolute and does not prevent governments from enacting or enforcing laws restricting freedom of expression. However, to the best of EFA's knowledge, governments in these countries have not enacted or indicated any intent to enact, Internet censorship legislation as restrictive of adults' freedom of expression, as that existing and proposed in Australia. "..."China has issued its most intrusive Internet controls to date, ordering service providers to screen private e-mail for political content and holding them responsible for subversive postings on their Web sites. ... Under the new rules, general portal sites must install security programs to screen and copy all e-mail messages sent or received by users. Those containing 'sensitive materials' must be turned over to authorities. Providers are also responsible for erasing all prohibited content posted on their Web sites, including online chatrooms and bulletin boards. "...In Saudi Arabia, public access to and from the Internet has been funnelled through a single government controlled centre since February 1999 when Internet access was first made available. From this centre, the government blocks access to Internet content deemed unsuitable for the country's citizens..." "...In May 1998, the Swedish Parliament enacted the "Act (1998:112) on Responsibility for Electronic Bulletin Boards". Electronic bulletin board is defined so as to include storage of data on the Internet, such as web pages, etc (thereby excluding personal e-mail that is only stored in individuals' mailboxes). The law places an obligation on service providers who store information (not those who only provide connections to the Internet) to remove or make inaccessible content that is obviously illegal (they do not have to decide in doubtful cases) according to the penal code, that is: instigation of rebellion (section 16 article 5) racial agitation (section 16 article 8) child pornography (section 16 article 10) illegal description of violence (section 16 article 10) or when it obvious that the user has infringed copyright law. According to explanations of the law made by the government, in computer areas where illegal messages often occur, the service providers must check what is stored, but in other areas, it is enough compliance for service providers to check when someone complains that something illegal has been stored. The above information is a very brief summary of information available (as at March 2002) on the web site of Jacob Palme of the Department of Computer and Systems Sciences, Stockholm University/KTH. For more detailed information see Jacob Palme's pages: Swedish Attempts to regulate the Internet - BBS Act http://dsv.su.se/jpalme/society/swedish-attempts.html#Heading12 Swedish BBS Act http://dsv.su.se/jpalme/society/swedish-bbs-act.html From profrv at nex.net.au Sun Sep 1 06:53:24 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 01 Sep 2002 23:53:24 +1000 Subject: Apster thread at anti-state and GREAT DANE! Message-ID: <5.1.0.14.0.20020901234728.009f7b10@mail.nex.net.au> http://www.anti-state.com/murphy/murphy18.html Reduced to rooting around in the forest floor with ancap swine,FUCK me DEAD! Great Dane for BBS's http://melbourne.indymedia.org/front.php3?article_id=32685&group=webcast "...is someone in victoria been charged for writting something on indymedia? " Yes and he even leaves his MOTHERFUCKING E_MAIL ADRESS there.I despair sometimes,I swear.All I ask is a a small group of thoughtful, committed netizens,is that too FREAKING MUCH! AARRRRGGGGHHHH! From nobody at dizum.com Sun Sep 1 15:10:06 2002 From: nobody at dizum.com (Nomen Nescio) Date: Mon, 2 Sep 2002 00:10:06 +0200 (CEST) Subject: Cryptographic privacy protection in TCPA Message-ID: <11c0e2885327b026ee29db536c29abbd@dizum.com> It looks like Camenisch & Lysyanskaya are patenting their credential system. This is from the online patent applications database: http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=camenisch&OS=camenisch&RS=camenisch > Non-transferable anonymous credential system with optional anonymity > revocation > > Abstract > > The present invention relates to a method and system for securely > proving ownership of pseudonymous or anonymous electronic credentials. A > credential system is described consisting of users and organizations. An > organization knows a user only by a pseudonym. The pseudonyms of the > same user, established for use with different organizations, cannot be > linked. An organization can issue a credential to a pseudonym, and the > corresponding user can prove possession of this credential to another > organization that knows him under another pseudonym. During the prove of > possession of the credential nothing besides the fact that he owns such > a credential is revealed. A refinement of the credential system provides > credentials for unlimited use, so called multiple-show credentials, > and credentials for one-time use, so called one-show credentials. Some of the claims seem a little broad, like this first one: > 1. A method for establishing a pseudonym system by having a certificate > authority accepting a user as a new participant in said pseudonym system, > the method comprising the steps of: receiving a first public key provided > by said user; verifying that said user is allowed to join the system; > computing a credential by signing the first public key using a secret > key owned by said certificate authority; publishing said first public > key and said credential. Wouldn't this general description cover most proposed credential systems in the past, such as those by Chaum or Brands? Does anyone know how to contact the PTO regarding proposed patents, perhaps to point out prior art? From profrv at nex.net.au Sun Sep 1 07:15:02 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 00:15:02 +1000 Subject: Oxymorons R us- Australian Intelligence. Message-ID: <5.1.0.14.0.20020901235756.009f78a0@mail.nex.net.au> The Australian Secret Intelligence Service (ASIS) Disclaimer The Australian Secret Intelligence Service (ASIS). Disclaimer. Please do not enter the web pages of the Australian Secret Intelligence ... Oh go on...be a devil... http://www.asis.gov.au/ ASIS was formed in 1952 but the organisation was not publicly acknowledged until 1977 Maybe because it was first called ASS.Aussie secret service.The I was added later for some weird reason.Maybe they were embarrassed about being set up with major input from a spy,Charles Ellis,who gave the nazi's the entire battle order of England in1940. He may have spied for the Russkies when they were at their most evil too.Guess youd want to keep that secret as long as you could. 1977. At that time the Prime Minister stated to Parliament that 'ASIS' capacity to serve Australia's national interest will continue to depend on its activities being fully protected by secrecy.' Well wouldn't you if the CIA's,"our man Kerr,"had placed you there as PM in a coup? "They have a terrific sense of humour down there in OzzieLand." W.Colby.Nugan Hand.director. ASIS is not a police or law enforcement agency. It is prohibited by law from planning for, or undertaking, paramilitary activities involving violence against the person or the use of weapons. "Cept when training eh boys!" Hahaha! http://www.aic.gov.au/publications/lcj/wayward/ch8.html Theres heaps more but I just started so Ill post this now before I get shot or something. From mmsfyn at msn.com Sun Sep 1 21:38:13 2002 From: mmsfyn at msn.com (Stephanie Azizuddin) Date: Mon, 02 Sep 2002 00:38:13 -0400 Subject: cypherpunks@algebra.com Here's Your FREE TRIAL Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 808 bytes Desc: not available URL: From alert at dianalist.com Mon Sep 2 01:16:19 2002 From: alert at dianalist.com (Colonial Mint) Date: Mon, 2 Sep 2002 03:16:19 -0500 (CDT) Subject: Fwd: FWD: September 11 2001 Anniv Memorial. 8 days left. Message-ID: <200209020816.g828GEa59577@mtz96.fztrk.com> > P.S.: All Americans should get one. Forward > this message to all your friends. > > --------------------------------------------------------------------- > ~~ Diana's Goodies Newsletter: August 27th 2002 ~~ > --------------------------------------------------------------------- > > Thank you for your subscription. > As a valued Dianalist subscriber, check out this special gift. > > > > > +--------------------------------------------------------+ > 911 Anniversary souvenir > +--------------------------------------------------------+ > > Free with no shipping cost. Grab one of this hot gift, > available to all Americans for free. (valid until Sep 11 2002) > http://www.dianalist.com/freebie/sample20020802.shtml > > > > > > +--------------------------------------------------------+ > September 11 2001 Memorial. Free gift with no shipping. > +--------------------------------------------------------+ > > Perfect gift for mom, dad, family members, friends and > co-workers. (valid to U.S. Residents Only) > http://www.dianalist.com/freebie/sample20020802.shtml > > > > > > +--------------------------------------------------------+ > ~~~ Sept 11 2001 Anniv Dollar gift. > +--------------------------------------------------------+ > > Limited collector item. Grab one of the hottest > American collection for FREE before Sep 11 2002. > http://www.dianalist.com/freebie/sample20020802.shtml > > Yours, Diana Shopper List Editor ----------------------------------------------------- Subscription Information ----------------------------------------------------- This email is part of your Dianalist Newsletter subscription. If you are no longer interested, please forward this email to: unsubscribenow at dianalist.com We welcome suggestions, comments and feedback. Contact us at: optinsupport at dianalist.com ========================================================== Dianalist.com (c) All rights reserved. From alert at dianalist.com Mon Sep 2 01:33:09 2002 From: alert at dianalist.com (Colonial Mint) Date: Mon, 2 Sep 2002 03:33:09 -0500 (CDT) Subject: The Sep 11 Anniv Bush Dollar souvenir. 9 days left. Message-ID: <200209020833.g828X8p08617@alk.bayink.com> > P.S.: All Americans should get one. Forward > this message to all your friends. > > --------------------------------------------------------------------- > ~~ Diana's Goodies Newsletter: August 27th 2002 ~~ > --------------------------------------------------------------------- > > As a valued Dianalist subscriber, check out this special gift. > Thank you for your subscription. > > > > > +--------------------------------------------------------+ > ~~~ Sept 11 2001 Anniv Dollar gift. > +--------------------------------------------------------+ > > Limited collector item. Grab one of the hottest > American collection for FREE before Sep 11 2002. > http://www.dianalist.com/freebie/sample20020802.shtml > > > > > > +--------------------------------------------------------+ > The Gift Dedicated to 911 Anniv Memorial > +--------------------------------------------------------+ > > Grab this President Bush 911 Dollar Bill for FREE. > Offer valid to U.S. residents only. > http://www.dianalist.com/freebie/sample20020802.shtml > (Note: Due to heavy demand, limit 1 order per person.) > > > > > > +--------------------------------------------------------+ > Sep 11 Bush Memorial Dollars. Free with NO SHIPPING! > +--------------------------------------------------------+ > > Free Sep 11 Memorial gift for mom, dad, family and friends. > Every American should have one. > (Note: Due to heavy demand, limit 1 order per person.) > http://www.dianalist.com/freebie/sample20020802.shtml > > Yours, Diana Shopper List Editor ----------------------------------------------------- Subscription Information ----------------------------------------------------- This email is part of your Dianalist Newsletter subscription. If you are no longer interested, please forward this email to: unsubscribenow at dianalist.com We welcome suggestions, comments and feedback. Contact us at: optinsupport at dianalist.com ========================================================== Dianalist.com (c) All rights reserved. From mwsu674 at framesetup.com Mon Sep 2 00:47:00 2002 From: mwsu674 at framesetup.com (mwsu674 at framesetup.com) Date: Mon, 2 Sep 2002 03:47 -0400 Subject: Huge natural tits Message-ID: <200209011937.g81JbiQC019839@ak47.algebra.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6906 bytes Desc: not available URL: From profrv at nex.net.au Sun Sep 1 12:17:00 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 05:17:00 +1000 Subject: I think I'm in love. Message-ID: <5.1.0.14.0.20020902050957.009f8af0@mail.nex.net.au> http://www.hup.harvard.edu/catalog/STEULT.html Its cherry blossom time in country Victoria.Looks like a bushfire summer's comin' "...Stern also holds out hope for new technologies that might combat this trend, and for legal and political remedies that would improve public safety without compromising basic constitutional rights." http://www.amazon.com/exec/obidos/tg/detail/-/0674003942/qid=1030907557/sr=1-1/ref=sr_1_1/104-3772013-0911143?v=glance&s=books From steve at tightrope.demon.co.uk Mon Sep 2 01:53:38 2002 From: steve at tightrope.demon.co.uk (steve at tightrope.demon.co.uk) Date: 02 Sep 2002 09:53:38 +0100 Subject: Backround checks are more important than education... In-Reply-To: <20020901182615.A86530@lightship.internal.homeport.org> References: <20020901182615.A86530@lightship.internal.homeport.org> Message-ID: Adam Shostack writes: > http://news.bbc.co.uk/2/hi/uk_news/education/2229196.stm > > > Thousands of teachers will not be able to take classes at the start > > of the new term because character checks on them will not have been > > completed, the government has admitted. > [...] > > Leicestershire was one of the first areas of the country to be > > affected by the vetting backlog as pupils returned to school last > > Thursday, with schools being told to turn away teachers who had not > > yet been checked. This is in the context of a knee jerk reaction to an apparent murder case of two young girls where one of the two accused worked in the girl's school. -- Steve Mynott From supasayinron at hotmail.com Sun Sep 1 17:31:31 2002 From: supasayinron at hotmail.com (supasayinron at hotmail.com) Date: Mon, 2 Sep 2002 10:31:31 +1000 Subject: Create a PAYCHECK with your COMPUTER... Message-ID: <200209020015.g820FoQC007954@ak47.algebra.com> Hello, You get emails every day, offering to show you how to make money. Most of these emails are from people who are NOT making any money. And they expect you to listen to them? Enough. If you want to make money with your computer, then you should hook up with a group that is actually DOING it. We are making a large, continuing income every month. What's more - we will show YOU how to do the same thing. This business is done completely by internet and email, and you can even join for free to check it out first. If you can send an email, you can do this. No special "skills" are required. How much are we making? Anywhere from $2000 to $9000 per month. We are real people, and most of us work at this business part-time. But keep in mind, we do WORK at it - I am not going to insult your intelligence by saying you can sign up, do no work, and rake in the cash. That kind of job does not exist. But if you are willing to put in 10-12 hours per week, this might be just the thing you are looking for. This is not income that is determined by luck, or work that is done FOR you - it is all based on your effort. But, as I said, there are no special skills required. And this income is RESIDUAL - meaning that it continues each month (and it tends to increase each month also). Interested? I invite you to find out more. You can get in as a free member, at no cost, and no obligation to continue if you decide it is not for you. We are just looking for people who still have that "burning desire" to find an opportunity that will reward them incredibly well, if they work at it. To grab a FREE ID#, simply reply to: veronicawillis1975 at hotmail.com and in the body of the email, write this phrase: "Grab me a free membership!" Be sure to include your: 1. First name 2. Last name 3. Email address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your free Member Number. That's all there's to it. We'll then send you info, and you can make up your own mind. Looking forward to hearing from you! Sincerely, Veronica WIllis P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This is different - there is value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. Unsubscribing: Send a blank email to: veronicawillis1975 at hotmail.com with "Remove" in the subject line. From sophie.l at rencontre-club.com Mon Sep 2 01:41:23 2002 From: sophie.l at rencontre-club.com (sophie.l at rencontre-club.com) Date: Mon, 2 Sep 2002 10:41:23 +0200 (CEST) Subject: Message de lodie Message-ID: <20020902084123.94305B91C1@futureobject.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9605 bytes Desc: not available URL: From sophie.l at rencontre-club.com Mon Sep 2 01:41:24 2002 From: sophie.l at rencontre-club.com (sophie.l at rencontre-club.com) Date: Mon, 2 Sep 2002 10:41:24 +0200 (CEST) Subject: Message de lodie Message-ID: <20020902084124.E2C50B9BAD@futureobject.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9605 bytes Desc: not available URL: From jeuutdrbs at aol.com Mon Sep 2 08:04:57 2002 From: jeuutdrbs at aol.com (Cheryl Chamayou) Date: Mon, 02 Sep 2002 11:04:57 -0400 Subject: Hi cypherpunks, did you see this? unljc Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6994 bytes Desc: not available URL: From ben at algroup.co.uk Mon Sep 2 05:06:40 2002 From: ben at algroup.co.uk (Ben Laurie) Date: Mon, 02 Sep 2002 13:06:40 +0100 Subject: Cryptographic privacy protection in TCPA References: <11c0e2885327b026ee29db536c29abbd@dizum.com> Message-ID: <3D735450.4040809@algroup.co.uk> Nomen Nescio wrote: > Some of the claims seem a little broad, like this first one: > > >>1. A method for establishing a pseudonym system by having a certificate >>authority accepting a user as a new participant in said pseudonym system, >>the method comprising the steps of: receiving a first public key provided >>by said user; verifying that said user is allowed to join the system; >>computing a credential by signing the first public key using a secret >>key owned by said certificate authority; publishing said first public >>key and said credential. > > > Wouldn't this general description cover most proposed credential systems > in the past, such as those by Chaum or Brands? Or, indeed, X.509. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From ben at algroup.co.uk Mon Sep 2 05:28:12 2002 From: ben at algroup.co.uk (Ben Laurie) Date: Mon, 02 Sep 2002 13:28:12 +0100 Subject: Cryptographic privacy protection in TCPA References: <11c0e2885327b026ee29db536c29abbd@dizum.com> Message-ID: <3D73595C.7050709@algroup.co.uk> Nomen Nescio wrote: > It looks like Camenisch & Lysyanskaya are patenting their credential > system. This is from the online patent applications database: > > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=camenisch&OS=camenisch&RS=camenisch Hmmm. I see they've made the usual mistake with the rest of the world, though. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From auto463742 at hushmail.com Mon Sep 2 16:11:07 2002 From: auto463742 at hushmail.com (auto463742 at hushmail.com) Date: Mon, 2 Sep 2002 16:11:07 -0700 Subject: Captain Cyborg to chip 11 year old in wake of UK child killings Message-ID: <200209022311.g82NB7e14318@mailserver2.hushmail.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 quoted entirely from: http://www.theregister.co.uk/content/54/26908.html thanks! Captain Cyborg, aka Professor Kevin Warwick of Reading University, is generally a harmless if somewhat tedious self-publicist whose risible 'experiments' pay his rent and provide the less critical elements of the press with a never-ending stream of stupid stories. But an exclusive in today's Daily Mirror serves to illustrate that such maniacs are not always harmless. Following the recent abduction of ten year olds Holly Wells and Jessica Chapman, the Mirror reports that Wendy and Paul Duval have decided to implant their daughter, Danielle, with "a microchip to track her every move. "If she was kidnapped her exact location would be discovered via a computer." And guess who developed the chip? That's right, "cybernetics expert Professor Kevin Warwick, 48." The Mirror does not directly attribute its explanation of the device to Captain Cyborg, but it is quite clear that some of the people involved - possibly the reporter, possibly the reporter and the Duval family - have somehow managed to get themselves seriously misled about the capabilities of the technology. The chip "emits radio waves through a mobile phone network and beams its exact location to a computer. If Danielle went missing, her location would be marked by an X on a computer map.... It will be inserted in her arm by a GP using local anaesthetic. It costs about #20 and will be invisible." Well then, how does that work? Warwick's experiments in chipping himself haven't gone as far as GPS, at least publicly, and any communications aspect to them has been decidedly short range. An "invisible" device that handles both GPS and mobile phone communications, and doesn't need its batteries changing every five seconds would however clearly make him a large fortune, if it existed. Which manifestly it doesn't. As regards GPS, you can get an idea of the current state of the art as far as footprint goes by looking at this PDF, which describes the Trimble Lassen SQ GPS module, announced in March. Two penlight batteries can power it for more than 40 hours, it is postage stamp-sized, and is "compatible with active 3.3 VDC antennas." So the small ones aren't invisible, they need two penlight batteries that you have to change every 40 hours, and they need an antenna. So the "invisible" chip is not a GPS device, and must perforce communicate with a real GPS device secreted somewhere about your person. In that sense it would therefore seem to be well within the technical capabilities already demonstrated by Captain Cyborg, who habitually shoves things under his skin so he can open doors automatically and such, when lesser mortals would merely use a smartcard ID tag. If indeed this is the way the tag will operate, then Warwick is wandering into the dubious territory of VeriChip/Digital Angel, which has been punting cattle tags at the hard of thinking. That one's the size of the ball of a ballpoint, but it needs a scanner run over it to identify you, and can't tell where you are. OK, but presuming the child protector chip can communicate with an external GPS device, where does that get you if you've been kidnapped? You can tell where you are, but how does the X get onto the computer screen? Mobile phone, obviously, but that needn't be another box, as it could be one with GPS built in, so there's still only one thing to keep hidden. We covered a system of this sort for hunting dogs a while back, and if you look here, you'll see the pawprint of that rig. The dogs of course don't have pockets to put it in, and no immediate need for concealment, but even so... However even if you've got a concealed mobile phone with GPS, then what use is the tag? The phone rig does all this already, so for as long as you can hang onto the phone, you're trackable, and if you can't, you're not. After that the chip could help them identify you if they find you, and if for some reason you're not in a position to tell them yourself. Again, we're in VeriChip territory here, albeit a somewhat grimmer variant thereof. So it's complete hokum, and under the circumstances pernicious. The Holly and Jessica case has generated much concern, and some hysteria in the UK, and stories such as the Mirror's serve only to fuel that hysteria by deluding parents into thinking that technology can somehow protect their children. And by pushing positive aspects of tagging, even years before it's actually feasible, they're softening public opinion up for the days when it can be widespread, and when its application can be more sinister. And Warwick's role? As we said earlier, the technological 'explanation' is not attributed to him, but he's clearly encouraging it. He said: "The implant won't prevent abductions, nothing will. But if the worst happens, parents will at least be in with a chance of finding their children alive." No more chance, it seems to us, than if the implant had not been fitted. Warwick, as is his habit, slides seamlessly into some future where it is feasible: "Children may resent that their every movement is traceable. It's also possible some parents might abuse the system. But I'm confident this has to be the correct course of action in the light of recent, tragic events." So in the light of recent tragic events the correct course of action for parents has to be the fitting of a manifestly useless tagging device to their child. "The technology exists," says Warwick, "it's affordable and accessible." No it doesn't, no it's not. This is a publicity stunt well up to the usual mark, with the added extra of being in the worst possible taste. It marks the point where Captain Cyborg ceased to be comical, and started to look like something far worse. -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wl8EARECAB8FAj1z/f8YHGF1dG80NjM3NDJAaHVzaG1haWwuY29tAAoJEB6lQC9z1bic WnQAn0IgKGXkMlu27CuhSCSVxGTLENSUAKCKOk2EHe15fpiegsUPsqM9yYMxPQ== =V6aS -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com From profrv at nex.net.au Mon Sep 2 00:33:24 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 17:33:24 +1000 Subject: Net censors strike Brothels while police cop DNA powers. Message-ID: <5.1.0.14.0.20020902173044.009f9320@mail.nex.net.au> http://theage.com.au/articles/2002/09/01/1030508160640.html Prostitution websites in Victoria will no longer be able to entice customers with full-body images of naked women or explicit menus of available services, under regulations that take effect today. Criminals forced to give DNA samples Police are set to order nearly 4000 convicted criminals to provide DNA samples within 28 days or face arrest under state laws that take effect today. Full report Your say! Should people be forced to provide DNA? ALSO http://www.melbourne.indymedia.org/front.php3?article_id=32718&group=webcast From avryl at msn.com Mon Sep 2 14:36:37 2002 From: avryl at msn.com (Christian Cusson) Date: Mon, 02 Sep 2002 17:36:37 -0400 Subject: Attention cypherpunks@algebra.com Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3854 bytes Desc: not available URL: From profrv at nex.net.au Mon Sep 2 00:40:29 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 17:40:29 +1000 Subject: Palladium Busters. Message-ID: <5.1.0.14.0.20020902173442.009f9880@mail.nex.net.au> COLLUSION CLAIMS ACCC probing 'hard-core cartels' Australia's competition watchdog was investigating about 25 cases of alleged anti-competitive "hard-core cartel" activity, a conference was told today. Full report According to ACCC chairperson,Alan Fels,Sony's regional coding is fair game for cracking. http://theage.com.au/articles/2002/09/02/1030508179933.html "...Professor Fels said hard-core collusion, which could involve secret price fixing, bid rigging, market sharing and agreed restrictions on output, was flourishing internationally ""He used his speech to an Australian Institute of Criminology conference to continue his push for jail terms for executives involved in such illegal collusion. Prof Fels said it was unfair that people who cheated the social security or tax systems of tens of thousands of dollars could be jailed, yet senior executives who colluded to cause tens of millions of dollars of loss to the community did not face a prison term." "The law must not be blind to the colour of the collar," he said. Prof Fels said such offences could currently incur fines of up to $500,000 for an individual, or $10 million for a company, but there were no criminal sanctions. "Hard-core cartels are secret, they are difficult to detect, they allow the firms involved to corrupt the competitive process ... and enable those who engage in collusion to line their pockets with higher profits," he said. Prof Fels said that in the six years to 2001, the ACCC received 2,426 complaints about cartels and 400 investigations were conducted. The commission currently was investigating 20 to 25 cases that could potentially involve hard-core cartels. In a submission to a review of the Trade Practices Act by former High Court judge Sir Daryl Dawson, the ACCC has argued for jail penalties for executives found guilty of anti-competitive behaviour. It argues for new seven-year prison terms for executives caught organising illegal cartels, and maximum fines worth 10 per cent of company turnover. Business groups have attacked Prof Fels' move, and called for his powers to be curtailed. END. The US may be too far gone for an ACCC to work,it may need the Mongo alternative. From profrv at nex.net.au Mon Sep 2 00:58:45 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 17:58:45 +1000 Subject: Hearing Voices? Message-ID: <5.1.0.14.0.20020902175622.009fdd90@mail.nex.net.au> Hearing voices By Bennett Ring August 30 2002 Icon Text has so far done a good job of communicating our thoughts across the Internet, via Web pages, chat rooms, instant messaging and message boards, but lacks the immediacy, tone and personal touch of speech. It also requires the user to type fluently. That's where VOIP (Voice Over Internet Protocol) applications are handy. VOIP applications, known as voice comms, became popular in the PC online gaming world, where they are still used. Playing with (or against) human beings is one thing, but being able to scream orders and/or taunts at them is better. Team-based games benefit especially; before voice comms, the team leader had to bash out instructions on the keyboard. Once voice comms are set up it's as simple as hitting the transmit key and speaking. One of the largest uses for the technology is as a substitute for the telephone, especially among those who make lots of interstate and international calls. Why spend serious money on an international call when you can chat for hours at a cost of a local phone call to your ISP? MORE ON http://www.smh.com.au/articles/2002/08/29/1030508096466.html Wired magazine shelled out for Declans call to me last year,It's so much cheaper online,the only thing is the 1 second sattelite gap.It's a bit like ham radio,I used it to call my sister in NZ. From profrv at nex.net.au Mon Sep 2 01:07:35 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 18:07:35 +1000 Subject: Carnivore; a toothless tiger. Message-ID: <5.1.0.14.0.20020902180531.009fc800@mail.nex.net.au> The FBI has openly admitted that its agents have difficulties collecting evidence from computers. FBI Director Robert Mueller told a House committee this summer that the agency lacks the technology skills and understanding that would allow agents to conduct complete computer forensics searches. Did FBI Bungle E-Mail Evidence? By Michelle Delio Print this • E-mail it 11:55 a.m. Aug. 30, 2002 PDT The FBI may have overlooked a crucial e-mail account used by Zacarias Moussaoui when agents examined computers known to have been used by the suspected terrorist. Moussaoui, now defending himself against terrorism conspiracy charges stemming from his alleged involvment in the Sept. 11 attacks, recently requested that prosecutors turn over their records of messages sent and received through his Hotmail account. Moussaoui claims his e-mail could help him establish his alibi. But the FBI has no records of the account, and an incredulous U.S. District Judge Leonie M. Brinkema now wants to know how the FBI could have searched the computers Moussaoui used and not located any traces of the Hotmail account. In response, prosecutors have submitted a sworn statement from Microsoft stating that the company is also unable to locate any records of Moussaoui's Hotmail account. According to Moussaoui, he was registered with Microsoft's free Hotmail e-mail service as "xdesertman." Moussaoui claims he accessed the account from various computers, including his own laptop, a computer at a Kinko's copy shop in Minnesota, and another computer belonging to the University of Oklahoma. All of these computers were searched by agents following Moussaoui's arrest in August 2001. The FBI has openly admitted that its agents have difficulties collecting evidence from computers. FBI Director Robert Mueller told a House committee this summer that the agency lacks the technology skills and understanding that would allow agents to conduct complete computer forensics searches. Brinkema has also ordered the FBI to file an affidavit stating whether the agency requested help from other government sources when examining the machines Moussaoui used. "The affidavit must indicate why investigators were unable to retrieve any information from MSN Hotmail and/or any other computers or accounts searched," Brinkema wrote in the order. "It must make clear whether any efforts were made to obtain forensic expert services of any other government agencies such as the CIA or NSA to assist in retrieving the information." But the evidence may not have been on the computers by the time FBI agents searched them. When an account is inactive, Hotmail deletes stored messages after 30 days, and disables inactive accounts after 90 days. However, Microsoft has been unable to find records indicating the count ever existed, according to a statement submitted to the court by the company. E-mail sent by Wired News to "xdesertman at hotmail.com" bounced back with an unknown recipient error message. But attempts to create a new account using xdesertman as a user name were also refused by the service. Although Moussaoui has a computer in his jail cell for use in preparing his defense, he is not allowed to use the Hotmail service. Brinkema recently ordered that Moussaoui must be allowed to use a computer to connect to a restricted-access website which contains records relating to his case, but has banned him from accessing other Internet sites from his cell. http://www.wired.com/news/conflict/0,2100,54857,00.html From profrv at nex.net.au Mon Sep 2 01:49:02 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 18:49:02 +1000 Subject: Carnivore the toothless tiger. Message-ID: <5.1.0.14.0.20020902184832.009dee50@mail.nex.net.au> http://www.melbourne.indymedia.org/front.php3?article_id=32736&group=webcast From profrv at nex.net.au Mon Sep 2 02:06:31 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 19:06:31 +1000 Subject: Foolish Bungling Incompetents? Message-ID: <5.1.0.14.0.20020902190301.009deaa0@mail.nex.net.au> FBI agents overseas 'critically important' In an effort to attack terrorism, drug trafficking, organized crime and other threats at their roots, an unprecedented number of FBI agents are now working overseas, and FBI Director Robert Mueller says they are "critically important" to preventing more terrorist attacks.....( Knight Ridder, 1 Sep 02) Terrorism's Toll on the F.B.I. OVER the years, F.B.I. directors have shifted resources to confront the scourge at hand. In the 1970's, Clarence M. Kelley veered away from the fight against Communism and took on organized crime. A decade later, William H. Webster put the emphasis on counterintelligence. William S. Sessions ended his tumultuous tenure with a push against violent crime.....( New York Times, 1 Sep 02) http://www.cicentre.com/ Bond,james Bond..."There's something from every film and it will be the greatest collection of original 007 objects, images and costumes ever assembled, exploring the science and the art of the Bond films." --Nicola Osmond Evans, a spokesman for the Science Museum in London about their upcoming "Bond, James Bond Exhibition", which opens next month Spies in the Boardroom? ...In late July CCBN.com, a Web-based communications firm that handles investor relations, filed suit against the Canadian information services giant Thomson Corp. Seeking treble damages, the suit accuses Thomson of using its two CCBN board seats to steal confidential information--including pricing data and competitive analysis--that helped it create a rival service, and of hiring people who had confidentiality agreements with CCBN....( Forbe, 1 Sep 02) Spy Sarasota aims gadgets at counter-surveillance market Standing in a busy aisle at the International Security Conference Expo in Orlando, Roy Winkelmann is clutching a 4-ounce device he has just purchased called a "Zap Checker." It is a highly sensitive handheld counter-surveillance meter that detects wireless video or audio bugs as far away as 40 feet....( Herald Tribune, 1 Sep 02) Gone and now forgotten Never mind if a country - a member of the NATO Alliance - is now led by a Communist-era secret police agent.....(Budapest Sun, 30 Aug 02) http://www.cicentre.com/ Bring back SMERSH. From profrv at nex.net.au Mon Sep 2 02:10:27 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 19:10:27 +1000 Subject: Chompsky in the Arab news today. Message-ID: <5.1.0.14.0.20020902190849.009dce80@mail.nex.net.au> http://www.arabnews.com/Article.asp?ID=18278 "...Noam Chomsky, a remarkable US political thinker. He demands radical changes in US foreign policy or the country will face a "revolution from within." He has advised successive US governments since the Carter administration of the need to change the colonialist and supercilious approach to the rest of the world. "Never doubt that a small group of thoughtful, committed citizens can change the world. Indeed, it is the only thing that ever has." - Margaret Mead From profrv at nex.net.au Mon Sep 2 02:21:50 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 19:21:50 +1000 Subject: Gore Techs. Message-ID: <5.1.0.14.0.20020902191508.009f12f0@mail.nex.net.au> Gore talks tech, re-invention Former vice president addresses technology and government officials at Innovative Government Forum [Posted Aug. 27] http://www.fcw.com/ Jebs choice for child care? A wife and child beating advocate. Bush family values -- He's the best man for the job DCF leader: It's OK to spank by Carol Marbin Miller, Lesley Clark and Peter Wallsten The man named Thursday by Gov. Jeb Bush to head Florida's notoriously inept child welfare agency is an evangelical Christian who views spanking that causes ''bruises or welts'' as acceptable punishment. The revelation did not come to Bush's attention until hours after the governor introduced Jerry Regier, a former Oklahoma Cabinet secretary and aide to Bush's father, as the new chief of the state's Department of Children and Families. Regier, 57, was named less than 48 hours after the resignation of DCF Secretary Kathleen A. Kearney. He takes over an agency that has been embroiled in scandal since 5-year-old Rilya Wilson disappeared. http://booknotes.weblogs.com/2002/08/16 From profrv at nex.net.au Mon Sep 2 02:29:31 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 19:29:31 +1000 Subject: Mongo's with matches,cruel but fair. Message-ID: <5.1.0.14.0.20020902192700.009f1460@mail.nex.net.au> Calif. Forest Fire Forces Evacuation AP/Steven K. Doi [26K] AZUSA, Calif. (AP) — A wildfire spread rapidly across 10,000 acres of national forest Sunday, sending thousands of holiday campers fleeing. The fire was burning in the Azusa Canyon area of the Angeles National Forest about 30 miles east of Los Angeles. About 8,000 campers were told to evacuate campgrounds. ``This was a holiday weekend and the canyon was full of people,'' state Department of Forestry dispatcher James Arthur said. About 11,420 acres of brush were aflame across California. In El Dorado County east of Sacramento, a fire destroyed one house and threatened about 100 others. It had consumed 770 acres Sunday and was 30 percent contained. A 15-year-old boy was in the county's juvenile hall in connection with the fire. A second boy, also 15, was questioned then released to his family, sheriff's Lt. Kevin House said. One boy was playing with matches when the fire started Saturday between the cities of El Dorado Hills and Rescue, House said. In San Bernardino County, a 554-acre fire was 61 percent contained Sunday. Investigators were trying to determine whether a burned body and an incendiary device were connected to the blaze that started Thursday. The device was discovered Sunday morning, said U.S. Forest Service spokeswoman Ruth Wenstrom. She had no further details. Nationwide, the National Interagency Fire Center reported 17 large active fires Sunday that were burning 660,000 acres. ——— On the Net: National Interagency Fire Center: http://www.nifc.gov/ Summers slippin away kids,get out in the woods! There is no greenhouse over Ameica! From profrv at nex.net.au Mon Sep 2 03:11:19 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 20:11:19 +1000 Subject: CIA WTF. Message-ID: <5.1.0.14.0.20020902200612.009ec1a0@mail.nex.net.au> CIA no big deal in India anymore CHIDANAND RAJGHATTA TIMES NEWS NETWORK [ SATURDAY, AUGUST 31, 2002 11:57:38 PM ] WASHINGTON: India is in the grip of the CIA! So what, did you say? Precisely. The once-dreaded three-letter acronym, not long ago a byword for sinister shenanigans, hardly creates a ripple in India these days. How else do you account for the fact that several South Asia hands in the US administration who have visited India in recent times come from the CIA, and there is nary a squeak in New Delhi? The latest visitor to New Delhi who has CIA pedigree is Lisa Curtis, advisor to Assistant Secretary of State for South Asia Christina Rocca. Curtis, a former CIA analyst who has dealt extensively with South Asia, held talks with Hurriyat leaders last week in a bid to persuade them to take part in the Assembly election. Although a former CIA staffer, Curtis is a political appointee in the state department brought in as aide to Ms Rocca, who herself was a CIA operative before she moved to the Hill to work with Senator Sam Brownback, who propelled her into the administration. Another familiar South Asia hand who came from the Agency was Bruce Riedel, former Senior Director and adviser to the President on South Asia in the Clinton administration. Riedel went out with the Democratic administration and is now on a sabbatical at King's College, England. One reason why the CIA has lost is menacing overtones is perhaps because its actions of late have tended to be supportive of India, probably recognising greater dangers. After all, former US ambassador to India Daniel P Moynihan, records that the CIA bankrolled even Mrs Gandhi's Congress Party against the Communists in Kerala, despite her perpetual rant about foreign hands and destabilisation. While Curtis has been working on the Hurriyat, Riedel played a key role in the landmark change of US policy that resulted in Washington backing India during the Kargil flare-up. Such reassuring gestures and change in attitude is perhaps what emboldened Home Minister L K Advani to step into the portals of the CIA headquarters in Langley, Virginia, during his visit here in January. Subsequent to the visit, Indian officials say, there has been plenty of cooperation between the two sides, including in the law enforcement front. One result of that was evident earlier this week, when the American FBI -- which now has an office in New Delhi -- and the Indian CBI staged an unprecedented joint sting operation to net an Indian software engineer who was trying to peddle source code purloined from a US company over the Internet. Such a joint action, let alone three CIA analysts coming to India, would have been unthinkable a decade or two back. http://timesofindia.indiatimes.com/articleshow.asp?art_id=20800121 CIA track record 50 years back? Noticed as early as 1950,the new york herald tribune reported listed five events that the 'company' failed to predict.The North Korean attack that year,the fall of Checkoslovakia,the Tito-Soviet split and the Communist victory in China. p34-'Oyster,the story of ASIS.'Toohey-Pinwell.89. From profrv at nex.net.au Mon Sep 2 03:27:47 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 20:27:47 +1000 Subject: Ohio,copperhead row.Michael K Allen eat your dirty heart out. Message-ID: <5.1.0.14.0.20020902202556.009f18e0@mail.nex.net.au> Federal judge bars new pornography 08/31/02 Chris Seper Plain Dealer Reporter A federal judge yesterday blocked changes that were meant to modernize Ohio's anti-pornography law for the Internet age. Judge Walter Herbert Rice in Dayton said the law was so broad that it was as likely to ban teaching of the Holocaust in schools and prohibit kids from reading National Geographic magazine as it was to protect them from online pornography and the sexual deviants who prowl the Web. The judge, who issued a temporary restraining order earlier this month, permanently barred the state from enforcing the law. Now the state must decide whether to appeal the decision, let legislators amend the law or await a final ruling from the judge later this year. Bret Crow, spokesman for the Ohio attorney general's office, said yesterday his office was still examining the ruling. He didn't know how it would limit Ohio's enforcement. Ohio's decades-old law was rewritten earlier this year to cover such things as online pornographers and sexual predators who target youths. The law made it a felony to distribute material considered "harmful to juveniles" - sex acts, repeated use of foul language, lurid details of violence and the glorifying of criminal activity - via computer, the Internet, newspapers, movies and other similar means. It was challenged by bookstore owners, a state newspaper association, and a sexual advice Web site, which said the definition of "harmful to juveniles" was too vague and that the Internet should not be included. Rice, chief judge of the U.S. District Court for the Southern District of Ohio, didn't rule on the Internet challenge but agreed that the definition of "harmful to juveniles" was too broad and covered too many media. Mainstream movies and magazines as well as legitimate historical topics could potentially violate the law, Rice stated. Rice also said Web sites that answer sexual health questions could also be in violation. "Indeed, under Ohio statutes, it would be illegal to show (a juvenile) a copy of a National Geographic in which indigenous women are pictured naked from the waist up," Rice wrote, also noting that prohibitions of extreme violence could endanger the teaching of the Holocaust. The attorney general's office argued during the case that no one would interpret the law that broadly, and warned that Ohio youth would be at greater risk if the law was struck down. But Rice questioned whether the law would be more effective against pornographers than existing legislation. He cited testimony in which Ohio police officers had made scores of arrests by impersonating children online. To reach this Plain Dealer reporter: cseper at plaind.com, 216-999-5405 From profrv at nex.net.au Mon Sep 2 03:42:55 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 20:42:55 +1000 Subject: US Army interest in au tech. Message-ID: <5.1.0.14.0.20020902204002.009f17a0@mail.nex.net.au> There's electronic ballistics at Metalstorm of course now,PermoDrives are go. http://www.permo-drive.com.au/ PD News Vol 3 No 2 PD News Vol 3 No 2 26 Jul 02: United States Army enlists Permo-Drive for war on fuel. With 246 thousand tactical vehicles, the US Army has the largest truck fleet in the world. New Vice President 19 Jul 02: CEO Max Bosotti has announced the appointment of Paul Chandler as Vice President, Permo-Drive Technologies Ltd. USA Interest 13 Jun 02: The Permo-Drive Team recently visited North America. From profrv at nex.net.au Mon Sep 2 03:47:34 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 20:47:34 +1000 Subject: Bad case of crabs. Message-ID: <5.1.0.14.0.20020902204417.009f0220@mail.nex.net.au> http://www.gov.sg/moh/mohiss/poison/pictor.html Lophozozymus pictor (Thunder Crab) -------------------------------------------------------------------------------- It is a confirmed toxic species. It could be found inhabiting the coral reef beds in the southern islands off Singapore. An adult crab weighs about 100 grams and 10 cm in width. It is usually brightly coloured and has mosaic patterns on its shell and as such is also know as the mosaic crab. Locally this is commonly called "Thunder Crab"; the Australians call it the "Red and White Reef Crab". Several cases of human fatality in association with its consumption have been documented. The crab is highly toxic and to date there is no known antidote against such poisoning. Seek immediate medical treatment in any suspected case of poisoning. Distribution: Singapore, Philippines, Indonesia and Australia. Domoic Acid (ASP) in Shellfish What is domoic acid? Domoic acid is a naturally occurring toxin produced by microscopic algae, specifically the diatom Pseudo-nitzschia pungens. Shellfish and crab ingest this algae, where the toxin concentrates. Significant amounts of domoic acid can cause Amnesic Shellfish Poisoning (ASP) in humans. ASP is transmitted by eating contaminated molluscan shellfish and crab. http://www.doh.wa.gov/ehp/sf/Pubs/DomoicAcid.htm From profrv at nex.net.au Mon Sep 2 04:05:17 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 21:05:17 +1000 Subject: Scarecrow screws to cardboard cops. Message-ID: <5.1.0.14.0.20020902204936.009f1cb0@mail.nex.net.au> Job cut out for school cops Some 300 cardboard policemen reported for duty Monday morning on the streets of the Lithuanian capital Vilnius, as part of a ploy by city authorities to get drivers to slow down as children return to school. The life-size cutouts painted in the cucumber green of Lithuanian police uniforms guarded street crossings near 90 Vilnius schools. "We strive to ensure drivers and schoolchildren pay attention to the intensive traffic in Vilnius streets," Vilnius's mayor, Arturas Zuokas, said in a statement. The children also guard the cops, however, taking them inside after school hours. http://abc.net.au/news/justin/nat/newsnat-2sep2002-99.htm Wonder if they've heard of cardboard K19 submarine captains? Time to throw out another 5 tons of blood? American health authorities are investigating whether the West Nile virus has been transmitted through blood transfusions or organ donations. More than 500 cases have been reported in 26 states and there have been 28 deaths. Shrub says US jobs more important than a runaway greenhouse full of mozzies as his head is full of feathers. Victorias a bastard...A book to be published in Britain later this week claims that Queen Victoria may have been illegitimate. In his book The Victorians, acclaimed biographer AN Wilson alleges that Victoria's mother had a lengthy affair with her Irish-born secretary. The Australian Defence Force Academy says there is no ongoing health risk at Duntroon after a 19-year-old cadet died of meningococcal infection on Saturday. The cadet saw a Dr and was cleared just before he died.Trust us,we are experts,go back to your desks.It has been revealed an Australian Defence Force Academy (ADFA) cadet who died of meningococcal disease was misdiagnosed. Nineteen-year-old Matthew Lipianin was found dead on Saturday morning From profrv at nex.net.au Mon Sep 2 04:19:03 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 21:19:03 +1000 Subject: Phillip Agree. Message-ID: <5.1.0.14.0.20020902210409.009f51d0@mail.nex.net.au> Police have found the former leader of the Victorian branch of the Manufacturing Workers Union (MWU), Craig Johnston, has no case to answer in relation to allegations of sexual assault. Dirty tricks in the Union movement? http://www.thirdworldtraveler.com/CIA/CIA_Diary_Agee.html Psychological warfare includes propaganda (also known simply as 'media'), work in youth and student organizations, work in labour organizations (trade unions, etc.), work in professional and cultural groups and in political parties. Paramilitary operations include infiltration into denied areas, sabotage, economic warfare, personal harassment, air and maritime support, weaponry, training and support for small armies. Closely related to paramilitary operations are the disruptive activities known as militant action. Through organization and support of 'goon squads' sometimes composed of off-duty policemen, for example, or the militant sections of friendly political parties, stations attempt to intimidate communists and other extreme leftists by breaking up their meetings and demonstrations. The Technical Services staff of the DDP makes a variety of weapons and devices for these purposes. Horrible smelling liquids in small glass vials can be hurled into meeting halls. A fine clear powder can be sprinkled in a meeting-place becoming invisible after settling but having the effect of tear-gas when stirred up by the later movement of people. An incendiary powder can be moulded around prepared tablets and when ignited the combination produces ample quantities of smoke that attacks the eyes and respiratory system much more strongly than ordinary tear-gas. A tasteless substance can be introduced to food that causes exaggerated body colour. And a few small drops of a clear liquid stimulates the target to relaxed, uninhibited talk. Invisible itching powder can be placed on steering wheels or toilet seats, and a slight smear of invisible ointment causes a serious burn to skin on contact. Chemically processed tobacco can be added to cigarettes and cigars to produce respiratory ailments. Increasingly, as the oppressed in capitalist society comprehend the myth of liberal reform, their ruling minorities have no choice but to increase repression in order to avert socialist revolution. Eliminate CIA stations, US military missions, AID Public Safety missions and the 'free' trade-union programmes and those minorities would disappear, faster perhaps, than they themselves would imagine. How fitting that over the rubble of the CIA's old temporary buildings back in Washington, the new building that rose was called 'Watergate'. When the Watergate trials end and the whole episode begins to fade, there will be a movement for national renewal, for reform of electoral practices, and perhaps even for reform of the FBI and the CIA. But the return to our cozy self-righteous traditions should lure no one into believing that the problem has been removed. Reforms attack symptoms rather than the disease, and no other proof is needed than the Vietnam War and Watergate to demonstrate that the disease is our economic system and its motivational patterns. Reforms of the FBI and the CIA, even removal of the President from office, cannot remove the problem. American capitalism, based as it is on exploitation of the poor, with its fundamental motivation in personal greed, simply cannot survive without force - without a secret police force. The argument is with capitalism and it is capitalism that must be opposed, with its CIA, FBI and other security agencies understood as logical, necessary manifestations of a ruling class's determination to retain power and privilege. Now, more than ever, each of us is forced to make a conscious choice whether to support the system of minority comfort and privilege with all its security apparatus and repression, or whether to struggle for real equality of opportunity and fair distribution of benefits for all of society, in the domestic as well as the international order. It's harder now not to realize that there are two sides, harder not to understand each, and harder not to recognize that like it or not we contribute day in and day out either to the one side or to the other. http://www.thirdworldtraveler.com/CIA/CIA_Diary_Agee.html From profrv at nex.net.au Mon Sep 2 04:46:41 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 21:46:41 +1000 Subject: Fresh Pulitzer skills. Message-ID: <5.1.0.14.0.20020902214157.009ede30@mail.nex.net.au> Thomas Friedman compares Noam Chomsky to USAma bin Laden. http://www.arabnews.com/Article.asp?ID=18278 "...When I asked Friedman during a recent visit to the Kingdom about his differences with Chomsky, he replied, "Just as you regard Osama Bin Laden as an extremist, we in the US regard Chomsky as an extremist." Friedman also slags off Seattle activists...http://faculty.maxwell.syr.edu/merupert/Anti-Friedman.htm Anne Thrax thinks these pinko liberals at the NYT need killing,she may have a point. A suicide Bombing seems called for Anne? From o.jean8 at caramail.com Mon Sep 2 22:05:22 2002 From: o.jean8 at caramail.com (JEAN-PIERRE ONDEKANE) Date: Mon, 2 Sep 2002 22:05:22 -0700 Subject: FROM JEAN-PIERRE Message-ID: <200209030505.g8355KQC020447@ak47.algebra.com> FROM: JEAN-PIERRE ONDEKANE , DEAR FRIEND, MY GREETINGS TO YOU AND YOUR FAMILY AND I HOPE THIS LETTER MEETS YOU IN GOOD HEALTH. I AM JEAN-PIERRE ONDEKANE , AIDE TO THE LATE PRESIDENT MOBUTU SESE-SEKO OF ZAIRE NOW KNOWN AS DEMOCRATIC REPUBLIC OF CONGO (DRC). I AM WRITING TO YOU IN GOOD FAITH BASED ON YOUR PROFILE I RECEIVED FROM THE CHAMBER OF COMMERCE IN SOUTH AFRICA. I AM MOVED TO WRITE YOU THIS LETTER IN CONFIDENCE CONSIDERING MY PRESENT CIRCUMSTANCE AND SITUATION AS A WAR REFUGEE HERE IN SOUTH AFRICA. FEW WEEKS BEFORE THE LATE PRESIDENT MOBUTU SESE-SEKO WAS FORCED OUT OF POWER, I WAS INSTRUCTED BY HIM TO MAKE AVAILABLE THE SUM OF US$22MILLION WHICH WAS TO BE TRANSFERRED ABROAD AND LODGED IN MY NAME WITH A SECURITY COMPANY FOR SAFEKEEPING DISCLOSED AS FAMILY VALUABLES, PENDING FURTHER INSTRUCTIONS. TWO WEEKS LATER ON MAY 16 1997, PRESIDENT MOBUTU SESE-SEKO GAVE UP POWER TO THE REBELS LED BY LAURENT KABILA, WHO WERE ADVANCING FROM KISINGANI AND FLED TO TOGO FROM WHERE HE LATER MOVED TO MOROCCO WHERE HE DIED ON SEPTEMBER 7, 1997 LESS THAN FOUR MONTHS AFTER HE WAS FORCED OUT OF POWER. HE WAS AGED 66 YEARS. I MANAGED TO ESCAPE TO SOUTH AFRICA WITH MY SON PATRICE, AGED 17 WHERE I AM PRESENTLY RESIDING AS A WAR REFUGEE SHORTLY AFTER THE CAPITAL CITY KINSHASHA WAS OVER RUN OVER BY REBELS. I LOST MY WIFE, TWO CHILDREN, AND MY POSSESSIONS DURING THE REBEL ONSLAUGHT ON THE CAPITAL CITY. THE LATE MOBUTU SESE-SEKO DURING HIS 30 YEAR RULE AMASSED A PERSONAL FORTUNE OF US$8BILLION WITH HOUSES IN SWITZERLAND AND FRANCE. HOWEVER, THE INCUMBENT PRESIDENT LAURENT KABILA MADE ARRANGEMENTS WITH THE SWISS GOVERNMENT AND OTHER EUROPEAN COUNTRIES TO FREEZE ALL HIS ASSETS AND CONFISCATE HIS PROPERTIES. I THUS DECIDED TO LIE LOW IN AFRICA TO STUDY THE SITUATION, UNTIL WHEN THINGS GET BETTER LIKE NOW THAT PRESIDENT LAURENT KABILA IS DEAD AND HIS SON JOSEPH KABILA HAS TAKEN OVER. I HAVE BEEN IN TOUCH WITH THE SECURITY COMPANY ABROAD WHERE THE MONEY IS STILL LODGED AS FAMILY VALUABLES. THE FUNDS ARE SECURITY CODED TO PREVENT THEM FROM KNOWING THE CONTENT. WHAT I WANT YOU TO DO IS TO INDICATE YOUR INTEREST THAT YOU WILL ASSIST ME BY RECEIVING THE MONEY ON MY BEHALF. ACKNOWLEDGE THIS MESSAGE SO THAT I CAN GIVE YOU THE MODALITIES FOR THE CLAIM OF THE FUNDS. MAY I AT THIS POINT EMPHASIZE THE HIGH LEVEL OF CONFIDENTIALITY WHICH THIS BUSINESS DEMANDS, AND HOPE YOU WILL NOT BETRAY THE TRUST AND CONFIDENCE WHCH I HAVE REPOSED IN YOU. IF YOU WANT TO ASSIST, I SHALL PUT YOU IN THE PICTURE OF THE BUSINESS, TELL YOU WHERE THE FUNDS ARE CURRENTLY BEIGN MAINTAINED AND ALSO DISCUSS OTHER MODALITIES INCLUDING REMUNERATION FOR YOUR SERVICES. I AM WILLING TO GIVE YOU A REASONABLE PERCENTAGE OF THE MONEY AS SOON AS THE TRANSACTION IS CONCLUDED. FOR THIS REASON, KINDLY FURNISH ME YOUR CONTACT INFORMATION, WHICH IS YOUR PERSONAL TELEPHONE AND FAX NUMBERS FOR CONFIDENTIAL PURPOSE AND ACKNOWLEDGE RECEIPT OF THIS MAIL USING THE ABOVE EMAIL ADDRESS. YOURS SINCERELY, JEAN-PIERRE ONDEKANE From jeffers at brick.net Mon Sep 2 21:22:18 2002 From: jeffers at brick.net (Gary Jeffers) Date: Mon, 2 Sep 2002 23:22:18 -0500 Subject: WinXP SP1 out next Monday - but can you avoid it? Message-ID: <000701c25301$7ecf9040$88934ad1@garyjeff> My fellow Cypherpunks, I found this link about WinXP SP1 . SP stands for "service pack". The article tells of some nasty goodies that MicroSoft has included in it. The 2nd link has more info.. http://www.theregister.co.uk/content/4/26911.html http://www.theregister.co.uk/content/4/26698.html You know, sometime we are going to have to abandon MS. I've already got a dual booting system: MS and Red Hat Linux. I am slowly migrating functions to Linux. The (GNU) Linux's and the free BSD's are good alternatives to MS. If you can't live without MS, then make your computer system dual booting. Also, dual booting will allow you to make a fairly easy migration to a DECENT operating system . MS is getting more and more oppressive. Yours Truly, Gary Jeffers BEAT STATE!!!! From profrv at nex.net.au Mon Sep 2 06:25:48 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 02 Sep 2002 23:25:48 +1000 Subject: AU State prosecutes Schizophrenic.Third cPunk trial.Their funeral. Message-ID: <5.1.0.14.0.20020902221145.009ec160@mail.nex.net.au> A man diagnosed with Schizophrenia 20 years ago and drawing an 80% incapacitated pension has been charged with making death threats toward the States police force. The alleged threats were made last year at Melb Indymedia website as comments to articles.The police themselves have said that "anyone can download there." No logs used to be kept at the site nor have they been subpoenaed.Are logs kept today? http://www.indymedia.org/front.php3?article_id=201108&group=webcast No registration or log in is required.A post made will not leave a trace on the machine used to e-mail it in.This can be tested by making a cryptic post with some random numbers and then logging off and running a search on the 'C' drive. No admissions being made,the Police are relying of two copies of posts as evidence.They obtained these copies from a 'ghost' copy of a seized laptop.The laptop was at the accused's place when he was arrested by a multi agency and International police task force. One of the copied posts is timestamped;the time does NOT match the post,the other copy looks like a saved screen dump.The threat in that second one concerns Molotovs;within the week of that post Italian police had planted Molotovs at a Genoa Indymedia address.They then invaded the address injuring many and smashing computers.One has admitted he lied about being attacked with a knife. The complaining officer in the AU matter the same week is named Nic Conte.btw. He appears to be of mediterranean appearance The post was made with a US SS agent within TEMPEST range of the subjects unit.The police had keys to all the 8 units for a week during this time.The suspects computer had been hacked it had been boasted on the main Indymedia website. A reward for info leading to the suspects arrest had been offered,it was for 25K. The suspect had been imitated,stalked,threatened and abused online in the two months leading up to the arrest.Items were allegedly stolen from the unit that the suspect accused the police of lying to gain entry too. A psych nurse who attended the arrest and had previous access to the computer met the police involved.The media were notified.Suspect was described as an,M1 'protestor',he later managed to get two retractions of that claim in two local papers. A knife was allegedly pulled on the suspect at the station by Conte.The suspect was kept in a windowless police lockup for the weekend after he refused to sign several bail conditions.The jail has since been condemned,the bail conditions were described by the Magistrate on the Monday as a 'Nonsense",with,"nothing to do with the charges,"(the charges at that time.) The suspect was accused of promoting assassination politics,he was called an anarchist as if that was a criminal offence. Seven Months after the raid the suspects medical treatment was the subject of a Federal police assault.One of the AFP officers who had been at the raid went to Kyneton and plotted to increase the suspects prescribed medication 3/4 times. When the suspect resisted he was almost committed.A short time later he tried at great expense to regain his stolen property.At this hearing SC Conte claimed under oath that he ,"knew nothing about computers." The computer 'expert' claimed that merely turning on the laptop would alter thousands of files.Presumably the 'Ghost' copy was made from the 'switched on' laptop? That there was ongoing US interest in this case is spelt out in FOI documents from the AFP and a statement from a psych nurse that the Americans had mentioned Extradition at the January meeting.The US authorities had earlier started to set up a grand jury and issued a subpoena in relation to a post allegedly made by the disabled suspect. The evidence presented in the discovery is such that a quick move for dismissal with costs would be justified,should a (jury?) trial go ahead it is likely to be a long one with many questions to be answered about the various pressures to prosecute,possible tampered evidence,possible personal antipathy from the complainant.Mistakes made in the sworn brief of the complainant.The complainants history in a manifestly corrupt police force.(esp the drug squad.) Why when drugs were found at the unit charges were not proceeded with? Why have the police killed so many mentally ill people lately? Where the proof that the person charged made the alleged threats is? (The brief does not even show ISP records of the laptops being logged on the Net at the time of the alleged posts.) This is the third cypherpunk trial in the ongoing struggle for genuine cryptoanarchy,the State demonstrates its weaknesses at these trials,if its weak then we can pump up the volume,if it overreacts then its grist for the publicity mill.The significance of this trial is even revealed by random processes. It starts on Sept 11. From jeffers at brick.net Mon Sep 2 21:26:12 2002 From: jeffers at brick.net (Gary Jeffers) Date: Mon, 2 Sep 2002 23:26:12 -0500 Subject: http://WHATREALLYHAPPENED.com Message-ID: <000f01c25302$09d9bda0$88934ad1@garyjeff> My fellow Cypherpunks, Check out the site: http://WHATREALLYHAPPENED.com It is a heavy site that informs about the world's ongoing political system. This site makes sense of politics. Yours Truly, Gary Jeffers BEAT STATE!!!! From hseaver at cybershamanix.com Mon Sep 2 21:46:36 2002 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Mon, 2 Sep 2002 23:46:36 -0500 Subject: WinXP SP1 out next Monday - but can you avoid it? In-Reply-To: <000701c25301$7ecf9040$88934ad1@garyjeff> References: <000701c25301$7ecf9040$88934ad1@garyjeff> Message-ID: <20020903044636.GB14130@cybershamanix.com> Forget dualbooting -- the best combo is a Mac for any of the DTP or graphix stuff you can't do on linux (and Macs are far beyond windoze in that respect anyway) and then linux for everything else. I do have both VirtualPC for the mac with '95 on it, and also Vmware for linux with '98 on it, but frankly I don't think I've booted either one more than once in the last year and a half, and that was only to run the DeLorme topo map. On Mon, Sep 02, 2002 at 11:22:18PM -0500, Gary Jeffers wrote: > My fellow Cypherpunks, > > I found this link about WinXP SP1 . SP stands for "service pack". The > article tells of some nasty goodies that MicroSoft has included > in it. The 2nd link has more info.. > > > http://www.theregister.co.uk/content/4/26911.html > http://www.theregister.co.uk/content/4/26698.html > > > You know, sometime we are going to have to abandon MS. I've already got a > dual booting system: MS and Red Hat Linux. I am slowly > migrating functions to Linux. The (GNU) Linux's and the free BSD's are good > alternatives to MS. If you can't live without MS, then make > your computer system dual booting. Also, dual booting will allow you to > make a fairly easy migration to a DECENT operating system . > MS is getting more and more oppressive. > > > Yours Truly, > Gary Jeffers > > BEAT STATE!!!! -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From profrv at nex.net.au Mon Sep 2 07:40:37 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 00:40:37 +1000 Subject: IRS now selling Juicy Lubes. Message-ID: <5.1.0.14.0.20020903001909.009f6220@mail.nex.net.au> IRS now sells poppers, Vaseline Knowing this day would come, but surprised it hasn't, Movementarian.com exposes the new business the IRS is involved with, no stone left standing in the process. Current IRS commissioner Charles Rossotti stated in a news conference held today that "[W]e are trying to make the victims feel less victimized. The medical community asked us to do something after April 15th when the largest such ass raping occurred. The urologists specifically requested that we stop penetrating beyond the anus into the rectum. As a traditional policy, we are unable to comply with that request, however we will begin offering scented and colored lubes along with a vast array of non-Aspirin based painkillers. We hope this will cut down on the hospital visits and thank the community for their valuable input." David Coy Johnston of the New York Times, pointed out in his op-ed "This issue has been completely misconstrued by tax-protesters and really is a moot point. These radicals need to deal with the issue like the rest of us and pay their fair share. Sure there might be a little bleeding and discomfort, but that is the price you pay for living in such a great country. Also, in the past, we in the media tended to provide various lube products, we are committed to doing so in the future as well and appreciate your past compliance; please keep up the great work." Hilary swears by them... http://www.freehotpics.com/cgi-bin/n-av/gallery.cgi?http://www.analvalley.com/?revid=13446 The greatest thing about anal sex is you never have kids you have to worry about so much that you get them chipped... "Following the recent abduction of ten year olds Holly Wells and Jessica Chapman, the Mirror reports that Wendy and Paul Duval have decided to implant their daughter, Danielle, with "a microchip to track her every move. "If she was kidnapped her exact location would be discovered via a computer." http://www.theregister.co.uk/content/54/26908.html Face It: Mental Health Isn't for Everyone. From profrv at nex.net.au Mon Sep 2 07:44:37 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 00:44:37 +1000 Subject: ELF demolish 'Homeland security." Message-ID: <5.1.0.14.0.20020902231848.009f10d0@mail.nex.net.au> http://www.indymedia.org/front.php3?article_id=201132&group=webcast The ELF Press Office received the following communique September 01, 2002: The Earth Liberation Front is claiming responsibility for the 8/11/02 arson attack on the United States Forest Service Northeast Research Station in Irvine, Pennsylvania. The laboratory was set ablaze during the early morning hours, causing over $700,000 damage, and destroying part of 70 years worth of research. This lesson in "prescribed fire" was a natural, necessary response to the threats posed to life in the Allegheny Forest by proposed timber sales, oil drilling, and greed driven manipulation of Nature. This facility was strategically targeted, and if rebuilt, will be targeted again for complete destruction. Furthermore, all other U.S. Forest Service administration and research facilities, as well as all DCNR buildings nationwide should now be considered likely targets. These agencies continue to ignore and mislead the public, at the bidding of their corporate masters, leaving us with no alternative to underground direct action. Their blatant disregard for the sanctity of life and its perfect Natural balance, indifference to strong public opposition, and the irrevocable acts of extreme violence they perpetrate against the Earth daily are all inexcusable, and will not be tolerated. If they persist in their crimes against life, they will be met with maximum retaliation. In pursuance of justice, freedom, and equal consideration for all innocent life across the board, segments of this global revolutionary movement are no longer limiting their revolutionary potential by adhering to a flawed, inconsistant "non-violent" ideology. While innocent life will never be harmed in any action we undertake, where it is necessary, we will no longer hesitate to pick up the gun to implement justice, and provide the needed protection for our planet that decades of legal battles, pleading, protest, and economic sabotage have failed so drastically to achieve. The diverse efforts of this revolutionary force cannot be contained, and will only continue to intensify as we are brought face to face with the oppressor in inevitable, violent confrontation. We will stand up and fight for our lives against this iniquitous civilization until its reign of TERROR is forced to an end - by any means necessary. In defense of all life, -Pacific E.L.F. Congratulations on a righteous action. (english) profrv@(nospam)fuckmicrosoft.com 6:11am Mon Sep 2 '02 comment#201162 Who cares who did it if the result is as claimed? Top job people,keep a low profile and use discreet methods and we can nickle and dime them to death.The quite outrageous sentence's dished out to some of our anarchistic friend demand the most stringent response.Mine is APster and all servants and duespayers of the State are warned that they may be targeted for capital punishment.Gagging me along with CJ and the man will not stop Operation soft drill. A shadowy figure in an online terrorist group has encouraged armed fighters to target American interests and to extort, kidnap and murder American citizens. "The United States has declared war," he said in a radio message to armed freedom fighters. "Our obligation is to fight them." Instructions from a bin Laden deputy holed up in a cave somewhere? Maybe a radical Islamic band in Pakistan? Or extremists in the land of our "ally" Saudi Arabia? None of the above. Wrong region. The threat comes from our very own hemisphere, and was issued by professor Rat. "Leading the world to higher consciousness through mockery and cheap publicity stunts."e From copenhagen.office.box at mail.doc.gov Mon Sep 2 09:54:08 2002 From: copenhagen.office.box at mail.doc.gov (=?GB2312?B?UG93ZXJTb2Z0VGVhbcP70KO/qreizcW20w==?=) Date: Tue, 3 Sep 2002 00:54:08 +0800 Subject: =?GB2312?B?z8i/qreiwvrS4rrzuLa/7g==?= Message-ID: <200209021654.g82GsNQD013125@ak47.algebra.com> 如果本邮件不是你所需要的,我们表示抱歉,请随手删除或按回复删除 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 业务说明(先提供服务,客户满意后再付款) 我们是powersoftteam软件团队,我们的成员来自北航与清华、华中科技大学(原华中理工大学)浙大的软件工程的硕士以及博士,我们提供如下服务: 1、客户关系管理(CRM)、进销存系统、销售管理系统、办公自动化系统(OA)、文挡管理系统、ERP、MRP、MIS等各类软件的定制开发,我们可以提交源程序,我们有这方面丰富的经验与众多的成功案例; 2、各类行业性软件的开发以及系统集成(例如:电信的网管软件、医院的信息管理系统、校园管理系统、酒店信息管理系统……); 3、电子政务、电子商务等大型系统的开发; 4、专业为国内人士提供软件破解和加密服务,破解效果可以达到两个层次,一个是密码或使用期限制的解除,另一个层次是在以上基础上进一步按客户需求修改软件界面,方便客户按照自己的习惯使用。方便大家使用国内外价格高达几万、几十万的大型或专业软件。该项服务需要客户简单介绍软件并提供未破密的软件的下载地址或光盘方式; 5、专业为本土软件提供加密保护;本工作室保障良好的破解和加密质量,充分满足用户的需求! 6、我们承接全国各地的以上方面的业务! 联系方式:powersoftteam软件团队 powersoftteam at sohu.com (与我们联系,请按照以上邮件地址,不要直接回复你所接收到的邮件) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 备注 1、我们可以给最终用户开发,也可以给软件公司或相关企业开发,客户可以在我们软件上面指明为客户自己开发(既软件版权可以给客户) 2:我们不提供破解工具和培训教程,考虑到操作问题,暂时不提供单片机、IC芯片和CPU的破解服务; 3:单价人民币5000元以下的软件,建议购买正版或请我们进行开发,我们不提供破解服务; 4:不出售大众软件、源代码和注册号,请勿来信索取; 5:不提供网站和电子邮箱的密码破解服务 联系方式:powersoftteam软件团队 powersoftteam at sohu.com (与我们联系,请按照以上邮件地址,不要直接回复你所接收到的邮件) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 请保留此邮件以备不时之需 From profrv at nex.net.au Mon Sep 2 07:57:04 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 00:57:04 +1000 Subject: SAP arrests two Indymedia reporters. Message-ID: <5.1.0.14.0.20020903005243.009f05a0@mail.nex.net.au> BREAKING NEWS - Police Repression Hits Indymedia SA by Indymedia South Africa • Monday September 02, 2002 at 10:29 AM Indymedia at union.org.za Two Indymedia comrades have just been arrested at NASREC while doing their job Two comrades from Indymedia South Africa, Mabata and another one that at this moment remains unidentified, have been arrested today at 14h00 at NASREC. The two have been transferred to Booysens Police Station. Further reports will follow on this countless act of police repression and intimidation on social movements and independent media workers. END Booysens gets mentioned here... http://www.web.amnesty.org/web/ar2000web.nsf/countries/08b35cefab5ad412802568f20055296b?OpenDocument "...There were other cases of torture during crime investigation. * In February, in the Johannesburg area of Townsview, members of a security firm, BBR, beat and kicked 19-year-old Archie Ngubalane, whom they had handcuffed to a railing and accused of an attempted stabbing. They threatened to shoot a relative who tried to intervene. Police failed to arrest the BBR members for assault, but arrested Archie Ngubalane and detained him at Booysens police station, where he was denied proper medical care. He was subsequently charged with attempted murder, denied bail and transferred to Diepkloof Prison,..." From admin at weltlotto-firma.s5.com Tue Sep 3 00:59:39 2002 From: admin at weltlotto-firma.s5.com (ADMINISTRATOR) Date: Tue, 3 Sep 2002 00:59:39 -0700 Subject: ATTENTION ENTRANT : cypherpunks Award Notificaton; Final Notice Message-ID: <200209022332.g82NWYQC016010@ak47.algebra.com> Attn cypherpunks , WELTLOTTO-FIRMA WORLDLOTTO 41132, NL-1007 DB AMSTERDAM, THE NETHERLANDS. FROM: THE DESK OF THE DIRECTOR PROMOTIONS, INTERNATIONAL PROMOTIONS/PRIZE AWARD DEPARTMENT, REF: WFL/67-AO91657984 ATTENTION ENTRANT: AWARD NOTIFICATION; FINAL NOTICE We are pleased to inform you of the announcement today, 2ND SEPTEMBER, 2002, of winners of the WELTLOTTO-FIRMA WORLDLOTTO/ INTERNATIONAL PROGRAMS held on 24TH JUNE, 2002. Your company, attached to ticket number 013-2316-2002-477, with serial number A025-09 drew the lucky numbers 37-13-34-85-56-42, and consequently won in category C. You have therefore been approved for a lump sum pay out of US$1,500,000.00 in cash credited to file REF NO. REF: WFL/67-AO91657984. This is from total prize money of US$22,500,000.00 shared among the fifteen international winners in the category C. All participants were selected through a computer ballot system drawn from 30,000 names from Australia, New Zealand, America, Asia, Europe and North America as part our International Promotions Program, which is conducted annually. CONGRATULATIONS! Your fund is now deposited with a Finance and Security House insured in your name. Due to the mix up of some numbers and names, we ask that you keep this award STRICTLY FROM PUBLIC NOTICE until your claim has been processed and your money remitted to your account. This is part of our security protocol to avoid double claiming or unscrupulous acts by participants of this program. We hope with a part of you prize, you will participate in our end of year high stakes US$1.3 billion International lotto. To collect your claim, please contact your claims officer immediately: jOHN BISHOP FOREIGN SERVICE MANAGER, EUROSECURITIES BV, FAX : 31 205248320 EMAIL :BISHOP at EUROSECURITIES.GQ.NU WEB URL : http://www.eurosecurities.gq.nu For due processing and remittance of your prize money to a designated account of your choice. Remember, you must contact your claims officer not later than SEPTEMBER 12, 2002. After this date, all funds will be returned as unclaimed. NOTE: In order to avoid unnecessary delays and complications, please remember to quote your reference number in every one of your correspondences with your claims officer. Furthermore, should there be any change of your address, do inform your claims officer as soon as possible. Congratulations again from all our staff and thank you for being part of our promotions program. Sincerely, THE DIRECTOR PROMOTIONS, WELTLOTTO-FIRMA LTD. http://www.welt-lottofirma.s5.com/ From profrv at nex.net.au Mon Sep 2 08:05:25 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 01:05:25 +1000 Subject: Charges against Indymedia centre dropped! Message-ID: <5.1.0.14.0.20020903010223.009f0310@mail.nex.net.au> District attorneyship of Zurich, Switzerland, decided for suspension of legal charges by Aktion Kinder des Holocaust against Independent Media Center for publishing "We are all Palestinians" cartoon series, where a Warsaw Ghetto-era boy is depicted saying "I am Palestinian". According AKdH's spokesman, Samuel Althoff, cartoon is "anti-Semitic" and "stands for the extermination of the Jewish people and the State of Israel." Author, Brazilian cartoonist Latuff, published on IMC Switerland and around the Web a cartoon series in order to promote International Campaign for Justice for the Victims of Sabra & Shatila, comparing the suffering of Palestinians to various oppressed people in history. MORE ON http://www.infoshop.org/inews/stories.php?story=02/09/02/8359050 Indy Swiss and Holland have frontline experience now fighting free speech repression.In Holland the right to link is under threat. From yanitla at hotmail.com Mon Sep 2 15:13:31 2002 From: yanitla at hotmail.com (Net Art Media) Date: Tue, 3 Sep 2002 01:13:31 +0300 Subject: Tketici Haklar Message-ID: <200209022214.g82MEXH11890@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11203 bytes Desc: not available URL: From profrv at nex.net.au Mon Sep 2 08:35:24 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 01:35:24 +1000 Subject: Tom Ridge, Gauleiter and Governor of Warthland Security. Message-ID: <5.1.0.14.0.20020903012027.009ef7f0@mail.nex.net.au> "Ridge reportedly telephoned the ILWU's Spinosa and suggested that any job slow-down or strike would be viewed as a threat to national security." Bush threatens to use troops against West Coast dockworkers http://www.infoshop.org/inews/stories.php?story=02/09/01/6989033 The LA Times further reported that soon after negotiations began on the new West Coast longshore contract, "the White House convened a working group to monitor them, with representatives from the departments of Commerce, Labor and Transportation and the Office of Homeland Security." The use of national security and the "war on terrorism" as a pretext for stripping workers of their democratic and collective bargaining rights is already the policy adopted by the Bush administration in relation to the new Department of Homeland Security. Bush is demanding that the 170,000 federal employees being transferred into the new department lose both their civil service protection and union representation. International solidarity may be needed to nip this forth Reich in the bud,at least arbusto is no demagogue! http://www.thenation.com/special/20010726miller.mhtml From profrv at nex.net.au Mon Sep 2 09:15:24 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 02:15:24 +1000 Subject: From anne Thrax to Chelle shock. Message-ID: <5.1.0.14.0.20020903021143.009f1280@mail.nex.net.au> http://www.prospect.org/webfeatures/2001/11/mooney-c-11-13.html Care for a rat sandwich? "...there is another Coulteresque pundit also in desperate need of accountability, to say nothing of restraint: Michelle Malkin. Malkin's syndicated column appears regularly in such newspapers as The Atlanta Journal-Constitution, The Miami Herald, The Washington Times, The Houston Chronicle and The New York Post. She also shows up as a commentator on Fox News and has an editorialist background from The Los Angeles Daily News and The Seattle Times. Unlike Coulter's unadulterated spinning, Malkin's columns commonly draw upon at least some interviewing and investigation. But this reportage does very little to temper the extreme language and ad hominem rhetorical abuse characteristic of her finished product. One of Malkin's favored -- and most irresponsible -- rhetorical techniques is a time honored one: guilt by association. And she adds her own unique flavor to this device: The associations made in her columns are frequently of her own idiosyncratic creation and not necessarily existent in real life." MORE ON http://www.prospect.org/webfeatures/2001/11/mooney-c-11-13.html What do call a right to lifer who cant wait to start a war? From franuma1 at runbox.com Tue Sep 3 03:14:06 2002 From: franuma1 at runbox.com (Francis Agedonuma) Date: Tue, 3 Sep 2002 03:14:06 -0700 Subject: project facilitation Message-ID: <200209030218.g832I4J14266@locust.minder.net> Pardon the abruptness and the liberty of this letter; It is due to its exigency. I am a government functionary in my country. I write to ask for your help. My colleagues and I are in need of a foreign partner to assist in the transfer of a considerable amount of money. My colleagues and I have deliberated much on the issue at hand. What we require is someone who is reliable and trustworthy, who has a vision and who will be able to manage whatever business in which we shall inject venture capital. We need someone who can share our dreams and ideals. I have the legal title to the sum and we shall go through the legal procedures entailed in both our laws and international laws in transferring the funds to you in trust. Please do not at this point misunderstand my intention, because understandably, we are not acqainted. I do not even know if you will be reliable and trustworthy, but I believe that everything starts with a first step. I know that I need to explain everything clearly to you before you can come to a decision as to whether you can assist me or not, and I will do this as soon as I get a response from you. I am sure that with the insider information I can provide, we will with your help, conclude the transaction within 21 working days. In consideration for your assistance, we have agreed to give you the normal transaction commission obtainable of 10% of the total sum, and another 5% if you can successfully put together an investment portfolio for us, as we will like to invest some of this money in your country, rather than leave it idle in a bank account. If you can be of assistance, please reach me at franuma at mail.com or send a fax to 234 1 7594298 for more information, otherwise, I thank you for your patience. Thank you for your courtesies. Best regards, Francis Agedonuma From mo at p-z.com Mon Sep 2 20:15:56 2002 From: mo at p-z.com (=?ISO-8859-1?Q?PZ?=) Date: Tue, 3 Sep 2002 04:15:56 +0100 Subject: =?ISO-8859-1?Q?logoffice.Com?= Message-ID: <200209030315.g833FsJ16260@locust.minder.net> Dear Sir/Madam logoffice.Com US$ 640 Please note that after years, the registration on the domain name logoffice.Com was not renewed and this domain had become available to register. Consequently, we have been approached to market this domain name that has been tracked and registered by a client. As result,logoffice.Com now available from us for IMMEDIATE transfer. With so many companies that could benefit from this domain, along with what many would consider to be a "wholesale price", we hope to secure a quick transfer. Please note that the domain name market is extremely solid at the moment and similar domains are currently selling on afternic.com, greatdomains.com (domain auction sites) and by domain name brokers, in some cases, for many thousands of US dollars. Please note that transfers take just 15 minutes and are extremely straightforward - absolutely NO technical knowledge required! For our client's peace of mind, we use an escrow service for all transactions and domains are ALWAYS secured by the buyer prior to us receiving any funds. We pay all fees connected with the escrow process. If you would like to use Www.logoffice.Com for your online business, please contact us at your earliest convenience. We will be on hand should you require any further assistance or information. We thank you for your attention and sincerely apologise if this e-mail has not been of interest to you. Yours sincerely, MO, Sales, Marketing P-Z From lopbelikoffkac at belikoff.org Tue Sep 3 00:34:22 2002 From: lopbelikoffkac at belikoff.org (Roxanne Lindsey) Date: Tue, 3 Sep 2002 06:34:22 -0100 Subject: Say goodbye to extra pounds Message-ID: <283506948.65879540766972@thhebat.net> Anatrim – The up-to-the-moment and most exciting flesh loss product is made available now – As told on ABC Did you realize that excessive body kilograms kill very much people around the planet? We know that you hate the ugly look of people like those and the social bias against them. Moreover, you have not the will to resist a siege of your fatal eating habits. If it all sounds familiar, then we have something for you! We are proudly introduce you Anatrim, the later product for the elimination of your body’s extra weight. The most astounding thing is that Anatrim raises the quality of your life by making you crave food less and giving you joyful spirit. Here you may see what people say to us on this product: "This is a great thing! Instead of watching TV and gorging anything easy to reach I became more interested in exercise. Anatrim placed me on the right track. I have a great figure now and there are lots of men around me!" Amelia B., Chicago "I tried some passive weight losing, but with little result. I was rather difficult for me to restrain my ravenous appetite. One day I was told on Anatrim the media by and I rather liked the information. I had tried taking it, and my wife said to me I'm a different person now, 3 months later. 32 pounds have gone away and it’s not a limit! And you know, I’m an impetuous lover again." Charley Mock, San Diego Anatrim helps your brain to understand you doesn’t have such a great need for that much food. It lifts your mood up, gives you energy, and attacks unnecessary kilos. Especial thanks to its mighty newly-elaborated formula!! Find out latest news on this excellent product now! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2212 bytes Desc: not available URL: From Normanncyx at inbox.ru Tue Sep 3 04:59:54 2002 From: Normanncyx at inbox.ru (Carson Baader) Date: Tue, 03 Sep 2002 07:59:54 -0400 Subject: Information for cypherpunks@minder.net Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3065 bytes Desc: not available URL: From Support at webtraxter.com Tue Sep 3 08:18:48 2002 From: Support at webtraxter.com (WebtraxterMail) Date: Tue, 3 Sep 2002 08:18:48 -0700 Subject: Reach them.... Message-ID: <200209031314.g83DEeJ40858@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3016 bytes Desc: not available URL: From eugen at leitl.org Mon Sep 2 23:30:40 2002 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 3 Sep 2002 08:30:40 +0200 (CEST) Subject: WinXP SP1 out next Monday - but can you avoid it? In-Reply-To: <000701c25301$7ecf9040$88934ad1@garyjeff> Message-ID: On Mon, 2 Sep 2002, Gary Jeffers wrote: > You know, sometime we are going to have to abandon MS. Who is that we? Some of us, in fact a rather large fraction, probably, has never used Redmondware. If you think the bulk of computer users in general, then you can wait until hell freezes over. From declan at well.com Tue Sep 3 08:40:16 2002 From: declan at well.com (Declan McCullagh) Date: Tue, 03 Sep 2002 11:40:16 -0400 Subject: Note to FBI, NSA, CIA: How to get your bill through Congress Message-ID: <5.1.1.6.0.20020903113920.01adede8@mail.well.com> Upcoming Conferences: Date: Sep. 13,-Sep. 13, 2002 Location: Washington, D.C. Event Name: Drafting Effective Legislation and Amendments Event Sponsor: TheCapitol.Net Event Description: Drafting Effective Federal Legislation and Amendments -- A "how to" program for federal agency staff. This one-day conference is designed to help you write and revise your agency's bills and amendments effectively and concisely. In addition to discussing the role of the OMB and examining the different formats and deciding how to choose the best one to highlight your agency's issue, we will discuss how to: - Define your audience and broaden the appeal of your measure. - Assess existing law and policy objectives before putting pen to paper. - Structure bills and amendments and streamline the drafting process. - Ensure that your legislative draft is interpreted exactly as intended. - Comply with style, grammar, punctuation guides and the U.S. Code rules of construction. - Use different drafting styles to work in your favor. -- TheCapitol.Net is a non-partisan, women-owned firm that is the exclusive provider of Congressional Quarterly Executive Conferences. Contact Information: Name: Sophia Lo Phone number: 202-678-1600 E-Mail: govexec at TheCapitol.Net Web site: http://www.DraftingLegislation.com 0 From shamrock at cypherpunks.to Tue Sep 3 11:40:40 2002 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 3 Sep 2002 11:40:40 -0700 Subject: S/MIME in Outlook -- fucked. In-Reply-To: Message-ID: <000901c25379$68fc7940$6801a8c0@VAIO650> Meyer Wolfsheim wrote: > ... just making certain Lucky has seen this gem. Lucky reads Bugtraq daily. :) --Lucky Green From ericm at lne.com Tue Sep 3 13:13:42 2002 From: ericm at lne.com (Eric Murray) Date: Tue, 3 Sep 2002 13:13:42 -0700 Subject: I see everything twice! Message-ID: <20020903131342.A11679@slack.lne.com> It looks like one of the CDRs, possibly algebra, is changing the Message-ID on cpunks mail and redistributing it to the CDRs-- I'm seeing two copies of each message, one of which has an X-Algebra header in it. Could the algebra maintainer check this out? Thanks. Eric From jamesd at echeque.com Tue Sep 3 13:20:27 2002 From: jamesd at echeque.com (James A. Donald) Date: Tue, 03 Sep 2002 13:20:27 -0700 Subject: S/MIME in Outlook -- fucked. In-Reply-To: Message-ID: <3D74B71B.1001.121B1A@localhost> -- On 3 Sep 2002 at 11:16, Meyer Wolfsheim wrote: > I encourage everyone to send Bill Gates an email from > himself. =) > > ============================================================= > ========= ==== Vendor Notification Status > > Microsoft knows about this, of course, but "isn't even sure > whether to call this a 'vulnerability'." Right. While the immediate bug is in Microsoft IE and Outlook, this exploit is also a reflection of the contorted mess that is the certificate structure and the public key infrastructure, and of the fact that Verisign is not doing its job. (This exploit only works if one starts with a legitimate verisign certificate for a web site, it does not work if one starts with a legitimate Thawte certificate.) Microsoft unambiguously screwed up, but the infrastructure made it easy to screw up, and difficult and expensive to get things right. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 2S6sg825yJSZ69s23KyOvpaHYYQYbgoRuPl2j1JZ 24hZwF+YmQMFl2hK8LOkiesmNrg+xJ0ZdA1qPUzQU From cypherpunks at Algebra.COM Tue Sep 3 12:13:00 2002 From: cypherpunks at Algebra.COM (cypherpunks at Algebra.COM) Date: Tue, 03 Sep 2002 14:13:00 -0500 Subject: Refinance and Save $$$ Message-ID: <8YEMEX3UM59GC.45FE9P6D9AXA3PBSELLU.cypherpunks@algebra.com> We will help you get the mortgage loan you want! Only takes 2 minutes to fill out our form. http://www.horacespeed.com/index.php Whether a new home loan is what you seek or to refinance your current home loan at a lower interest rate and payment, we can help! Mortgage rates haven't been this low in the last 12 months, take action now! Refinance your home with us and include all of those pesky credit card bills or use the extra cash for that pool you've always wanted... Where others says NO, we say YES!!! Even if you have been turned down elsewhere, we can help! Easy terms! Our mortgage referral service combines the highest quality loans with most economical rates and the easiest qualification! Click Here to fill out our form. http://www.horacespeed.com/index.php -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4846 bytes Desc: not available URL: From marketing at cd-uk.net Tue Sep 3 07:35:53 2002 From: marketing at cd-uk.net (Computer Developments UK) Date: Tue, 3 Sep 2002 15:35:53 +0100 Subject: Take Your Pick! Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3755 bytes Desc: not available URL: From eresrch at eskimo.com Tue Sep 3 16:05:12 2002 From: eresrch at eskimo.com (Mike Rosing) Date: Tue, 3 Sep 2002 16:05:12 -0700 (PDT) Subject: Shooting cops is an Adrenaline rush.Its also more popular this year. In-Reply-To: <5.1.0.14.0.20020904060002.009ef200@mail.nex.net.au> Message-ID: On Wed, 4 Sep 2002, Matthew X wrote: > Attacks on police soar > By TANYA GILES > 04sep02 > VIOLENT crime against police is rising: more than 2300 officers were > attacked while on duty in one year. Two police were killed in their car by a 27 year old driver in Wisconsin USA last month. No motive known - he just floored it and ramed the cop car full speed and T-boned it. An interesting sociological phenomena. Be interesting to see how much longer it lasts. Patience, persistence, truth, Dr. mike From profrv at nex.net.au Tue Sep 3 04:01:32 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 21:01:32 +1000 Subject: Code red leads to Code blue in DC. Message-ID: <5.1.0.14.0.20020903210051.009ed460@mail.nex.net.au> POLICE ABUSE ALLEGED IN THE ARREST OF A ROLLERBLADING POLITICAL ACTIVIST Bandana protection from Code Red smog in D.C. becomes an excuse for a brutal arrest and violation of rights WASHINGTON, D.C. -- D.C. Statehood Green Party member and community activist Chris Otten will represent himself in court on Thursday, September 5, when he faces charges after an incident in which D.C. police reportedly violated his privacy and used needless force. On July 25, Otten was rollerblading on U Street NW, wearing a bandana over his nose and mouth due to Code Red smog. A sergeant of the Metropolitan Police Department (MPD) approached Otten near the U Street Metro Station, wielding his baton and demanding identification. Otten refused, citing privacy rights, upon which police backup was summoned and Otten was tackled to the ground by several MPD officers. He was arrested on the charges of "failure to show identification" and "disorderly conduct," denied medical attention for eight hours, and spent 20 hours in jail. Otten called his arrest and brutal treatment typical of a larger assault on American civil liberties. "Everyday citizens need to concern themselves when the police show up to harass their fellow neighbors. I encourage all people to read up on our rights and watch the police carefully when the situation calls so to witness and testify against any police brutality that may, and in D.C., most likely will occur." "What happened to me is nothing new in DC," Otten added. "I met lots of people during my experience in the D.C. criminal justice system who are subjected to police abuse regularly -- to the point where this system has become a culture, a way of life for many D.C. residents." "As a candidate Ward One member of City Council, I am outraged that [incumbent candidate] Jim Graham and his campaign staff would stand by idly while a young man who was trying to protect himself from the smog found himself attacked and abused by police," said Edward Chico Troy, noting that the incident took place in Ward One. "The police should be held accountable to standards of professional law enforcemet behavior. We should never allow or condone the abuse of law-abidng citizens." Chris Otten will appear in D.C. Superior Court, 500 Indiana Avenue NW, courtroom 120 on September 5 at 9 a.m., after an 8 a.m. rally in his defense in front of the courthouse. For periodic updates during the day, call Mintwood Media at (202) 986-6186. "We must take a stand against police abuse of power and the criminal injustice system," said Otten. "This is especially true when U.S. government cronies like John Ashcroft have pounced on people's true fears stemming from 9-11 and he has used them to attack Americans' civil liberties through the USA PATRIOT Act and the Homeland Defense Department, both of which are reminiscent of McCarthy era policies from the 1950s." MORE INFORMATION The D.C. Statehood Green Party http://www.dcstatehoodgreen.org 1314 18th Street, NW, lower level, Washington, DC 20036, 202-296-1301 - END - From profrv at nex.net.au Tue Sep 3 04:03:19 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 21:03:19 +1000 Subject: Portland State of Siege. Message-ID: <5.1.0.14.0.20020903210249.009f1dd0@mail.nex.net.au> This story had photos, see the link and the Portland indymedia site for a more complete story..... http://www.portland.indymedia.org The police riot at last week's A22 Bush Protest outraged many people in Portland and around the U.S. Mayor Vera Katz delivered her response on Friday by subjecting Critical Mass riders to pepperspray and police violence. With this choice, she has made it clear that she stands with tyranny and against freedom. Katz's track record of affronts against civil liberties includes the Joint Terrorism Task Force, the Sit-Lie-Stand Ordinance, and the humiliation of Dignity Village. Her committed opposition to basic human decency has never been more obvious. She is a disgrace to the caring, progressive, justice-seeking people of this city and if she had a shred of honor, she would step down. In my book, Katz is more dangerous than Dubya; her brand of petty fascism is endorsed by the clueless liberals of the Democratic Party, whose only difference with the Republicans is that they kiss you before they fuck you over. It's time for you to resign, Vera, and take that thug Police Chief Kroeker with you. 800+ riders showed up for this Friday's Critical Mass, the biggest of the year so far. Just before arriving, we heard over the police scanner that the cops were bringing vans and pepperspray. We figured that the city was somehow planning "revenge" for the victory that the people of Portland enjoyed on A22, which sent positive ripples out across the nation. And while the city certainly tried to use the cops against us -- and certain cops were brutally dedicated to the cause -- the Critical Mass was not deterred Link: http://portland.indymedia.org/front.php3?article_id=19316&group=webcast From pmfreepornwebsites4 at PopCorn.net Tue Sep 3 21:35:24 2002 From: pmfreepornwebsites4 at PopCorn.net (yltAmber) Date: Tue, 3 Sep 2002 21:35:24 -0700 Subject: Free Adult DVDs and Videos. No purchase necessary! gbhyk Message-ID: <200209040435.g844ZHH27113@waste.minder.net> TO: cypherpunks at minder.net Shhhhhh... You just found the Internet's BEST KEPT SECRET!!! These Adult DVDs are Absolutely FREE!!! They retail at over thirty dollars you only pay shipping guaranteed! Go To: http://www.pornvideosales.com Everything must go!!! Additional Titles as low as $9.95 Largest Selection on the net guaranteed. Removal Instructions for cypherpunks at minder.net You have received this advertisement because you have opted in to receive free adult internet offers and specials through our affiliated websites. If you do not wish to receive further emails or have received the email in error you may opt-out of our database here: http://80.71.66.106/optout/index.html . Please allow 24 hours for removal. This e-mail is sent in compliance with the Information Exchange Promotion and Privacy Protection Act. section 50 marked as 'Advertisement' with valid 'removal' instruction. ulkeypkmevfvyhisyjyghro From profrv at nex.net.au Tue Sep 3 05:08:20 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 22:08:20 +1000 Subject: FBI,CIA in au. Message-ID: <5.1.0.14.0.20020903220152.009f45f0@mail.nex.net.au> FBI quizzes US ambush victims By Jordan Baker and Catharine Munro 03sep02 AN FBI agent has interviewed victims of a violent ambush in Indonesia's Papua province as they recovered in an Australian hospital. Three people died when an estimated 15 gunmen opened fire on a convoy of cars carrying teachers and their families near a huge US gold mine at the weekend. Seven Americans and an Indonesian were airlifted to a hospital in Townsville, north Queensland, where at least two underwent surgery. Among the injured sent to Australia were American school teachers Saundra Hopkins and Ken Balk, and their six-year-old daughter Taia. A Townsville Hospital spokeswoman said all patients were stable and resting comfortably. United States Embassy spokesman Matt Conoley said an American consular official and an embassy legal attache, who was also an FBI agent, had flown to Townsville. They were interviewing the American patients. "Obviously this kind of attack can raise concerns that this could be a militant or terrorist attack," Mr Conoley said. "We wanted to verify whether or not that was the case. "At this point it's too soon to tell and I don't have any details about what was talked about." The New York Times reported Western diplomats believed the ambush did not appear to be part of an international terrorist plot against Americans. Amnesty International today condemned the attack but warned authorities to refrain from using the incident as an excuse to crack down on Papuan civilians. It called for an immediate, impartial and effective investigation. Any suspects should be charged with a recognisable criminal offence and be brought to trial in accordance with international standards for a fair trial, it said. "Freeport (mine) also has a responsibility to ensure that an effective and independent investigation takes place," it said. Security authorities have blamed the Free Papua Movement (OPM), but the OPM and its political arm have denied responsibility. Some analysts have suggested elements of the military could be involved. The loosely-organised OPM has waged for three decades a low-level guerrilla struggle against Indonesian rule in the province in the western half of New Guinea island. Meanwhile, a Papuan human rights group has said 15 people had been questioned without lawyers over the killing of three teachers at a remote mine in Papua province. The claim came as Amnesty International issued a statement calling on the Indonesian government to respect human rights while tracking down the killers of two Americans and one Indonesian at the Freeport gold and copper mine on New Guinea island on Saturday. Ten more people were injured in the attack on a convoy of cars travelling on a road between the coast and the highlands mine. They included seven Americans and an Indonesian who were evacuated to Townsville Hospital in far north Queensland for urgent medical treatment. But the Indonesian military and police both denied they had detained any suspects as their search continued. Aloysius Renwarin of the Human Rights and Advocacy Group (ELSHAM) in the provincial capital of Jayapura said he had received reports that people in the tribal village of Wara Banti, close to the site of the attack, had been detained in the mining settlement of Tembagapura. "We heard reports from the Amungme tribe, particularly from Wara Banti village, that they have been accused of being involved in an attack," Renwarin said. "Fifteen residents of Wara Banti were interrogated by the police but they were not accompanied by a lawyer." "The 15 were just ordinary people, they don't know much." Villagers were unable to carry out their everyday work because access to roads had been limited to the military, he said. Regional police chief Made Pastika said ELSHAM's claim was incorrect. "The police have not arrested anybody," he said. Pastika said that police had not yet identified a man who was shot dead by soldiers near the scene of the attack on Sunday on suspicion of being involved in the ambush. "We have asked members of two local tribes to confirm the identity of the dead man but they don't know him," he said. Papua regional military chief Major General Mahidin Simbolon denied any arrests had been made. "We're trying our best here and people just need to be patient," he told Reuters. Security analysts have questioned the ability of the badly organised guerilla group, Free Papua Movement (OPM), to carry out the ambush and said such violence was uncharacteristic of their decades-old struggle for independence. Amnesty International warned the military not to use the attack to justify harsh operations, saying that past assaults have resulted in gross human rights violations against civilians. "The Indonesian authorities have an obligation to bring those responsible to justice," the group said in a statement. However, it warned against using the incident as justification for indiscriminate operations against Papuan civilians, including independence activists. "It would not be the first time that the Indonesian military has been suspected of provoking armed attacks or other disturbances in Papua or elsewhere in Indonesia in recent years," Amnesty international said. First CIA agents in au? 1) Commander Samuel Rountree Sanders,listed as Assistant Naval Attache' and assistant Attache' for air.1954 2)Lt Colonel Collas G Harris.'Assistant air Attache'.1956.The year of Dulles visit. From profrv at nex.net.au Tue Sep 3 05:08:59 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 22:08:59 +1000 Subject: Yahoo trojan horse in China. Message-ID: <5.1.0.14.0.20020903213945.009f1760@mail.nex.net.au> Yes sir no sir three bags full sir... http://news.com.com/2100-1023-956243.html?tag=fd_top Carnivore fails in the US...fall of Govts imminent? Declan McPotatoheads heads fall report..."No one's life, liberty or property are safe while the CATO Institute is in session." http://news.com.com/2010-1071-956201.html?tag=fd_nc_1 As the PATRIOT act was pre chewed,what else is on the menu Dec? Inquiring minds etc... "First they came for the hackers. But I never did anything illegal with my computer, so I didn't speak up. Then they came for the pornographers. But I thought there was too much smut on the Internet anyway, so I didn't speak up. Then they came for the anonymous remailers. But a lot of nasty stuff gets sent from anon.penet.fi, so I didn't speak up. Then they came for the encryption users. But I could never figure out how to work pgp5 anyway, so I didn't speak up. Then they came for me. And by that time there was no one left to speak up." From profrv at nex.net.au Tue Sep 3 05:31:28 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 22:31:28 +1000 Subject: Chicken attack on America. Message-ID: <5.1.0.14.0.20020903223023.009f0ec0@mail.nex.net.au> Chicken kill leaves bitter aftertaste By Daniel Lewis, Regional Writer September 3 2002 When the diseased birds wouldn't burn as fast as they were being gassed or having their necks wrung, the alternative for Mangrove Mountain was the pits. There are two of them, lined with more than 100 shipping containers that are filled with the carcasses of about 1.5 million chickens. The pits must be monitored for at least 30 years - which the Auditor-General says is costing about $1 million a year. They are symbols of the fact that people are still paying for Australia's worst outbreak of exotic animal disease long after the last animal was destroyed. Newcastle disease struck the small Central Coast farming community's poultry industry in 1999. What happened to farmers like Shaun Rodger has helped the country understand how devastating a widespread outbreak of foot-and-mouth disease would be. The Productivity Commission looked at Mangrove Mountain and noted: "Although the disease was confined to one area it took three months to control, involved up to 5000 people working on eradication and is conservatively estimated to have cost governments around $22 million (excluding compensation)." advertisement The cost to the chicken meat industry has been put at $200 million and farmers are still furious over their compensation. From what he saw at Mangrove Mountain, Mr Rodger's assessment of foot-and-mouth is that "you wouldn't have a hope in hell of stopping it". Mr Rodger - whose family was reduced to accepting food parcels after the outbreak - is also chairman of the NSW Contract Poultry Group and represents most chicken farmers around Mangrove Mountain. They are still angry, he says, over the lack of consultation from government authorities as the outbreak was tackled. "You have got to use farmers. Nobody knows their plot of dirt better than the farmer. Farmers just felt isolated." Had their advice and help been accepted, the outbreak would have been controlled far more quickly and cheaply. Many locals also fear that the pits are not being monitored closely enough, Mr Rodger said. The destruction and disposal of seven million animals in Britain last year after a foot-and-mouth outbreak has thrown the spotlight back on carcass disposal. Britain's Environment Agency recorded about 50 cases of water pollution related to carcass burial, but there was no long-term contamination of drinking water. There were about 900 burial sites and 300 complaints about the smell. The burning of animals on spectacular pyres was seen as a public relations disaster that cost British tourism billions of dollars. The preferred method of carcass disposal in Australia is burial, although burning was tried first at Mangrove Mountain. Huge fires fuelled by 120,000 railway sleepers burnt 24 hours a day to destroy more than 500,000 birds, but could not keep up with the killing, says NSW Agriculture's Kevin Cooper, who managed the outbreak. The pits were built to the highest standard, well above the water table, and rigorous testing had revealed no problems. NSW Agriculture is now working with local government to identify sites across the state that could be safely used for future carcass burials. At Mangrove Mountain, the State Government still employs a community worker to help locals adjust. A Department of Community Services survey found that 69 per cent of people felt it would take at least two years to recover economically and emotionally. Its research identified continuing divisions between chicken farmers and others over issues such as restriction of movement during the emergency. The outbreak also sparked stigma, paranoia and conspiracy theories. Farmers' children were bullied and the case of the child who had a chicken sandwich unnecessarily confiscated when the school bus was stopped at a checkpoint has become bitter legend. Mr Rodger says the only good result was Mangrove Mountain was put on the map. When Sydneysiders discovered the beautiful rural property within an hour's drive, real estate prices rose, but "they're already complaining about the smell of chook manure". From profrv at nex.net.au Tue Sep 3 05:39:37 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 22:39:37 +1000 Subject: Pocketmail Message-ID: <5.1.0.14.0.20020903223627.009f4910@mail.nex.net.au> http://www.zdnet.com.au/newstech/enterprise/story/0,2000025001,20267857,00.htm Hey my moms got one of those! The only problem? The price halved just after she bought it. http://www.pocketmail.com/?loc=us "...More disciplinary cases have been brought against employees for violating company e-mail and Internet policies than for acts of dishonesty, violence or health and safety breaches..." http://www.zdnet.com.au/newstech/hr/story/0,2000024989,20267882,00.htm From profrv at nex.net.au Tue Sep 3 06:13:03 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 03 Sep 2002 23:13:03 +1000 Subject: Erm,ah,a "Pinhead" from ratbags.com would like to set you straight. Message-ID: <5.1.0.14.0.20020903231126.009f7340@mail.nex.net.au> The moral disease of homosexuality is rooted in the godless metaphysics of evolutionism. Evolutionism is the theory, homosexuality is the practice. Evolutionists fail to distinguish between the anus and the vagina because they both appear as a hole. It is the same ideology that refuses to distinguish between human bones and monkey bones because they both appear as bones. This is like failing to distinguish between a rocket launcher and a pipe because they both appear as a tube. However, nobody makes that mistake becuase everybody applies intellegent design theory, not evolutionism, to those things. Many evolutionists take this ideology to its logical limit. Since their belief system predicts the anus and the vagina are both purposeless holes with no difference between them there is no reason not to engage in the using of either one--with the easier-to-obtain anusus winning out. This is where homosexuality comes from. Well, what are the actual consequences of this behavior? Anus-stuffing evolutionists think they have deceived G-d because they have deceived themselves, but G-d is not mocked and he will have his vengence! Returning to our analogy, the vagina, like the pipe, is designed for bi-directional flow. The anus, like the rocket launcher, only launches one way! If you continue to stuff anuses, like stuffing a rocket launcher--an explosion will inevitably occur. This is what's happening in the world today. Global warming is really caused by the wrath of G-d against the rampant anus-stuffing society known as the Netherlands. G-d intends to melt the polar ice caps in order to drown that most sinful lowland nation like he did to the world in the days of Noah--and this time, there will be no litttle Dutch boys to stick their fingers in the dyke-holes to stop it. That will only be the beginning, the day of reckoning for the continual stuffing anuses for ll of humanity will then be upon us! (partially described in Revelation) Jesus loves you and so does Pinhead http://www.ratbags.com/ranters/pinhead010722.htm From nobody at libertynews.org Tue Sep 3 16:30:18 2002 From: nobody at libertynews.org (Anonymous) Date: 3 Sep 2002 23:30:18 -0000 Subject: Privacy/anonymity charities Message-ID: <3ff3177b3daa80b8d8a26936cde9b114@libertynews.org> The company I work for has a charitable donation matching program. Do you have any suggestions for organizations with 501(c)3 status who would be worthy recipients of a donation? I have EFF and EPIC on my list. Are there others doing things to protect anonymity and privacy rights? I am more interested in actively working on developing ways of securing people's anonymity, rather than lobbying or litigation organizations. I think that the two I have above cover the latter nicely. TIA. From profrv at nex.net.au Tue Sep 3 07:06:44 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 00:06:44 +1000 Subject: Was Mi5 behind the Blair Ditch project? Message-ID: <5.1.0.14.0.20020904000502.009f0360@mail.nex.net.au> MI5 agent David Rupert tried to get the Continuity IRA (CIRA) to procure biological weapons, The Sunday Business Post has learned. The breakaway republican group eventually declined Rupert's overtures, but the informant is believed to have succeeded in smuggling arms from the United States into Ireland, with the full knowledge of MI5, in 1997. The American was operating as an agent for the British security service from a base in Donegal without authorisation from the Irish government. The Garda was also not informed. This newspaper has seen a series of e-mails which were sent by Rupert to his MI5 handlers in which he outlined his extraordinary efforts to inveigle himself into the CIRA hierarchy between 1993 and 1998. "I had outlined the weapons deals briefly in the US," Rupert wrote in one e-mail sent to his MI5 handler in 1998. "I talked about the computer deal and then the big one, biologicals. I said I understand they are quite easy to get in the US as a laboratory experiment type deal. They were interested." The 51-year-old Rupert is now on the Witness Protection Programme in the United States waiting to give evidence in the trial of Michael McKevitt, the alleged leader of the Real IRA. McKevitt is expected to go on trial early next year in the Special Criminal Court on charges of directing terrorism. Related article: North's MI5 man in bizarre chemical weapons plot MI5 spy in North enquired about biological weapons MI5 agent David Rupert tried to get the Continuity IRA (CIRA) to procure biological weapons.....( Sunday Business Post, 2 Sep 02) "I had outlined the weapons deals briefly in the US, I talked about the computer deal and then the big one, biologicals. I said I understand they are quite easy to get in the US as a laboratory experiment type deal. They were interested." --MI5 spy David Rupert in an e-mail sent to his MI5 handler in 1998 on his attempts to convince the Continuity IRA to procure biological weapons from the United states From profrv at nex.net.au Tue Sep 3 07:21:22 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 00:21:22 +1000 Subject: SOB George and the Mondragon. Message-ID: <5.1.0.14.0.20020904001923.009f33c0@mail.nex.net.au> The Challange of Mondragon. In the Beginning . . . . The Basque region of Spain has, in recent years, seen the rise of a system of cooperatives that is unparalleled in its dynamism, growth, and economic impact on a region. The system, which spreads throughout the surrounding Basque region, is named after Mondragon, a town in the mountains of Guipuzkoa Province near Bilbao, the place where the first cooperatives started. Since its start over thirty years ago, it has gained an international reputation, with similar models now being developed in England, Wales, and the United States. While its explicit connections to the anarchist tradition are unclear, the Mondragon system is an example of liberatory [sic] organization which, like its predecessors in the Spanish Civil War, has achieved success on a scale unequaled in any other part of the world. The Mondragon network was founded by a Catholic priest, Don Jose Maria Arizmendi, a man who had narrowly missed being put to death by Franco as a result of his participation in the Spanish Civil War on the Republican side. With the help of collections from citizens of Mondragon, he founded an elementary technical school in 1943. The first graduates numbered among them five men who, in 1956, founded a small worker-owned and managed factory named ULGOR, numbering initially 24 members, and given to the manufacture of a copied kerosene stove. This cooperative venture proved successful and developed into the flagship enterprise of the whole system which later was to come into being. At one point ULGOR numbered over 3,000 members, although this was later recognized as too large and was reduced. The structure of this enterprise served as the model for the latter enterprises forming the system. Following the Rochedale principles, it had one member-one vote; open membership; equity held by members and hence external capitalization by debt, not equity; and continuing education Mondragon Corporación Cooperativa 17/06/2002.- MCC increased sales by 14.7% in 2001 and created 6,800 new jobs In a year like 2001, characterised by an acute slowdown in the economy all over the world, made worse in the second half of the year by the tragic events of 11 September, MCC companies performed reasonably well. They increased their sales by 14.7%, with significant international expansion in the industrial area and 6,800 new jobs created, although overall profitability fell somewhat. For 2002, the forecasts are for a 14% rise in sales and 5,000 new jobs http://www.makethemaccountable.com/ From profrv at nex.net.au Tue Sep 3 07:26:33 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 00:26:33 +1000 Subject: CAPPS Message-ID: <5.1.0.14.0.20020904002406.009ec4f0@mail.nex.net.au> By late fall, federal airport security officers hope to begin installing computer systems that can instantly check the personal backgrounds of airline passengers and alert security officials to any who are deemed dangerous before they can board planes and take off. The tool, a substantially advanced version of the Computer Assisted Passenger Prescreening System (CAPPS) now in use, is being designed to comb multiple government and commercial databases for information that could indicate that a passenger poses a threat. Although installation of the system at airports is scheduled to begin in late fall, a government official, speaking on background, said it could be delayed if, as expected, the Transportation Security Administration is pulled out of the Transportation Department and moved into the Homeland Security Department. "We're waiting to see what happens with the new department," the official said. The House of Representatives has approved a Bush administration plan to create the Homeland Security Department and move TSA and about two dozen other federal entities into it. But the Senate has only begun to examine the proposal. Last spring, TSA hired four companies to design rival versions of essential software for the passenger screening system, and agency officials expect a final design of the system to be finished this fall. The system should be able to conduct "real-time preflight background threat evaluation" of airline passengers by using names and personal information taken from passenger manifests, according to TSA and industry sources. The system, called CAPPS II, would compare information from manifests with information culled and analyzed instantaneously from "numerous databases from government, industry and the private sector" to determine whether any passengers pose a security threat. A computer using a security scoring algorithm and criteria and weights set by TSA would decide whether a passenger posed a threat. The system would also consider "threat data gathered from state, federal and private-sector sources," TSA officials wrote in a report on CAPPS II. An existing version of CAPPS provides threat information to airline employees, who are then supposed to pass it on to airport security personnel. The new version is being designed to provide threat alerts directly to "front-line security forces," including via secure wireless communication, the report states. TSA's plan to use information from commercial databases worries privacy advocates. The Electronic Privacy Information Center warns that "each airline passenger will be subjected to an extensive profiling" if CAPPS II goes forward. Lawyers for EPIC sued TSA, saying the agency failed to disclose enough information about how the system will work. EPIC wants to know what factors would trigger a threat alarm, how accurate data in the databases would be, what recourse travelers would have if they are falsely identified as being a threat, and whether the system violates constitutional prohibitions, including those against unreasonable searches. TSA officials are guarded about discussing the system. In a notice about CAPPS II sent to software developers this spring, TSA warned that "there shall be no public release of information concerning the requirements" of the system or proposals by companies interested in developing it. But industry officials insist it will work. "It could be very effective" in identifying potentially dangerous passengers, said Allen Shay, president of Teradata, a data warehousing division of NCR Corp. The system is likely to focus on passengers who pay cash, buy one-way tickets or have questionable or conflicting identification documents, criminal records or other information in databases that arouses suspicion, he said. Similar automated background checks are common in the financial industry and commerce, Shay said. Banks, for example, check employment, credit and financial records when marketing loans. But the passenger-screening system is almost certain to raise concerns about privacy and profiling, Shay said. "When it is done in the commercial world, it is known as customer resource management. When it is done by the government, it's an invasion of privacy," he said. "To move forward in a positive way, that's something we're going to collectively have to get over." http://www.fcw.com/fcw/articles/2002/0902/news-capps-09-02-02.asp Hope it picks up anthrax carrying sheep murdering Mi5 agents. From profrv at nex.net.au Tue Sep 3 07:32:53 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 00:32:53 +1000 Subject: US SS knives SA on HR for HS.Night of the long knives. Message-ID: <5.1.0.14.0.20020904002730.009f3150@mail.nex.net.au> Remember when the SS took over from the SA Lili Marlene? The Bush administration did not go far enough when it recommended giving the proposed Homeland Security Department extra flexibility in hiring, retaining and firing department staff, according to President Bush's Homeland Security Advisory Council. Despite already heated opposition to Bush's proposal in the Senate, the council, which draws its members from the public and private sectors, suggested several ideas in a meeting last week, including that senior executives and managers slated to join the proposed department be required to apply for the new positions they would hold. Using this tactic, the administration, employees and the public can be sure that the department's leaders are really the best people for the job, not just the people who held certain titles before, said council member Ruth David, president and chief executive officer of Analytical Services Inc. Measuring the performance of people, as well as systems and programs, is important throughout the department, council members agreed. The council was especially concerned with the role of middle managers. For example, they proposed evaluating managers on their ability to make their staff members work as a team — and replacing managers if they fail. "Culture is an asset, but it can never be an excuse," said Norm Augustine, former chief executive officer of Lockheed Martin Corp., whom the council called in to share ideas on integration. Augustine also served as a member of the U.S. Commission on National Security/21st Century, a bipartisan group established by Congress that called for a homeland security department in its final February 2001 report. Members acknowledged that many of the flexibilities the council suggested do not easily fit within the government structure. "We're having to invent an entirely new process of integration," said Utah Gov. Michael Leavitt, a council member. But all agreed that past experience merging agencies shows that working by old management rules will cost critical years while trying to bring together all the pieces of the proposed department. "We do not have the time to repeat those patterns," said council member Lydia Thomas, president and CEO of Mitretek Systems Inc. Council members said management flexibility was critical to the success of the department. But the concept still faces a fierce debate in Congress. Although the House passed its version of the Homeland Security Department bill July 26 with the management flexibilities intact, the battle in the Senate, which is still deliberating the bill, is heating up. Sen. Joe Lieberman (D-Conn.), chairman of the Senate Governmental Affairs Committee, sent a letter last week to members of Congress highlighting the differences between the president's bill to create the proposed department and the Senate version. Lieberman's committee leads the Senate's work on the bill. In the letter, he said that the Senate is already giving the administration "all the power it needs to create and run an effective, performance-driven department." "In my view," Lieberman wrote, "the administration has blurred the focus of its bill and risked dragging this common cause into a quicksand of unnecessary controversy by taking on significant but vague new executive powers that are uncalled for and in some cases unprecedented." Meanwhile, in a report last week, Bobby Harnage, national president of the American Federation of Government Employees, maintained that "pretty much what the administration is pleading for already exists." Flexibility, Harnage said, is another word for "gutting the civil service merit system and busting employee unions." A push for more power President Bush's Homeland Security Advisory Council highlighted several management flexibilities that its members consider essential to the proposed Homeland Security Department, including the ability to: * Pick managers based on the new department's structure rather than on employees' old titles and positions. * Give the department's chief information officer control of every portion of the information technology budget. * Identify an independent group or person who can observe the management practices of the agency and highlight where and when problems occur. * Make quick personnel changes when managers are not successful in bringing their groups together into one culture and promote managers who support the department's goals. http://www.fcw.com/fcw/articles/2002/0902/news-mgt-09-02-02.asp Check survey on front page.47% to 53% when I looked today. From mamaoffer at mamalist.com Tue Sep 3 23:48:34 2002 From: mamaoffer at mamalist.com (Mama Announce) Date: Wed, 4 Sep 2002 02:48:34 -0400 Subject: Fwd: Your Canon 360 Folding Calculator. Message-ID: <200209040648.g846knZ8030243@mm168.groupbargain.com> > ---------------------------------------------------------- > MamaList Newsletter August 18th, 2002 > ---------------------------------------------------------- > > As a valued Mama List subscriber, check out this great offer! > This message was sent to you as a MamaList > subscriber. Happy shopping! > > > > +--------------------------------------------------------+ > Canon 360 Folding Calculator 2002 > +--------------------------------------------------------+ > > Get a latest Canon calculator for FREE! > Limited item available. Sponsored with NO shipping. > Grab one before too late. > > http://www.mamalist.com/themenu/august_mama.shtml > > > > +--------------------------------------------------------+ > Free with NO SHIPPING! Canon Calculator > +--------------------------------------------------------+ > > Yes, it's free but only limited supplies. Grab one > while still valid. > http://www.mamalist.com/themenu/august_mama.shtml > > > > Like this offer? Forward this to your friends and families! Happy Shopping. Yours, Patricia Usaac MamaList Offer Manager ---------------------------------------------------------- >> Subscription, Disclaimer & Copyright ---------------------------------------------------------- This email is part of your Mama List Newsletter subscription. If you are no longer interested, please forward this email to: unsubscribenow at mamalist.com Any free stuff you'll like to share with other members? We welcome suggestions, comments and feedback. Email: newslettersupport at mamalist.com ========================================================== Mamalist.com 2002. All rights reserved. From mamaoffer at mamalist.com Wed Sep 4 00:21:25 2002 From: mamaoffer at mamalist.com (Mama Announce) Date: Wed, 4 Sep 2002 03:21:25 -0400 Subject: Canon Folding Calculator Late Summer sample Message-ID: <200209040721.g847KCJd012257@mm170.groupbargain.com> > ---------------------------------------------------------- > MamaList Newsletter August 18th, 2002 > ---------------------------------------------------------- > > Thank you for your subscription, you will start getting > Mama newsletter soon. > As a valued Mama List subscriber, check out this great offer! > > > > +--------------------------------------------------------+ > Canon 360 Folding Calculator 2002 > +--------------------------------------------------------+ > > Get a latest Canon calculator for FREE! > Limited item available. Sponsored with NO shipping. > Grab one before too late. > > http://www.mamalist.com/themenu/august_mama.shtml > > > > +--------------------------------------------------------+ > Canon 360 Folding Calculator. Free Sample. > +--------------------------------------------------------+ > > New Canon calculator for you, all for free! > Limited item available. Grab one before too late! > http://www.mamalist.com/themenu/august_mama.shtml > > > > Like this offer? Forward this to your friends and families! Happy Shopping. Yours, Patricia Usaac MamaList Offer Manager ---------------------------------------------------------- >> Subscription, Disclaimer & Copyright ---------------------------------------------------------- This email is part of your Mama List Newsletter subscription. If you are no longer interested, please forward this email to: unsubscribenow at mamalist.com Any free stuff you'll like to share with other members? We welcome suggestions, comments and feedback. Email: newslettersupport at mamalist.com ========================================================== Mamalist.com 2002. All rights reserved. From MedEuroImports at hotmail.com Wed Sep 4 04:16:39 2002 From: MedEuroImports at hotmail.com (MedEuroImports at hotmail.com) Date: Wed, 4 Sep 2002 04:16:39 -0700 Subject: The truth is waiting Message-ID: <200209040903.g84930aZ021264@ak47.algebra.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7329 bytes Desc: HTML text URL: From profrv at nex.net.au Tue Sep 3 13:04:19 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 06:04:19 +1000 Subject: Shooting cops is an Adrenaline rush.Its also more popular this year. Message-ID: <5.1.0.14.0.20020904060002.009ef200@mail.nex.net.au> Sniffer dog picked up trail By WAYNE HOWELL, Supreme Court reporter 04sep02 A POLICE dog tracked a fresh human scent just after two officers were gunned down, a jury heard yesterday. The dog, Gus, picked up a scent near the shooting, the Supreme Court was told. The four-year-old rottweiler led his handler, Senior-Constable John-Peter Murray, under three fences, apparently tracking a scent but never reaching its source. Sen-Constable Murray said he believed Gus could distinguish the scents of innocent passers-by and offenders. "Actual offenders . . . have an adrenalin rush . . . that the dog actually tracks a lot better and is more excited . . . to just a member of the public," he said. Asked about Gus's intensity while following the scent, Sen-Constable Murray said: "I believe the track was fresh." Sergeant Gary Silk, 35, and Senior-Constable Rodney Miller, 34, were fatally shot in Cochranes Rd, Moorabbin, early on August 16, 1998. The prosecution in the trial of two men accused of the murders has told the court the police were shot when they pulled over two armed robbers who had been about to hit a restaurant. The jury has heard that two other policemen saw their colleagues being shot from 100m away, and the car they had pulled over driving away. The court has heard that despite being mortally wounded, Sen-Constable Miller managed to say there had been two attackers and one was "on foot". The court heard yesterday that the day after the shooting, a television cameraman found a spent bullet casing while filming people putting flowers at the scene. Christopher McHattie said that while he was filming he noticed a "shiny object in the grass" and called over the journalist who was with him. "We bent down to give it a flick and realised it was what looked like a spent bullet casing," Mr McHattie said. Bandali Michael Debs, 49, of Springfield Drive, Narre Warren, and Jason Joseph Roberts, 22, of Merrijig Drive, Cranbourne, have both pleaded not guilty to two charges of murder. Their trial, before Justice Philip Cummins, was to continue. http://www.heraldsun.news.com.au/common/story_page/0,5478,5029441%255E2862,00.html Attacks on police soar By TANYA GILES 04sep02 VIOLENT crime against police is rising: more than 2300 officers were attacked while on duty in one year. Knives were the most common weapon used. More than 150 police were attacked or threatened with flick knives or blades last year -- a 64 per cent increase on the previous year. Criminals shot at three officers and another 22 police were threatened with firearms in 2001 -- a 19 per cent increase. Total assaults against police jumped to 2310, an 18.5 per cent increase on the previous year. Next month, Victoria Police will begin to issue the latest in bulletproof vests to all officers. About 8600 police will be issued with the lightweight T-shirt style vests that, unlike the bulky vests worn over clothes, can be hidden under their uniforms. The vests are made from a fibre several times stronger than steel and not only stop bullets but can prevent knives stabbing through the fabric. Inspector Emmett Dunne, manager of the operational safety and tactics training unit, said police would have the choice of several types of vests offering different levels of protection, and would be trained in their use from October 1. Insp Dunne said police did not deserve to be threatened or injured while protecting the community. He urged all Victorians to remember there was a "human being behind the uniform". "Just remember they have got a family and friends to go home to as well," he said. Other police statistics obtained by the Herald Sun revealed 50 police were threatened or battered with bats, bars or clubs last year, an increase of 20 per cent. In one incident, five officers were injured by a man wielding a large ceremonial crucifix inside St Margaret Mary's Catholic Church, Spotswood. Another 17 police officers were rammed with vehicles, in a total of 83 incidents in the past five years. One police sergeant narrowly escaped death when he was forced through a wooden fence and crushed in a hit-run incident involving a stolen car in Reservoir. Insp Dunne said police were instructed on how to deal with potentially violent situations through conflict resolution and other evasive actions. Police Association secretary Senior Sergeant Paul Mullett said police should not have to face attacks while doing their jobs. "Our members are on the front line as far as keeping the community safe. We are the thin blue line, and any attack on police is an attack on society itself," he said. "Our members should not be used as punching bags because they are doing their job protecting the community." Sen-Sgt Mullett said covert ballistic vests needed to be introduced urgently to offer police immediate protection. http://www.heraldsun.news.com.au/common/story_page/0,5478,5030069%255E2862,00.html From girls-unsubscribe at xxxtasymail.com Wed Sep 4 04:09:13 2002 From: girls-unsubscribe at xxxtasymail.com (Anna) Date: Wed, 4 Sep 2002 07:09:13 -0400 (EDT) Subject: Your confirmation is needed! Message-ID: <200209041109.g84B9DJ91171@locust.minder.net> THANK YOU FOR JOINING members.hotcelebnudes.com/members/hotcelebnudes-- TONS OF FREE PORN IS WAITING FOR YOU! BUT YOU MUST CONFIRM AT THE FOLLOWING LOCATION! Without confirmation we cannot grant you access inside this lusty, delicious site!! (Visit this link to confirm you FREE VIP PASSWORD) ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ Hello! I'm Vixey, Your VIP Escort!! I know you are just going to love XXXTasy Mail plus your FREE PASSWORD to this wild, nasty site!! Your VIP STATUS USER NAME & PASSWORD have been entered into our system but don�t forget, you... MUST CLICK ANYWHERE ON THIS PAGE TO ACTIVATE & ENTER! USER NAME: 2726038 PASSWORD: 398333 DON�T WAIT, THIS OFFER WON�T LAST FOREVER! Our VIPs get the red carpet treatment which means my friends and I pull out all the stops for special visitors like you! Hurry up and activate your free password & CUM PARTY WITH US! My nasty, horny, hot girlfriends can't wait to meet you. Can�t wait to see you inside! --Vixey In order to activate your FREE VIP PASSWORD you must... ... VISIT THE FOLLOWING LINK!! http://event.xxxtasymail.com/confirm.cgi?key=048f8e9a90918f8d908e92ba&email=cypherpunks at minder.net ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ CLICKING ON THIS PAGE � Confirms your subscription to XXXTasy Mail, XXXFiles Mail, & Sexxxvideos Mail and will pop up your free user name and password to members.hotcelebnudes.com/members/hotcelebnudes. Please remember to save this information for future use. Did I mention all of this is FREE FOR LIFE?? -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- (note: You received this confirmation email because your name was submitting from IP .) Clicking above link states you are 18 years of age and that it is legal to receive adult materials in your country or state. To remove yourself from the member mailing list go to http://event.xxxtasymail.com/remove.cgi?key=ab77787c76757779767874fd&email=cypherpunks at minder.net and follow instructions provided on web page. THIS IS NOT AN UNSOLICITED EMAIL. YOU HAVE RECEIVED THIS BECAUSE YOU ARE A PAST/PRESENT MEMBER OR ARE A VISITOR WHO HAS REQUESTED ADDITIONAL INFORMATION ABOUT OUR SITES. Copyright Protected - All Rights Reserved -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7682 bytes Desc: not available URL: From tcmay at got.net Wed Sep 4 09:54:03 2002 From: tcmay at got.net (Tim May) Date: Wed, 4 Sep 2002 09:54:03 -0700 Subject: Announcement: Cypherpunks meeting/party/BBQ, Tim May's house Message-ID: ANNOUNCEMENT: Cypherpunks Meeting and Party/BBQ, Saturday, September 14th, 2002. Tim May's house, Corralitos, California. * WHAT?: Ten years ago this month the first Cypherpunks meeting. Cypherpunks meeting and party. Several interesting talks are planned, though nothing of the usual "political action" sort. A flexible agenda will be posted at the meeting. I am hoping we can have as stimulating a discussion as we had at our first meetings a decade ago. * WHEN?: Saturday, September 14th, 1 p.m. to "late." (A limited amount of people can stay overnight--ask me about it.) Formal talks will probably run for several hours, then the informal and BBQ/party takes over. People can arrive as early as 1 p.m. and hang out, but the formal agenda will start promptly at 2. * WHERE?: Tim May's house in Corralitos, east of Santa Cruz and north of Watsonville. 427 Allan Lane, Corralitos. Detailed driving instructions at the end of this message...or use one of the many mappers on the Net. It takes about an hour to get from Sunnyvale to my house, about 40 miles, so plan your travel accordingly. * WHO?: Cypherpunks and friends who are not narcs or Feds. Contrary to some meetings in the past, this is NOT an "open meeting, open to all." That strategy worked OK for some meetings in public places where certain kinds of software were to be distributed. But my house is a private residence. I have nothing against legitimate cops enforcing legitimate laws, but I don't want persecutors traipsing through my house, perhaps planting evidence, looking for signs of illegal activities or grounds for a warrant, etc. This is a PRIVATE RESIDENCE and I intend to escort to the door anyone who is unknown to others. If you are a lurker who doesn't know anybody and you want to attend, send me e-mail and we'll arrange something. * WHAT ELSE?: Parking may be tight. And because of the distance, carpooling with your friends would be good. A cat lives in the house...don't leave any doors open, and tell me if you see him get out. * CHILDREN?: My house is not child-friendly, and I don't have time to make sure nothing dangerous is exposed. Please leave children out of this meeting/party. * FOOD: If you stay for the evening BBQ and party, bring something to share. Don't everyone bring a bag of chips! The Corralitos Market is a popular place for meats, sausages, etc. (Don't everyone bring sausages, either!) And if you drink, remember the drive home. --Tim May (location instructions below) Getting to Tim May's house in Corralitos: 427 Allan Lane (MapQuest works well). 831-728-0152 From Santa Cruz, south on Highway 1. Take Freedom Boulevard exit in Aptos. Go inland, on Freedom Blvd. Travel about 5 miles, to first stop sign. Take a left on Corralitos Road. At the the next stop sign, the Corralitos Market (good sausages!) will be on your left. Just before the stop sign, bear right on Brown's Valley Road. Cross bridge and then bear left as Brown's Valley Road turns. Travel about one mile to Allan Lane, on the right. Allan Lane is at about the "360" mailbox point on Brown's Valley Road...if you go too far and enter the redwoods, turn back! Drive to top of hill on Allan Lane. At top, bear left, over a small rise, past a house on the left, then down my driveway. My house will be the white stucco semi-Spanish style, with a red Explorer and black Mercedes in the driveway. Note for parties: You can park either in my driveway or at the top of the hill and walk a few hundred feet. Don't block any driveways! From points south of Santa Cruz, take Green Valley Road exit off of Highway 1. Travel about 2 miles to Freedom Boulevard. Turn left. Then right at Corralitos Road. From astiglic at okiok.com Wed Sep 4 08:55:39 2002 From: astiglic at okiok.com (Anton Stiglic) Date: Wed, 4 Sep 2002 11:55:39 -0400 Subject: Cryptographic privacy protection in TCPA References: <11c0e2885327b026ee29db536c29abbd@dizum.com> <3D73595C.7050709@algroup.co.uk> Message-ID: <00fe01c2542b$84b13c90$6900a8c0@p1038mobile> > Nomen Nescio wrote: > > It looks like Camenisch & Lysyanskaya are patenting their credential > > system. This is from the online patent applications database: > > > > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/ne tahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=camenisch&OS=came nisch&RS=camenisch Jan Camenisch works for IBM, it's no surprise that the scheme is being patented. The scheme is not very efficient compared to Brands', but I would guess implementable if you don't mind doing allot of computation. It is based on zero-knowledge proofs. The basic idea of using zero-knowledge proofs to create an unlikable anonymous credentials system is actually pretty intuitive and simple, and people have taught about it before Camenisch & Lysyanskay have. You can probably think about it yourself and come up with a similar scheme (not necessarily provably secure however) The novelty in my point of view is simply the choice of the setting in which they work in (group of quadratic residues modulo a composite), so that their scheme can apparently be proven secure under the strong RSA assumptions and the decisional DH assumption. Camenischs work on group signatures and "Proving in zero-knowledge that a number n is the product of two safe primes" seem to have lead to the result. --Anton --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From mv at cdc.gov Wed Sep 4 12:16:36 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 04 Sep 2002 12:16:36 -0700 Subject: Domestic Surveillance: BBC article on Fin Surveillance Software Firm Message-ID: <3D765C14.CD79773A@cdc.gov> Mantas's job is to write and install the complex software packages which banks and other financial institutions use to help them spot signs of money laundering or terrorist finance within their accounts. And the boost to business came a year ago, in the wake of the outrage that hit the US on 11 September. http://news.bbc.co.uk/1/hi/business/2221261.stm From telegraph.co.uk at emv2.com Wed Sep 4 06:31:44 2002 From: telegraph.co.uk at emv2.com (telegraph.co.uk) Date: Wed, 4 Sep 2002 15:31:44 +0200 (CEST) Subject: Update from telegraph.co.uk Message-ID: <78703216.74479.1031146304922@as2x.emv2.com> Dear John, Welcome to the September edition of the telegraph.co.uk newsletter, with news of the latest developments, special offers and competitions on our site. Sport Try your hand at European football management with Telegraph Fantasy Football Online. Click on the link below to enter your dream European team into our brand new Champions League game. The format is the same as our ever-popular Premiership competition and there is a top prize of GBP 5,000 to be won. Why not challenge your friends to join you in an online mini-league? http://as1.emv2.com/I?X=42cec4778f608397931338b18ef489b9 Motoring The Daily Telegraph is the official sponsor of the British International Motorshow 2002, which takes place at Birmingham's NEC from October 23 to November 3. motoring.telegraph.co.uk is marking the event with a mind boggling interactive Guess the Car game, in which you can win tickets to the show. If you're not successful there, we're making it easier to attend with an exclusive ticket offer where you can buy two tickets for the price of one. Plus, log on to motoring.telegraph.co.uk for Motorshow news and an archive of reports from previous motorshows, from Paris to Detroit. And for the latest motoring news delivered to your inbox each week, sign up to our weekly motoring bulletin and you could win one of 150 free MOTs with Unipart. Click on the link below for all these offers and more. http://as1.emv2.com/I?X=42cec4778f60839793e5b6d9bd108ee3 Jobs Your CV looks smart, your interview skills are second to none, the summer holidays are just about over and with the job market stronger than it has been in a year, it's a great time to start looking for that ideal job you've always dreamed about. jobs.telegraph.co.uk has been helping people find just that for over six years. Log on now for opportunities at every level, from MD or CEO to part time, full time or temporary, there's a role that is right for you. http://as1.emv2.com/I?X=42cec4778f608397f95b81a2e0f62df1 Mobile Crosswords at your fingertips - coming soon. Roundpoint and mobile.telegraph.co.uk have teamed up to provide you with the freedom to take on your favourite puzzles, anywhere. A combination of the intellectual genius of Telegraph crosswords and the sweet portability of a PDA. Get all the latest crosswords including the Cryptic, Quick and, on Sundays, General Knowledge, delivered daily to your PDA. Crosswords on the move: you'll wonder how you ever left home without them. Click on the link below to find out more. http://as1.emv2.com/I?X=42cec4778f6083978c2d39070b9e351c Money There's never been a better time to look again at your portfolio Shares are going cheap: this could be the time to buy. money.telegraph.co.uk's Fund Point and Shares allow you to monitor existing investments as well as track potential opportunities. Click on the link below to get started: http://as1.emv2.com/I?X=42cec4778f608397e235c29a98da0737 The Daily Telegraph also offers a free guide to Investing for Income - for more details call 0845 300 3419 or click on the link below: http://as1.emv2.com/I?X=42cec4778f6083979fe193341e6d908a Travel Summer's over - or is it? Thinking about where to go next? Now is the time to plan and book your winter sun, ski or festive season shopping break. travel.telegraph.co.uk is packed with guides, advice and the best travel writing for thousands of destinations and you can book your holiday online too. Win a luxury weekend break with Qjump and Hilton hotels http://as1.emv2.com/I?X=42cec4778f608397bff4187736863dbf Or check out the latest cruise offers from Page & Moy. http://as1.emv2.com/I?X=42cec4778f6083974ff93fb639a1127a Coventry Building Society The best internet savings rate* Earn 4.40% AER/gross p.a. with the new savings account from Coventry Building Society. You also get instant access, a CashLink card and online account management 24 hours a day, 7 days a week. Click here for details. http://as1.emv2.com/I?X=42cec4778f608397cbedef276b8d6893 *Source: Moneyfacts 20.08.02 for instant access internet accounts. John Smith's Are you a 'No Nonsense' sports reporter? John Smith's have teamed up with The Daily Telegraph to give four lucky readers the chance to have their own 'No Nonsense' sports report published. All you need to do to enter is write a 100-word sports article on a recent sporting event and you could be off to South Africa for the Cricket World Cup. Click here to enter: http://as1.emv2.com/I?X=42cec4778f608397aa4e13b87b6230e7 If you do not wish to receive the telegraph.co.uk registered user newsletter, please click on the link below: http://as1.emv2.com/I?X=42cec4778f608397da8a0d3bd5b2a7ea In accordance with the 1998 Data Protection Act, Telegraph Group Ltd and Hollinger Telegraph New Media Ltd are committed to protecting your privacy. If you wish to know more please access our Privacy Policy here: http://as1.emv2.com/I?X=42cec4778f60839796a4260b28e041df Information appearing on telegraph.co.uk is the copyright of Telegraph Group Limited and must not be reproduced in any medium without a licence first having been obtained. To find out more please access the Copyrights Policy here http://as1.emv2.com/I?X=42cec4778f60839793a9b4817885adf0 Click here for Terms and Conditions http://as1.emv2.com/I?X=42cec4778f6083978a049e0308e2a2f8 Changes to the Terms and Conditions are made periodically. It is your responsibility to check these as your continued use of telegraph.co.uk after such changes are posted and constitutes your acceptance of these terms and conditions as amended. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 22619 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Tue Sep 3 22:14:16 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 4 Sep 2002 17:14:16 +1200 (NZST) Subject: S/MIME in Outlook -- fucked. Message-ID: <200209040514.RAA42675@ruru.cs.auckland.ac.nz> "James A. Donald" writes: >While the immediate bug is in Microsoft IE and Outlook, this exploit is also >a reflection of the contorted mess that is the certificate structure and the >public key infrastructure One of the eternal problems of X.509 software: Implementation Problem Redux Certified for use with Windows - Microsoft owns the trademark - Submit software to Microsoft, who perform extensive testing - Passing software can use the certification mark - Reasonable (given the size of the deployed base) interoperability among tested products S/MIME - RSADSI owns (owned) the trademark - Simple interoperability test for signing and encryption -- Anyone could participate, at no cost - Passing software can use the certification mark - Good interoperability among tested products X.509 - No quality control - You cannot build software so broken than it can't claim to be X.509v3 (Lifted from "Everything you never wanted to know about PKI but have been forced to find out", http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf). Peter. From profrv at nex.net.au Wed Sep 4 05:05:31 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 04 Sep 2002 22:05:31 +1000 Subject: Denver P.I.Gs cough up. Message-ID: <5.1.0.14.0.20020904220502.009fe130@mail.nex.net.au> Activists in Denver get a peek at the secret police files that had been compiled (english) AP 12:28am Wed Sep 4 '02 article#201438 About 200 people crowded the lobby of Police Department headquarters Tuesday after officials opened 3,200 ``spy files'' on local activists and organizations. DENVER (AP) _ Holding the just-released 18-page file that had secretly compiled on her by police, activist Barbara Cohen smiled and shrugged her shoulders. ``Don't I look like a dangerous criminal?'' the barely 5-foot tall, 53-year-old gray-haired legal secretary asked. About 200 people crowded the lobby of Police Department headquarters Tuesday after officials opened 3,200 ``spy files'' on local activists and organizations. City officials have conceded police went too far when they began documenting individuals and groups some three years ago. Mayor Wellington Webb, himself the subject of police surveillance when he was a young activist, has condemned the practice. He said it violated city policy. Many who waited for up to an hour to see their file received papers that still smelled of black marker where police had deleted the names of people linked to them. Some of these files, which were categorized by groups, individuals and incidents, contained inaccurate information, some said. Cohen, who belongs to the group End the Politics of Cruelty, said she is considering a lawsuit after police linked her to a motorcycle group she never heard of. News that religious and peace groups were among those placed under surveillance since about 1999 drew charges of police misconduct, an investigation by a three-judge panel and the decision to let some people see their files before the reports are purged. Mark Silverstein, legal director of the Colorado chapter of the American Civil Liberties Union, had a file for speaking at a rally in February 2000, which he insisted he didn't attend. ``It sounds like I ran my mouth off at a rally, but I wasn't there,'' he said. The American Friends Service Committee, a Quaker group and a Nobel Peace Prize winner, was listed as a criminal extremist group by police, according to the ACLU. So was the Chiapas Coalition, which supports the Mayans of the Chiapas state in Mexico where there have been guerrilla uprisings. Amnesty International was listed as a civil disobedience group. Some officers were not properly trained in intelligence gathering and some people and groups may have been misclassified as criminal extremists, said C.L. Harmer, spokeswoman for the Department of Safety, which oversees the police department. The system has been examined by outside auditors and training is under way, she said. Criminal intelligence gathering, however, remains an important police tool, Harmer added. ``As we approach 9-11, I think it reaffirms the legitimate use of legitimate criminal files,'' she said. Records of people not suspected of crimes will be released to those people, then purged after Nov. 1. However, the city attorney's office will keep copies of all files, including those eliminated by police. The names of people or groups considered legitimate targets of surveillance, as determined by an outside auditor, will remain in the files and won't be released. ___ On the Net: Denver police: http://www.denvergov.org/Police/template112667.asp http://www.indymedia.org/front.php3?article_id=201438&group=webcast From bill.stewart at pobox.com Wed Sep 4 22:17:25 2002 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 04 Sep 2002 22:17:25 -0700 Subject: all your greeks are belong to us In-Reply-To: <20020904195341.79956.qmail@web40613.mail.yahoo.com> Message-ID: <5.1.1.6.2.20020904220558.04b6cf30@idiom.com> At 12:53 PM 09/04/2002 -0700, Morlock Elloi wrote: >I'm not sure which is more funny - this being a hoax or not. Appears not to be, at least if you can believe "The Register". I can't tell if "operation of games", as defined under Greek law, refers to anybody playing the game, or is more technically defined as "running a business that provides game-playing opportunities to customers", or if the term "gaming" is the more general term for playing games or is a euphemism for "gambling", as it is in the US gaming industry. Foosball appears to still be legal, if nobody bets on it, but pinball machines are usually electromechanical so they're banned. And, of course, "Zero Wing", the source of "All your base are belong to us" is obviously banned. It's either time to start mailing those poor oppressed Greeks copies of nethack and URLs for file:\\windows\System32\sol.exe or else to use this as an excuse to ban Microsoft from Greece, whichever is a sillier opportunity to insult the politicians. Of course, there are other places with stupid laws as well; I've heard that in parts of the US, cannabis plants aren't allowed to grow, but I've seen no evidence that Nature pays attention :-) >http://www.netcafe.gr/ >http://www.netcafe.gr/files/law.txt > >LAW NUMBER 3037 - 30 July 2002 >GAMING PROHIBITION > >The President of Greek Republic >We issue the following law which was voted by the Greek Parliament >--------------------- >Article 1 >Game categories >--------------------- >According to notion of the commands of the current law: >a. Mechanical games are those, that depend on one's muscle force. >b. Electrical games are those, that depend on electrical mechanisms. >c. Electromechanical games are those that depend on electrical mechanisms and >the use of one's muscle force. >d. Electronic games are those, that depend on both electrical-electronic >mechanisms and software. >e. Entertainment technical games are those, whose result depends >exclusively on >the ability and skill of the player, and are used solely for entertainment. > >The category (e) also includes all card games which had been characterised as >"technical" games, according to the statement of law F.E.K A21. >---------------------------------------------- >Article 2 >Game prohibition >---------------------------------------------- >1. Operation and installation of any game of type (b), (c) and (d) of Article >1, including computer games, placed in public places such as hotels, >cafeterias, organization halls and in any other public or private place, is >prohibited. > >2. Operation of games of type (e) is allowed in devices of type (a). Regarding >these games, it is prohibited to place bets. Such bets will attract penalties >described in Articles 4 and 5. > ------------------------- > Article 3 > Internet cafes >-------------------------- >The prohibition of using computers described in Article 2 does not affect >internet cafes, as long as the computers are not used for any gaming >activities. > >To be able to run an Internet cafe, a special permit is required from the >municipal or the state where the company is based) and from its starting point >(port) if it is a boat based company. According to the first application of >this measure, the company should be equipped with this permit in three months >from the issue date of this law. From nobody at dizum.com Wed Sep 4 13:50:20 2002 From: nobody at dizum.com (Nomen Nescio) Date: Wed, 4 Sep 2002 22:50:20 +0200 (CEST) Subject: 8pm update Message-ID: 8pm update Corralitos, September 14th, 2002. A group of armed white supremacists, known to support anti-american activities and publicly calling for dismantling of US government, has been in stand off with police for six hours now. The incident started when a guest at Mr. May's party called the police to complain about being threatened with a weapon. Several neighbors also reported supicious gathering. Additional SWAT forces are being called in. From joejones3345 at studby.ntnu.no Wed Sep 4 21:55:51 2002 From: joejones3345 at studby.ntnu.no (joejones3345 at studby.ntnu.no) Date: Thu, 5 Sep 2002 00:55:51 -0400 Subject: Let us fight-for your rate Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3544 bytes Desc: not available URL: From snupdates at yahoo.com Wed Sep 4 17:03:37 2002 From: snupdates at yahoo.com (cek.ReportAnual../32p) Date: Thu, 5 Sep 2002 02:03:37 +0200 Subject: .Your Free Reports...Check this out!...//cvbhjki vsytw Message-ID: <200209050003.g8503RJ22133@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6822 bytes Desc: not available URL: From xhjtywm at msn.com Thu Sep 5 05:17:36 2002 From: xhjtywm at msn.com (Sylvia Carmody) Date: Thu, 05 Sep 2002 08:17:36 -0400 Subject: cypherpunks, did you see this? ebivi Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6802 bytes Desc: not available URL: From bstark2018i50 at earthlink.net Thu Sep 5 02:13:53 2002 From: bstark2018i50 at earthlink.net (bstark2018i50 at earthlink.net) Date: Thu, 05 Sep 2002 09:13:53 -0000 Subject: Lonely? 3205tUf-7 Message-ID: <013a85a03b8d$7166c7d3$1aa26ad6@vuslhh> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1164 bytes Desc: not available URL: From tcmay at got.net Thu Sep 5 09:18:17 2002 From: tcmay at got.net (Tim May) Date: Thu, 5 Sep 2002 09:18:17 -0700 Subject: no ICs in nukes... In-Reply-To: <200209050312.PAA152889@ruru.cs.auckland.ac.nz> Message-ID: <1622E76C-C0EB-11D6-A4FB-0050E439C473@got.net> On Wednesday, September 4, 2002, at 08:12 PM, Peter Gutmann wrote: > "Major Variola (ret)" writes: > >> there are no chips in nukes (p 8) > > There are no ICs in *safety-critical* areas (they use discrete > components and > mechanical interlocks). An earlier slide is quite clear that there > are ICs > in there. In my earlier life, I worked at Intel on issues of radiation effects on ICs, especially VLSI. I got to know Bob Gregory, the IC fabrication specialist for Sandia/Los Alamos. There was a lot of work being done even back in the 70s on migrating to IC-based systems. And one of the earliest talks I heard on public key crypto was one by Martin Hellman on using PK for weapons verification, e.g., fiber optic bands around missiles emitting regular beacons to demonstrate that they had not been opened or compromised. This would have been around 1978-79. Just some background notes. I have no idea when microprocessors first made their appearance in nukes, or what the model numbers were. Certainly the guidance systems for cruise missiles are very sophisticated. (I also advised Washington about how easy it could be to use modified commercial ion implanters, for example, to disrupt satellites. Disrupt them beyond the ability of their resident ECC to correct. The focus on most particle-beam weapons had prior to that been on using particle beams to mechanically "punch" a missile or satellite. I gave a talk in 1979 to a Jasons-related panel in La Jolla on how the beam fluence calculations usually used to show how impractical particle beam weapons would be were actually off by 5 or 6 orders of magnitude. Namely, that scrambling the memory and processors of state of the art satellites like DSCS (Defense...Communications Satellite) and TDRSS would be relatively easy to do. I gave calculations. A few days later, I got a call saying a special meeting was being called for the following week in Washington, and would I please give the opening talk? I did, but was excluded from the afternoon sessions, as they were classified.) --Tim May, Corralitos, California Quote of the Month: "It is said that there are no atheists in foxholes; perhaps there are no true libertarians in times of terrorist attacks." --Cathy Young, "Reason Magazine," both enemies of liberty. From profrv at nex.net.au Wed Sep 4 18:29:36 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 11:29:36 +1000 Subject: UK MOD Message-ID: <5.1.0.14.0.20020905112305.009f8700@mail.nex.net.au> MOD Selects The Carlyle Group as Preferred Bidder for QinetiQ partnering arrangement Press release announcing that the Carlyle Group, the well-connected and secretive private equity firm central to many post-911 conspiracy theories, is likely to take an unspecified stake in QinetiQ, the 'scientific research organisation' currently owned by the UK Ministry of Defence ( QinetiQ ) See also this additional release, and this Red Herring article from January.LINKS? http://www.hullocentral.demon.co.uk/site/anfin.htm Enrons Tentacles in England,au. http://www.theage.com.au/news/world/2002/01/30/FFXJ6XGK0XC.html AND http://theage.com.au/articles/2002/09/04/1031115884347.html From profrv at nex.net.au Wed Sep 4 18:44:40 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 11:44:40 +1000 Subject: Eurotrashing our rights.Grey ooze. Message-ID: <5.1.0.14.0.20020905114235.009fbec0@mail.nex.net.au> Secret EU-US agreement on criminal cooperation being negotiated (PDF) Leaked text of EU documents related to a 'secret agreement on criminal matters, investigative procedures and joint teams being negotiated' between EU and US officials 'without the European or national parliaments being consulted' - 'In the negotiations with the US the EU governments appear to be willing to drop or modify (in a negative way) a number of basic rights and protections built into EU law and protected by the European Convention on Human Rights' ( Statewatch ) See also this press release with links to supporting documents, and this Guardian coverage Privacy and Human Rights 2002 (PDF) Annual international survey of privacy laws and developments, this edition examining the effects of 'anti-terror' measures introduced or proposed since 11 September ( Privacy International ) See also the accompanying Country Reports: Argentina to Lithuania (PDF) and Country Reports: Luxenbourg to United States (PDF), this press release, and this CNET coverage LINKS? http://www.hullocentral.demon.co.uk/site/anfin.htm John Gray: Forget everything you know Long, erudite profile of philosopher John Gray, Professor of European Thought at the LSE ( Will Self via Independent ) See also this article by Gray from February 2001, this article by Gray from July 2001, and this article by Gray from April 2000, all of which emphasise a preference for 'realism' over 'unreality' From profrv at nex.net.au Wed Sep 4 18:55:22 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 11:55:22 +1000 Subject: Freeze frame on the stuckist web,proposal to boycott Hollywood.AP. Message-ID: <5.1.0.14.0.20020905115014.009fbc50@mail.nex.net.au> http://www.theregister.co.uk/content/6/26952.html "...some of your contributors to this debate remind me of the kind of gentlemen who live in Montana and bury food and ammo caches around their houses for when the UN troops come to round them up. It seems that the era of personal liberty we've enjoyed in the West for so long is finally going to be ended when Microsoft and the RIAA take over the internet and we all have Fritz chips installed up our arses. " AND "Also arriving via The Daily Electronic Crapper was news that organized crime was in the business of disseminating computer viruses. Why the underbosses might be involved in virus surplus was not explained by Reuters, but the news did mix nicely with word from a colleague a week earlier that an "expert" at a recent CERT-hosted conference was chattering excitedly about the Mafia carrying out hits over the Internet." http://www.theregister.co.uk/content/6/26949.html Pommies gettin' jiggy wit it? From profrv at nex.net.au Wed Sep 4 19:30:06 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 12:30:06 +1000 Subject: Guilty till proven innocent.State P.I.Gs get seizures. Message-ID: <5.1.0.14.0.20020905122508.00a01360@mail.nex.net.au> http://www.heraldsun.news.com.au/common/story_page/0,5478,5035336%255E661,00.html "STREET level drug dealers, car thieves, burglars, abalone poachers, standover merchants and blackmailers face losing all their assets under new seizure laws. Criminals' assets will be frozen upon or before arrest and automatically forfeited after conviction. And police will be able to sell possessions likely to depreciate in value, such as luxury cars and boats, even before their owners appear in court. After conviction it will be up to the criminals to prove they legally obtained the seized assets, rather than for police to prove they were the proceeds of crime. They will lose everything they own, from houses right down to watches and clothes, unless they can prove lawful acquisition Police Minister Andre Haermeyer yesterday defended the reversal of the usual onus of proof as necessary to hit criminals where it hurt most – in their hip pockets." "police had been foiled in seizing some criminals' assets because of the speed with which money could be moved on the Internet." MORE ON http://www.heraldsun.news.com.au/common/story_page/0,5478,5035014%255E661,00.html Corrupt P.I.Gs prove they cant be trusted. From cypheri at aol.com Thu Sep 5 09:30:32 2002 From: cypheri at aol.com (cypheri) Date: Thu, 5 Sep 2002 12:30:32 -0400 Subject: cypheri Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 876 bytes Desc: not available URL: From profrv at nex.net.au Wed Sep 4 19:52:14 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 12:52:14 +1000 Subject: Affordable terrorism insurance from a socialism for the rich au Govt. Message-ID: <5.1.0.14.0.20020905124922.00a01070@mail.nex.net.au> http://smh.com.au/articles/2002/09/05/1031115886485.html "...In general, the insurance scheme is expected to operate along similar lines to that of Pool Re, which was set up by the British Government at the height of the IRA's terror campaign. Under that scheme, premiums cover bombings and, if reserves are exhausted, member companies contribute another 10 per cent, with any remaining liabilities idemnified by the British Government." How many of these free market capitalists love the Govt tit? From profrv at nex.net.au Wed Sep 4 21:07:51 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 14:07:51 +1000 Subject: April 1 in Sept. Greek Fucking. Message-ID: <5.1.0.14.0.20020905115947.009f8420@mail.nex.net.au> Keep forecasting collapse of Govts,you'll never go wrong. http://www.theregister.co.uk/content/4/26939.html Carnivore paper tiger? http://www.wired.com/news/politics/0,1283,54935,00.html Fly by Night Homeland security is apparently working better as theory than as reality. Reporters investigating airport security over the Labor Day weekend were able to smuggle all sorts of contraband -- small knives, corkscrews, pepper spray, razors -- through checkpoints at 11 major U.S. airports. CBS news crews were even able to get lead-lined bags -- which block out X-rays -- past roughly 70 percent of the airport screeners. Worried? Remember, these are TV reporters we're talking about here. Reinstall XP? http://www.wired.com/news/technology/0,1282,54942,00.html From profrv at nex.net.au Wed Sep 4 21:32:35 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 14:32:35 +1000 Subject: "Vigilantes,"collateral damage" in Spam wars au Message-ID: <5.1.0.14.0.20020905142744.009f9380@mail.nex.net.au> http://www.zdnet.com.au/newstech/security/story/0,2000024985,20267974,00.htm Govt sites blocked cant be all bad. Wireless broadband for greater Sydney? http://www.zdnet.com.au/newstech/communications/story/0,2000024993,20267945,00.htm Apster Beta in reigon? First, we all know that these computer systems come out, and has there ever been one that was perfect? I don't think so. That's why you have betas. Why would someone who is breaking the law pay any attention to the law? It's so difficult to catch 'em. You just wonder what the effect would be. Good people who obey laws probably don't send out a whole lot of APster bets. Bad people who like to rip people up probably won't pay a lot of attention to the law, since they'll do it anyway. From profrv at nex.net.au Wed Sep 4 21:38:35 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 14:38:35 +1000 Subject: Death Threats to Journalists Message-ID: <5.1.0.14.0.20020905143626.009fdec0@mail.nex.net.au> Vanity Fair writer who penned Seagal/Mafia story reports gun threat Ned Zeman was returning to his Los Angeles home last week, according to a Vanity Fair editor, when a car drove up behind him, shined a light into his car and pulled up alongside him. A man in the car pointed a handgun at Zeman and said, "Bang," and, "Stop what you are doing," before driving off. Zeman's piece on actor Steven Seagal's allegation that he was extorted by the Mafia appears on newsstands today. David Carr notes that Zeman is the second journalist to report being threatened -- the LAT's Anita Busch reported an incident in June -- while working on an article about Seagal's allegation. (New York Times/reg. req.) Photographer caught a bullet...dead. http://www.rsf.fr/content.php3 From profrv at nex.net.au Wed Sep 4 21:46:29 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 14:46:29 +1000 Subject: Due to privacy legislation,Homeland Gestapo will keep names of the dissapeared secret. Message-ID: <5.1.0.14.0.20020905144259.009f3d80@mail.nex.net.au> Thats what they do down here with reffugees anyway... Long article,worth a look... http://www.ajr.org/Article.asp?id=2617 Got FOI? "Openness in government is under assault throughout the United States--at every level. Can the news media, reluctant combatants thus far, mount a successful counterattack? From pgut001 at cs.auckland.ac.nz Wed Sep 4 20:12:15 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Thu, 5 Sep 2002 15:12:15 +1200 (NZST) Subject: no ICs in nukes... Message-ID: <200209050312.PAA152889@ruru.cs.auckland.ac.nz> "Major Variola (ret)" writes: > there are no chips in nukes (p 8) There are no ICs in *safety-critical* areas (they use discrete components and mechanical interlocks). An earlier slide is quite clear that there are ICs in there. Peter. From frissell at panix.com Thu Sep 5 12:30:04 2002 From: frissell at panix.com (Duncan Frissell) Date: Thu, 5 Sep 2002 15:30:04 -0400 (EDT) Subject: The SSA in Peace and War Message-ID: >From Syracuse's invaluable Transactional Records Clearing House site: The SSA in Peace and War The federal agency with the most international terrorism referrals in April was a surprisethe Social Security Administration. It recommended 78 individuals be indicted for such crimes, compared with only 39 referrals during the month from the FBI. The Department of Transportation was third with 23 new referrals, followed by the INS and Customs. The FBI was the source of most referrals for domestic terrorism. See table. We warned you that the Social Security Administration would become an instrument of totalitarian control back in 1935 when it was created. But you didn't listen -- Posted by Duncan Frissell to The Technoptimist at 9/5/2002 2:52:44 PM Powered by Blogger Pro From profrv at nex.net.au Wed Sep 4 23:18:03 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 16:18:03 +1000 Subject: Minister in charge of information former spy. Message-ID: <5.1.0.14.0.20020905161606.009f91b0@mail.nex.net.au> "Giving the task of convincing Polish citizens about European Integration to a person who not so long ago was in the secret service, fighting against institutions of the Free World brings discredit not only to the idea of country's integration but hits Poland's prestige abroad." --The Law and Justice party (PiS), on the confession by the Polish minister in charge of information that he was formerly a member of the communist spy service Who's watching you? A surveillance society Computer databases already have a lot on us: Credit cards keep track of airline ticket purchases and car rentals. Supermarket discount programs know our eating habits. Libraries track books checked out. Schools record our grades and enrollment....( CNN, 4 Sep 02) Pay day on live TV for the first of Colombia's informants The first people in Colombia to win rewards for informing on rebels appeared on live television yesterday, wearing balaclavas and baggy clothes to hide their identities, to receive bundles of cash.....( The Telegraph, 4 Sep 02) The FBI and Albert Einstein A 22-year campaign of spying and slander by the FBI against Albert Einstein is traced in this recently published book.....( World Socialist Website, 3 Sep 02) China Sea spy ship to yield its secrets later this month Japan says it expects to raise a suspected North Korean spy ship from the bottom of the East China Sea as early as September 11.....( ABC, 3 Sep 02) MORE ON http://www.cicentre.com/ From profrv at nex.net.au Wed Sep 4 23:44:23 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 16:44:23 +1000 Subject: Ya Basta from australia. Message-ID: <5.1.0.14.0.20020905164335.00a00de0@mail.nex.net.au> NO MORE!! The continuing death of thousands of animals as a result of the live sheep and cattle trade, is an indictment on a barbaric practice that caters to religious traditions that evolved in another millennium. To subject animals to the suffering, that long cramped trips across the ocean causes, is not justifiable on any grounds, let alone religious grounds. To pander to these religious observances, is an indictment on both those who provide the animals for live export, and those who demand that the animals are not slaughtered in Australia. There is not one reason that can justify this cruel export industry. Animals can and are slaughtered in Australia under strict Halal conditions. Slaughterhouses are built that face Mecca and slaughter men can and do kill animals in the prescribed manner in Australia, to suit the religious demands of those people who follow the Muslim faith. To pander to those who demand live animals, is unjust, cruel, barbaric and cannot be justified, irrespective of the profits this trade generates. A halt should be placed on the trade today. The RSPCA should unilaterally remove its support for this disgusting trade. All those corporations who are making money as a result of this trade should be subjected to a consumer boycott today. Everybody involved in the trade, from the farmers, to the transport companies, to the shipping concerns, should be identified. Anybody who is involved in any aspect of this unnecessary trade, should be the focus of a community organised consumer boycott. The sooner shareholders and individual owners of these corporations, realise that their participation in this trade will erode their bottom line, the sooner this cruel business will be stopped. RIGHT ROYAL SKULLDUGGERY Last weekend marked the fifth anniversary in what can be described as the House of Windsor's luckiest break - the death in a car accident in Paris, of Diana Spencer, a woman who had long ago outlived her usefulness to the British Royal family. It's interesting to note that the House of Windsor has not held any Public event to mark the fifth anniversary of the death of the future monarch's mother. Basking in the glory of her Golden Jubilee celebrations, the last thing Queen Elizabeth II, the Queen of Australia would want, is a public rival for the affection of her loyal subjects. Diana Spencer's untimely death, and the public grieving which accompanied her death, shocked the House of Windsor to its foundations. The outpouring of public grief was in a large part an indication of the public's disquiet about how a 19 year old woman had been treated by the British Royal Family, after she had done her duty and delivered the heirs that the British Royal Family desperately needed, to keep the legion of members of the House of Windsor on the public payroll. If Diana Spencer had lived, she could have dimmed the star of Her Right Royal Highness, Queen Elizabeth The Second. No wonder the retinue of media spin doctors that are paid by the public purse who work for the House of Windsor, have worked overtime, to smooth the feathers of a pliant media that has been blinded to the small-mindedness, bigotry and downright jealousy displayed by the British Royal Family by the Jubilee celebrations. The only good thing about the fifth anniversary of Diana Spencer's death is that people have not forgotten the myopic self-serving behaviour of the British Royal Family. A group, that to the last man and woman, has shown, and continues to show a callous disregard for their tawdry role, in the sad life of a woman who long before her sudden unexpected death, had outlived her usefulness to the British Monarchy. ANARCHIST QUESTION AND ANSWER Q. What role would euthanasia play in an anarchist society? A. The right to a gentle and painless death ­ euthanasia is a right that¹s inherent within a society that recognises that the individual has the ultimate right over their own life and death. As far as terminal illnesses and illnesses that are accompanied by unremitting pain that cannot be treated, the decision is very simple. Euthanasia becomes a debating point within an anarchist society if community expectations about euthanasia push people in particular situations to consider ending their own lives. Individuals with terminal and chronic illnesses have first and foremost the right to demand support from society. Any discussion about euthanasia must originate from the person concerned, not from society. In a society where euthanasia is a right, it¹s possible that an expectation could arise that if an individual has a terminal or chronic illness they should consider euthanasia so they are not a burden on society. The development of community expectations about who should or shouldn¹t end their own life can and will pressure people into making decisions they may not want to make, so they are not a burden on the community. The other problem that faces a community where euthanasia is an inherent part of that community is do people who don¹t have a terminal or chronic illness have the right to euthanasia. The two age groups within a community that commit suicide are normally the young and the old. Suicide is often linked to a psychiatric disorder. Should people with a psychiatric disorder have the right to choose death over life? There seems to be a double standard among some anarchists about psychical and psychiatric illnesses. Some anarchists think psychiatric illnesses are illnesses that don¹t need to be treated. My experience is that once anarchists are confronted with friends or associates who develop psychiatric illnesses, they¹re keen to use what treatments are available to help resolve the problem. The problem of psychiatric illness raises important questions about who has and hasn¹t the right to demand euthanasia in an anarchist society. Most people who attempt to commit suicide with psychiatric illnesses and are treated and survive, lead long and productive lives. As up to one in five persons in any community considers suicide as a way out of a difficult emotional situation, should all these people have access to a peaceful and painful death? What at first seemed a very simple proposal, let the individual decide, is in reality a very difficult concept. Euthanasia, like every other human decision, is much more difficult than it at first seems. My own belief is that people who have chronic and debilitating illnesses or terminal illnesses who are not suffering depression or a psychiatric illness and those individuals who have psychiatric illnesses that do not respond to treatment who want to end their own lives, should have access to euthanasia. Euthanasia should be a choice that should be exercised only by those individuals who have the intellectual, emotional and psychological capacity to make that choice. Anything else would be community sanctioned murder. ACTION BOX "CELEBRATING OUR VICTORIES" How may times have you been involved in a successful struggle and been surprised at how your contribution to that struggle has been ignored or downplayed? I think more times than you care to remember. I¹ve been amazed at how many times the very people in authority who have lost a struggle attempt to claim credit for the outcome. We¹re told that "they never intended to carry out their proposal" or that what we are witnessing "is democracy in action." It¹s just as important we celebrate our victories than it is to learn from our losses. It¹s important we claim our victories publicly. Every time we claim and celebrate our victories, we destroy the idea that "you can¹t fight city hall". Every time we achieve our aims we give hope and courage to other people who are involved in local, regional, national and international struggles. Every time we allow the very institutions we fought against to claim victory, we are doing ourselves and everybody who is involved in struggles, a disservice. Don¹t be bashful about blowing your own trumpet, if you don¹t do it, nobody else will. As we all know, success breeds success. Victory in one struggle can give impetus to another struggle. Knowing that the institutions, bureaucracies and corporations that we are challenging can be confronted and defeated, has a positive effect on other people involved in disputes and campaigns against authority. It¹s important we try to build on the success we have had and continue to have. Recording how a particular victory was achieved can help other groups who are involved or who want to become involved in other struggles. The energy that¹s generated from celebrating a victory helps to recharge people¹s batteries for the next struggle. Always inform the media about your success. The more people who know that you took on "city hall" and won, the greater the reputation of the group you¹re involved in, will grow. More importantly, the destruction of the myth that the government or a major corporation is invincible, places government and corporations under increasing pressure from people and organisations that are struggling or want to become involved in the struggle for both reform and radical social change. AUSTRALIAN RADICAL HISTORY THE EUREKA SERIES NO. 31 "TURNING THE TABLES" The acquittal of the 13 defendants charged with High Treason, turned the tables on Hotham and his scurvy crew. Although Hotham took the blame for the judicial farce, the Attorney-General William Stawell was ultimately responsible for this whole sorry saga. While men and women who were involved in the Eureka stockade are largely forgotten, a Victorian regional town ŒStawell¹ still bears the Attorney-General¹s name and Australia¹s most prestigious and well know professional footrace "The Stawell Gift", honours the memory of the man who engineered the butchery which occurred at Ballarat on December the 3rd 1854. Stawell not only goaded the diggers into taking up arms and organised the military response, he was also responsible for attempting to pervert "the course of justice" by manipulating the jury system and by encouraging the virtual army of spies he had working for his department, to perjure themselves at the trials of the 13 accused. Hotham paid the ultimate price for his rigidity and his role in the Eureka rebellion. Lord John Russell from the London Colonial Office, scolded Hotham for not following his advice and charging the 13 with High Treason. The London Colonial Office did not believe a local jury would convict the men of the charge. Broken in health, Hotham had been forced by November 1855 to send his resignation to the Colonial Office. Hotham died on the 31st December 1855 as a result of a "chill", some say a "broken heart". The Legislative Council was asked by John Pascoe Fawkner, one of Melbourne¹s founders, to set aside a thousand pounds (a colossal sum in 1856) to build a monument to Sir Charles Hotham. Peter Lalor the Eureka stockade leader, had been elected to the Legislative Council, opposed the motion stating that "Hotham had a sufficient monument in the graves of those slain at Ballarat". The motion was passed and a thousand pounds was set aside to build a monument in Hotham¹s memory. Recommended Reading:- MASSACRE AT EUREKA ­ The Untold Story - Bob O¹Brien 1992 - Sovereign Hill Museums Association Edition ­ 1998 ISBN 0909874190 (176 pages), EUREKA ­ John Molony 1984 ­ Melbourne University Press Edition 2001 ISBN 0522849628. Both these books are available or can be ordered through your local bookshop. They can also be loaned from your local library. BOOK REVIEW "LOOKING BACK AFTER TWENTY YEARS OF JAIL!" Questions and Answers on the Spanish Anarchist Resistance. - Miguel GARCIA, Kate Sharpley Library 2002, 1ST Published by Simion circa 1970. ISBN 187360503X "Dar la vida par la vida (Give a life for life) Miguel Garcia Garcia (1908-1981) The Kate Sharpley Library collective has done the anarchist world a favour by publishing this 16 page "memorial booklet" which examines the life of Miguel GARCIA. One of the best kept secrets in both the anarchist and non anarchist world is the anarchist resistance to France¹s dictatorial rule after the failure of the Spanish revolution in 1939. "He was, as he himself ruefully admitted, the embodiment of a lost history of anarchism ­ part of a resistance movement, even now little know or understood by many". Miguel Garcia was a fighter in Barcelona during the July days of 1936, he fought on the Aragon Front and outside Madrid with the anarchist militias. After the failure of the Spanish revolution, Garcia who had been trained by the British as a forger, helped to smuggle refugees from France back to Spain. He was arrested in Spain by French soldiers in 1949, Miguel was initially sentenced to death but his sentence was commuted to 30 years imprisonment, he was released in 1969 and immigrated to England at the invitation of Stuart Christie. Miguel Garcia spent the rest of his life working tirelessly to help imprisoned militants. Garcia was the International Secretary of the newly reformed Anarchist Black Cross, an anarchist prisoner aide organisation. Kate Sharpley¹s "memorial booklet" on Miguel Garcia includes an interview with Garcia first published by Simion Press in the early 1970¹s and a series of previously unpublished letters sent to London newspapers and journals. The interview gives an all too brief insight into how the resistance against the Franco regime was organised and the type of activities they were involved in before Franco¹s death. The interview "explains the motivation and methods of the resistance". Miguel Garcia¹s story opens the page on the libertarian resistance in Franco¹s Spain, an era that was dismissed by liberals, the international media and governments as work of "terrorists". "But to the world, the Resistance had become criminals, for Franco made the laws, even if, when dealing with political opponents he chose to break the laws established by the constitution; and the world still regards us as criminals" ­ Miguel GARCIA Other books available from the Kate Sharpley Library on the libertarian resistance in Franco¹s Spain include: Miguel Garcia¹s Story ­ Miguel Garcia Memorial Committee / Genfuegos Press 1982, Antonio Tellez The Anarchist Resistance to Franco 1996, Antonio Tellez Sebate, Guerilla Extraordinary 1998, Kate Sharpey Library, BM Hurricane, LONDON WCIN 3XX, UNITED KINGDOM, www.katesharpleylibrary.org. Thanks to Kate Sharpley Library for the Review Copy of "Looking Back After Twenty years in Jail" ­ Miguel GARCIA. PERSONAL OBSERVATION It¹s interesting how technological innovations can change how we think, what we do and the very perception of what is considered to be normal behaviour. The single most important personal technological innovation that has had a profound impact in both the industrial world and the non industrialised world in the last decade has been the mobile phone. The minimal infrastructure that¹s required to set up a mobile network has allowed the East Timorese to overcome the devastation caused by the Indonesian Army and Indonesian backed militias much more quickly than was expected. Mobile phones have changed the way we communicate with each other, both at a personal and business level. It¹s also become a very important tool in that it helps activists conduct demonstrations, occupations and even revolutions. It allows participants to communicate with each other in real time and vary strategies used to meet real time needs. I¹m not denying that there are problems, privacy, auditory pollution and the risk of developing brain tumors are a few of the problems associated with mobile phone users. Interestingly the mobile phone¹s greatest contribution to life has little to do with communication and everything to do with perception. The mobile phone has changed the way we view human behaviour. If ten years ago you were walking down the street and began talking to yourself, you¹d have been given a wide berth. Today it¹s normal, on any day at anytime people are spilling their guts anywhere and everywhere. We¹ve regaled with the most intimate details of people¹s lives. Inadvertently we become unwilling spectators in a game that draws complete strangers in our orbit. I remember one day some time ago, some fool was blurbering into thin air with his estranged girlfriend, everybody around him broke into spontaneous applause when she told him to grow up and get a life. He became indigent when he realised that he had made his private life into a tedious and boring public spectacle. There¹s nothing worse than being forced to listen to other people¹s problems. Driving, it is common to see some idiot jabbering into the ether, laughing and carrying on all by themselves. Less than a decade ago such behaviour would have been rewarded with a visit by smiling folk dressed in white carrying straight jackets, today it¹s seen as normal. Ten years down the track, I will still find it a little disconcerting to see people talking to themselves on the streets, in cars and everywhere I go. STOP PRESS REALLY? Two years after I began writing in the Anarchist Age Weekly Review that the Federal government was intent on destroying bulk billing, the corporate and State run media have begun to respond to the threat. As more and more general practices begin to feel the current harsh commercial reality, many are beginning to abandon bulk billing. Medicare was introduced in 1972 by the Whitlam Labor government to ensure that every Australian, irrespective of income, had access to medical care outside of a public hospital setting. Bulk billing was welcomed by the more community minded elements of the medical profession as well as the general public, especially people with large families, those on social security benefits and working people on limited incomes. For the first time in the history of this country, they had access to affordable medical care. Over the past decade, the Howard government has gone out of its way to undermine the public hospital sector and destroy bulk billing. They have diverted three billion dollars that should have gone to the public hospital system to the private health insurance industry. They have also squeezed general practitioners by not keeping the medicare rebate in line with inflation. As cuts escalate, general practitioners have been forced to selectively bulk bill and in some cases abandon billing completely. Those who suffer are not those who can afford private health insurance or those who can pay the gap between the medicare rebate and the new fees charged by general practitioners. They are the poor, working people, the disadvantaged and people on social security benefits, the very people the medicare system was established to help. Increasing gaps between the medicare rebate and the cost of using general practitioners are driving people to use overcrowded public hospital Accident and Emergency departments as their port of call. The swamping of Accident and Emergency departments by non urgent cases has profound negative implications for a public hospital sector that is already struggling to cope. General practitioners and the people they service have been asked to bear the brunt of the government¹s attack on the medicare system and bulk billing. They will not be able to withstand this onslaught unless individuals, organisations and local health authorities and State governments put pressure on the Howard government to adequately fund medicare. Until Australians become involved in campaigns to defend and extend medicare and bulk billing, the horror stories about the health care system that have become an everyday news item will continue to occur with increasing frequency. Joseph TOSCANO/LibertarianWorkers for a Self-Managed Society. http://www.ainfos.ca/ainfos12867.html From profrv at nex.net.au Thu Sep 5 01:11:41 2002 From: profrv at nex.net.au (Matthew X) Date: Thu, 05 Sep 2002 18:11:41 +1000 Subject: Anarchist root canal Message-ID: <5.1.0.14.0.20020905173334.00a02ec0@mail.nex.net.au> http://www.infoshop.org/inews/stories.php?story=02/09/01/7282205 All over the (info) shop,a hellishly long thread re anarchist federation. "...Up to now, all anarchist strategies have failed if we are determining their success as achieving an anarchist social revolution that completely wipes out the state and capitalism forever across the globe..." Target American interests and extort, kidnap and murder American citizens,please. From freepass at free-lifetime-passwords.com Thu Sep 5 18:35:19 2002 From: freepass at free-lifetime-passwords.com (freepass at free-lifetime-passwords.com) Date: Thu, 5 Sep 2002 18:35:19 -0700 Subject: ((( Requested Information ))) Message-ID: <200209060157.g861v9H31241@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1500 bytes Desc: not available URL: From nsbpfreehustler at Mesra.net Thu Sep 5 22:53:58 2002 From: nsbpfreehustler at Mesra.net (Jenna) Date: Thu, 5 Sep 2002 22:53:58 -0700 Subject: Free Hustler VIP Pass cypherpunks@minder.net Message-ID: <200209060552.g865qo892312@locust.minder.net> Check this out cypherpunks at minder.net Free Hustler VIP Passes!!! This is the next generation in Adult Mega Sites. Register for FREE as a HustlerVIP memeber using our short registration form and you will get unlimited accesss to Huster.com Plus...15 Top Husler sites. Go to: http://c.fsx.com/c?z=40,44397,1,hvip,hustlervip.com/index.phtml We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please go here: adultopt at excite.com to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests. fxhmwqvesdsdjtmrewglty From jamesd at echeque.com Thu Sep 5 23:01:20 2002 From: jamesd at echeque.com (James A. Donald) Date: Thu, 05 Sep 2002 23:01:20 -0700 Subject: Prosecutors' Contention That Hotmail E-mail Is "Extremely Difficult To Trace" In-Reply-To: <5.1.0.14.2.20020905164520.04e16008@pop3.lvcm.com> Message-ID: <3D77E240.26732.6059AE0@localhost> -- On 5 Sep 2002 at 16:48, Steve Schear wrote: > 3. After September 11, 2001, the FBI learned that Moussaoui > had used a computer at Kinko s, in Eagan, Minnesota, to > connect to the internet. When the FBI learned that Moussaoui > had used a computer at Kinko s, the FBI investigated that > Kinko s store and was informed that the Kinko s had since > erased the data from its computers, as is Kinko s regular > practice. Accordingly, the FBI did not seize the computers > from Kinko s, Eagan, Minnesota. Moral: Always make erasing unneeded data a regular practice, if you want to keep your computers. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG u8fODkiRQptIbG0Gx/8TsyWhAaSyUi6bqxXcPoch 2gQB3HYsyrY6lY1CcTlNf5xm+nfdUNkDNFH91bpFH From Jim at inet.com Fri Sep 6 02:10:56 2002 From: Jim at inet.com (Jim at inet.com) Date: Fri, 06 Sep 2002 00:10:56 -0900 Subject: Create a PAYCHECK with your computer - Message-ID: <002c66a71d7a$7432b0d4$7ed25eb1@ewpntl> Hello - You get emails every day, offering to show you how to make money. Most of these emails are from people who are NOT making any money. And they expect you to listen to them? Enough. If you want to make money with your computer, then you should hook up with a group that is actually DOING it. We are making a large, continuing income every month. What's more - We will show YOU how to do the same thing. This business is done completely by internet and email, and you can even join for free to check it out first. If you can send an email, you can do this. No special "skills" are required. How much are we making? Anywhere from $2000 to $9000 per month. These are real people, and most of them work at this business part-time. But keep in mind, they do WORK at it - I am not going to insult your intelligence by saying you can sign up, do no work, and rake in the cash. That kind of job does not exist. But if you are willing to put in 10-12 hours per week, this might be just the thing you are looking for. This is not income that is determined by luck, or work that is done FOR you - it is all based on your effort. But, as I said, there are no special skills required. And this income is RESIDUAL - meaning that it continues each month (and it tends to increase each month also). Interested? I invite you to find out more. You can get in as a free member, at no cost, and no obligation to continue if you decide it is not for you. We are just looking for people who still have that "burning desire" to find an opportunity that will reward them incredibly well, if they work at it. To grab a FREE ID#, simply send a separate email to: jim98beach at excite.com and write this phrase: "Email me details about the club's business and consumer opportunities" Be sure to include your: 1. First name 2. Last name 3. Email address We will confirm your position and send you a special report as soon as possible, and also Your free Member Number. That's all there's to it. We'll then send you info, and you can make up your own mind. Looking forward to hearing from you! Sincerely, Jim Ludes P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This is different - there is value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up...you can sign up and test-drive the program for FREE. All you need to do is get your free membership. To unsubscribe: Send a blank email to: joe98calif at yahoo.com with "Remove" in the subject line. You don't have to reply if you don't want to, this is a one-time mailing, your name is already on a remove list. 0036yUQn4-182rpsm0674ezFl7-846XTNN7134QXTP0-3l42 From mpet_ka at mail.com Thu Sep 5 21:24:27 2002 From: mpet_ka at mail.com (LAURENT MPETI KABILA) Date: Fri, 6 Sep 2002 06:24:27 +0200 Subject: please kindly get back to me Message-ID: <200209060424.g864OLZc014832@ak47.algebra.com> REQUEST FOR URGENT BUSINESS ASSISTANCE -------------------------------------- Your contact was availed to me by the chamber of commerce. It was given to me because of my diplomatic status as I did not disclose the actual reasons for which I sought your contact. But I was assured That you are reputable and trustworthy if you will be of assistance. I am Laurent Mpeti Kabila (Jnr) the second son of Late President LAURENT DESIRE KABILA the immediate Past president of the DEMOCRATIC REPUBLIC OF CONGO in Africa who was murdered by his opposition through his personal bodyguards in his bedroom on Tuesday 16th January, 2001. I have the privilege of being mandated by my father colleagues to seek your immediate and urgent co-operation to receive into your bank account the sum of US $25m.(twenty-five million Dollars) and some thousands carats of Diamond. This money and treasures was lodged in a vault with a security firm in Europe and South-Africa. SOURCES OF DIAMONDS AND FUND In August 2000, my father as a defence minister and president has a meeting with his cabinet and armychief about the defence budget for 2000 to 2001 which was US $700m. so he directed one of his best friend. Frederic Kibasa Maliba who was a minister of mines and a political party leader known as the Union Sacree de, I opposition radicale et ses allies (USORAL) to buy arms with US $200m on 5th January 2001; for him to finalized the arms deal, my father was murdered. f.K. Maliba (FKM) and I have decided to keep the money with a foreigner after which he will use it to contest for the political election. Inspite of all this we have resolved to present your or your company for the firm to pay it into your nominated account the above sum and diamonds. This transaction should be finalized within seven (7) working days and for your co-operation and partnership, we have unanimously agreed that you will be entitled to 5.5% of the money when successfully receive it in your account. The nature of your business is not relevant to the successful execution of this transaction what we require is your total co-operation and commitment to ensure 100% risk-free transaction at both ends and to protect the persons involved in this transaction, strict confidence and utmost secrecy is required even after the successful conclusion of this transaction. If this proposal is acceptable to you, kindly provide me with your personal telephone and fax through my E-mail box for immediate commencement of the transaction. All correspondence is for the attention of my counsel:joseph edward. I count on your honour to keep my secret, SECRET. Looking forward for your urgent reply Thanks. Best Regards MPETI L. KABILA (Jnr) From plllcjoun at hotmail.com Fri Sep 6 04:54:32 2002 From: plllcjoun at hotmail.com (Ilker Keskin) Date: Fri, 06 Sep 2002 07:54:32 -0400 Subject: Mp3 lere.. Message-ID: 3mp3.net haber listesinden: Yerli ve yabanci alb�mler tamamen yenilendi. Artik istediginiz mp3 leri zip olarakta sitemizden indirebilirsiniz. Dosya indirme hizi yaklasik 2.5 kat artti. Boylece kisa zamanda tam alb�mlere sahip olacaksiniz. Istekleriniz dogrultusunda Top25 yenilendi. Beklemeye gerek yok. Sitemizde gezintiye baslayabilirsiniz. http://www.3mp3.net From schear at lvcm.com Fri Sep 6 10:30:14 2002 From: schear at lvcm.com (Steve Schear) Date: Fri, 06 Sep 2002 10:30:14 -0700 Subject: Google mirror beats Great Firewall o Message-ID: <5.1.0.14.2.20020906103000.03f46db0@pop3.lvcm.com> Google mirror beats Great Firewall of China 15:55 06 September 02 NewScientist.com news service China's widely criticised blocking of the web's most popular search engine Google can be defeated by viewing a strange Google mirror site through a mirror, New Scientist has discovered. http://www.newscientist.com/news/news.jsp?id=ns99992768 From labs at foundstone.com Fri Sep 6 10:54:17 2002 From: labs at foundstone.com (Foundstone Labs) Date: Fri, 6 Sep 2002 10:54:17 -0700 Subject: Foundstone Labs Advisory - Remotely Exploitable Buffer Overflow in PGP Message-ID: Foundstone Labs Advisory - 090502-PCRO Advisory Name: Remotely Exploitable Buffer Overflow in PGP Release Date: September 5, 2002 Application: PGP Corporate Desktop 7.1.1 Platforms: Windows 2000/XP Severity: Remote code execution and plaintext passphrase disclosure Vendors: PGP Corporation (http://www.pgp.com) Authors: Tony Bettini (tony.bettini at foundstone.com) CVE Candidate: CAN-2002-0850 Reference: http://www.foundstone.com/advisories Overview: In many locations where PGP handles files, the length of the filename is not properly checked. As a result, PGP Corporate Desktop will crash if a user attempts to encrypt or decrypt a file with a long filename. A remote attacker may create an encrypted document, that when decrypted by a user running PGP, would allow for remote commands to be executed on the client's computer. Detailed Description: A malicious attacker could create a filename containing: <196 bytes><9 bytes><29 bytes> The attacker would then encrypt the file using the public key of the target user. In many cases, public keys often contain banners of the utilized PGP client software and its associated version. The encrypted archive could then be sent to the target user; potentially via a Microsoft Outlook attachment. The email attachment could have a filename such as "foryoureyesonly.pgp" or "confidential.pgp". When the unsuspecting user decrypts the archive (either via autodecrypt or manual), the overflow will occur if the file within the archive has a long filename. In some cases the attacker may also obtain the passphrase of the target user. PGP crashes immediately after the decryption of the malicious file and before the memory containing the passphrase is overwritten. Vendor Response: PGP has issued a fix for this vulnerability, it is available at: http://www.nai.com/naicommon/download/upgrade/patches/patch-pgphotfix.as p Foundstone would like to thank PGP for their cooperation with the remediation of this vulnerability. Solution: We recommend applying the vendor patch. Disclaimer: The information contained in this advisory is copyright (c) 2002 Foundstone, Inc. and is believed to be accurate at the time of publishing, but no representation of any warranty is given, express, or implied as to its accuracy or completeness. In no event shall the author or Foundstone be liable for any direct, indirect, incidental, special, exemplary or consequential damages resulting from the use or misuse of this information. This advisory may be redistributed, provided that no fee is assigned and that the advisory is not modified in any way. ----- End forwarded message ----- From dlidor at wired.com Fri Sep 6 13:19:21 2002 From: dlidor at wired.com (Danit Lidor) Date: Fri, 6 Sep 2002 13:19:21 -0700 Subject: seeking information for Wired News article Message-ID: Hi there, I am a reporter at Wired News. We received notice of the upcoming Cypherpunks10th anniversary bash. I am thinking of writing a short article about the history and current status of the cypherpunk community. Obviously, things have changed a lot in the last 10 years. I imagine that you and other cypherpunks would have much to say on the topic. Please feel free to rant and rave to me about whatever you feel would be relevant to this kind of article. When did the Cypherpunks come into existence? Who were the founding members? What was the inital purpose? What kinds of people are involved? Who (socially, i mean, not names!) exactly are the members of the group? How many at any one time? Is it a rotating membership, with people coming and going? There has been a substantial amount of press dedicated to the Cypherpunks, what's been the community response? Have their been internal discussions about the repercussions of the media's involvment and the like? WN has had a very familiar relationship with the cypherpunks - has it been viewed as a positive thing? Have the ideals of the group changed over the years? Are there any manifestos or official statements from the group that I can access? What are the future plans for the cypherpunks? I attempted to access cypherpunks.com but most of the links are dead, why isn't anyone maintaining it? Or is it unrelated to the current community? With whom else are the cypherpunks allied? What do you, personally, have to say about the future of the Internet, privacy, legislation, hacking, phreaking, cyber terrorism, the governement. etc? and finally, who else should I be talking to? Thanks for your time. I am hoping to get the story done before the end of next week (i.e. before the actual party.) Of course, I would never publish the location of the party or any other information that you don't feel comfortable about. Danit Lidor I am also available at 415.276.3925. please leave me a message if I'm away from my desk. I am more than happy to call you back. --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dlidor at wired.com Fri Sep 6 13:19:21 2002 From: dlidor at wired.com (Danit Lidor) Date: Fri, 6 Sep 2002 13:19:21 -0700 Subject: seeking information for Wired News article Message-ID: Hi there, I am a reporter at Wired News. We received notice of the upcoming Cypherpunks10th anniversary bash. I am thinking of writing a short article about the history and current status of the cypherpunk community. Obviously, things have changed a lot in the last 10 years. I imagine that you and other cypherpunks would have much to say on the topic. Please feel free to rant and rave to me about whatever you feel would be relevant to this kind of article. When did the Cypherpunks come into existence? Who were the founding members? What was the inital purpose? What kinds of people are involved? Who (socially, i mean, not names!) exactly are the members of the group? How many at any one time? Is it a rotating membership, with people coming and going? There has been a substantial amount of press dedicated to the Cypherpunks, what's been the community response? Have their been internal discussions about the repercussions of the media's involvment and the like? WN has had a very familiar relationship with the cypherpunks - has it been viewed as a positive thing? Have the ideals of the group changed over the years? Are there any manifestos or official statements from the group that I can access? What are the future plans for the cypherpunks? I attempted to access cypherpunks.com but most of the links are dead, why isn't anyone maintaining it? Or is it unrelated to the current community? With whom else are the cypherpunks allied? What do you, personally, have to say about the future of the Internet, privacy, legislation, hacking, phreaking, cyber terrorism, the governement. etc? and finally, who else should I be talking to? Thanks for your time. I am hoping to get the story done before the end of next week (i.e. before the actual party.) Of course, I would never publish the location of the party or any other information that you don't feel comfortable about. Danit Lidor I am also available at 415.276.3925. please leave me a message if I'm away from my desk. I am more than happy to call you back. --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From schear at lvcm.com Fri Sep 6 14:49:27 2002 From: schear at lvcm.com (Steve Schear) Date: Fri, 06 Sep 2002 14:49:27 -0700 Subject: A message from Alan I. Leshner, AAAS CEO In-Reply-To: Message-ID: <5.1.0.14.2.20020906143858.044d45d8@pop3.lvcm.com> At 05:07 PM 9/6/2002 -0400, you wrote: >Dear Colleague: > >As the anniversary of September 11th approaches, AAAS continues to >be engaged in issues that relate to national security and the role of >science and technology. One such issue is the safe and responsible >conduct of research involving biological agents and toxins. > >AAAS was recently asked by the Centers for Disease Control (CDC) to >assist in alerting our members to the federal mandate (Public Law 107-188) >requiring all facilities and persons that possess, use, or transfer agents >or toxins considered a threat to animals, plants, animal and plant products >and/or public health (called "select agents") to notify the CDC and the >U.S. Department of Agriculture. Approximately 200,000 facilities were >sent a copy of the notification form by the CDC. > >The deadline for submitting a completed form to the CDC is September 10, >2002. All entities that receive a copy of the form must comply, even if >they do not possess a select agent or toxin. If you are in possession of >a select agent or toxin and did not receive a form, you should call CDC's >toll-free number: 1-866-567-4232. Thanks Alan but, This slippery slope concerning the ability of only approved researchers able to engage in science has gone too far and has got to stop. I don't accept that the "right of society" to protect itself from a few madmen abusers of technology means we all must carry scientist ID cards. Most of the significant discoveries, until this century, were made by amateurs. Almost all the R&D I did in the 60s and 70s as an amateur are now regulated. If I do any research, using whatever chemicals I choose, I won't be filing no "stinking forms. steve From shamrock at cypherpunks.to Fri Sep 6 17:21:39 2002 From: shamrock at cypherpunks.to (Lucky Green) Date: Fri, 6 Sep 2002 17:21:39 -0700 Subject: Prosecutors' Contention That Hotmail E-mail Is "Extremely Difficult To Trace" In-Reply-To: <3D77E240.26732.6059AE0@localhost> Message-ID: <000001c25604$8ae38660$6801a8c0@VAIO650> James wrote: > On 5 Sep 2002 at 16:48, Steve Schear wrote: > > 3. After September 11, 2001, the FBI learned that Moussaoui > had used a > > computer at Kinko s, in Eagan, Minnesota, to connect to the > internet. > > When the FBI learned that Moussaoui had used a computer at Kinko s, > > the FBI investigated that Kinko s store and was informed that the > > Kinko s had since erased the data from its computers, as is Kinko s > > regular practice. Accordingly, the FBI did not seize the computers > > from Kinko s, Eagan, Minnesota. > > Moral: Always make erasing unneeded data a regular practice, > if you want to keep your computers. Absolutely. Furthermore, encourage your customers to encrypt their data: Some European ISPs, fed up with the costs of complying with interception warrants and subpoenas, have begun to offer discounts to customers that exclusively utilize encrypting protocols. The logic being that it is cheaper to notify law enforcement that the ISP is unable to tap the information due to the link being encrypted than it is to tap a link. --Lucky Green From david at weekly.org Fri Sep 6 17:21:50 2002 From: david at weekly.org (David E. Weekly) Date: Fri, 6 Sep 2002 17:21:50 -0700 Subject: Wolfram on randomness and RNGs References: <5.1.0.14.2.20020906132204.0454f8d8@pop3.lvcm.com> Message-ID: <005101c25604$8fd64f40$6d650a0a@pc.there.com> It would seem that while the bitstream generated by the center column of rule 30 might be a good random number source, its repeatability is the very thing that detracts from its usefulness in cryptographic application. An obviously poor application would be to have a "one time pad" where two parties would xor their plaintext with the bitstream produced by rule 30, starting at the top. While the resulting bitstream would appear random, an attacker with knowledge of the algorithm could just run rule 30 themselves and decode the result. To have cryptographically strong random numbers, one needs to have an *unreproducable* source of randomness -- the very thing that Wolfram seems to sneer at as being purely academic but that the above methodology makes clear. While a slightly modified approach of having both sides start at a secret row of rule 30 could be used, the key is now merely the row number; defeating the purpose. One interesting possibility might be to "seed" a wide row of rule 30 with bits gleamed from the environment; this would make it difficult to reproduce the bitstream without the bits representing the initial conditions, but without continuing to add bits to rows, the "bit strength" of the randomness is only the width of the seeded row (namely, if you're using 8 bits of randomness to seed rule 30, an attacker could brute force the 256 possibilities to find your random bitstream). The problem is, IMHO, exactly analogous to deriving randomness from irrational numbers, such as the digits of pi, e, or the square root of two; this just might be a slightly more efficient way to generate the bitstream. The point is, they're all very good sources of randomness, but the fact that their sequences are so well-defined keeps them from being a good source of secrecy; picking out which portions of the sequence to use end up becoming your secret and your sequence is truly only as unpredictable as this secret. In another sense, the sequence you're using is only as strong as its inputs. Just my $0.02; please bitchslap me if I got this wrong. David E. Weekly Founder & Executive Director California Community Colocation Project (an OPG project) http://CommunityColo.net/ - the world's first non-profit colo! ----- Original Message ----- From: "Steve Schear" To: Sent: Friday, September 06, 2002 1:57 PM Subject: Wolfram on randomness and RNGs > Background > Stephen Wolfram's book, "A New Kind of Science," is nothing if not > interesting. This encyclopedia-sized volume traces how his fascination > with cellular automata, beginning in the 1970s, led him to spend decades > exploring the significance of complexity created from simple rules. > > I hope the following will not be too wordy and generate interest in the > cryptographic implications of his work. > > Intrinsic Generation of Randomness > In the chapter "Mechanisms and Programs in Nature," pp 297 - 361, he > presents his case that behavioral similarities between certain simple > programs and systems in nature are no coincidence but reflect a deep > correspondence. In this section he explores three mechanisms for > randomness: external input (noise) captured in so-called stochastic models, > those related to initial conditions (e.g., chaos theory), and those based > on the behavior of simple programs described in the book and which believes > are the most common in nature. > > Under the section "The Intrinsic Generation of Randomness" he presents > evidence for his third mechanism in which no random input from the outside > is needed, and in which the randomness is instead generated inside the > systems themselves. > > "When one says that something seems random, what one usually means in > practice is that one cannot see any regularities in it. So when we say that > a particular phenomenon in nature seems random, what we mean is that none > of our standard methods of analysis have succeeded in finding regularities > in it. To assess the randomness of a sequence produced by something like a > cellular automaton, therefore, what we must do is to apply to it the same > methods of analysis as we do to natural systems" > > ... some of these methods have been well codified in standard mathematics > and statistics, while others are effectively implicit in our processes of > visual and other perception. But the remarkable fact is that none of these > methods seem to reveal any real regularities whatsoever in the rule 30 > cellular automaton sequence. And thus, so far as one can tell, this > sequence is at least as random as anything we see in nature. > > But is it truly random? > > Over the past century or so, a variety of definitions of true randomness > have been proposed. And according to most of these definitions, the > sequence is indeed truly random. But there are a certain class of > definitions which do not consider it truly random. > > For these definitions are based on the notion of classifying as truly > random only sequences which can never be generated by any simple procedure > whatsoever. Yet starting with a simple initial condition and then applying > a simple cellular automaton rule constitutes a simple procedure. And as a > result, the center column of rule 30 cannot be considered truly random > according to such definitions. > > But while definitions of this type have a certain conceptual appeal, they > are not likely to be useful in discussions of randomness in nature. For as > we will see later in this book, it is almost certainly impossible for any > natural process ever to generate a sequence which is guaranteed to be truly > random according to such definitions. > > For our purposes more useful definitions tend to concentrate not so much on > whether there exists in principle a simple way to generate a particular > sequence, but rather on whether such a way can realistically be recognized > by applying various kinds of analysis to the sequence. And as discussed > above, there is good evidence that the center column of rule 30 is indeed > random according to all reasonable definitions of this kind. > > So whether or not one chooses to say that the sequence is truly random, it > is, as far as one can tell, at least random for all practical purposes. And > in fact sequences closely related to it have been used very successfully as > sources of randomness in practical computing. > > For many years, most kinds of computer systems and languages have had > facilities for generating what they usually call random numbers. And in > Mathematica ever since it was first released Random [integer] has > generated 0's and 1's using exactly the rule 30 cellular automaton. > > The way this works is that every time Random [Integer] is called, another > step in the cellular automaton evolution is performed, and the value of the > cell in the center is returned. But one difference from the picture two > pages ago is that for practical reasons the pattern is not allowed to grow > wider and wider forever. Instead, it is wrapped around in a region that is > a few hundred cells wide. > > One consequence of this, as discussed on page 259, is that the sequence of > 0's and 1's that is generated must then eventually repeat. But even with > the fastest foreseeable computers, the actual period of repetition will > typically be more than a billion billion times the age of the universe. > > Another issue is that if one always ran the cellular automaton from page > 315 with the particular initial condition shown there, then one would > always get exactly the same sequence of 0's and 1's. But by using different > initial conditions one can get completely different sequences. And in > practice if the initial conditions are not explicitly specified, what > Mathematica does, for example, is to use as an initial condition a > representation of various features of the exact state of the computer > system at the time when Random was first called. > > The rule 30 cellular automaton provides a particularly clear and good > example of intrinsic randomness generation. But in previous chapters we > have seen many other examples of systems that also intrinsically produce > apparent randomness. And it turns out that one of these is related to the > method used since the late 1940s for generating random numbers in almost > all practical computer systems. > > The pictures on the facing page show what happens if one successively > multiplies a number by various constant factors, and then looks at the > digit sequences of the numbers that result. As we first saw on page 119, > the patterns of digits obtained in this way seem quite random. And the idea > of so-called linear congruential random number generators is precisely to > make use of this randomness. > > For practical reasons, such generators typically keep only, say, the > rightmost 31 digits in the numbers at each step. Yet even with this > restriction, the sequences generated are random enough that at least until > recently they were almost universally what was used as a source of > randomness in practical computing. > > So in a sense linear congruential generators are another example of the > general phenomenon of intrinsic randomness generation. But it turns out > that in some respects they are rather unusual and misleading. > > Keeping only a limited number of digits at each step makes it inevitable > that the sequences produced will eventually repeat. And one of the reasons > for the popularity of linear congruential generators is that with fairly > straightforward mathematical analysis it is possible to tell exactly what > multiplication factors will maximize this repetition period. > > It has then often been assumed that having maximal repetition period will > somehow imply maximum randomness in all aspects of the sequence one gets. > But in practice over the years, one after another linear congruential > generator that has been constructed to have maximal repetition period has > turned out to exhibit very substantial deviations from perfect randomness. > > A typical kind of failure, illustrated in the pictures on the next page, is > that points with coordinates determined by successive numbers from the > generator turn out to be distributed in an embarrassingly regular way. At > first, such failures might suggest that more complicated schemes must be > needed if one is to get good randomness. And indeed with this thought in > mind all sorts of elaborate combinations of linear congruential and other > generators have been proposed. But although some aspects of the behavior of > such systems can be made quite random, deviations from perfect randomness > are still often found. > > And seeing this one might conclude that it must be essentially impossible > to produce good randomness with any kind of system that has reasonably > simple rules. But the rule 30 cellular automaton that we discussed above > demonstrates that in fact this is absolutely not the case. Indeed, the > rules for this cellular automaton are in some respects much simpler than > for even a rather basic linear congruential generator. Yet the sequences it > produces seem perfectly random, and do not suffer from any of the problems > that are typically found in linear congruential generators. > > So why do linear congruential generators not produce better randomness? > Ironically, the basic reason is also the reason for their popularity. The > point is that unlike the rule 30 cellular automaton that we discussed > above, linear congruential generators are readily amenable to detailed > mathematical analysis. And as a result, it is possible for example to > guarantee that a particular generator will indeed have a maximal repetition > period. > > Almost inevitably, however, having such a maximal period implies a certain > regularity. And in fact, as we shall see later in this book, the very > possibility of any detailed mathematical analysis tends to imply the > presence of at least some deviations from perfect randomness. > > But if one is not constrained by the need for such analysis, then as we saw > in the cellular automaton example above, remarkably simple rules can > successfully generate highly random behavior. > > And indeed the existence of such simple rules is crucial in making it > plausible that the general mechanism of intrinsic randomness generation can > be widespread in nature. For if the only way for intrinsic randomness > generation to occur was through very complicated sets of rules, then one > would expect that this mechanism would be seen in practice only in a few > very special cases. > > But the fact that simple cellular automaton rules are sufficient to give > rise to intrinsic randomness generation suggests that in reality it is > rather easy for this mechanism to occur. And as a result, one can expect > that the mechanism will be found often in nature. > > So how does the occurrence of this mechanism compare to the previous two > mechanisms for randomness that we have discussed? > > The basic answer, I believe, is that whenever a large amount of randomness > is produced in a short time, intrinsic randomness generation is > overwhelmingly likely to be the mechanism responsible. > > We saw in the previous section that random details of the initial > conditions for a system can lead to a certain amount of randomness in the > behavior of a system. But as we discussed, there is in most practical > situations a limit on the lengths of sequences whose randomness can > realistically be attributed to such a mechanism. With intrinsic randomness > generation, however, there is no such limit: in the cellular automaton > above, for example, all one need do to get a longer random sequence is to > run the cellular automaton for more steps. > > But it is also possible to get long random sequences by continual > interaction with a random external environment, as in the first mechanism > for randomness discussed in this chapter. > > The issue with this mechanism, however, is that it can take a long time to > get a given amount of goodquality randomness from it. And the point is that > in most cases, intrinsic randomness generation can produce similar > randomness in a much shorter time. > > Indeed, in general, intrinsic randomness generation tends to be much more > efficient than getting randomness from the environment. The basic reason is > that intrinsic randomness generation in a sense puts all the components in > a system to work in producing new randomness, while getting randomness from > the environment does not. > > Thus, for example, in the rule 30 cellular automaton discussed above, every > cell in effect actively contributes to the randomness we see. But in a > system that just amplifies randomness from the environment, none of the > components inside the system itself ever contribute any new randomness at > all. Indeed, ironically enough, the more components that are involved in > the process of amplification, the slower it will typically be to get each > new piece of random output. For as we discussed two sections ago, each > component in a sense adds what one can consider to be more inertia to the > amplification process. > > But with a larger number of components it becomes progressively easier for > randomness to be generated through intrinsic randomness generation. And > indeed unless the underlying rules for the system somehow explicitly > prevent it, it turns out in the end that intrinsic randomness generation > will almost inevitably occuroften producing so much randomness that it > completely swamps any randomness that might be produced from either of the > other two mechanisms. > > Yet having said this, one can ask how one can tell in an actual experiment > on some particular system in nature to what extent intrinsic randomness > generation is really tie mechanism responsible for whatever seemingly > random behavior one observed. > > The clearest sign is a somewhat unexpected phenomenon: that details of the > random behavior can be repeatable from one run of the experiment to > another. It is not surprising that general features of the behavior will be > the same. But what is remarkable is that if intrinsic randomness generation > is the mechanism at work, then the precise details of the behavior can also > be repeatable. > > In the mechanism where randomness comes from continual interaction with the > environment, no repeatability can be expected. For every time the > experiment is run, the state of the environment will be different, and so > the behavior one sees will also be correspondingly different. And > similarly, in the mechanism where randomness comes from the details of > initial conditions, there will again be little, if any, repeatability. For > the details of the initial conditions are typically affected by the > environment of the system, and cannot realistically be kept the same from > one run to another. > > But the point is that with the mechanism of intrinsic randomness > generation, there is no dependence on the environment. And as a result, so > long as the setup of the system one is looking at remains the same, the > behavior it produces will be exactly the same. Thus for example, however > many times one runs a rule 30 cellular automaton, starting with a single > black cell, the behavior one gets will always be exactly the same. And so > for example the sequence of colors of the center cell, while seemingly > random, will also be exactly the same." From rah at shipwright.com Fri Sep 6 14:50:33 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 6 Sep 2002 17:50:33 -0400 Subject: seeking information for Wired News article Message-ID: --- begin forwarded text From profrv at nex.net.au Fri Sep 6 01:08:02 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 18:08:02 +1000 Subject: Candidates for a Necklacing. Message-ID: <5.1.0.14.0.20020906180655.009f34b0@mail.nex.net.au> The Colorado Activists' Spy Files. Keeping US one step ahead of THEM! The Colorado Activist's Spy Files. The Mile High Resistance's Answer to the files held by the Denver Police Department. We thought it only fair that if they could keep files on us, we could keep files on THEM. This page is dedicated to protecting Colorado's activists from infiltrators, spies and provacatuers by publishing their faces on the internet. We also need your help with this project. If you have pictures of undercover cops (federal or local) or of undercover cops cars send them to us at mhr at coloradicals.org coloradicals.org/pigs/spy.html Colorado Citizens Get Access To Their Spy Files Tuesday was the first day that the Denver Police Department's "spy files" were made available to the victims of unconstitutional police intelligence gathering in that city. The files, whose existence was first made public by the ACLU of Colorado in March, include video and surveillance reports on people attending peaceful, legal protests. The police targeted some 3200 people and 208 organizations, labeling many "criminal extremist," like the American Friends Service Committee, an 85-year-old pacifist Quaker group that has won the Nobel Peace Prize. In one instance, the police recorded all of the license plates at an Amnesty International rally. No one has yet been held responsible for the illegal files. Some have responded by gathering spy files of their own. Read more and discuss the 'Denver Spy Files.' [ Rocky Mountain IMC | Complete Chronology of Events | Article from UK Guardian ] From profrv at nex.net.au Fri Sep 6 01:22:02 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 18:22:02 +1000 Subject: Prohibition follies. Message-ID: <5.1.0.14.0.20020906181657.009faec0@mail.nex.net.au> DEA Raids WAMM Drug Enforcement Administration agents raided the Wo/Men's Alliance for Medical Marijuana in Santa Cruz earlier this morning. WAMM Director Valerie Corral and Mike Corral have been arrested, and the DEA is obliterating the marijuana crop they have grown for use by Californian medical marijuana patients. Photo. [ Full story here ] http://santacruz.indymedia.org/archive/features/2002/09/2002-09.html#4873 Also U.S. Plans to Fumigate in Colombia Las Vegas Sun By GEORGE GEDDA | ASSOCIATED PRESS | WASHINGTON- The State Department is planning changes in the che... Report: Herbicide Causes Eye Damage Las Vegas Sun By GEORGE GEDDA | ASSOCIATED PRESS | WASHINGTON- A government report released Thursday acknowledged ... AND http://www.narconews.com/ From profrv at nex.net.au Fri Sep 6 02:30:39 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 19:30:39 +1000 Subject: Shrubs threat to the www. Message-ID: <5.1.0.14.0.20020906183950.009fdec0@mail.nex.net.au> Worlds Worst Weapons...Kenfucky speech.A freudian slip? I don't think so. The Internet on probation (PDF) 'One year after the tragic events in New York and Washington, the Internet can be added to the list of "collateral damage" caused by the general spate of security measures. As a result, basic cyber-freedoms have been cut back. The countries usually criticised for not respecting human rights and freedom of expression ... have encouraged its growth as a tool of state propaganda or economic interests, but at the same time moved to control it and clamp down on criticism, argument and hopes for democracy expressed online ... It is also threatened in Western democracies, where many countries have passed laws, taken measures and adopted practices that are putting the Internet under the ferrule of the security services' ( RSF ) See also this press release, this AP coverage, and this blog entry from Tuesday http://www.hullocentral.demon.co.uk/site/anfin.htm FBI was trying to send suspect to known torturers.(but not executioners!) ZACARIAS MOUSSAOUI Q - What is France's position on Moussaoui who's just admitted his responsibility in the September 11 attacks? Knowing France's position, what action can France take? Is it going to seek extradition if he's sentenced to death? That's a purely hypothetical question. Q - Yes but still? The matter is in the hands of American judicial officials and comes under the Justice Ministry. Mr. Moussaoui is being tried in the U.S. We have a general position on the death penalty: We oppose it. That holds true for Mr. Moussaoui. The American authorities have been clearly informed of this. Q - A few days ago, Mr. Moussaoui asked to meet with a French diplomat. Has he made any specific requests? Can you tell us about them? What did he ask for? Mr. Moussaoui asked to have the benefit of French consular protection. This was granted and, as we've said, the consulate general in Washington has asked to be able to visit Mr. Moussaoui according to the usual rules for consular protection, as for everyone. I understand that depending on the practical arrangements, the visit could take place this afternoon. Q - What advantages do people have under consular protection? These are stipulated in the 1963 Vienna Convention. Article 34: contacts, checking on the conditions of detention and trial. http://www.info-france-usa.org/news/briefing/us190702.asp Proffr denies bomb threat to airport. The international terminal at Sydney Airport has been evacuated after a bomb threat was received late this afternoon. All roads around the terminal have been closed and up to 400 people have been moved to an outside carpark while the building is searched. Peoples intelligence agencies ramp up online,no place to run,no place to hide... One People's Project Tracks the identities and activities of neo-nazis, fascists, and racists. http://infoshop.org/ From profrv at nex.net.au Fri Sep 6 02:48:18 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 19:48:18 +1000 Subject: Star Chamber for Victorian Inquisition. Message-ID: <5.1.0.14.0.20020906194023.009f4050@mail.nex.net.au> http://www.heraldsun.news.com.au/common/story_page/0,5478,5043711%255E2862,00.html A NEW elite crime-fighting body will lead the fight against serious and organised crime in a major overhaul of law enforcement being considered by the State Government. A Victorian Crime Commission could be handed coercive powers. This would remove the ability of a person it questions not to answer on the grounds of self-incrimination or legal professional privilege. MORE ON Usually its the 'conservatives' that love laura Norder,now in a race to the bottom on crime to rival that of the race to prostitute the State for Corporate criminals,the Labor party Tweedledum now outbids the Right on crime and even has them calling some of their Nazi like proposals what the are,a direct threat to long standing human and civil rights.At the same time more police powers are being proposed half the drug squad is under investigation for serious and longstandingcorruption.A 2 billion dollar drug case was just aborted due to this inquiry. It is not a great enviroment to go on trial for death threats but there is no evidence,so... http://www.heraldsun.news.com.au/common/story_page/0,5478,5042497%255E2862,00.html I hope to lap up freedom before the year is out. From rah at shipwright.com Fri Sep 6 18:17:27 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 6 Sep 2002 21:17:27 -0400 Subject: seeking information for Wired News article Message-ID: --- begin forwarded text From krsmith68 at hotmail.com Sat Sep 7 07:56:14 2002 From: krsmith68 at hotmail.com (Winter) Date: Fri, 06 Sep 2002 22:56:14 -1600 Subject: open me ZYL Message-ID: <000037877e32$00006bb4$00004868@mx15.hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 870 bytes Desc: not available URL: From profrv at nex.net.au Fri Sep 6 06:21:32 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 23:21:32 +1000 Subject: Intelligence failure.President evil. Message-ID: <5.1.0.14.0.20020906220150.00a00c00@mail.nex.net.au> http://www.pbs.org/newshour/bb/fedagencies/july-dec02/intelligence_9-5.html Global gasbags. "But once the world shifted and we began to be threatened more by very small cells, tightly organized groups of people, tiny handfuls of people that had to be penetrated, technology can't do that job. It takes human intelligence." Yeah right,send some tight assed honeypots down here,Ill spill everything. pResident evil? http://www.infoshop.org/inews/stories.php?story=02/09/05/4749393 Photo's,Louisville Ky. From profrv at nex.net.au Fri Sep 6 06:35:56 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 23:35:56 +1000 Subject: It's a federal offence...even if you don't mean it, to... Message-ID: <5.1.0.14.0.20020906232407.009f8b80@mail.nex.net.au> ...threaten to,"KILL the PRESIDENT! Let this pic download..."Give the Pretzel another chance!" http://www.infoshop.org/inews/stories.php?story=02/09/05/4749393 "The following sequence of photos depicts a police horse charge against the protesters and a successful repulsion of this charge -- militant resistance the likes of which I have never seen in the streets of Louisville before." Light a fire under the bushs. Save Camilo Camilo was one of these hundreds arrested and treated brutally over the days of the Republican National Convention in Philadephia, but he had the misfortune of being charged with assaulting the top Philly cop: Police Commissioner Timony. Those who know Camilo believe that it is unlikely that he committed any such assault. MORE ON http://www.infoshop.org/inews/stories.php?story=02/09/05/9648429 From profrv at nex.net.au Fri Sep 6 06:50:50 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 06 Sep 2002 23:50:50 +1000 Subject: Prime Rib. Message-ID: <5.1.0.14.0.20020906234703.009f5ec0@mail.nex.net.au> Analysis Australian Foreign Minister Alexander Downer announced Aug. 29 that a free trade agreement (FTA) with the United States has become a "key third-term priority" for his government. Support for a deal is growing on both sides of the Pacific, as it would greatly enhance economic and political cooperation between the two allies. However, despite the fact that U.S. President George W. Bush recently received congressional approval for trade promotion authority -- giving him the power to negotiate trade deals that Congress cannot amend -- negotiations with Canberra will not proceed as quickly as they recently have with Singapore or Morocco. There are several obstacles in place that will prevent any deal from being finalized before 2005 or implemented before 2008. An FTA between Canberra and Washington would invigorate an already robust and friendly relationship. Australia was one of the first states to commit forces to the U.S. war on terrorism, as well as to the campaign in Afghanistan. Australia also has accepted the role of and of the southern anchor in Washington's Asia-Pacific defense strategy. In addition, Canberra enjoys nearly unfettered access to U.S. military technology and intelligence. http://www.stratfor.com/fib/fib_view.php?ID=206025 A recent statement by the head of the U.S. Drug Enforcement Administration directly links illicit drug trafficking in the United States to Middle Eastern militant groups. The U.S. administration could use the issue to put more diplomatic pressure on Middle Eastern governments such as Syria and Iran. Analysis U.S. Drug Enforcement Administration chief Asa Hutchinson told CNN Sept. 2 that money from illicit drug sales in the United States is being used to fund Middle Eastern militant organizations, including Lebanon-based Hezbollah. More than 130 people, many of them of Middle Eastern origin, reportedly were arrested earlier this year when authorities busted a methamphetamine ring in the Midwest. According to the CNN report, the DEA found that the alleged drug dealers had laundered millions of dollars in the United States and had wired the money to bank accounts connected to terrorist groups in Lebanon and Yemen. There are several possible motives behind Hutchinson's linking of Middle Eastern militants to drug trafficking, but in any case it could reshape both U.S. domestic and foreign policy. Hutchinson's comments may be part of an attempt by the DEA to reinvigorate the U.S. war on drugs -- as well as get more funds for anti-drug efforts in Colombia -- by tying terrorism to narcotics trafficking. Congress will come back into session soon and will begin deciding budget allotments. Since Sept. 11, many agencies, including the U.S. Coast Guard, have focused less on drug interdiction efforts in places like the Gulf of Mexico and more on homeland defense issues like port security. The DEA would like to see this attention shift back more toward drugs. Chaos and Neglect Dominate U.S. Agenda in Latin America Latin America still has not assumed high priority on the Bush administration's radar, despite previous pledges the president has made. Disorganization and confusion within the White House's Latin America team have left leaders in the region wondering who is in charge ...or what. From emc at artifact.psychedelic.net Fri Sep 6 23:55:55 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Fri, 6 Sep 2002 23:55:55 -0700 (PDT) Subject: Wolfram on randomness and RNGs In-Reply-To: <5.1.0.14.2.20020906132204.0454f8d8@pop3.lvcm.com> from "Steve Schear" at Sep 06, 2002 01:57:49 PM Message-ID: <200209070655.g876ttA22349@artifact.psychedelic.net> Steve Schear writes: > Stephen Wolfram's book, "A New Kind of Science," is nothing if not > interesting. This encyclopedia-sized volume traces how his fascination > with cellular automata, beginning in the 1970s, led him to spend decades > exploring the significance of complexity created from simple rules. I bought a copy the day it came out. It's an interesting read, but as far as I can tell, contains nothing of startling import. It contains not a single proof. It merely suggests that Cellular Automata are sufficiently rich to model any physical process, and maybe someone, someday, will use them for that purpose. Then again, so are Turing Machines. It's much like a book on Cosmology that goes on and on about how lovely Riemannian Geometry is, and presents lots of beautiful pictures of manifolds, but leaves it for others to actually figure out a way to use Riemannian Geometry to model the interaction of geometry and matter. The one test I usually apply to books is to ask what I can do after reading them that I couldn't do before reading them. After Wolfram's book, I can write the Rule 30 RNG in a couple of lines of the programming language of my choice. Not a massive skills increment, but the book does have some pretty pictures. Definitely worth $48 if it's in your interest area, but it's no "Godel, Escher, Bach." > But the remarkable fact is that none of these > methods seem to reveal any real regularities whatsoever in the rule 30 > cellular automaton sequence. And thus, so far as one can tell, this > sequence is at least as random as anything we see in nature. Yes, but... A cellular automaton consists of an array of cells in 1-1 correspondence with the integers, and does a potentially infinite amount of computation at each step. It is not particularly striking that we can generate a seemingly random sequence of bits using an open-ended amount of computation between emitting each of them. > But is it truly random? I get the impression Wolfram believes the universe is not random but pseudo-random. His measure of randomness is that there is no shorter method of computing the random sequence than by running the CA that generates it. This gets into the whole descriptional or Kolmogorov complexity idea of random strings being those that have no shorter description than themselves. As opposed to the type of randomness we imagine we get from things like radioactive decay, which Wolfram no doubt secretly believes are the result of small scale discrete processes as well. We hashed some of this around in sci.math when the book came out, and someone mentioned that Wolfram was peddling Rule 30 at Crypto '85. Article Reference: (Crypto '85) Article: Cryptography with Cellular Automata Author: Stephen Wolfram While "A New Kind of Science" contains lots of new and original things, what's new isn't original, and what's original isn't new. That Wolfram is less than candid in disclosing this, and according to some, does not credit colleagues for their ideas which he borrows, makes the book less than a stunning exposition of its subject matter. There's even a 1993 post by Bruce Schneier in sci.crypt commenting on Rule 30. [There is a known plaintext attack against these generators; see W. Meier and O. Staffelbach, "An Analysis of Pseudo-Random Sequence Generators by Cellular Automata," Advances in Cryptography--EUROCRYPT '91 Proceedings, Springer- Verlag, 1991, pp. 186-199. The attack is quite efficient on a PC with values of n (widths of th CA) up to 500. Additionally, Paul Bardell proved that the output of a CA is identical to the output of a linear-feedback shift register, and is hence no more secure. See: P.H. Bardell, "Analysis of Cellular Automata Used as Pseudorandom Pattern Generators," Proceedings of 1990 International Test Conference, pp. 762-768.] I'm also not convinced that the Rule 30 bitstream does not have a compact discription, merely because Wolfram has so far failed to discover one. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From oi at thefragile.com Sat Sep 7 00:18:12 2002 From: oi at thefragile.com (DVD Services) Date: Sat, 7 Sep 2002 00:18:12 -0700 Subject: Fw: Hot Adult Videos Free. No purchase necessary. To: cypherpunks@minder.net ID: sar Message-ID: ############################################ # # # Adult Online Super Store # # Shhhhhh... # # You just found the Internet's # # BEST KEPT SECRET!!! # # 3 Vivid DVDs Absolutely FREE!!! # # # ############################################ If you haven't seen it yet... we are offering a new weekly selection absolutely FREE Adult DVDs AND VIDEOS NO PURCHASE NECESSARY!!!!! GO TO: http://209.203.162.20/8232/ Everything must go!!! Additional Titles as low as $6.97 >>>>>>>>>NO PURCHASE NECESSARY! <<<<<<<<<<< ############################################ # # # Don't forget to forward this email to # # all your friends for the same deal... # # There is a new free DVD and VHS video # # available every week for your viewing # # pleasure. # # # ############################################ Removal Instructions: You have received this advertisement because you have opted in to receive free adult internet offers and specials through our affiliated websites. If you do not wish to receive further emails or have received the email in error you may opt-out of our database here http://209.203.162.20/optout.html . Please allow 24 hours for removal. This e-mail is sent in compliance with the Information Exchange Promotion and Privacy Protection Act. section 50 marked as 'Advertisement' with valid 'removal' instruction. psnwntgdtbgvrnnrvtavxcfmggwvrjiukie From tomjenkins at yahoo.com Fri Sep 6 22:04:03 2002 From: tomjenkins at yahoo.com (Tom Jenkins) Date: Sat, 7 Sep 2002 01:04:03 -0400 Subject: New Top Sites Message-ID: http://humansyn.com
http://mind-brain.com
http://briowebdesign.com
http://tourkiev.com
http://michaeleaton.net


Find more top sites at http://www.goldenwebawards.com/awardwinners.shtml ! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 449 bytes Desc: not available URL: From kestaugwu at mail.com Sat Sep 7 01:38:40 2002 From: kestaugwu at mail.com (MR KESTA UGWU) Date: Sat, 07 Sep 2002 01:38:40 Subject: URGENT ASSISTANCE Message-ID: <200209062339.g86NcbjP021970@ak47.algebra.com> To: THE CHAIRMAN/CEO RE: URGENT ASSISTANCE As a result of bloody fighting between rival rebel groups which claimed so many precious lives notably, I lost my loving wife with my two (2) children, also we Sierra Leone lost the Vice President Leonard Erim on July 2nd 2001. I fled my war torn country to Nigeria for my dear life. The late Erim doubled as chairman precious stones mining corporation where he misappropriated sum of US$40 million he secretly deposited as family Treasures/Fragile Film materials for development with First Fidelity Trust Security Company. Cote D’Ivoire, Abidjan. This misappriopriated money were Synthetically packed into 2boxes of weight 21kg each. But for my knowledge about this deal I made a swift retrieval of some vital documents from the vice president office before he was killed. Amongst documents I retrieved is original certificate of deposit issued Erim by the security Company. Besides, I have lost every property, traveling papers and lived as a refugee. Thank be to GOD I had in my possession the proof of deposit hence I am writing you this proposal for to assist me claim/evacuate this deposit items >From the security company who had standing order from Erim to handover the Boxes to a foreign partner he did not disclosed before he was killed. Based on above, I request you send the following which empower you to Claim deposit as final receiver/partner on my behalf. Thus; 1. Your full name, address, telephone and fax numbers. 2. Copy of your valid driver’s license or any other identification paper. However, for your assistance we share these funds thus; (A.) You get 25% (B.) 5% goes for repayment of likely incur expenditures to actualizing this business. (C.) the balance 70% belong to me receivable only on my visit to your country after this deal. Finally, be advised that strict adherence to confidentiality & honesty is very Important for this our deal to succeed therefore, I guarantee 100% risk free arrangement. I await your urgent reply {adamsofos at yahoo.com } My regards, Kesta. From gabe at seul.org Sat Sep 7 01:39:46 2002 From: gabe at seul.org (Gabriel Rocha) Date: Sat, 7 Sep 2002 04:39:46 -0400 Subject: [labs@foundstone.com: Foundstone Labs Advisory - Remotely Exploitable Buffer Overflow in PGP] Message-ID: <20020907043946.A18350@seul.org> ----- Forwarded message from Foundstone Labs ----- From lucrative_1 at yahoo.com Sat Sep 7 11:08:36 2002 From: lucrative_1 at yahoo.com (Ragnar) Date: Sat, 7 Sep 2002 11:08:36 -0700 (PDT) Subject: Privacy/anonymity charities Message-ID: Liberty Impact ( http://www.libertyimpact.com )is a knowledge-based organization and newsletter that promotes privacy and liberty. Donations to Liberty Impact can be made via a 501(c)(3) organization called United Support for Humanity ( http://www.unsh.org ). USH gives to organizations that support teaching, scholarship, etc. > To: cypherpunks at lne.com > Subject: Privacy/anonymity charities > Sender: owner-cypherpunks at lne.com > > The company I work for has a charitable donation matching > program. Do you > have any suggestions for organizations with 501(c)3 status who > would be > worthy recipients of a donation? I have EFF and EPIC on my > list. Are there > others doing things to protect anonymity and privacy rights? > > I am more interested in actively working on developing ways of > securing > people's anonymity, rather than lobbying or litigation > organizations. I > think that the two I have above cover the latter nicely. > > TIA. > > --- end forwarded text > > > -- > ----------------- > R. A. Hettinga > The Internet Bearer Underwriting Corporation > > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and > antiquity, > [predicting the end of the world] has not been found agreeable > to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman > Empire' > ===== Regards, Ragnar CFO - http://www.gold-age.net Liberty Impact! Check out this free, hard-hitting weekly newsletter about privacy, liberty, offshore banking, tax avoidance & digital currencies. http://www.libertyimpact.com Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From promotions at searchnshop.com Sat Sep 7 11:40:36 2002 From: promotions at searchnshop.com (Search n' shop) Date: Sat, 7 Sep 2002 11:40:36 Subject: <<<:::...Get your site noticed...:::>>> Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3063 bytes Desc: not available URL: From ben at algroup.co.uk Sat Sep 7 05:04:58 2002 From: ben at algroup.co.uk (Ben Laurie) Date: Sat, 07 Sep 2002 13:04:58 +0100 Subject: Wolfram on randomness and RNGs References: <200209070655.g876ttA22349@artifact.psychedelic.net> Message-ID: <3D79EB6A.6070201@algroup.co.uk> Eric Cordian wrote: > Steve Schear writes: > > >>Stephen Wolfram's book, "A New Kind of Science," is nothing if not >>interesting. This encyclopedia-sized volume traces how his fascination >>with cellular automata, beginning in the 1970s, led him to spend decades >>exploring the significance of complexity created from simple rules. > > > I bought a copy the day it came out. It's an interesting read, but as far > as I can tell, contains nothing of startling import. It contains not a > single proof. It merely suggests that Cellular Automata are sufficiently > rich to model any physical process, and maybe someone, someday, will use > them for that purpose. > > Then again, so are Turing Machines. Conway proved long ago that cellular automata can model Turing machines (see "Winning Ways", Berlekamp, Guy and Conway (in some order I forget) for the proof - and many other amusing distractions). Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff From measl at mfn.org Sat Sep 7 12:33:51 2002 From: measl at mfn.org (J.A. Terranson) Date: Sat, 7 Sep 2002 14:33:51 -0500 (CDT) Subject: seeking information for Wired News article In-Reply-To: Message-ID: <20020907135414.H41870-100000@greeves2.mfn.org> Why, after reading the questions presented below, think that Danit is the *wrong* person to be writing this article? On Fri, 6 Sep 2002, R. A. Hettinga wrote: > --- begin forwarded text > > > Status: RO > From: "Danit Lidor" > To: > Subject: seeking information for Wired News article > Date: Fri, 6 Sep 2002 13:19:21 -0700 > > Hi there, > > I am a reporter at Wired News. We received notice of the upcoming > Cypherpunks10th anniversary bash. I am thinking of writing a short article > about the history and current status of the cypherpunk community. Note that the term "community" here, while probably not accurate in the strictest sense, is certainly a *LOT* more accurate than the implied term "organization", which the vast majority of your questions approach. Cypherpunks are "organized" only in the sense that "they" manage to get their shopping done when they run out of food. There are CP's who fall all over the 4 corners of the political spectrum, and all over the physical world. Realisticaly, about the only thing that they all have in common is a strong interest in crypto, and a native suspicion for most forms of "authority". > Obviously, things have changed a lot in the last 10 years. I imagine that > you and other cypherpunks would have much to say on the topic. Please feel > free to rant and rave to me about whatever you feel would be relevant to > this kind of article. Now you've done it: expect 700 emails per day from MattD :-( > When did the Cypherpunks come into existence? When did Humanity come into existence? I'm serious here: CP merely utilized a new communications medium. > Who were the founding > members? Here we go with the "membership" thing again - You have it Completely Wrong. There are no "members", there is no "leadership", there is no "Following" or "Group". CP's are individuals who happen to identify themselves as CP's - period. > What was the inital purpose? The purpose? You mean "What does The Group want to accomplish"? See above. > What kinds of people are involved? Doctors, Lawyers, Mathematecians, Felons, Druggies, Anti-druggies, Anarchists, Libertarians, Right-Wing-Fanatics, Left-Wing-Fanatics, Teachers, Housewives, Househusbands, students, cops, criminals... > Who (socially, i mean, not names!) exactly are the members of the group? Agains, there IS NO GROUP. I'm not trying to be cute here - THERE IS NO GROUP. The whole concept of "group" is flawed in this context. > How many at any one time? Anyone's guess. I personally know a bunch of folks who follow CP who do so only out of curiosity: do I count them "in"? How about all the federal agents who subscribe to the CP lists? Getting the drift? > Is it a rotating membership, with people coming and going? No. There is no "Membership". > There has been a substantial amount of press dedicated to the Cypherpunks, > what's been the community response? Varied. Like the press itself. Like the CP's themselves. It is not possible to place CP into any cubbyhole. > Have their been internal discussions about the repercussions of the media's > involvment and the like? OooOoOooohhhhh.... "Internal Discussions"! I like that: it implies that (radical) Group thing again... :-( > WN has had a very familiar relationship with the cypherpunks - has it been > viewed as a positive thing? By some, and not others. > Have the ideals of the group changed over the years? Sorry Kemosabe: most of the folks who refer to themselves as CP's are less than "idealists". And, since there IS NO F*@#$ GROUP, this question is irrelevant. > Are there any manifestos Many: Google Is Your Friend. > or official statements "Official Statements"! That's rich!!! Tell you what - take one from Column-A, and one from Column-B, where each column is the source of your choice, and I'll [personally] acknowledge them as the Official Statements of Whomever You Like. > from the group that I can > access? > > What are the future plans for the cypherpunks? I guess you should ask each CP individually. Personally, my long term plans are to Get Out Of Dodge (USA), before it turns into Germany in 1941. My short term plans are to try and educate as many persons "in authority" as possible in How The Real World Works, and as many persons NOT "in authority" in How The Real World Works. > I attempted to access cypherpunks.com but most of the links are dead, why > isn't anyone maintaining it? Maybe if someone were to form a CypherPunks GROUP, they would get maintained? > Or is it unrelated to the current community? > > With whom else are the cypherpunks allied? [I actually had to take a moment to wipe the tears of laughter from the question] Nobody. Any such "alliance" would require a Group Consensus - something which is just patently impossible. If you ever find two CP's who can agree on enough to come to a broad Consensus, you let me know so I can mark it on my calendar. > What do you, personally, have to say about the future of the Internet, > privacy, legislation, hacking, phreaking, cyber terrorism, the governement. > etc? Now *there* are questions I can answer. Internet: Growth will continue, but the Vanillazation will also continue. It's a sorry (but inevitable) thing that once Big Business And Government discover a communications medium it is reduced to it's most Vanilla form. Privacy: ..will continue to be stripped from the world as a whole, and the American world in particular, until some critical mass is reached, and people again enter into the endless cycle of armed revolt. Legislation: ...will continue to be passed solely for the benefit of the legislators and their maggot financial backers, until some critical mass is reached, and people again enter into the endless cycle of armed revolt. Hacking: I assume you are refering to "Cracking" here... It too will continue, as it always has (before Cracking there was Phreaking. Before Phreaking the was Ham Radio?). It's the allure of the Forbidden Fruit. Phreaking: According to my LEO contacts, phreaking is not only on a fast rise, it is also a concern WAY above cracking. . Cyber-Terrorism: Gawd, I just LOVE this concept! In the mid 80's, one of my employers used this concept to sell services to The Fedz - nothing's changed. Of the Eight Critical Infrastructures identified by the USG, I personally find it very difficult to believe that seven of them are vulnerable to any societally significant "attack". This is a hilarious concept used to sell congresscritters and their military counterparts on pork. > and finally, who else should I be talking to? Joe Sixpack. Jane Doe. George Bush. CP's are everybody and nobody. CypherPunks Are People Who Give A Shit. > Thanks for your time. I am hoping to get the story done before the end of > next week (i.e. before the actual party.) Of course, I would never publish > the location of the party or any other information that you don't feel > comfortable about. Most CP's wont be there - they wouldn't want to associate with any group of people (note the lowercase "group") who would accept them as a "member"... > > Danit Lidor > I am also available at 415.276.3925. please leave me a message if I'm away > from my desk. I am more than happy to call you back. > > --- end forwarded text Yours, J.A. Terranson sysadmin at mfn.org -- If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place... -------------------------------------------------------------------- --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From rah at shipwright.com Sat Sep 7 15:39:26 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 7 Sep 2002 18:39:26 -0400 Subject: Privacy/anonymity charities Message-ID: --- begin forwarded text From profrv at nex.net.au Sat Sep 7 02:54:24 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 19:54:24 +1000 Subject: Prosecutors' Contention That Hotmail E-mail Is "Extremely Difficult To Trace" Message-ID: <5.1.0.14.0.20020907195344.009f8500@mail.nex.net.au> > > > >>: Always make erasing unneeded data a regular practice, if you want to > keep your computers. --digsig James A. Donald << > >http://www.geocities.com/CapitolHill/2374/reign.html > >Eraserhead. > >http://www.geocities.com/CapitolHill/2374/bait.html > >Switch hitter > >http://www.geocities.com/SoHo/9879/jamesd.html > >The sea will tell From profrv at nex.net.au Sat Sep 7 03:22:52 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 20:22:52 +1000 Subject: Wolfram on randomness and RNGs, Message-ID: <5.1.0.14.0.20020907200853.00a0aec0@mail.nex.net.au> I KNOW WHAT YOU'LL DO NEXT SUMMER What do galaxies, stockbrokers and style gurus have in common? A set of numbers that describes everything they do. Does nature's hidden program mean we're all deeply predictable, asks John Casti Cover story dead tree New Scientist magazine.31 August 02. Wolframs patterns,fractals,elliot waves,fibonacci waves,all working against 'free will'. And the sheeple looked up... http://www.newscientist.com/inprint/previous/20020831.jsp A proposal was floated in 2000/1 of pulling random bursts off various broadcasts just prior to sending message,system would rely on satellites and be quite expensive,its since been superceded as an expensive technical proposition by http://www.idquantique.com/ NATURE REPORTS ON QKD AND id QUANTIQUE "Quantum cryptography: Can you keep a secret?" In its issue of July 18, Nature reports on the first steps towards commercializing Quantum Key Distribution systems.Bitch slap me if you look like Jessica Stern. From profrv at nex.net.au Sat Sep 7 04:10:56 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 21:10:56 +1000 Subject: War Games Gulf style. Message-ID: <5.1.0.14.0.20020907210656.00a0ac20@mail.nex.net.au> Wake-up call Article based on an interview with retired Lt Gen Paul Van Riper, the 'wily 64-year-old Vietnam veteran' who 'sank most of the US expeditionary fleet in the Persian Gulf' during a recent war game organised by the Pentagon - ' "You're going to have to use cellphones and satellite phones now, they told me. I said no, no, no - we're going to use motorcycle messengers and make announcements from the mosques," he says. "But they refused to accept that we'd do anything they wouldn't do in the west." ' ( Guardian ) See also this Army Times article from last month, and this transcript of a US Defense Dept briefing from last month.LINKS http://www.hullocentral.demon.co.uk/site/anfin.htm The Troubling New Face of America 'We have ignored or condoned abuses in nations that support our anti-terrorism effort, while detaining American citizens as "enemy combatants," incarcerating them secretly and indefinitely without their being charged with any crime or having the right to legal counsel. This policy has been condemned by the federal courts, but the Justice Department seems adamant, and the issue is still in doubt. Several hundred captured Taliban soldiers remain imprisoned at Guantanamo Bay under the same circumstances, with the defense secretary declaring that they would not be released even if they were someday tried and found to be innocent. These actions are similar to those of abusive regimes that historically have been condemned by American presidents' ( Jimmy Carter via Washington Post ) 'Donahue' for Sept 5 Transcript of yesterday's edition of Donahue, a US public affairs programme, during which investigative reporter Greg Palast was interviewed about the electoral assistance George W Bush is giving his brother Jeb in Florida ( MSNBC ) The Florida state pension fund is heavily invested in Enron, apparently (for the record I can't stand Donahue/Carter but we are in a 'kingdom of fear.') From profrv at nex.net.au Sat Sep 7 04:23:36 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 21:23:36 +1000 Subject: Worry about Kinko Rats. Message-ID: <5.1.0.14.0.20020907211813.00a0b540@mail.nex.net.au> "...I'm less worried about bin Laden's gang attempting to bring down the Internet than I am about these rats finalizing their next plot via instant messages sent from rented computers at Kinko's...." http://news.com.com/2010-1071-956823.html?tag=fd_nc_1 "...Considering how panicky this nation can become during times of crisis--remember the Palmer Raids of the early 1920s and the internment of Japanese-Americans during the Second World War?--this isn't an idle concern..." Anniversary of Palmer raids yesterday,see Daily Bleed. "Extraordinary times call for extraordinary measures" Up to now, all strategies have failed if we are determining their success as achieving an anarchist social revolution that completely wipes out the state and capitalism forever across the globe.APster; who do you want to kill today? From profrv at nex.net.au Sat Sep 7 05:13:01 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 22:13:01 +1000 Subject: Plea Bargain Blackmail rejected in Hartford. Message-ID: <5.1.0.14.0.20020907221135.00a0b2d0@mail.nex.net.au> http://www.infoshop.org/inews/stories.php?story=02/09/05/7640999 They're not in quite as much danger as Camilo but still in need of support -- people should at least be aware of them, as well as the Long Beach folks and Camilo. ================== "And then there were three... Hartford 18 holdouts prepare for trial" By Chris Harris Published 09/05/02 in the Hartford Advocate Last October, more than 300 anti-war demonstrators took to Hartford's streets, in opposition to United States military actions against Afghanistan. But what started out as a peaceful demonstration at Bushnell Park -- its participants students from UConn, Central Connecticut State University, Yale, and Wesleyan, as well as several local activists -- ended in front of Constitution Plaza, with pepper spray, beatings, and the arrests of 18 people, seven on charges of inciting to riot. Nearly a year later, three of those 18 demonstrators have yet to plead out, and say they will take the matter to trial. Dave Bonan, 24, Jason Cappell, 23, and Max Greene, 19, were in Hartford Superior Court last Tuesday, represented by New Haven attorney Norm Pattis. Each has appeared before a judge several times since the protest. Bonan, Cappell, and Greene -- all wearing pins that read "Defend the Hartford 18" -- told the Advocate they've been offered numerous chances at a plea bargain but have refused. The charges against them range from interfering with police and inciting to riot, a felony, to disorderly conduct and trespassing. A date for their trial has been set for October 15. "These boys," says Pattis, "refuse to buckle." Accepting the plea bargain would mean admitting blame, something these three holdouts don't want to do. They say the worst crime they committed on October 25 was blocking traffic, staying in the street when ordered by police to get out, and marching without a permit. The demonstration marched along various streets, and approached Sen. Joe Lieberman's office at One Constitution Plaza on Market Street. Throughout, police in cars and on foot tried to divert the demonstration off the streets and onto the sidewalks. Police patience had worn thin by the time the mob made it to Lieberman's office. Police bumped, elbowed, and shoved some of the demonstrators onto the sidewalk. Then, police started blasting the crowd with pepper spray. The Hartford 18 were grabbed in choke holds, and dragged off to patrol cars. At the time, a police spokesman described the crowd as "rowdy," claimed they were banging on police cars and chanting "anarchy now" and "attack the police!" The arrests began only after marchers had ignored police orders for 45 minutes, police say. This reporter, who was present from start to finish, saw no such provocation. "I didn't do anything," says Greene, a sophomore at Wesleyan. "If I accepted a diversionary program, it would be admitting guilt." All three say they feel more like victims in this case, not criminals. They're confident a jury will rule in their favor. "It's kind of difficult to comprehend that 18 of us got arrested at a peaceful protest," says Greene. The rest of the Hartford 18 accepted the state's plea offer for accelerated rehabilitation -- a brief form of probation that results in a dismissal of the case. If they're able to stay out of trouble during that probationary period, the charges will be cleared from their records. Pattis says his clients could see some jail time if found guilty. How much jail time depends on the judge, he says. No minimum period of incarceration is associated with the charges pending against his clients. While he wouldn't comment specifically about his plan of attack for this case, Pattis did say he'll introduce video footage of the demonstration shot by Greene as part of his defense. This evidence, he suspects, will be "pivotal" to the outcome of the trial. "It shows this was a police riot," says Pattis. "These were people engaged in protected speech, and it would be a disaster for them to be convicted of anything." Pattis says his clients "represent the very best of what this country is all about," and added that any witness "the state puts up will become our witness on cross-examination." None of the three would comment on whether or not he is planning to sue the city or its police department. Greene says he's experienced psychological trauma as a result of the police riot and still has recurring nightmares about the experience. ### Posted for fair use. http://www.newmassmedia.com/nac.phtml?code=har&db=nac_fea&ref=21900 Comment www.infoshop.org From profrv at nex.net.au Sat Sep 7 05:34:10 2002 From: profrv at nex.net.au (Matthew X) Date: Sat, 07 Sep 2002 22:34:10 +1000 Subject: What Kind of man has a pussy? Message-ID: <5.1.0.14.0.20020907222815.00a0b9e0@mail.nex.net.au> Who let the cats out? and what's with the Merc? Wasn't it in the 60's you had a small German car,the 70's you had a small German gun and the eighties, a small German boy? Hang on to something long enough I guess... Has Mongo been hanging on to his sausage too long? Searching for the perfect man, Kathy Lette takes a butcher's at what's on offer. http://smh.com.au/articles/2002/09/06/1031115934706.html Throw another shrimp on the barbie for me mate. From profrv at nex.net.au Sat Sep 7 08:41:25 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 01:41:25 +1000 Subject: Local Support for Jim Bell quoting Anarchists free speech trial. Message-ID: <5.1.0.14.0.20020908013554.00a00ec0@mail.nex.net.au> http://www.melbourne.indymedia.org/front.php3?article_id=33127&group=webcast MELBOURNE URGENT SUPPORT free speech trial MATT TAYLOR 11 SEPT. Who's attending? by Joanna 10:53pm Sat Sep 7 '02 (Modified on 11:41pm Sat Sep 7 '02) article#33127 address: http://melbourne.indymedia.org/display.php3?article_id=32685&group=webcast bpossum at hotmail.com URGENT ACTION NEEDED IN MELBOURNE to support person facing potential extreme miscarriage of justice, and to uphold freedom of speech. "On sept 11 the police are charging a mentally disabled man with threats to kill them. One was a comment to a post made here on May 8 and another on june 1 of 01." Matt Taylor could be jailed for 20 years. MORE ON www.indymedia.org Melbourne au actually I just found out its 5 years max from my lawyer. From profrv at nex.net.au Sat Sep 7 09:51:56 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 02:51:56 +1000 Subject: Indyjournos a go go. Message-ID: <5.1.0.14.0.20020908024940.009fae00@mail.nex.net.au> http://www.indymedia.org/front.php3?article_id=202052&group=webcast Four filmmakers - one from IMC South Africa, 2 from IMC Italy and one from IMC New York, narrowly escaped arrest in Cape Town, South Africa this morning. The 4 were filming a strike by privatised water workers at the request of the workers. Workers were fearing the heavy police presence and harassment during their strike. The 4 IMC people were arrested and then de-arrested. An autonomist lawyer was negotiating with cops on the phone when the 4 saw they were about to be arrested again. They got into their cars. The cops shouted to the security to keep the gates of the water plant locked. The four intrepid filmmakers were then forced to bust through the gates in their cars, having to bash them five times. One got everything on film! Expect a preview soon. Unfortunately after this the workers were all arrested. It seems they have been taken to a far away cop station to prevent their friends, the Mandela Park Anti-Eviction Campaign, from marching on the police station. However, as they are SA Municipal Workers Union members the union should be able to get lawyers to get them out today. WHAT YOU CAN DO TO HELP: Especially in France - please hold protests at Suez Lyonnaise offices. This is the worlds worst water multinational. They did terrible things like raise prices 300% in Buenos Aires and cut off to the poor. We need to expose them internationally. It is not for nothing that the Cape Town workers are striking partly over poor wages but also to have the plant nationalised. Please publish to the South Africa Indymedia site details of your protest - we will pass the info on to workers. To contact the workers in custody call Max on +27 73 1546555 Independent Journalism,its not a job,its an ADVENTURE. From profrv at nex.net.au Sat Sep 7 10:03:22 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 03:03:22 +1000 Subject: Corruption Cali style,encrypted donations needed. Message-ID: <5.1.0.14.0.20020908030032.00a036d0@mail.nex.net.au> LA Film Permit System Investigated for Possible Fraud Almost everyone in the porn industry can relate to this in some degree. Those pesky permits. You know the ones- LA's ritual form of blackmail that keeps the cops off your back. And God forbid if you don't have one. Well you might just get a visit from the constabulary during a shoot and have your tapes impounded. Then you have to go to court. Yadda yadda yadda. And it's a real pain in the ass. Well guess what? All that money you've been paying has gone to support the lavish lifestyle of LA's bureaucrats. The LA Times broke the following story Saturday. Move over Enron and WorldCom. Move over John Rigas. L.A. Film Permit Agency Is Target of Investigation: Lavish spending and political donations by officials of the quasi-public body lead to raids. The Times reports an investigation of the Entertainment Industry Development and its alleged misuse of public funds by lavishing exorbitant tips at restaurants, sending its executives on Caribbean jaunts and donating money to politicians who sit on its board. The Entertainment Industry Development Corp., whose board includes the entire Los Angeles City Council and county Board of Supervisors, gets its $3-million budget from permit fees that would otherwise go to public coffers. An investigation by the district attorney's office, with the assistance of county auditors, led to a Wednesday night search of the agency's offices and the home of its president, Cody Cluff. Financial documents and computer disks were seized. Prosecutors said Cluff, 43, charged $500,000 worth of personal expenses, steered funds to his children's school, and perjured himself on state documents he signed denying that any of EIDC's directors profited from the agency. Cluff's attorney, Tom Brown, said his client and the EIDC have cooperated with investigators. Cluff has done nothing wrong, he said. "EIDC entertains and markets the film industry," Brown said. "We believe that when we've had an opportunity to explain its business and what we've done, both EIDC and Cody Cluff will be fully vindicated." Records show that the agency contributed nearly $200,000 to politicians, including more than a dozen who sat on its board. No charges have been filed. County auditors said the search warrant was sought after the agency refused to turn over financial records this summer. "They've been fighting giving us information," said Pat McMahon, the county's assistant auditor-controller. Auditors found that Cluff, a former deputy mayor under Riordan, received more than $50,000 in direct payments from EIDC to his personal American Express card. Prosecutors found more than $40,000 in charges for Laker basketball games and other sporting and concert events, and $20,000 in cashier's checks from the EIDC to Cluff. Cluff charged the EIDC for his membership in the Grand Havana Room, a Beverly Hills cigar club that lists a $3,000 initiation fee and a $200 monthly charge. Auditors also noted "numerous payments for meals and bar [alcohol] tabs at exclusive restaurants and clubs, often incurred late at night or early in the morning," where Cluff sometimes signed for tips equal to 100% of the bill. Court papers also state that Cluff, who had once worked as an auditor, used $40,000 in EIDC money to pay for trips to Georgia, as well as Utah and France--where two of the world's biggest film festivals, Sundance and Cannes, are held. Prosecutors said Cluff and another EIDC executive traveled to the Caribbean at agency expense. Court papers said the EIDC gave money to the school that Cluff's children attend, and list a $5,000 contribution to Covina High School. The office also paid $341,000 to an Internet company run by one of its 45 board members. State records show that the EIDC has contributed $194,000 to political committees since 1998. The recipients include more than a dozen politicians who at the time were sitting on the group's board. Jackie Goldberg, who represented Hollywood on the Los Angeles City Council and now represents the region in the state Assembly, received at least $15,500, the largest amount. The EIDC also contributed $10,000 to the anti-secession campaign run by Mayor James K. Hahn, an EIDC board member. On Friday, secessionists called for an investigation by the city ethics commission into a possible conflict of interest by Hahn. "It's absolutely appalling," said Gene La Pietra, head of the Hollywood secession effort. Kam Kuwata, Hahn's consultant on the anti-secession campaign, said Friday the mayor solicited the contribution but that there is no conflict. From profrv at nex.net.au Sat Sep 7 10:09:46 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 03:09:46 +1000 Subject: Sites under Threat. Message-ID: <5.1.0.14.0.20020908030538.00a03500@mail.nex.net.au> Ten Porn Websites Were Threatened in Granholm Letter Michigan's attorney general Jennifer Granholm threatened at least ten porn websites with legal action in last week's guilt by association letter that was sent to iBill, a website billing company. Frankiesangels.com was one of them. The other nine are identified in that letter. Frank Bongiorno says iBill has now assured him that they would support him in any legal action against Granholm. Bongiorno says attorney Jeffrey Douglas has referred him to a free speech attorney in Michigan. "I've gotten a proposal on what the costs might be and we're going to try and generate some funds for this legal endeavor," says Bongiorno. "We're going to go after her for defamation of character and do it in a way that creates as much publicity as possible. We want to get this on CNN and MSNBC; we want to get this story any place we can possibly get it. We're going to keep plugging away until she gives us a public apology, recants what she said and pays us for our losses." According to Bongiorno, the webmasters of the other nine sites being targeted are reluctant to go public. "I don't know why," he says. "That doesn't make any sense to me. Adult webmasters aren't known to be the best businessmen in the world." The ten companies are listed in the threatening letter sent from Granholm to iBill. Granholm specifically states that the companies are "engaged in the promotion and distribution of child pornography" - a libelous accusation if there were ever legal grounds to sue. Granholm accuses iBill, vis a vis, of aiding and abetting the distribution of child pornography and that their conduct will result in prosecution. iBill is ordered to cease and desist in its activities. Bongiorno said on advice of Jeffrey Douglas he'd be breaking the other adult companies' rights to privacy by divulging their names from the letter. The companies include gay sites, fetish sites and straight. "Mine stands out like a sore thumb," Bongiorno says. "The other ones are pretty hardcore urls. Frankiesangels seems out of place on the list." In au the daily planet,a legal brothel has been ordered to pull alleged 'ads' off the web as they can be printed out in Victoria.The Judge joins a list of aussi Canutes that includes state attorneys of NSW and SA.Also the Federal Minister has had some flak for being a bull in an internet china shop.('cept the damge is being routed around) From cypherpunks at Algebra.COM Sun Sep 8 01:35:57 2002 From: cypherpunks at Algebra.COM (cypherpunks at Algebra.COM) Date: Sun, 08 Sep 2002 03:35:57 -0500 Subject: Young, Dumb and Full of ... Message-ID: <9X18PG6823RM.SKBN8P3G7D.cypherpunks@algebra.com> Snapping Tight Lesbian Teens Best of All They're FREE http://www.freehostclub.com/~athree/u001s34/index.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1592 bytes Desc: not available URL: From profrv at nex.net.au Sat Sep 7 11:23:30 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 04:23:30 +1000 Subject: APB on killer of Timothy Thomas. Message-ID: <5.1.0.14.0.20020908041309.009ff520@mail.nex.net.au> RACIST WANTED FOR THE MURDER OF TIMOTHY THOMAS IN CINCINNATI by October 22 Coalition Sat Sep 7 01:14:14 PDT 2002 APB: http://www.raisethefist.com/news.cgi?artical=wire/----985950picture.jpegIMG.article Photo of suspect,all suspects are innocent until proven APtargets. APB: http://www.october22.org Does David Boren need killing? I ask you,who do you want to kill today? http://www.pbs.org/newshour/bb/fedagencies/july-dec02/intelligence_9-5.html From profrv at nex.net.au Sat Sep 7 11:28:42 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 04:28:42 +1000 Subject: Warchalking? Message-ID: <5.1.0.14.0.20020908042755.00a09b20@mail.nex.net.au> Chalking It Up To Experience Graphic artist Sean McDonough, a 34-year-old Canadian citizen, doesn't seem like a security threat. He's polite, soft-spoken, clean-shaven, and owns a one-bedroom condo in an exclusive downtown Toronto neighborhood. But on Wednesday night, when McDonough arrived by Greyhound bus at the Buffalo, N.Y., Peace Bridge border checkpoint – on his way to participate in Sunday's Kennedy Center Open House Arts Festival – he was denied entry and sent packing back to Toronto. "Everybody got off the bus and went into the waiting area. I was pretty well held over while everybody else was allowed to go ahead," McDonough told us yesterday, a couple of hours before making his second attempt to cross the border in order to take part in Edwin Fontanez's Washington Chalk Festival, a Kennedy Center tradition. "I answered a lot of questions. I showed them my sketchbook. When I said I was going down for a chalk drawing festival, the lady got very suspicious. She said, 'Are you going to sell any of your art?' And I said no. She said, 'How do I know that?' And I said, 'I guess you'll have to take my word for it.' And so they rejected me." We tried to obtain an explanation from the appropriate federal officials. McDonough said he noticed the blue uniforms and sidearms of U.S. Customs officers, but a Customs Service spokesman sent us to the Immigration and Naturalization Service. The INS told us Customs was responsible. "He's an artist: If he says they were wearing blue uniforms, that's good enough for me," an INS public affairs officer said. But then Customs insisted that INS did the deed. "This is not the first time that Customs has bounced something back to us," the INS flack responded. But later we were told, confidentially, that the INS had filed an incident report describing its role. Department of Homeland Security, anyone? From profrv at nex.net.au Sat Sep 7 11:29:20 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 04:29:20 +1000 Subject: Anne thrax needs an asslift. Message-ID: <5.1.0.14.0.20020908042617.00a02270@mail.nex.net.au> Is Human Uzi Ann Coulter 38 or 40 years old? And when she insists that she's the former, is she telling a fib? The right-wing media scourge – who has been getting plenty of ink for her best-selling book, "Slander: Liberal Lies About the American Right" – frequently scorches hapless reporters who dare write that she's no longer in her thirties. Newsday's Aileen Jacobson – who was planning to rely on numerous published accounts, including People magazine's, that Coulter is 40 – let her subject argue her into using the younger age in a recent profile. "Media accounts that she's 40 are wrong, she maintains," Jacobson wrote. But yesterday Jacobson told us: "I do believe that she is 40." London Telegraph writer Toby Harnden, meanwhile, wrote in his July 19 piece: "An air of mystery surrounds Coulter's age. She says she is 38 but her publicist puts her at 40. After the interview, she sends me an e-mail: 'I think you should go with one of the incorrect younger ages.' " Ann Coulter: 38 and holding firm? (Dayna Smith - The Washington Post/File Photo) Our own investigation revealed that: * Coulter's Connecticut driver's license lists her birth as December 1961. * Her D.C. driver's license, acquired many years later, says she was born in December 1963. * The birth date on file at the New Canaan, Conn., voter registration office is Dec. 8, 1961. In an effort to clear up all this confusion, a member of The Post's crack research team phoned the New Canaan registrar of voters, who chuckled, checked his records and reported that Coulter registered to vote in 1980, when presumably she was the legal minimum voting age of 18. That would make her 40 today. But when we reached Coulter, she predictably stuck to her guns. "It's like the difference in being thrown off the 13th floor or the roof," she e-mailed us. "So the upside is, I'm two years younger than at least some newspapers have said I am, but the downside is, I'm still 38. Yikes!" My only regret with Osama bin Laden is that he did not manage to kill every member of the Wall Street Journal editorial staff." "In this recurring nightmare of a presidency, we have a national debate about [George W. Bush's stolen presidency].... Otherwise there would be debates only about whether to impeach or assassinate. MORE ABOUT... Eric Alterman Media Analysis "We need to execute people like Ann Coulter in order to physically intimidate conservatives, by making them realize that they can be killed too. Otherwise they will turn out to be outright traitors." First things first: Mr. Ashcroft, if you're there, I do not mean any of the statements above to be taken literally. I do not mean them at all. None of them. OK? What I do mean is to point out the incredible hypocrisy of those on the right, the center and the "liberal media" who defend the lunatic ravings of Ann Coulter, whether because she is "kidding" or because "the left does the same thing." (For those who have been lucky enough to have missed the Coultergeist of the past few months, the author of the summer's number-one bestselling nonfiction book in America has--in language identical to that above--expressed her regret that Timothy McVeigh did not blow up the New York Times building, mused aloud whether Bill Clinton should have been impeached or murdered, and called for the execution of John Walker Lindh in order to intimidate liberals.) It's degrading to have to write about Coulter again. As a pundit, she is about on a par with Charles Manson, better suited to a lifelong stay in the Connecticut Home for the Criminally Insane than for the host's seat on Crossfire. Her books are filled with lies, slander and phony footnotes that are themselves lies and slanders. Her very existence as a public figure is an insult to our collective intelligence. I should really be writing about the campaign by neocon chickenhawks to intimidate Howell Raines and the New York Times on Iraq. But fortunately, John Judis and Nick Confessore have taken responsibility for that, leaving me to the less ominous but more baffling phenomenon of the bestselling Barbie-doll terrorist-apologist, who continues to be celebrated by the very media she terms "retarded" and guilty of "mass murder" while calling for their mass extinction by the likes of her ideological comrade Timothy McVeigh. Make no mistake. Coulter may routinely call for the murder of liberals, of Arabs, of journalists, of the President, among many others. She may compare adorable Katie Couric to Eva Braun and Joseph Goebbels and joke about blowing up the Times building. But instead of ignoring, laughing at or, perhaps most usefully, sedating her, we find Coulter's blond locks and bony ass celebrated by talk-show bookers and gossip columnists--even a genuine book reviewer--from coast to proverbial coast. Do I exaggerate? While promoting her hysterical screed against "liberals"--a category so large she occasionally includes, I kid you not, Andrew Sullivan--this malevolent Twiggy with Tourette's was booked on Today, Crossfire (as guest and guest host), Hardball, The Big Story With John Gibson and countless other cable and radio programs. She was lovingly profiled in Newsday, the New York Observer and the New York Times Sunday Style section. She was the Boston Globe's honored guest at the White House correspondents dinner. Her incitements to murder and terrorism have been cheered and defended in the Wall Street Journal and National Review Online. (The latter did so, moreover, despite her having termed its editors "girly boys" and behaving, in the words of the website's editor, Jonah Goldberg, "with a total lack of professionalism, friendship, and loyalty.") And her publisher, Crown, says it has no plans to correct her lies in future editions. Why should they care? Is anyone holding them accountable? The slanderous nonsense she puts between hard covers, moreover, is selling not only to the caveman crowd, it's also receiving praise in such respectable outlets as the liberal LA Times Book Review and being quoted as constitutional gospel by alleged intellectual George Will on ABC's This Week. This despite the fact that Coulter's accusations have been as effectively discredited as Hitler's diaries. (The last time I checked, the folks at Tapped, the American Prospect's weblog, had compiled so many of these falsities it took them nearly 3,000 words to enumerate them. Coulter has also been ripped to shreds by dailyhowler.com, spinsanity.com, mediawhoresonline.com, Scoobie Davis Online and by Joe Conason in Salon. The most comprehensive compilation can supposedly be found at slannder.homestead.com. I cannot bring myself to actually wade into it.) So what's the deal? Is looking like an anorexic Farrah Fawcett and wearing skirts so short they lack the dignity and reserve of Monica Lewinsky's thong enough to insure the embrace of the national entertainment state no matter what you say, just so long as your murderous bile is directed at "liberals"? Would it have worked for Saddam if he wore a size 6? I really don't know. Naïve optimist that I am, when I first picked up Coulter's book in galleys in the late spring, I felt pretty certain we were done with her. I mean, how even to engage someone who terms Christie Todd Whitman a "birdbrain" (page 51) and a "dimwit" (page 53); Jim Jeffords a "half-wit" (page 50); and Gloria Steinem a "deeply ridiculous figure" (page 37) who "had to sleep" with a rich liberal to fund Ms. magazine (page 38)--all of which makes her "a termagant" (page 39)? Coulter's done far worse since, of course, and yet, like one of those Mothralike creatures that feed on bullets and squashed Japanese villagers, the monster continues to grow, debasing everyone and everything in its wake. Coulter jokes about McVeigh blowing up the Times, and the Wall Street Journal--which was blown up by terrorists on September 11--rushes to her defense. Their man, Daniel Pearl, was murdered by terrorists in Pakistan. Have they no shame? At long last, have they no sense of decency left? From al at qaeda.org Sun Sep 8 12:22:00 2002 From: al at qaeda.org (Optimizzin Al-gorithym) Date: Sun, 08 Sep 2002 12:22:00 -0700 Subject: research & homeland insecurity Message-ID: <3D7BA357.37F42189@qaeda.org> (sent to AAAS members) Dear AAAS Member: As the anniversary of September 11th approaches, AAAS continues to be engaged in issues that relate to national security and the role of science and technology. One such issue is the safe and responsible conduct of research involving biological agents and toxins. AAAS was recently asked by the Centers for Disease Control (CDC) to assist in alerting our members to the federal mandate (Public Law 107-188) requiring all facilities and persons that possess, use, or transfer agents or toxins considered a threat to animals, plants, animal and plant products and/or public health (called "select agents") to notify the CDC and the U.S. Department of Agriculture. Approximately 200,000 facilities were sent a copy of the notification form by the CDC. The deadline for submitting a completed form to the CDC is September 10, 2002. All entities that receive a copy of the form must comply, even if they do not possess a select agent or toxin. If you are in possession of a select agent or toxin and did not receive a form, you should call CDC's toll-free number: 1-866-567-4232. Further information on the select agent list, procedures for notification, and exemptions can be found at the following websites: CDC: http://www.cdc.gov/od/ohs/lrsat.htm USDA: http://www.aphis.usda.gov/vs/ncie AAAS is initiating an effort to monitor the effects of new national security initiatives on the research community. In that regard, we'd be pleased to hear about your experience, whether positive or negative, in complying with this new federal mandate. You can forward such information to Dr. Mark Frankel, director of the AAAS Program on Scientific Freedom, Responsibility and Law at mfrankel at aaas.org Sincerely, Alan I. Leshner Chief Executive Officer From al at qaeda.org Sun Sep 8 12:54:20 2002 From: al at qaeda.org (Optimizzin Al-gorithym) Date: Sun, 08 Sep 2002 12:54:20 -0700 Subject: police video surveillance of public schools; facerecog too Message-ID: <3D7BAAEB.2EF1539A@qaeda.org> http://www.latimes.com/news/local/la-fi-campus8sep08.story SANTEE, Calif. -- As Mike Brooder pulls into the student parking lot outside West Hills High School, wireless cameras record his face and license plate--doing the same to every car that follows. The cameras then track the 17-year-old senior as he walks up a concrete path, studies his schedule, scratches his chin, waves to friends and then wanders to class. Nearly every move Brooder makes--and every move of his 2,300 classmates--is captured and stored in the campus' database. Following last September's terrorist attacks and years of school shootings, West Hills High sits on the cutting edge of the emerging surveillance society. Each bathroom door is monitored. Sensors that detect the smoke of a single match send alerts to campus security. By Christmas, four more cameras will be installed, and hall monitors will carry wireless computers that can pull up a student's school picture, class schedule and attendance record. School officials are considering whether to expand the SkyWitness surveillance system by adding facial recognition software that will allow a computer to filter out who should--and who should not--be on campus. Technology, once viewed primarily as a learning tool, is building a wall of electronic security on campus. "People are saying they expected this to happen after the shootings and the terrorists last year," said Brooder, an honor student who plays on the school baseball team. "Still, it seems a little overwhelming and extreme." And perhaps likely to become far more common--not just in schools, but everywhere. Schools are among the first to embrace new technology, often because companies view campuses as perfect testing grounds before rolling products out to corporate America. For instance, one of the companies behind West Hills' system, PacketVideo Corp., predicts that demand for products like SkyWitness will grow, as people are tracked at factories, office parks, stadiums--even places such as the Third Street Promenade shopping district in Santa Monica. Companies like the fact that students enjoy fewer constitutional protections than adults and have lower expectations of privacy than their parents. For many students, such surveillance is standard, with cameras at every bank ATM and many fast-food drive-throughs. But the desire to protect has led to an erosion of individual privacy, civil liberties advocates argue. "Once privacy is gone, you can't get it back," said Dale Kelly Bankhead, a spokeswoman for the ACLU of San Diego and Imperial counties. "This is not just about schools, but about a broader social attitude." Relying on such high-tech systems is an unusual move for high schools, but is expected to become a more popular trend in the post-Sept, 11 world, said Kenneth S. Trump, president and chief executive of National School Safety and Security Services, a Cleveland-based consulting firm. At Tewksbury Memorial High School, about an hour outside Boston, the push for security has gone so far as to result in a video-surveillance system that lets both educators--and local police--watch the hallways. "Cameras are everywhere someone wants to watch over," Trump said. The technology at West Hills relies on advanced hardware, but basic, off-the-shelf technology is already used by both parents and educators to watch kids. Software programs can take snapshots of every Web page they visit and every e-mail they send. Devices such as AutoWatch can be popped into an automobile and programmed to record a car's speed, as well as times, dates and the lengths of time it is driven. Cell-phone bills list the calls a student makes and receives. "You might call it control," said Joe Schramm, head of security at West Hills. "We call it keeping the kids safe." Tucked into the scrub-brush valley of Santee, West Hills High appears to be nothing but safe. The average SAT score is nearly 1100, and 70% of last year's seniors are attending either a community college or a four-year institution this fall. But West Hills High has not gone untouched by fear. Less than three miles away, Charles "Andy" Williams went on a shooting rampage last year, killing two students and wounding 13 others at Santana High School. The community was stunned when nearly two weeks later another student launched a shooting spree at a different school in the Grossmont Union High School District. Jason Hoffman, 18, wounded five people at Granite Hills High School in El Cajon. Hoffman committed suicide while awaiting trial. Last month Williams was sentenced to prison for 50 years to life. Despite the violence, the school district was forced to cut its budget across the board; the security group lost three of its 10 employees, including two of the staff members who helped patrol the 76-acre West Hills campus. Hoping to offset the pain of the staff cuts, the district started to look at technology it already had in place on its campuses and explore how the tools could be used for security purposes, said Sue Mangiapane, education global account manager for Cisco Systems Inc. The San Jose computer giant had been hired to install the core routers, switches and servers that formed the computer brain to link campuses with the district's offices and, in turn, to the Internet. Initially, the technology had been designed for instructional use, such as creating digital lockers where students could store their electronic art projects. Then, the focus shifted toward security. At a technology conference this spring, executives from Cisco and San Diego-based PacketVideo began discussing the school shootings and tossing around ideas of how the tragedies could have been avoided. "Schools aren't a key security market for us," said James Carol, chairman and co-founder of PacketVideo, a privately owned software company that creates wireless video networks. The company, along with Cisco and Sony, donated the equipment and handled the installation of the $50,000 SkyWitness system. "This was the right thing to do for a school that's essentially in our backyard," Carol said. The project at West Hills also provided the technology companies with a test lab in which to develop and try out a security system that the firms will ultimately market to corporate America and government agencies. Already, PacketVideo's software is used by cell phone and technology firms such as NTT DoCoMo in Japan and Siemens AG in Germany, and tapped for private security projects. Tech firms such as Microsoft Corp. and Apple Computer Co. have a long history of donating software and hardware to schools. The motivation is partly the push to be a corporate good citizen and partly the desire to influence the consumer habits of future shoppers. "If you want to stress-test a technology, particularly a security system, a school is a good place," said Trump of National School Safety and Security Services. "Most often, the biggest obstacle a company must overcome is the issue of cost. If [the technology] is free, many schools will be open to it." Aiding the decision is the fact that minors have fewer rights than adults, said John Pescatore, research director for security at the industry-consulting firm Gartner. "If the system gets too intrusive, the school and the technology companies are likely to get fewer complaints and fewer legal actions filed over it" than they would elsewhere, Pescatore said. "You can do things on a school campus that you could never do in an office building." Few of the students at West Hills or their parents knew about the new surveillance system when classes began in late August. The school's football team, the Wolf Pack, and the campus cheerleaders had practiced on campus this summer and saw the cameras being installed. Rumors flew, as word of the new technology became campus gossip. Some students, carrying their bar-coded photo identification cards, grumbled about the digital devices that tracked their every step. But most wandered nonchalantly by the wireless cameras, ignoring the monitoring. "We're observed all the time," said senior Kimberly Schmidtke, 17. "It's just that they're now taping us." That such surveillance would not only be accepted but also embraced by some teenagers marks a subtle cultural shift over public monitoring. A few decades ago, students rallied against having their actions recorded by authority figures. But as camera technologies became cheaper and easier to use, they became far more widely used, said Bankhead of the ACLU. Digital cameras sit on top of home computers, peek out of mall ceilings and take snapshots at gas station pumps. Cities such as Simi Valley have approved grants to pay for cameras to catch graffiti vandals, and dozens of towns nationwide use cameras to capture drivers who speed through red lights. "It's been so incremental, we almost didn't notice such monitoring of our lives was happening," Bankhead said. "We don't even know it's there. The more it's there, the more it seems to make sense to people." In the first few days of school, only a few parents voiced complaints--not about the technology itself, but that the district had not informed them that the system would be put into use. "For something so significant, it's the district's responsibility to disclose what they're doing," said Patty Everts, 50, while waiting Monday to pick up her daughter at West Hills. "We knew there was new technology on the campus that was being upgraded. Most people assumed it was for educational purposes, not security." School officials plan to send a letter out to parents next month "as soon as we know the full potential of how we are going to use this technology," said Principal Jim Peabody. "The technology will help us keep kids safe and keep out people who shouldn't be on this campus." But the security system could not have prevented last year's school rampages, because the shooters were not people who didn't belong on campus. Reliance on such technology to attempt the creation of a protective wall horrifies privacy proponents, who insist that the West Hills system is not only invasive, but also gives parents and school officials a false sense of security. "No one's even asking the question: Is this truly going to make my child safer?" Bankhead said. To 66-year-old grandfather Jerry Parli, the answer is moot. Lingering at the entrance of West Hills, he sat patiently in the hot August afternoon, waiting to pick up his two granddaughters. "It's about time they do something like this," he said. "It's a terrible thing, but it's time to embrace Big Brother." ---- "Well, as long as everyone's videotaping everyone else, I guess justice will be done" Marge Simpson From al at qaeda.org Sun Sep 8 13:14:17 2002 From: al at qaeda.org (Optimizzin Al-gorithym) Date: Sun, 08 Sep 2002 13:14:17 -0700 Subject: seeking information for Tired News article Message-ID: <3D7BAF98.42A49BFF@qaeda.org> At 02:33 PM 9/7/02 -0500, J.A. Terranson wrote: >> What kinds of people are involved? > >Doctors, Lawyers, Mathematecians, Felons, Druggies, Anti-druggies, >Anarchists, Libertarians, Right-Wing-Fanatics, Left-Wing-Fanatics, >Teachers, Housewives, Househusbands, students, cops, criminals... We're all just voices in TM's head.. >> Who (socially, i mean, not names!) exactly are the members of the group? > >Agains, there IS NO GROUP. I'm not trying to be cute here - THERE IS >NO GROUP. The whole concept of "group" is flawed in this context. Dogthinker seeks Alpha Cat. >> WN has had a very familiar relationship with the cypherpunks - has it been >> viewed as a positive thing? Which? WN is widely considered lame ('tired' to you) esp. since Declan left. On the other hand, publicity can attract contentful participants. Also trolling feds and folks looking for help with homework. >> With whom else are the cypherpunks allied? > >[I actually had to take a moment to wipe the tears of laughter from >the question] > >Nobody. Well a few authors have gotten free plane trips & bed & board at the Feds' expense.. some even came back after it was over. Any such "alliance" would require a Group Consensus - >something which is just patently impossible. If you ever find two >CP's who can agree on enough to come to a broad Consensus, you let me >know so I can mark it on my calendar. True 'nuff. Now ask us about protocols which let you determine a consensus... well, that's tasty. >> Thanks for your time. I am hoping to get the story done before the end of >> next week (i.e. before the actual party.) Of course, I would never publish >> the location of the party or any other information that you don't feel >> comfortable about. And 'we' should 'trust' "you" *why* ?? (Ho-ho, list relevence! Explain/define the scare-quotes! For extra credit, explain how protocols might avoid spoofing.) From al at qaeda.org Sun Sep 8 13:41:10 2002 From: al at qaeda.org (Optimizzin Al-gorithym) Date: Sun, 08 Sep 2002 13:41:10 -0700 Subject: opsec hint: don't give classified into to Moussaoui Message-ID: <3D7BB5E5.FD406DD8@qaeda.org> US accidentally gave Moussaoui classified information on al-Qaeda: report September 07, 2002, 11:09 PM WASHINGTON (AFP) - The US government accidentally gave Zacarias Moussaoui, the only person charged in connection with the September 11 attacks, classified information about al-Qaeda, ABC News reported. The documents and computer disks were mistakenly handed over to Moussaoui along with materials the government is required to furnish for his legal defense, several legal sources, including one at the Justice Department, told the network Friday. Moussaoui is serving as his own counsel. http://www.arabia.com/afp/news/int/article/english/0,10846,283377,00.html From mailservis at ttnet.net.tr Sun Sep 8 16:38:37 2002 From: mailservis at ttnet.net.tr (GREENCARDCEKLSN KACIRMAYIN) Date: Sun, 8 Sep 2002 16:38:37 -0700 Subject: GREEN CARD CEKLS KACIRMAYIN Message-ID: <200209082338.g88Ncm851713@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 259 bytes Desc: not available URL: From cyl8844 at sina.com Sun Sep 8 02:32:45 2002 From: cyl8844 at sina.com (=?GB2312?B?sbG6vS+7qtbQL8flu6q/qreizcW20w==?=) Date: Sun, 8 Sep 2002 17:32:45 +0800 Subject: =?GB2312?B?z8i/qreiwvrS4rrzuLa/7g==?= Message-ID: 如果本邮件不是你所需要的,我们表示抱歉,请随手删除或按回复删除 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 业务说明(先提供服务,客户满意后再付款) 我们是powersoftteam软件团队,我们的成员来自北航与清华、华中科技大学(原华中理工大学)浙大的软件工程的硕士以及博士,我们提供如下服务: 1、客户关系管理(CRM)、进销存系统、销售管理系统、办公自动化系统(OA)、文挡管理系统、ERP、MRP、MIS等各类软件的定制开发,我们可以提交源程序,我们有这方面丰富的经验与众多的成功案例; 2、各类行业性软件的开发以及系统集成(例如:电信的网管软件、医院的信息管理系统、校园管理系统、酒店信息管理系统……详细的行业性软件请见邮件最后部分); 3、电子政务、电子商务等大型系统的开发; 4、专业为国内人士提供软件破解和加密服务,破解效果可以达到两个层次,一个是密码或使用期限制的解除,另一个层次是在以上基础上进一步按客户需求修改软件界面,方便客户按照自己的习惯使用。方便大家使用国内外价格高达几万、几十万的大型或专业软件。该项服务需要客户简单介绍软件并提供未破密的软件的下载地址或光盘方式; 5、专业为本土软件提供加密保护;本工作室保障良好的破解和加密质量,充分满足用户的需求! 6、我们承接全国各地的以上方面的业务! 联系方式:powersoftteam软件团队 powersoftteam at sohu.com (与我们联系,请按照以上邮件地址,不要直接回复你所接收到的邮件) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 备注 1、我们可以给最终用户开发,也可以给软件公司或相关企业开发,客户可以在我们软件上面指明为客户自己开发(既软件版权可以给客户) 2:我们不提供破解工具和培训教程,考虑到操作问题,暂时不提供单片机、IC芯片和CPU的破解服务; 3:单价人民币5000元以下的软件,建议购买正版或请我们进行开发,我们不提供破解服务; 4:不出售大众软件、源代码和注册号,请勿来信索取; 5:不提供网站和电子邮箱的密码破解服务 (与我们联系,请按照以上邮件地址,不要直接回复你所接收到的邮件) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 请保留此邮件以备不时之需 补充: 我们承接过的行业性软件如下: 建筑领域建模作图和绘图、地震反分析、水库特性分析以及近表面折射分析、石油勘探、气动流体分析模拟、耐久性疲劳寿命分析、材料数据信息系统、工业产品造型软件、产品概念设计、产品数据管理工具、数据结构管理、数字样机、逆向工程、曲面造型、三维数字化设计工具、工程流体动态分析、动态组装、三维机构动态仿真、机械运动仿真、图纸矢量化软件、加工模拟、三维浮雕和雕刻、高级非线性结构有限元分析系统、动力学分析软件、模流分析系统、有限元分析、电磁分析、机械系统动力学分析软件、高频电子分析设计、造船加工软件、工厂设计和工厂数据维护、工程预算软件、股票分析软件、影象工作站软件、金相图象分析软件................................................ From profrv at nex.net.au Sun Sep 8 06:31:11 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 23:31:11 +1000 Subject: Get that old criminal record expunged,NOW! Message-ID: <5.1.0.14.0.20020908232746.00a030c0@mail.nex.net.au> Two in five face job vetting in drive to detect offenders 'The new Criminal Records Bureau predicts that within three years it will be making more than 11 million checks on past offenders, out of a working-age population of 29 million [in the UK]. The police previously made about one million criminal record checks a year ... The government drive means that a Criminal Record Certificate could soon become as essential for a job interview as a curriculum vitae and a suit ... Of the 11,627,595 checks predicted to be made each year from 2005, only 3.2 million will be on those who work with children. The other eight million or so certificates will be requested by people seeking to apply for work in a wide variety of other roles and professions. To reach these targets - which the bureau must hit if it is to become a self-funding body - employers will have to be encouraged to demand the £12 certificates from applicants' ( Independent ) The CRB has received a great deal of coverage in the UK media over the last two weeks, after it failed to clear a huge backlog of checks on school staff in time for the start of term. As the CRB is nominally a Home Office agency, the public has been given the impression that this was a civil service cock-up. In fact, the work of the CRB is performed by Capita, a private firm with a long record of botching government contracts See also this Telegraph article, and this Guardian article LINKS? http://www.hullocentral.demon.co.uk/site/anfin.htm Funny attempt to smear your friendly professor...Professor rat,to many people he is a businessman, funnyman, philanthropist, entrepreneur and patron of the arts,but to one anonymous coward... http://www.melbourne.indymedia.org/front.php3?article_id=33154&group=webcast The devil went down to Kyneton. From profrv at nex.net.au Sun Sep 8 06:45:44 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 08 Sep 2002 23:45:44 +1000 Subject: Victims out killers online. Message-ID: <5.1.0.14.0.20020908234453.00a04340@mail.nex.net.au> http://www.heraldsun.news.com.au/common/story_page/0,5478,5052161%255E2862,00.html A VICTIM'S lobby group plans to use the Internet to out two Victorian teenage killers. People Against Lenient Sentencing president Steve Medcraft said he planned to pass on the names of the two teenage boys convicted of killing Seaford grandmother Marie Greening Zidan for publication on a US-based site. The group also plans to publish their addresses when released from jail. A civil liberties organisation has accused the group of taking the law into their own hands. The action came as Mrs Greening Zidan's daughter, Janine Bramley, gathered signatures on a petition calling for a change to the Children and Young Person's Act to enable children who murder, rape or viciously assault to be publicly named. Mrs Greening Zidan, 73, was killed in her home on October 15, 2000. Two local boys, then aged 15 and 16, pleaded guilty to manslaughter. They were sentenced to nine years' jail, with a minimum of six. Mrs Bramley said the Act was meant to protect children who scrawled graffiti or stole a car -- not those who raped or murdered. The petition also calls for sentencing for juveniles "more in line with community expectations". Mr Medcraft said he had legal advice suggesting that if the names of the boys were forwarded to the website's operators and then placed on the site, his organisation could escape prosecution. "The system will not guarantee these guys won't re-offend so if the system can't guarantee it we will at least give people an equal chance," Mr Medcraft said. He will seek further legal advice and hopes to have the names listed within six months. "If it means that I'm going to be put up in court on this issue I'm prepared to wear the flak so that the community can have access to what is their right to protection and free speech." Victorian Council for Civil Liberties vice-president Greg Connellan said placing the names on the website would be irresponsible. "They are acting unlawfully and it's incredibly arrogant for them to assume that they have the right to act unlawfully with impunity and other people don't," he said. Mr Connellan com mended Mrs Bramley for trying to get her point across through a petition. Mrs Bramley and Mr Medcraft met with Opposition corrections spokesman Kim Wells on Friday to raise concerns about justice, including offenders being imprisoned in juvenile detention centres after the age of 18, and lack of compensation for victims of crime. Mr Wells said he planned to table Mrs Bramley's petition in Parliament and will also present a letter Mrs Bramley has written to Parliament. In Victoria, the name of an offender cannot be published if under 17 when the crime was committed and under 18 when reaching court. A spokesman for Attorney-General Rob Hulls said: "In Victoria, the president of the Children's Court can give permission for the publication of a child's name, but the general principle is that they should not be published because the sentencing emphasis for children is on rehabilitation and giving them a chance to reintegrate and reach their full capacity in adult life." From profrv at nex.net.au Sun Sep 8 07:20:47 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 00:20:47 +1000 Subject: Ace of spades. Message-ID: <5.1.0.14.0.20020909001623.009f74f0@mail.nex.net.au> How fate, and Stalin, finally dealt the 'ace of spies' a losing hand The order to kill Sidney Reilly - the "ace of spies" whose exploits supposedly provided inspiration for James Bond - came directly from Stalin, according to the author of a new biography of the MI6 agent.....( Guardian Unlimited, 6 Sep 02) "To the best of my knowledge Reilly never killed anyone in the course of his spying. The only killings he carried out were with a view to lining his own pocket. He was a good spy but also a criminal who perfected confidence stings. He was a scoundrel who spoke seven languages and exactly the type of person SIS needed." --Andrew Cook, author of the new book, On His Majesty's Secret Service - Sidney Reilly ST1 Subject of teleseries a decade or so ago starring Sam Neil. Zambia's ex-spy boss arrested - again Zambia's former intelligence boss Xavier Chungu has been arrested for the fourth time in three months, and charged with stealing a motor bike, police said on Friday....(SAPA/AFP, 6 Sep 02) One of au's ASIS chief's was assaulted twice during his term of office.SEE Oyster,by brian Toohey. http://www.cicentre.com/ From profrv at nex.net.au Sun Sep 8 07:31:02 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 00:31:02 +1000 Subject: Hershey Highway. Message-ID: <5.1.0.14.0.20020909002853.00a01a30@mail.nex.net.au> Later this month, the General Services Administration will announce the first government agencies to be cross-certified with the federal public-key infrastructure bridge, making it easier for agency users to exchange data securely. The federal PKI bridge is designed as a way to link agencies' certificate authorities (CAs), which are the central component of a PKI. A CA is the server used to generate and manage digital certificates to identify users and secure their transactions. By cross-certifying CAs certificate policies through the bridge, which acts as a trusted third party, an agency that needs to accept a certificate from another federal agency, and ultimately other non-federal entities, to conduct an electronic transaction will know that the certificate can be trusted. On Sept. 18, GSA plans to hold a cross-signing ceremony that will show certificates from the Defense Department, the Agriculture Department's National Finance Center, NASA and the Treasury Department can interoperate, said David Temoshok, acting director for identity policy at GSA's office of governmentwide policy. Those agencies' PKI domains "will be able to cross-certify through the bridge" and will be recognized by each other, Temoshok said while attending the Interagency Resources Management Conference in Hershey, Pa., this week. He added that in 2003, GSA hopes to add Illinois and Canada to that list. http://www.fcw.com/fcw/articles/2002/0902/web-bridge-09-06-02.asp Tech keeps track of parolees Florida county using VeriTracks system, which can plots a person's location relative to crimes committed Run pugsly RUN! From profrv at nex.net.au Sun Sep 8 07:52:14 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 00:52:14 +1000 Subject: Hang Cheney Message-ID: <5.1.0.14.0.20020909004736.00a07610@mail.nex.net.au> He was in charge and could have saved the pentagon... http://www.capitolhillblue.com/artman/publish/article_390.shtml Time of 1st strike 8.46,time of pentagon strike 9.38.Time to scramble jet and shoot down plane/missile...aprox 5-10 minutes. http://abcnews.go.com/sections/us/DailyNews/worldtrade010911.html Background on the groundhog http://www.btinternet.com/~nlpwessex/Documents/WATCheney.htm Everyone is witness. Everyone is a journalist. From profrv at nex.net.au Sun Sep 8 08:09:30 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 01:09:30 +1000 Subject: Still Dreaming,still Schnewsing. Message-ID: <5.1.0.14.0.20020909010738.00a04870@mail.nex.net.au> http://www.ainfos.ca/ainfos12924.html WAKE UP! IT'S YER ALWAYS AFTER SUMMIT... SchNEWS APOCALYPSE SOON? "It should now be crystal clear that the South African government is hell-bent on smashing legitimate dissent by whatever means they deem appropriate, including attacking peaceful marchers and terrorising children. The ghosts of the South African past are returning with a vengeance." Johannesburg demonstrator, outside the Earth Summit, this week. Tanks in townships, tooled up riot cops firing teargas and stun grenades into crowds of people, mass arrests, threats of deportation, laws against group assembly, the secret police spying on people...South Africa ten years ago?? Try South Africa this week MORE ON. http://www.ainfos.ca/ainfos12924.html From profrv at nex.net.au Sun Sep 8 09:16:24 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 02:16:24 +1000 Subject: Call to repeal the PATRIOT act. Message-ID: <5.1.0.14.0.20020909021445.009f8680@mail.nex.net.au> http://workers.labor.net.au/151/c_historicalfeature_bush.html Washington has become the first State Labor Council in the U.S. to call on the AFL-CIO to seek repeal of the USA Patriot Act and oppose the Bush Administration, reports Fred Hyde. *********** The floor of the convention at the Washington State Labor Council (WSLC) in Spokane, Washington was hushed when Gil Veyna took the mike to support "A Resolution Against the War, Attacks on Civil Liberties and Cuts in Public Services. "As a Chicano and a unionist," Veyna said resoundingly "I resent Bush's war on terrorism which is a war on working people and immigrants." Veyna, a 22-year Veterans Administration hospital employee, was at the August 19-22, 2002 convention as a delegate for the American Federation of Government Employees (AFGE) Local 3197. His union is one of several which has raised objections to the governments plan to remove civil service protections and collective bargaining rights from the 170,000 federal workers in the newly formed Department of Homeland Security. In his comments, Veyna criticized the national leadership of the AFL-CIO for its unstinting support of the military actions in Afghanistan. He noted that now the administration has turned its guns on dockworkers, referring to the threat to call out troops in the name of "national security" in the eventuality of a strike by the International Longshore Workers Union. Veyna was no less critical of what he termed "federally sanctioned racial profiling following 9/11" which put immigrants under the spotlight and led to many unfairly losing their jobs. When Veyna sat down, not a single delegate of the 500 unionists representing locals throughout the state rose to speak against the resolution, and it passed overwhelmingly. Thus Washington became the first State Labor Council in the country to call on the AFL-CIO to seek repeal of the USA Patriot Act and oppose the U.S. government's war without end. MORE ON http://workers.labor.net.au/151/c_historicalfeature_bush.html From profrv at nex.net.au Sun Sep 8 10:38:49 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 03:38:49 +1000 Subject: Raise the Fist at melbourne Indymedia. Message-ID: <5.1.0.14.0.20020909033633.00a02d50@mail.nex.net.au> http://www.melbourne.indymedia.org/front.php3?article_id=33231&group=webcast Anarchists,Indymedia under attack. by Russell Walsh 2:44am Mon Sep 9 '02 article#33231 The Mayday of 2001 led State police violence and repression as detailed in Article,an alleged threat to police posted here eight days later has led to a court case here in Melb. Another alleged 'threat' coincided closely with the most violent and unprecedented attack on an Indymedia station.People being hospitalized and as at S11,2000 having their teeth smashed out.50 police are under investigation in Italy and some have admitted planting 'weapons' and faking 'assaults' on them. This is from raisethefist. Long Beach Anarchist Movement Under Heavy Fire by xxxxx Thu May 23 20:09:02 PDT 2002 May Day 2001, the now infamous riot in the streets of Long Beach, was just the beginning of a well organized conspiracy to destroy the growing anarchist movement in Southern California. The City of Long Beach, and it's police department, is now at the forefront of a well-organized quasilegal conspiracy, in the cahoots with Los Angeles, La Habra, Fullerton, and the orange County and Los Angeles sheriffs departments. Rest assured that the Feds are also heavily involved. Their goal is to jail a few of the most outspoken anarchists in order to intimidate the rest of the movement. We have seen this scheme played out already in Eugene with devastating results. Regardless of the harassment by the Long Beach Police Department, the activists continued to do work to better the community. Groups and programs such as 'Food Not Bombs' (an anti-military network that serves food as a protest to war and arms), 'COPWATCH' (an organization who monitors unlawful police activity), 'POWER' (an anti-authoritarian, anti-war/anti-racist group) have been created to empower the local community. On April 20, 2002, Mathew Gordon Lamont, a Long Beach Activist, who has been highly involved with the above mentioned groups and the infoshoppe along with Maxwell Lucas, a Food Not Bombs Activist, were pulled over in the city of La Habra (Orange County) after being followed by 2 Long Beach detectives. While their car was pulled over for unknown reasons, it was searched by LONG BEACH DETECTIVES (Long Beach is Los Angeles County Jurisdiction). The detectives found a gas can in the car, arrested the two men and took them into custody. Maxwell Lucas, who is a juvenile, was taken to the Orange County Juvenile Detention Center in Orange, CA. He is being charged with but not limited to the felony of possession of a destructive device. Matthew Lamont is being held in the Theo Lacy Facility in Orange, CA. and is being charged with 4 felony charges of possession of a destructive device, transporting of a destructive device, the use of a destructive device, and the possession of materials/instructions to make a destructive device. Matthew was scheduled to have his first arraignment on Tuesday April 23rd in Division 7 of the Central Court of Orange County in the city of Fullerton. During this arraignment Matthew asked for a 3-week continuance in order to obtain an attorney. Matt's bail was placed at 100,000 dollars. Tuesday May 14th, 2002, Matthew Lamont had a scheduled court date in Santa Ana's Central Court for his extended arraignment. A small demonstration had previously been called for in front of the courthouse. However, when the demonstrators arrived they were greeted by at least 100 cops in full riot gear, undercover cops, sheriff's deputies, police horses, etc. The first group of demonstrators who arrived - unmasked, unarmed, unthreatening in every way - decided to go inside to view court proceedings. They proceeded to walk up to the court and waited for a few others to show up before proceeding inside. The demonstrators were told that Matthew Lamont's hearing was held first thing in the morning before his scheduled appearance. THIS IS NOT A COINCIDENCE. It's an obvious attempt to lower his morale by making it difficult for supporters to appear in court and show support. The demonstrators then decided to wait out in front for more people to show up. Several sheriff deputies then confronted the demonstrators and said, "OK, people! I need to see your I.D's!". Only one person co-operated with them and the rest refused to show identification. The sheriffs then backed off when they realized they wouldn't be able to get any more information. Just moments later, the police started forming a line in front of the court door and strapped on their riot helmets and gear. They then surrounded the demonstrators up against a wall, and one officer read a dispersal order saying that if the group didn't disperse immediately they will all be arrested. Disappointed, the small group had no choice but to leave. As the small group proceeded to leave, two demonstrators were searched by police as they arrived to their car. When the rest arrived at the parking lot, the parking attendant told them that the police ordered him to let them into the lot to investigate for bombs. Just as the small group of demonstrators were forced to leave, another group of 8 had arrived. They stood across the street with a banner that read, "FIGHT POLITICAL REPRESSION! FREE MATT & MAX!". Police, and undercover officers proceeded to surveil the peaceful demonstrators with video cameras. Realizing the enormous police presence, 3 demonstrators went to get a video camera from their car so they could tape the overwhelming police presence. As they tried to do so, they were closely followed by 3 police cars. As the 3 demonstrators left the car and proceeded back to the demo, the police stayed behind and appeared to be analyzing the vehicle. Another demonstrator went into the court house and was confronted by a LOS ANGELES SHERIFFS DEPUTY who told her that Matthew had already had his arraignment and left court. Despite this, the demonstrators still decided to continue on with the peaceful demonstration which took place on the side walk across the street from the court house. Approximately 15-20 minutes later, the riot police began to disperse and leave the area. The riot police on horses left shortly afterwards. The sheriffs, and undercover officers remained on the scene and continued to video tape the demonstrators. After about an hour and a half, Matthew was seen leaving the court in the back of a squad car. Matthew's arraignment was supposed to be scheduled at the North Court in Fullerton, but was then moved to the Central Court in Santa Ana only 2 days before the demonstration. This was an obvious attempt to disorganize the event in fears of large amounts of people coming to show support. Matthew is being charged with 4 felony counts, and is facing serious jail time. At Matthews first arraignment, Tuesday April 23rd, one if his supporters, Jeff Hendricks, yelled out in support as he was being led back out of the courtroom by the bailiff. The Judge pressed the emergency button and the bailiff immediately arrested Jeff. Jeff was arrested for two misdemeanor charges: contempt of court and communication with a prisoner. Jeff was held on 15,000 bail until his arraignment on Thursday April 25. During his arraignment Jeff had his bail lowered to 7,500. On Friday Jeff made bail and was about to be released when a Deputy ran into the release room of the jail with a hold: A new warrant from the Long Beach police department for remaining at the scene of a riot. Jeff was placed back into custody and transported to an L.A county facility. Jeff made a phone call earlier that day from jail and told friends that he was put in HIGH SECURITY after being arrested at court (on minor misdemeanor charges), and had his picture taken by the FBI, and was continuously being questioned by authorities. While in custody, Jeff's car was impounded and searched for "explosives". At 4 am Saturday morning Jeff was again bailed out. Jeff is currently out on bail and is facing his two misdemeanor charges as well as a probation violation. The probation stems from his plead of no contest to failure to disperse after his arrest in the Long Beach May Day 2001 police riot. Jeff now faces up to 2 years in jail. Political repression in Long Beach has increased outrageously since May Day 2001, where approximately 100 demonstrators were brutally attacked and arrested as they attempted to peacefully march for workers rights. It was only two minutes into the demonstration and police began swinging their batons. The march didn't last more than 15 minutes before police opened fire with riot guns, forcing half of the march to disperse down a drive-way where they were beaten to the ground. The other half dispersed up against building where they were trapped after police unloaded several hundred rounds of rubber bullets on them. With guns still drawn, one-by-one, everyone was arrested. May 1st, 2002 set the worst case of police brutality in Long Beach in 33 years. Demonstrators suffered fractured arms due to baton swings, and penetrating wounds from scatter-shot projectiles fired from 12-Gauge shot guns. Bail was set as high as $25,000 for some arrestees. Many were being charged with 6 different misdemeanor charges. Despite the enormous repression, many of those arrested still decided to take their cases to trial. After September 11th occurred, the prosecutor and judge decided to include 3 years maximum jail time if convicted, along new plea which consisted of 30 days minimum in jail time if the previous plea bargain (1 year probation) wasn't taken immediately. After this, the majority of arrestees decided to plea in fear of serving heavy jail time. This was an obvious threat which demonstrated a clear act of prejudice directed towards the arrestees because of their political beliefs. On November 15th Robert Middaugn, who was one of those arrested on mayday, was scheduled to begin his trial. Robert had been in Jail since May 1st and was charged with Felony assault against a peace officer, Felony riot, Felony conspiracy, Felony resisting arrest, and misdemeanor failure to disperse. At the time of his arrest on May 1st Ruckus was on formal probation stemming from pleading guilty to assault against a police officer at the Democratic National Convention. When supporters of Ruckus appeared in court the morning of November 15th there were 4 police sitting in the courtroom in the jury chairs. Ruckus' supporters soon learned that these police were there to testify against him for his parole violation hearing. Yes, the police court was going to have Robert's probation violation hearing before his trial; in reality you're guilty until proven innocent in the American injustice system. The prosecution put the 'deal' of offering Ruckus 3 years in State Prison and 3 years formal probation upon release. In order to coerce Ruckus into taking the plea the judge informed Ruckus that he would be facing 4 years just for his probation violation not to mention a possible 13 more if found guilty of the other charges. Ruckus was threatened with 17 years in prison. After taking the plea for 3 years in state prison, Ruckus found himself possibly facing a 3rd strike on a new charge that will give him another 20 years to life. The repression didn't end here. In fact it only got worse. On Feburary 24th, another mayday arrestee, Sherman Austin, was raided by 25 heavily armed FBI agents and Secret Service for running a Los Angeles based anarchist web site, Raisethefist.com. Raisethefist.com was an alternative media site conversing a diversity of subjects including anarchism, activism, and current events not reported by mainstream media or even what passes as alternative media were reported and commented on in an open publishing format available to the public. Heavily armed with shot guns and machine guns, the FBI, Secret Service, LAPD and LASD surrounded Sherman in his home before pulling him outside and storming his house. FBI agents confiscated his computer equipment, along with his political literature and shut down the site along with the newly opened, laanrchists.org (Los Angeles Anarchist Collective) site that he also recently created. Despite the raid, Sherman still decided to protest the World Economic Forum in New York that month. After being targeted by authorities, he was then arrested by New York police, interrogated by the FBI and Secret Service for several hours, released, and then re-arrested minutes later by 6 FBI agents on charges from the new "Patriot Act". Sherman was called a terrorist in the court room and was denied bail as the judge rendered him a "threat to the community". After spending nearly 2 weeks in Maximum Security Federal Prison on 2 bogus felony counts that served a maximum 30 years jail sentence, Sherman's charges were mysteriously dropped and he was released "pending further investigation". The FBI to this day still remains in possession his computer equipment and political literature. The new "Patriot Act" gives law enforcements a new excuse to raid, surveil, follow, detain, incarcerate and deport anyone who even remotely sees to challenge the oppressive, brutal policies of the U.S injustice system. Hasan Hasan, a math instructor at Cerritos college and member of the Long Beach Peace Network, was illegally detained by the INS. Without being given any reason Hasan Hasan was both fired from his job and arrested within a matter of minutes. This was an obvious setup to target Hasan for his political beliefs. Hasan now faces deportation charges. A year had gone by since May Day '01, and in the first verdicts to come out of the violent police riot which erupted from a would-be peaceful march, jurors on Tuesday, May 21st acquitted two people of failure to disperse and convicted a third of unlawful assembly and wearing a mask with the "intent to commit a crime". Sarah Roberts, 26, the only one convicted, was handcuffed and taken into sheriff's custody after the verdicts were read. Over the strong objection of her attorney, Roberts was also ordered held on $100,000 bail until her sentencing. At Roberts sentencing on May 23rd, she was sentenced to 6 months in LA County and given $1,000.00 fine. Excessive surveillance, profiling, arrests and harassment has been experience by many local activists, especially those associated with the Long Beach Infoshoppe. There isn't one hour that the LBPD doesn't pass the Infoshoppe at least once. Their almost subtle monitoring consist of silver cars parked in front of the Infoshoppe, following local activists to and from events, videotaping, and harassing activists and community supporters. Political repression continues to intensify in Long Beach around the anarchist movement. The Long Beach Police Department are at forefront of a well-organized quasilegal conspiracy, in the cahoots with Los Angeles, La Habra, Fullerton, and the orange County and Los Angeles sheriffs departments and FBI. Their goal is to destroy the growing anarchist movement in Southern California. We've seen this happen in Eugene, and in the 60's with devastating results. We must not let it happen again! We must take immediate action to resist the repression and to free all political prisoners. We must take action now, otherwise it will be too late! For more information please contact the Long Beach Infoshoppe at 562-434-6934. 684 Redondo Ave Long Beach, CA Police share high quality and high cost communications,is it simply co-incidence that certain events are so tightly linked? Remember the kidnapping of jaggi Singh? First they came for the ELF and ALF suspects and I said nothing because I eat meat and pull down a great wage at the woodchip factory,then they came for the anarchists and IMCista's and I thought,I don't need reminding about a lot of depressing BS,then they came for everyone in the union and co-op,good riddance,no more dues and friggin' string bags.Then they started dissapearing people at random like what happened in Stalins Russia...the odds are they wont pick me...I hope.I do love big bother and we have always been at war with Oceania bin Laden.Right? add your own comments From profrv at nex.net.au Sun Sep 8 12:06:43 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 05:06:43 +1000 Subject: Chop Chop Message-ID: <5.1.0.14.0.20020909050138.00a00270@mail.nex.net.au> CC is green tobacco with added saltpetre to assist burning,its sold under the counter in au to evade huge taxes on standard coffin nails and rolling sotweed. Cigarettes smuggling is huge world wide,a run between Turkey and southern Russia had nuclear materials as a backload to NJ.When the US customs found it the CIA got shirty.Enough to attack the twin Towers? maybe... http://organizedcrime.about.com/library/weekly/aa090402a.htm A Smoking Gun Cigarette smuggling is a billion dollar industry with links to organized crime and terrorism. In the film "Goodfellas," Henry Hill's first arrest comes about because he is selling a shipment of hijacked cigarettes to factory workers. The truth of cigarette smuggling is not nearly as innocent as that scene would lead us to believe. ETC. From wangqing at sina.com Sun Sep 8 14:45:08 2002 From: wangqing at sina.com (wangqing at sina.com) Date: Mon, 9 Sep 2002 05:45:08 +0800 Subject: ɺã Message-ID: <200209082149.g88LncH32489@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12091 bytes Desc: not available URL: From schear at lvcm.com Mon Sep 9 11:04:03 2002 From: schear at lvcm.com (Steve Schear) Date: Mon, 09 Sep 2002 11:04:03 -0700 Subject: Balancing Linux and Microsoft Message-ID: <5.1.0.14.2.20020909110337.04466a00@pop3.lvcm.com> Balancing Linux and Microsoft By STEVE LOHR For nearly two years, Bruce Perens was a senior strategist for open-source software at Hewlett-Packard  an evangelist and rabble-rouser on behalf of a computing counterculture that is increasingly moving into the mainstream. Part of the job description, he was told, was to "challenge H.P. management." His last day as a Hewlett-Packard employee was 10 days ago. The parting was amicable, Mr. Perens said, but he was fired  "officially a termination," he noted. "It came after a long, long warning," Mr. Perens explained. "The thing that I did that was most hazardous for H.P. is the Microsoft-baiting I tend to do." http://www.nytimes.com/2002/09/09/technology/09SOFT.html From schear at lvcm.com Mon Sep 9 11:04:44 2002 From: schear at lvcm.com (Steve Schear) Date: Mon, 09 Sep 2002 11:04:44 -0700 Subject: China Reins in Unlicensed Satellites Message-ID: <5.1.0.14.2.20020909110428.0445a340@pop3.lvcm.com> China Reins in Unlicensed Satellites Friday, September 6, 2002 Last updated at 12:33:40 p.m. PT By JOE MCDONALD ASSOCIATED PRESS WRITER BEIJING -- Faced with the hijacking of its television signals by Falun Gong protesters and pirate broadcasters, China says it is cracking down on unauthorized use of satellite communication networks and ground relay stations. http://seattlepi.nwsource.com/national/apasia_story.asp?category=1104&slug=China%20Satellite%20Crackdown From dave at immunitysec.com Mon Sep 9 09:23:57 2002 From: dave at immunitysec.com (Dave Aitel) Date: 09 Sep 2002 12:23:57 -0400 Subject: Unmask 1.0 Release Party at My House! Message-ID: I've released Unmask today - available at http://www.immunitysec.com/unmask.html >From the web page: What is Unmask? Unmask is a python script that allows you to break the anonymity of e-mail or other text. It works by doing basic statistical matching against stored "signatures." It may require some tweaking to fit your particular use to it (un-anonymizing IRC chats, email, web pages on FreeNet, etc). Another fun parlor game use is using it to distinguish between two groups of any kind. Male/Female, Engineers/Computer Scientists, Scientists/Liberal Arts Majors, etc. If you improve it in some way, please send me (dave at immunitysec.com) a note. Unmask is released under the GNU GPL v2.0. As a further note, I specifically designed Unmask to be resistant to GOBBLES style "Chinese reordered english." Dave Aitel Immunity, Inc. ----- End forwarded message ----- -- "It is seldom that liberty of any kind is lost all at once." -Hume From gbroiles at parrhesia.com Mon Sep 9 13:02:05 2002 From: gbroiles at parrhesia.com (Greg Broiles) Date: Mon, 09 Sep 2002 13:02:05 -0700 Subject: [dave@immunitysec.com: Unmask 1.0 Release Party at My House!] In-Reply-To: <20020909185549.GA35078@lightship.internal.homeport.org> Message-ID: <5.1.0.14.2.20020909125602.042ed8b0@bivens.parrhesia.com> At 02:55 PM 9/9/2002 -0400, Adam Shostack wrote: >Anyone played with it? > >[...] > >Subject: Unmask 1.0 Release Party at My House! >From: Dave Aitel > >I've released Unmask today - available at >http://www.immunitysec.com/unmask.html I've been experimenting with it some this morning - it's a memory and CPU hog, turning 10-20K input files into 20-30M data files, and using 300-500M of RAM and a few minutes of CPU time on a relatively fast Athlon in the process. Nothing interesting to report yet, other than a hunch that it'd be improved by rewriting some parts in C, and/or using a resource storage format that's more appropriate for big data sets, like a database. It seems to want to keep everything in RAM at once. -- Greg Broiles -- gbroiles at parrhesia.com -- PGP 0x26E4488c or 0x94245961 From uigxvxb at aticca.com Mon Sep 9 10:46:23 2002 From: uigxvxb at aticca.com (Timea Capobianco) Date: Mon, 09 Sep 2002 13:46:23 -0400 Subject: Hello cypherpunks, we only want Poor Credit dtauc Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4460 bytes Desc: not available URL: From asi798 at hotmail.com Mon Sep 9 04:49:32 2002 From: asi798 at hotmail.com (asi798 at hotmail.com) Date: Mon, 9 Sep 2002 14:49:32 +0300 Subject: bekliyorum tamam Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 396 bytes Desc: not available URL: From adam at homeport.org Mon Sep 9 11:55:50 2002 From: adam at homeport.org (Adam Shostack) Date: Mon, 9 Sep 2002 14:55:50 -0400 Subject: [dave@immunitysec.com: Unmask 1.0 Release Party at My House!] Message-ID: <20020909185549.GA35078@lightship.internal.homeport.org> Anyone played with it? Adam ----- Forwarded message from Dave Aitel ----- From marketing at cd-uk.net Mon Sep 9 10:43:34 2002 From: marketing at cd-uk.net (Computer Developments UK) Date: Mon, 9 Sep 2002 18:43:34 +0100 Subject: Something for FREE again! Message-ID: This weeks one off email only offer is FREE installation of Sophos Anti-Virus if you purchase this software for 5 or more users and are within a 30 mile radius of our offices in Witney. Also please give us a call for our unbeatable prices, on hardware and software, as we won't be beaten on price. If you would like to take advantage of this offer please contact our Sales Team on 01993 849200, stating you had this offer via email. Regards The Sales Team Computer Developments UK All Offers are made subject to availability. Prices quoted are exclusive of VAT. All trademarks acknowledged. All sales subject to CD-UK's Terms and Conditions. To be removed from our email list please reply with remove as the subject and also stating email address if different from the one you are using, thank you. Computer Developments UK, Waterside Court, Witan Way, Witney, Oxfordshire, OX28 6FE Telephone: 01993 849200 Fax: 0870 458 2385 Email:mailto:sales at cd-uk.net From profrv at nex.net.au Mon Sep 9 03:43:34 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 20:43:34 +1000 Subject: Saxotoxin sprinkled pretzels. Message-ID: <5.1.0.14.0.20020909204032.00a01820@mail.nex.net.au> Who will risk experimenting with SAXITOXIN? It is 1000 times more toxic >than a typical synthetic nerve gas such as sarin. It was used by CIA in >1950's as a suicide capsule. President Nixon ordered entire stock of of >SAXOTOXIN to be destroyed. > There are plus point to SAXOTOXIN, it has been used in medical research. > Checking on the structure of Saxitoxin in the Merck Index reveals that it >> has a most interesting architecture. Three terminal NH2 groups, an ether >> linkage and a ketone. Its stable in acid solution but decomposes rapidly in >> alkaline media. It looks like very good food for anaerobic bacteria and I >> suspect would decompose rapidly in the presence of acetogens and >> methanogens. Try a sample of digested sewage sludge (anaerobic) culture with >> some milk for a few days at 35 Celsius until gas is produced. Then add the >> Saxitoxin at known dilution, sample and analyse for Saxitoxin every hour. >> Within 12 hours I'll bet its all gone. Not sure of the specific test used to >> confirm saxitoxin but I guess its capable of parts per billion. Source in nature... http://www.scuba-doc.com/ingest.htm From profrv at nex.net.au Mon Sep 9 04:08:18 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 21:08:18 +1000 Subject: Dermot Avon,a liar,an incompetent buffoon and Vic policeman. Message-ID: <5.1.0.14.0.20020909210749.00a04710@mail.nex.net.au> Dermot Avon Fuckwit of the week. by profrv@(nospam)fuckmicrosoft.com 8:51pm Mon Sep 9 '02 article#33272 Dermot Avon enjoys lying,he told me he was from my ISP with a sickly smirk,then his little weasel mate,Conte told me they were Persons Impersonating Govt.servants or P.I.Gs. http://www.melbournecrime.bizhosting.com/gabdallah.htm "The Deputy Ombudsman began an inquiry into the circumstances of the shooting of Gary Abdallah and after an eight-month investigation suggested that the two detectives at the fatal shooting appeared to have agreed to corroborate each other's false accounts (The Herald, 22 December 1989)." FROM Gary Abdallah Abdallah was wanted for arson in connection with a $300,000 fire at Simons Disco in Northcote. He grew up as a young armed robber in the Flemington area and a member of a well known criminal gang which resided in his suburb and its neighbour, Ascot Vale. Other members of the crew included Mark and Jason Moran, Graham Jensen, Frank Valastro, Mark Militano, Jedd Houghton, Victor Pierce, Peter McKevoy and Santo Mercuri. Houghton, like Abdallah, was killed by police during investigations into the 1988 Walsh St police shootings. On March 31, 1988, a bank robbery occurred at a State Bank branch in Oak Park. The armed robbers left empty handed but shots were fired. Forensic records showed the gun used was definitely the same one used in the Walsh Street shootings. This robbery was linked to four unsolved recent hold-ups, police dubbing the perpetrators as the Flemington Crew. The gun used was retrieved next to tram tracks in Parkville's Royal Park Golf Course in 1990. In late 1988, the TyEyre Taskforce into Walsh Street undertook a series of dawn raids on drug dealers, armed robbers and other known criminals in some way connected with the police shootings. Abdallah was one of the men at the top of the list of people police wanted to speak with. Abdallah became a Walsh Street suspect on the evidence of the prosecution's key witness, Jason Ryan, whose statement was changed four times and finally thrown out by the court. Ryan, part of Richmond's feared crime family, the Pettingill's, claimed that Abdallah's part in the killings was to provide and drive the getaway car which the alleged killers had sought from his Carlton commission flat. The evidence was collected in an interview with Ryan conducted by Det John Noonan. He had taken Ryan on a trip out of the city, to Mansfield in the states north-east. It was there Ryan was interrogated and from his ever changing information and statements, Noonan initiated a case against his uncle, Victor Pierce, friend, Anthony Farrell, associate, Peter McEvoy and uncle, Trevor Pettingill. Abdallah feared for his life after he heard rumours that the police were out to kill him. He had good reason to be fearful: Jedd Houghton was shot dead by police in a Bendigo caravan park in November 1988. For two months Abdallah eluded the police. Raids were made on all known associates including his girlfriends family and the family of Jedd Houghton. News filtered back to Abdallah that police intended to kill him if they got to him first. He kept away from them until visiting Detective John Noonan at St Kilda Rd Police HQ on February 22, 1989 when he arranged a meeting with the task force head and his lawyer. Noonan told him that he was not wanted for the shooting, and Abdallah said he hadn't come in earlier "because people were telling me I was going to be knocked [killed]". Leo Musgrave, a Melbourne justice of the peace who knew Abdallah and Houghton as young criminals in the inner western suburb of Flemington, was also anxious about the atmosphere after he saw Abdallah's name on police bulletin boards. According to Roma Carew, the mother of Stephen Carew, a close friend of Abdallah, Musgrave warned her in December 1988 that if the police got to Abdallah first "the bastards will kill him". Stephen Carew said Musgrave approached him twice and urged that Abdallah give himself up to police, promising to ensure that Abdallah got the warning. Det. John Noonan (left) Jason Ryan and Victor Pierce (right) Noonan assured Abdallah that he was not wanted in any relation to the case. Abdallah's car, suspected of being used in the getaway, had been sold before the murders. It was later obtained by police although their tests proved nothing. He claimed not to have heard of the murders until the following day in the newspaper. Abdallah also said he never used telephones throwing police accusations that he'd phoned fellow suspects McKevoy and Pettingill out the window. Abdallah told Noonan that he didn't believe his friend Jed Houghton would ever have anything to do with Jason Ryan. Abdallah thought that Houghton couldn't stand him thinking that he was untrustworthy with a big mouth. Noonan sent Abdallah to arson over the Simons Nightclub incident. He was then bailed. Although Noonan assured him of his presumed innocence, Abdallah was immediately trailed. The police then planted a listening device in Abdallah's flat in Drummond Street, Carlton, and set up a permanent surveillance position in the building opposite. Abdallah's lease ended on Sunday April 9, 1989. Police surveillance was also about to end. He left his flat momentarily, was trailed by police who intercepted him and returned him home. Police claim he was being arrested for the attempted murder of a policeman's son several weeks before. It was there that Abdallah allegedly pulled an imitation pistol on detectives Cliff Lockwood and Dermot Avon from City West CIB. Lockwood fired six shots from his gun and then let off another one from his partners weapon. Abdallah was critically wounded and died after 40 days in a coma from complications arising from a bullet wound to the back of the head. When Gary Abdallah was shot and eventually died there was a large amount of media attention paid to the circumstances of his shooting. The Abdallah family and their solicitor were vocal in questioning the police version of events and demanding an independent public inquiry. Other influential groups and individuals also publicly questioned the shootings. The fact that Gary Abdallah was shot at seven times and had a bullet wound in the back of his head were not matters that could be readily explained. It was announced that there would be a special series of coronial inquiries into the shootings. The inquest has examined the circumstances of the shootings in a way that has never been done previously. The Deputy Ombudsman began an inquiry into the circumstances of the shooting of Gary Abdallah and after an eight-month investigation suggested that the two detectives at the fatal shooting appeared to have agreed to corroborate each other's false accounts (The Herald, 22 December 1989). One level of criticism against police suggested that in the wake of the killing of the two police officers revenge overcame reason in the police force. A lawyer representing a man charged in relation to the 'Walsh Street' killings said in court, while objecting to his client being held in custody, 'he is probably safer in Pentridge than on the streets where he could be subjected to a bullet in the back of his head' (The Sun, 13 September 1990). The coroner was told that 'After the two young policemen were killed, it was if the police had some kind of vendetta' (The Age, 13 September 1990). Mrs Carew, a local resident, told the coroner that a local Justice of the Peace, who she had known for many years, came to her house and asked her to get her sons to tell Abdallah, who at the time police wanted to question about 'Walsh Street' to come to his home and he would make sure that Abdallah 'got to the police station all right'. She said the Justice of the Peace told her: 'If they get to him first, the bastards will kill him'. In 1989, the Victorian government appointed state coroner Hal Hallenstein to conduct an inquiry into police killings following the shooting of Abdallah. Abdallah's family asked the deputy ombudsman, Dr Barry Perry, to investigate the shooting. His 329-page report was completed shortly before Christmas 1989. It said that "the evidence seems to provide some basis for believing that there was criminal conduct" in the police shooting. During the inquest, the Abdallah family lawyer expressed a more direct view: the pistol was a plant and Abdallah was on his knees, his hands behind his head, when he was shot like a dog on a short lead. In Victoria there were eleven fatal shootings by police in the two year period up to April 1989. This compares to only ten fatal shootings by police in the previous thirteen years. The number of fatal shootings by police had increased from only two in 1985 and one in 1986 to five in 1987 and five in 1988. The fatal shooting of Abdallah led to growing demands for a judicial inquiry into the shootings. Those calling for such an inquiry included families of some of the deceased, the Federation of Community Legal Centres, the Victorian Council of Civil Liberties, Member of Parliament Mr Neil Cole, Pentridge prison chaplain, Father Peter Norden, and the Bar Association. These demands were based on the growing number of shootings, the circumstances surrounding some of the shootings and the belief that the usual investigation by the Homicide Squad overseen by the police Internal Investigation Department and an inquiry by the coroner would not be sufficient to uncover any wrongdoing by police involved. The shootings became the subject of growing media attention and a public meeting was organised by the families of the deceased and the Flemington Legal Service. Hundreds of people attended the public meeting and passed a motion calling on the government to set up a judicial inquiry into the shootings and police accountability. There may be something wrong with Avons left eye,one time he faced me and his wandering eye was moving around the ceiling in the corner.If I was partnering this dingbat I would carry a knife as well nic.(should regulations allow of course.) See you weds,suckers.Get your stories straight. From profrv at nex.net.au Mon Sep 9 04:37:58 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 21:37:58 +1000 Subject: Capita Punishment UK Stasi. Message-ID: <5.1.0.14.0.20020909213637.00a03390@mail.nex.net.au> Two in five face job vetting in drive to detect offenders 'The new Criminal Records Bureau predicts that within three years it will be making more than 11 million checks on past offenders, out of a working-age population of 29 million [in the UK]. The police previously made about one million criminal record checks a year ... The government drive means that a Criminal Record Certificate could soon become as essential for a job interview as a curriculum vitae and a suit ... Of the 11,627,595 checks predicted to be made each year from 2005, only 3.2 million will be on those who work with children. The other eight million or so certificates will be requested by people seeking to apply for work in a wide variety of other roles and professions. To reach these targets - which the bureau must hit if it is to become a self-funding body - employers will have to be encouraged to demand the £12 certificates from applicants' ( Independent ) The CRB has received a great deal of coverage in the UK media over the last two weeks, after it failed to clear a huge backlog of checks on school staff in time for the start of term. As the CRB is nominally a Home Office agency, the public has been given the impression that this was a civil service cock-up. In fact, the work of the CRB is performed by Capita, a private firm with a long record of botching government contracts See also this Telegraph article, and this Guardian article Capita punishment 'New Labour can't master the "ever-faster waves of technology". All it can do is produce needless suffering and throw public money at bungling and rapacious corporations. In all the coverage of the Criminal Records Bureau fiasco, few journalists have noticed the boldness of the Home Office's ambition. At the moment, Capita, the out-sourcing company whose failure to deliver benefits or stop fraud has made it an old friend of this column, can't check the criminal records of teachers. Children are probably dying on the roads because Ministers are too scared of the post-Soham tabloids to allow them into the safety of the classrooms. Today's scandal, however, could well be dwarfed in the spring ...' ( Nick Cohen via Observer ) See also this article by Michael Mandel from 1997, this Observer report quoting Scotland Yard sources as saying that CRB checks are likely to be virtually useless in any case, as the police database against which the checks are made is riddled with errors.LINKS? http://www.hullocentral.demon.co.uk/site/anfin.htm From schear at lvcm.com Mon Sep 9 22:58:33 2002 From: schear at lvcm.com (Steve Schear) Date: Mon, 09 Sep 2002 22:58:33 -0700 Subject: A message from Alan I. Leshner, AAAS CEO Message-ID: <5.1.0.14.2.20020909225527.02a508e0@pop3.lvcm.com> At 08:35 PM 9/9/2002 +0100, Peter Fairbrother wrote: >I think it's actually quite reasonable: below is the proposed new list, and >except for malicious reasons I can't think why anyone would want to use them >outside a fully-equipped lab (with an on-site medical presence etc). Anyone >who does is showing negligent disregard for human safety. And his own. Peter, After reviewing the list I don't deny the dangers inherent in experimenting with these items. My objection has to do with the federal government's involvement. Over the past ten years I've made it a "hobby" to study the detailed legislative histories of several key constitutional amendments (e.g., the 14th and 16th) and Supreme Court rulings on these amendments and their interpretations of the Commerce Clause and Necessary and Proper Clauses. I've read the works of and discussed the findings with a number of Constitutional scholars (e.g., Larry Lessig and Eugene Volokh). In general they support my conclusions and share a serious concern for the frightening lack of respect Congress and the Supreme Court have shown the Constitution and our liberties. If I am right substantial portions of federal law passed since the Civil War (and especially since the FDR administration) have no basis in a clear reading of the Constitution. I have no qualms with my state regulating many of my behaviors and possessions, but find the federal involvement unlawful and unacceptable in this area. Most of my fellow citizens accept an almost unlimited federal involvement in our daily lives. The Founders placed many safeguards in the Constitution to prevent this, but Congress and the Courts have found illegal circumventions. Most Americans would rather not know that their liberties have been and are continuing to be drained away by the unconstitutional practices of the supposed guardians of their liberties. They believe that the current balance struck is the best under the circumstances. In fact, they are frightened by (or consider mentally unbalanced or unpatriotic) anyone who would raise serious objections. I am left to protect my rights the best I can, even if it means violating unlawful regulations. If you are one of the "many" you will probably find my ranting that of a loon. If not, a good place to start your inquiry is with the recently published book, "The Real Lincoln," by Thomas diLorenzo http://www.amazon.com/exec/obidos/ASIN/0761536418/lewrockwell/104-1710778-1366320. Its causing quite a stir in American historical circles. http://www.washtimes.com/civilwar/20020504-87400616.htm http://www.lewrockwell.com/dieteman/dieteman115.html http://www.lewrockwell.com/dilorenzo/dilorenzo14.html steve From profrv at nex.net.au Mon Sep 9 06:05:16 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 23:05:16 +1000 Subject: Secret Service in crisis. Message-ID: <5.1.0.14.0.20020909230225.009eea40@mail.nex.net.au> http://www.usnews.com/usnews/issue/020909/usnews/9service.htm On a warm summer night last year, a 19-year-old woman sat in a crowded bar, engaged in a rite of passage familiar to countless college-age teens: persuading a bartender to break the law and sell her a drink. This was no ordinary teenager, though. She was Jenna Bush, the daughter of President George W. and first lady Laura Bush. The bartender was amenable to serving the young woman–until he spotted two agents from her Secret Service detail. Nervous, he approached the agents and asked what he should do. Use your best judgment, the agents shrugged. The bartender promptly asked Jenna Bush to leave. She was furious. A Secret Service agent familiar with the incident told U.S. News that Jenna berated her agents, then fled the bar into a dark alley. Sources say one of the agents chased Jenna, and she taunted him. "You know if anything happens to me," she said, "my dad would have your ass." Not quite. After she called her father to complain about the incident, which is still widely recounted among agents, President Bush declined to side with Jenna. Laura Bush, however, was concerned about what Jenna and her twin sister, Barbara, view as repeated intrusions into their privacy. As a result, sources say, agents assigned to the protective details of the Bush twins have been ordered to pull back from traditional methods of coverage. Many agents say they regard this as a serious security risk. "They have no concept," says one source who has protected members of the Bush family. ". . . They act like they don't have any concept of world events and how vulnerable they are or can be." Protecting the lives of families of top government officials has never been easy. By the same token, living under the controlling, intrusive, often overbearing, and seemingly omnipotent presence of agents can be stifling for political leaders and their families, especially for children. Presidents do what they can to strike a balance between protecting themselves and their families by acceding to the demands of agents, at the same time fighting for the right to have some semblance of a normal life. Some family members unused to the constant presence of armed law enforcement officers seek restrictions on agents' activities and guarantees of privacy. Others, more hostile, rebel and try to give their minders the slip, as Jenna's sister, Barbara, has done. Last April, Barbara's agents were lampooned by the Yale University magazine Rumpus after the car she was in sped through an E-ZPass lane as Barbara and her friends drove from New Haven, Conn., to a World Wrestling Federation match in New York. Members of her security detail had to wait in the toll lane on a bridge into Manhattan, then weave through traffic at high speeds to catch up. In Texas, Jenna evaded her Secret Service agents following class last fall, after the September 11 attacks, sources say. When she finally surfaced after several hours, a supervisor on her protective detail lectured the young woman and warned against repeating such behavior. The Bush twins aren't alone. Secret Service sources tell U.S. News that shortly after 9/11, President Bush sought expanded coverage for other Bush family members through an executive order. But this June, President Bush changed his mind and ordered the Secret Service to discontinue the security details he had authorized for several family members. "They are dictating coverage," says a Secret Service agent. "And what's worse is we're letting them." "Protective methodology." After September 11, Secret Service executives made significant additions to President Bush's security arrangements. But some agents worry that Bush's ranch in Crawford, Texas, with its vast, open spaces, poses serious staffing and logistical challenges, difficulties that give pause to even the toughest military-trained tactical teams in the service. Providing security for its protectees in remote locations like the president's ranch is regarded as among the most difficult challenges by Secret Service executives, agents, and officers. How to best guarantee the safety of the president, the vice president, and their families is just one element of a larger debate among line agents, uniformed officers, and Secret Service executives about the agency's changing role and responsibilities. In the past year, Director Brian Stafford has implemented a broad new security theory known as "protective methodology." Many agents and officers say this plan goes against the grain of time-tested Secret Service methods and practices and could expose protectees and their bodyguards to possible attack by reducing customary layers of protective "insulation." The changes include cutting the number of posts where agents and officers stand guard, eliminating some technical assets like magnetometers, ballistic glass, and armored plating, and withdrawing Counter Sniper, Counter Surveillance, Counter Assault, and other tactical teams. "Basically, what we are doing now and what we were trained to do are at different ends of the spectrum," says a veteran agent. "It doesn't make sense." Director Stafford declined to respond to an interview request. Paul Irving, who heads the Office of Government Liaison and Public Affairs, also failed to reply to a detailed list of questions for this article. A senior White House official who works closely with the Secret Service said he believes the service is doing a "terrific" job protecting President Bush and other top government officials and their families. Scott McClellan, a White House spokesman, also declined to respond to specific questions, saying, "We do not discuss security issues. The president and Mrs. Bush are grateful and appreciative for the outstanding job the Secret Service does in protecting the first family and others." Traditionally, the Secret Service has relied on a guarantee of 360-degree coverage of its protectees. The approach calls for a team of agents enveloping the person under protection in a kind of moving box, covering him or her from all angles. The new protective methodology, by contrast, is based on an evaluation of "threat assessments," calculating different levels of risk confronting protectees like the vice president, his wife, and their children, the president's children, and the first lady. Using current intelligence information and historic precedents like past assassination attempts, Secret Service executives determine how many agents and what kinds of special teams and capabilities to assign individual protectees. For instance, vice presidents have been considered a relatively low assassination risk. Vice President Cheney, as a result, under the protective methodology approach, like other VPs, has received fewer assets and tactical support teams than the president. Some Secret Service agents say that a protective theory based so heavily on intelligence analysis may be dangerously flawed, especially in light of the intelligence failures that occurred prior to the September 11 attacks on the World Trade Center and the Pentagon. These individuals say that Secret Service executives have sometimes ignored or discounted security recommendations more heavily weighted to intelligence analysis, despite the fact that such analysis has been so heavily emphasized by Director Stafford and other proponents of the protective-methodology theory. Shortly after September 11, Cheney's security was beefed up. Then in December, Stafford and his deputy, Danny Spriggs, met with Secret Service agents and Uniformed Division officers at the Naval Observatory, Cheney's official residence. Sources say the meeting was intended as a morale booster. Stafford told the agents and officers that though they were not assigned to the elite presidential protective detail, they were doing a vitally important job. Intelligence analysts rated Cheney as a higher security risk than President Bush, Stafford continued, because of his having served as the first President Bush's secretary of defense during the Persian Gulf War a decade ago. The war, and the presence of thousands of American troops in Saudi Arabia before, during and after it, have been cited as a principal source of grievance by Osama bin Laden and others in his al Qaeda terrorist organization. Shortly after the meeting, however, several sources tell U.S. News, Secret Service executives reduced the level of Cheney's protection. "You say this guy is the biggest threat? They started cutting," says one former officer. "They were short of manpower for the Olympics. They cut posts everywhere." By Christmas, several Secret Service officials say, the special Counter Assault, Counter Sniper, and Emergency Response teams assigned to Cheney immediately after September 11 were phased out. For months, the Secret Service also rejected recommendations for magnetometers, or X-ray machines, to screen attendees at public events where Cheney appeared. These same sources say the service began assigning more Mag officers, as they are called, to Cheney's detail after U.S. News reported (June 17, 2002) on the agency's recent cost-cutting measures and personnel difficulties. The Treasury Department's inspector general initiated an investigation of each of the allegations cited in the magazine's earlier story. That inquiry is continuing, sources say. The department's top law enforcement official, Under Secretary for Law Enforcement Jimmy Gurulé, sources say, has also begun interviewing officers to gauge the extent of problems documented by the magazine in the Secret Service's Uniformed Division. "Brokenhearted." The agents who spoke to U.S. News for this account are all currently employed by the Secret Service and have held a variety of high-profile assignments, including protecting the president and vice president, the first lady, Lynne Cheney, and other members of the Bush and Cheney families. They spoke on condition of strict anonymity. In addition, U.S. News spoke to many former Uniformed Division officers who have guarded the White House complex and foreign embassies in and around Washington, D.C. The agents and officers declined to discuss sensitive protective techniques and methods so as not to compromise protectees' safety or the security of the White House complex. Many of the agents and officers told the magazine that they decided to come forward after the earlier U.S. News article because of growing concerns about their ability to ensure the safety of some protectees–family members who typically receive little or no protective coverage. More than a dozen agents who have served on protective details for a particular family member at various times over the past year have expressed concern that security measures the Secret Service has implemented on that individual's behalf were dangerously inadequate. U.S. News has refrained from publishing certain security information obtained during the reporting and research for this article and is withholding the name, location, and other details about the individual cited by these agents for security reasons. "If something happens to this protectee," says one agent, "it would cause great embarrassment. Not to mention the family; they would be brokenhearted." In addition to the merits of the new protective-methodology plan, some agents question the timing of its implementation. The Secret Service budget has increased 75 percent since 1999, to $1.05 billion today. At the same time, though, the service has suffered a debilitating loss of manpower while the scope of its protective and investigative missions has increased significantly. After the September 11 attacks, President Bush increased the number of protectees from 17 to 38. The number is now down to 22, but that's still a significant increase for a relatively small force of nearly 3,000 agents and roughly 1,000 Uniformed Division officers. The service has butted heads with other agencies like the FBI as it has sought to expand the original mission for which it was created–combating counterfeiting–to take on new responsibilities like investigating cybercrimes and international financial crimes. The service has also been given primary responsibility for providing security at what it calls national security special events like the Super Bowl and the recent Winter Olympics Games in Salt Lake City. The new missions come at the same time the departures of agents and officers are accelerating. In the past year, more than 100 plainclothes agents have retired, quit, or taken jobs with the newly created Transportation Security Administration, internal Secret Service records show. In the past two months alone, the service has lost special agents-in-charge of its field offices in Cincinnati, Oklahoma City, Orlando, St. Louis, Atlanta, Minneapolis, and Kansas City, Mo. Many agents say they are leaving because they are fed up and want better pay and more humane working conditions, including less travel. These agents are averaging 81 hours overtime per month. A unique Secret Service pension plan allows retirement-age agents to rejoin the federal government at other agencies at elevated pay grades. Even elite Counter Sniper technicians from the Uniformed Division, who fill some of the most-sought-after and prestigious positions in the service, are leaving. CS marksmen guard the roof of the White House and travel on presidential and vice presidential advance trips to identify and assess possible security risks. Sometimes, Secret Service executives have had so few CS technicians that they have been forced to resort to what one source describes as "pseudo protection," for presidential or vice presidential events, shining powerful floodlights, hanging huge drapes, or erecting special barriers in lieu of posting Counter Snipers at vulnerable location. In recent months, the shortage of CS technicians has been so acute that on several occasions, only one officer has been assigned to plan advance security for an event involving the president or vice president. "They were cutting down power to do basic assessments," says a veteran Secret Service official. "CS advance is very difficult. You could see [the technician] running around like a madman." Double standard. Morale in the service is plummeting, many agents say, in part because of a widely perceived double standard. Agents who enjoy close relationships with Secret Service executives in Washington are given more favorable assignments and other treatment than those who don't, many in the service say. In the sometimes arcane parlance of the Secret Service, these agents have what is known as a "hook" with headquarters. The Secret Service has also had long-standing management difficulties with its Uniformed Division, the officers and technicians who are at the front line of defense at the White House and at foreign missions. They include members of the elite Counter Sniper teams, the Emergency Response Team, and the K-9 bomb squad units. Many of these officers complain of being treated as second-class citizens. Plainclothes agents sometimes refer to uniformed officers as "box creatures," because they stand watch in the little white booths around the White House grounds. Sources say that some officers who transferred and became plainclothes agents found anonymous notes soon after taking up their new duties saying, "once a guard, always a guard." Many of the uniformed officers are overworked, with even supervisors forced to put in an enormous amount of overtime. Since last October, the Secret Service has lost more than 256 Uniformed Division officers, according to internal statistics provided to U.S. News; if current trends continue, the total could rise as high as 400 by year's end, nearly a third of the Uniformed Division's workforce. The personnel drain throughout the service has led to a decrease in the number of officers and agents available to protect the White House. "They cut posts around the White House before 9/11," says one source. Secret Service executives have had to shift officers who train cadets at the Beltsville, Md., academy to the White House complex. Officers assigned to guard foreign missions around Washington have also been shifted to stand post at 1600 Pennsylvania Avenue. Valued members of the Secret Service's technical staff are also departing in significant numbers, including telephone and computer experts and highly trained encryption specialists. Pressure cooker. The numbers alone are alarming, many inside the Secret Service say, but they also translate into a worrisome loss of experience among those who remain. When veteran trainers and supervisors leave, they take with them years of institutional knowledge and practical, hands-on experience that often cannot be taught by less experienced personnel. Agents and former Uniformed Division officers tell U.S. News that they fear that the enormous pressure to quickly hire and train new agents, combined with the lower hiring standards that were implemented in recent years, may further compromise security, if the wrong people are brought on board. In the past, Secret Service job applicants who had used any drugs, including marijuana, cocaine, and heroin, were automatically disqualified and sent on their way. But now, sources say, an applicant who has stayed clear of marijuana for just 36 months and smoked it only 10 times can still qualify. And the Secret Service will consider candidates with cocaine or heroin use–as long as it was before their 21st birthday. The service now classifies such activity as a "youthful indiscretion." In meetings with members of Congress, Treasury Department overseers, and White House officials, Secret Service executives have sought to downplay the extent of personnel problems. But they have also had little to say publicly about their new approach to guarding high government officials and their families. Director Stafford and his deputies have committed very little information about the new protective-methology procedures to paper, several agents say. These agents worry that there has not been the kind of rigorous training, testing, and lesson planning based on the new protective theory, as has been the case with traditional protective methods. Agents and officers interviewed for this article expressed concern that if something goes wrong, there is so little on paper about the protective-methodology procedures that line agents and officers may be held accountable for decisions made by higher-ups. "Congress," says one veteran agent, "is going to grill our behinds, barbecue our backsides when, not if, but when–something happens." Adds another agent: "All you're doing is counting the days and hours you've been lucky." Some key causes of concern: The Secret Service is so hard pressed to find trained Mag officers to screen people attending public functions with the president, vice president, and other top officials that it has had to reduce the number of such officers at some events. When heads of Secret Service details request Mag officers, they are often told that none is available; when they turn in security advance plans to headquarters, approved plans often come back with the number of Mag officers reduced, even for the president's detail, sources say. Detail heads have been forced on some occasions to pull agents from other posts to fill in near X-ray machines to scan crowds or even to use hand-held devices to screen attendees. One source says agents assigned to Cheney always make sure they are "vested up," have their bulletproof vests on, when they don't get magnetometer support and worry that a terrorist or a deranged person might sneak a gun into an event. Because of concerns in part over excessive cost, Secret Service officials have declined to install ballistic glass in front of windows of hotels or other venues where key protectees have been scheduled to appear. "They won't put up ballistic glass," says an agent, "because they have to pay money to bring in a truck with a hydraulic lift to roll the glass in." Supervisors also frequently nix requests from agents for camouflaged armored sheets of steel used at outdoor events or in hotels to guard against sniper fire. Agents say the Secret Service has failed to adjust its post-9/11 security procedures to address the potential threat of an aerial attack. The service, sources say, must demand more aggressive vetting of small aircraft by local police and other government agencies in advance of public events involving the president and vice president. Agents say they are especially worried about charter planes, because they receive virtually no security screening and their flight paths are typically not monitored. "It raises concerns," says one agent, "about how to reassure those who are under our protection about their safety, when really, we can't." Security precautions taken for the first lady, some agents say, are often dangerously inadequate. In Washington, Laura Bush's motorcade does not even get the benefit of "intersection control"–coordinated traffic lights, a basic security measure accorded many high-risk visiting foreign dignitaries. And agents say they are concerned about the security of the vice president's wife, Lynne. When her father was president, Chelsea Clinton was regularly assigned a two-man Counter Assault Team, in addition to her regular detail, after she received threats when she was a Stanford University student. The Bush daughters briefly were assigned similar teams after September 11, sources say, but they have since been pulled back. Added to the loss of experienced agents and officers, many in the Secret Service believe executives remain skeptical of the value of some elite special units like Counter Assault, Counter Surveillance, and Emergency Response teams–the Pentagon-trained Uniformed Division officers who protect the White House. These sources say that many senior supervisory agents in the field and officials at headquarters are philosophically at odds with using these techniques. "They think we are cowboys," says a former veteran Emergency Response Team member, "and that it's overkill." This former officer and other sources say there's a kind of generation gap, due in part to the fact that many senior officials never went through the specialized training now required of the Secret Service's most elite units. Training is a key measurement. Many agents and officers describe the training of new recruits as excellent, but others say the Secret Service is behind the curve. "These guys think old school," says one former officer who came to the Secret Service from the military. The specialized teams train to respond to multiple threats, like the September 11 attacks, and to rocket, chemical, and biological assaults. But most officers not on the elite teams and nonspecial team agents are still trained on a "single cycle" threat, such as that posed by a lone gunman. Some of these agents believe that after 9/11, the service should have modified its training curriculum to focus more on responding to multipronged attacks. "Standing down." Paramount among the Secret Service's high-priority protective missions, of course, is the White House and its inhabitants. Despite the agency's ability to scramble and redeploy agents and officers from other responsibilities over the past year, the challenge is only likely to grow, agents and officers say. More than five years ago, special operations experts from the elite military counterterrorism unit Delta Force conducted a threat assessment of the White House and found numerous vulnerabilities. Secret Service executives have implemented only a few minor changes since that study, sources say. The threats are varied and not easy, in some cases, to counter. Veteran Secret Service officers worry, for example, about the long-standing custom of "standing down" when members of Congress come to call at 1600 Pennsylvania Avenue. One former officer says he requested a congressman's voting card to double-check the member's identification and was "reamed out" by his supervisor after the congressman complained. Officers who spoke with U.S. News for this article say they have been forced time and again to allow members of Congress to enter the White House complex without identification because they have complained loudly when challenged. The worries, these sources say, are not misplaced. In April 1994, at the funeral reception for former President Richard Nixon at his library in Yorba Linda, Calif., a middle-aged man using fake identification papers sauntered through the VIP-congressional area and approached then President Clinton and former President George Bush. He attempted to engage them in conversation before he was finally detained, arrested, and charged with trespassing. "There's no way we can know even a quarter of these people," says one officer. "Yet we are supposed to allow them onto the ground without a picture ID. You can buy congressional pins or congressional license plates off eBay." The Secret Service has a long and proud history of meeting difficult challenges and beating them. Many agents and officers, still intensely loyal to the agency, say they believe that with the right leadership and an influx of new blood, the service can handle whatever new demands it is required to meet. But others worry that the double whammy of personnel losses and increased responsibilities may be impeding the ability of the agency to function at the high levels expected of it. For some in the Secret Service, that challenge comes down to a decidedly personal level. "I hate to say this, but I couldn't have cared less," says one officer who has left the service. "If someone tried something, I probably would have missed it, because I just did not care." From profrv at nex.net.au Mon Sep 9 06:06:34 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 23:06:34 +1000 Subject: Secret Service crisis 2. Message-ID: <5.1.0.14.0.20020909230519.009fb1b0@mail.nex.net.au> First Lady cancels USN&WR interview over Secret Service cover story President Bush and his wife are steaming over U.S. News & World Report's story about Secret Service protection for their twin daughters. White House spokesman Ari Fleischer calls the article "a disappointing departure from the media's traditional role of respecting the privacy of the president's family," but editor Brian Duffy tells Howard Kurtz the magazine performed "the usual balancing act between privacy concerns and whether the measures being taken are adequate to ensure (the twins') safety." (Washington Post) http://www.poynter.org/medianews/ From profrv at nex.net.au Mon Sep 9 06:21:09 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 23:21:09 +1000 Subject: Busy week in counterintelligence. Message-ID: <5.1.0.14.0.20020909232018.009e7ec0@mail.nex.net.au> Petty officer took hard drives, data In a case interlaced with theft, potential espionage and the Sept. 11 terrorist attack on the Pentagon, a Navy submariner pleaded guilty yesterday to charges he improperly possessed defense secrets and stole and sold government-owned computer hard drives......( Union-Tribune, 7 Sep 02) Sailor possessed military secrets Navy submariner pleaded guilty to charges he improperly possessed defense secrets and stole government-owned computer hard drives, which he later sold on the Internet.....( AP, 7 Sep 02) Little Change in a System That Failed The Central Intelligence Agency and the Federal Bureau of Investigation have proven remarkably resilient in defense of their own turf.....( New York Times, 8 Sep 02) When Playing the Field, the Game Gets Rough THE conventional wisdom about what is troubling American intelligence, particularly human intelligence — the stuff spies do — is that the system is broken; that on Sept. 11 the Central Intelligence Agency just did not have enough language-qualified spy handlers on the ground around the world to do the job.....( New York Times op-ed by Milt Bearden, 8 Sep 02) Spy History 101: America's Intelligence Quotient MOST of America's best-known spies — from Nathan Hale to Francis Gary Powers and from the Rosenbergs to Aldrich H. Ames — are remembered because they got caught or because they spied against their country.....( New York Times, 8 Sep 02) Getting the Intelligence Services a Vulnerable Nation Needs If anything changed after Sept. 11, it was America's sense of invulnerability. Suddenly, this became a nation under threat, a nation without security. What needs to be done, what can be done — short and long term — by the intelligence services to protect the United States against future attack?.....( New York Times, 8 Sep 02) Eyes in the Sky, Ears to the Wall, and Still Wanting ....For more than 50 years, providing the country with early warning of a nuclear missile attack from Russia has been the first priority of the American intelligence community. The system has worked well, thanks largely to billions of dollars worth of technical intelligence.....( New York Times op-ed by James Bamford, 8 Sep 02) Learning to Spy With Allies What will Al Qaeda do next? One big problem in figuring it out has been that, in important ways, the terrorist network is more effectively globalized than the modern intelligence organizations that try to penetrate it....( New York Times, 8 Sep 02) Bin Laden's Guys Have Cloaks and Daggers, Too FOR all the resources American agents are devoting to watching the myriad tentacles of Al Qaeda, one of the things they have been forced to consider is that Al Qaeda may be watching them.....( New York Times, 8 Sep 02) Pearl Harbor as Prologue Why does intelligence fail? Remember Pearl Harbor....( New York Times, 8 Sep 02) Trust No One: In New York, Everyone Is Suspect now thinks we ought to keep an eye out for suspicious behavior and bring it to the attention of the experts who keep files on suspiciousness.....( New York Times, 8 Sep 02) Face It: Your Looks Are Revealing In the last year, intelligence agents have been showing more interest in the work of the California psychologist Paul Ekman than ever before.....( New York Times, 8 Sep 02) The Real Me: The Online Version It is no secret that the Internet offers a wealth of information. It's even known that much of what we used to call "intelligence" is freely available online. I decided to find out what I could learn about myself just by consulting Internet-based resources....( New York Times, 8 Sep 02) Book Contends Chief of A-Bomb Team Was Once a Communist Adding a startling chapter to the long historical debate over the secret laboratory that developed the atom bomb in World War II, a new book concludes that its leader, Dr. J. Robert Oppenheimer, belonged to the American Communist Party in the late 1930's and early 40's.....( New York Times, 8 Sep 02) [Read review of book by CI Centre Professor Nigel West] Trial alleges Guatemalan guard's deadly role Myrna Mack knew the death squads were after her. The 39-year-old anthropologist asked neighbors to watch for intruders outside her home, began varying her travel habits and told a priest she feared for her life. They got her anyway.....( AP, 8 Sep 02) The US is expanding its Echelon spy network THE DEFENSE MINISTRY SAYS THAT BUILDING AN AMERICAN RADAR STATION IN LATVIA COULD ENDANGER THE SECURITY OF NORTH-WESTERN EUROPE. RUSSIAN STRATEGISTS ARE ALREADY REGRETTING SHUTTING DOWN THE RADIO INTELLIGENCE STATION AT LOURDES, CUBA, AND ARE ACCUSING THE US OF INCONSISTENCY AND DOUBLE STANDARDS.....( Russia Weekly, 8 Sep 02) http://www.cicentre.com/ From profrv at nex.net.au Mon Sep 9 06:43:12 2002 From: profrv at nex.net.au (Matthew X) Date: Mon, 09 Sep 2002 23:43:12 +1000 Subject: R.A.T.M. Message-ID: <5.1.0.14.0.20020909233915.009fbbc0@mail.nex.net.au> http://www.ratm.com/ Rage against the machine reformation rumours. http://www.musicfanclubs.org/rage/ Renegades of funk. The revolutionary band Rage Against the Machine has announced today that they would be uniting again after the band disbanded to pursue separate careers over a year ago. "We've been re-called by the Sony corporation to sell products to the masses." Said lead singer Zach de la Rocha at a press conference last Thursday. The band also announced that because they have re-united they are making some new changes to their old records. In this article they have asked me to include the new lyric sheets for some of the new songs and to name-drop their major brand name corporation, Sony. Who are now using the once revolutionary song Killing In The Name Of, to pimp the world the Sony corporation's video game machine, Playstation. The re-naming of their songs has spawned from this new revolutionary co-opt. "The first song we want to change is Guerilla Radio. We decided to change it to 'Sony Playstation'. We were gonna change it to 'Sony Radio' but decided to go with 'Sony Playstation' as we thought this might be better to pimp Playstations" said lead singer Zach de la Rocha. Their new lyrics have been dubbed by Maximum Rock and Roll as "The most revolutionary new mantra the sony corporation has ever owned." The new lyrics are as follow: Guerilla playstation! "Transmission third world war third round. Play Colin Mcrae Rally for full surround sound No shelter if your looking for shade, most of our games come from Accolade. As the polls close like I casket, all truth devoured You'll see our ads in the shadow of power. A spectacle monopolized, buy Sony II there's no choice disguised. Is it Crash Bandicoot for those who burn and toil? Or free toasters for the thirst for blood and oil A spectacle monopolized we hold the reigns now close your eyes For the fist-a-gon and Sony corporation Who stuff the banks and staff the party ranks Exports? Or housing for the poor. None of the above fuck it plug in the chord Lights out, Sony Playstation Turn that shit on Lights out Sony Playstation. Turn that shit on! Contact I hijacked the TV screen Selling you Playstation and our CDs Way past the days of protesting DC Sound off. Now you'll never be free. Who got 'em yo check the federal file. All you Rage fans see they sold out in style The army of pigs smiles then bins your file Cause your on the idiot box and the radio dial Lights out Sony Playstation. Turn that shit on. Lights out Sony Playstation. Turn that shit on" With smashing lyrics like that they sell playstatoins to the poorest most oppressed RATM fans. They have also announced that their song that was almost number one around the world was also going to be changed. Killing in the Name Of which was a major success world wide, is now being changed to Sellin' Sony Playstation the lyrics are as follows: So I know that market forces. Call for big corporate mergers The call for big corporate mergers Are because of market forces Selling Sony Playstation Selling Sony Playstation MORE ON http://www.raisethefist.com/news.cgi?artical=wire/----9858853t4a.article From martyn at emailaccount.com Mon Sep 9 23:53:47 2002 From: martyn at emailaccount.com (Martyn) Date: Mon, 9 Sep 2002 23:53:47 Subject: NEW 100% FREE AUCTION SITE TO BUY & SELL Message-ID: <200209092243.g89MhJk1020461@ak47.algebra.com> A new auction site just opened & it is offering free sign up & then free for all to sell or bid all their products.Check their link out as follows so you can add all your Items for sale.This site has only just started a few months ago & it will be advertised/promoted in the coming months so you have a good opportunity to sell your products from time to time.Go on and check it out & place your Items for Auction, you have nothing to lose but sales to gain. http://scripts.cgispy.com/auctions/auction.pl?user=prh1967 ======================================================================= This is not a spam! Your are receiving this email either because,you asked for it, you have sent me an email in the past, or you are on a list of marketers requesting information or FFA network etc. If this is not the case, PLEASE accept my sincerest apologies and reply to martyn at emailaccount.com with "remove" in the subject field. I will remove your name immediately! ======================================================================= From profrv at nex.net.au Mon Sep 9 07:00:05 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 00:00:05 +1000 Subject: San Diego secrets a go go. Message-ID: <5.1.0.14.0.20020909235827.00a05130@mail.nex.net.au> http://www.signonsandiego.com/news/military/20020907-9999_2m7computer.html Sailor gets 7 months in theft of secret Navy property Petty officer took hard drives, data By James W. Crawley UNION-TRIBUNE STAFF WRITER September 7, 2002 In a case interlaced with theft, potential espionage and the Sept. 11 terrorist attack on the Pentagon, a Navy submariner pleaded guilty yesterday to charges he improperly possessed defense secrets and stole and sold government-owned computer hard drives. Petty Officer 1st Class Bryan Moody was sentenced by a military judge to seven months in the brig, loss of pay and was reduced to seaman recruit. Moody, an electrician's mate, formerly assigned to the submarine Helena at Point Loma Naval Base, likely will be dismissed from the Navy after he completes his sentence. Despite describing the case as "extremely troubling," Navy prosecutors agreed to lesser charges to keep classified information from being divulged during the court-martial and for Moody's cooperation in determining whether military secrets were compromised. "The primary importance in these cases is the damage assessment," said Lt. Cmdr. Shannon Kopplin. "There is a competing government concern that's of equal or greater importance than confining someone (in jail)." As part of the plea bargain, the most serious charge, possession of classified information, was dropped in favor of a lesser count of possessing national defense documents. Moody could have been sentenced to more than 18 years on all the charges. Navy investigators found dozens of computer diskettes, a secret Navy chart and three pictures that officials said were classified "secret" at Moody's San Diego home and at his former wife's residence in San Diego, after she called authorities. The diskettes reportedly contained classified tests and exam questions about the nuclear reactors and submarine operations, both closely held naval secrets. The chart, sources familiar with the case said, included information about efforts to track a Russian submarine off the West Coast several years ago. Navy officials, citing security concerns, refused to comment. The pictures showed Moody and another sailor inside the Helena's top-secret reactor compartment, sources said. Between 1996 and June 2001, Moody stole from the Helena at least five computer hard drives, which the Navy was trading in for new equipment. Moody sold three of the five drives on E-Bay to people in Illinois, Pennsylvania and Florida. Naval Criminal Investigative Service agents tracked down two drives, but one sold to a man in Florida was resold to a Texas used-parts distributor, which sold it to a firm in the Dominican Republic. None of the hard drives seized by the Naval Criminal Investigative Service contained classified information, and there was no evidence Moody had passed secrets to foreign agents, testified special agent Krista Pixley. The Sept. 11 attack put an interesting spin on the case. The chart had been sent to the Pentagon for review by Navy intelligence officers last summer. It was destroyed when the hijacked jetliner crashed into the building. Moody argued that a lax attitude aboard the Helena allowed him to take the hard drives out of recycling bins and casually remove secret information. "I never viewed my actions as aberrant at the time," he said during his sentencing. But, now, Moody said, "I've harmed the U.S. Navy with my actions." From profrv at nex.net.au Mon Sep 9 07:08:25 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 00:08:25 +1000 Subject: Presidential guards murder detail. Message-ID: <5.1.0.14.0.20020910000209.00a01030@mail.nex.net.au> Guatemala Tries 3 Officers, Saying They Instigated '90 Killing After years of delays and intimidation, three high-ranking officers who once commanded a presidential security and intelligence unit are being tried on charges that they masterminded the killing of a vocal critic of the military in 1990.....( New York Times, 9 Sep 02) Trial alleges Guatemalan guard's deadly role Myrna Mack knew the death squads were after her. The 39-year-old anthropologist asked neighbors to watch for intruders outside her home, began varying her travel habits and told a priest she feared for her life. They got her anyway.....( AP, 8 Sep 02) Guatamala used PROMIS stolen Inslaw software to track and trace dissidents.The AFP still use it even though it's said to have a CIA backdoor. The reminders of Canada's role in an espionage scandal in Israel have distant echoes of 40 years ago when Canada was researching North Vietnam for the UN and leaking information to the CIA through ASIS.Page 85.'Oyster' by Brian Toohey. From adultopt at excite.com Tue Sep 10 00:44:29 2002 From: adultopt at excite.com (adultopt at excite.com) Date: Tue, 10 Sep 2002 00:44:29 -0700 Subject: Adult Video Sale Message-ID: <411-22002921074429304@server> Adult Videos and DVDs Sale Go To: http://www.adultvideosmall.com Everything must go!!! Titles as low as $9.95 Largest Selection on the net guaranteed. ~~This is not spam~~You received this email because you signed up at one of our affiliate websites or a party that has contracted with us reply to this message with remove in the subject. From profrv at nex.net.au Mon Sep 9 07:46:10 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 00:46:10 +1000 Subject: Fwd: Blofeld found near Corralito's stop licensed to kill stop eyes only stop Message-ID: <5.1.0.14.0.20020910004433.009feec0@mail.nex.net.au> > >Subject: Blofeld found near Corralito's stop licensed to kill stop eyes >only stop >Backgound for Infiltration purposes. >Adventures of Fluffy, American Dissident Cat; >(September 9) It's started again. Early in the morning some idiot starts >ringing my doorbell. It was ringing and ringing and ringing, and I knew >right away it was one of the Geriatric Gestapo of the Neighborhood Watch >Association. They're the only ones that would do it - ring five or six >times in a row like that. And sure enough it was - complaining about the >Fluffster. Anyway Fluffy the cat was over at the golf club parking lot, >where he likes to hang out with all the Cadillacs and their American flags >that the Geriatric Gestapo like to put on their cars. The Fluffster has >gotten into the habit of tearing the flags off of them. > >To him, it's just something to play with. The flags are blowing in the >breeze, and the cat gets on top of the cars. He takes his paws and grabs >at the flag and his claws get stuck in the flag. Then in order to get his >claws out, he will literally tear the flag right off the little wooden >pole. His claws get stuck in there because they're all cheap little >seventy-nine cent American flags - made in China, of course. They're just >stapled on to the wood. So the Fluffster, in order to get his claws out, >has to tear the flag off the pole. And people are thinking he's doing it >on purpose. These oldsters are convinced that I've trained him to do it on >purpose because I told them so. I've told them that the Fluffster is a >duly enlightened cat, and he's doing his part to prevent the spread of >"Dangerous Blind Patriotism." > >I put his little army helmet on today and he's all set. He's got a >miniature army helmet I bought him through this cat mail order place. They >sell all sorts of stuff for cats. The Fluffster actually seems to like it. >It's a little green plastic helmet with webbing over it and it looks >exactly like a World War II helmet and it has places for his ears. It says >the Big Red One on it and it has a little elastic that goes under his >chin. It doesn't seem to bother him and he doesn't try to pull it off, but >then, of course, he's half stoned all the time. > >He eats catnip incessantly. He'll go through a bag of it in no time. I >used to give him just a teaspoon of organically grown fresh catnip a day. >It's good for the cat's bowels and urinary tract. It evidently keeps them >regular like bran flakes for people. I kept giving him more and more and >then I thought I'll just give him the whole bag. He's an All American Cat. >He's stoned all day on catnip. His eyes are always glazed over and he's >having a hell of a time. > >Catnip is to Cats what Jack Daniels and Prozac is to the Bush Family. > >So he's out there this morning with his little helmet on, tearing the >flags off the Geriatrics' Cadillacs. The old people actually believe me >when I tell them that I've trained him to do this and that the Fluffster >is doing his part so the Geriatric Gestapo don't succumb to "Dangerous >Blind Patriotism." And, of course, none of them want to hear that. > >So now I've been told that for every seventy-nine cent American flag "Made >in China" that he pulls down, we'll get fined five dollars. They're just >fine happy and they just love it because the fines go into the clubhouse >fund to support the geriatric exercise room where they're now learning the >goose-step. Instead of aerobics, they have Goose Stepping 101. You don't >know how wild the Neighborhood Watch Association seniors can get. (See >previous story on "Close Encounters With Neighborhood Watch") > >Their biggest problem is that their brittle belief systems, from the time >when they were young, are all calcified -- and they're collapsing all >around them. Since their minds have long since atrophied, they go into >this numb way of living, so they're just numb to everything. It's like >All-Natural Prozac, and they all hang out with each other because they're >all equally naïve and provincial. They all take the senior citizen shuttle >bus to Wal-Mart for the Thursday double discount seniors' day. Loaded with >their trading stamp booklets and every discount card in the world, they go >driving around in their electric three wheelers. They bang into each other >and their false teeth come out. More of them have lost their false teeth >at Wal-Mart banging into each other than you can imagine. It's like >Dodge-Em Cars or Bumper Cars in this place. And that's what it looks like >because none of them can half see anymore. Their eye-hand coordination is >pretty well gone. You go into the Wal-Mart and it looks like a bunch of >oldsters playing Bumper Cars and then when one of them drives onto the >other, they yell and cry out, "Whiplash" and "I'm going to get my lawyer." > >And they actually have ads on the back of the bus benches in front of the >place from every ambulance-chasing lawyer in town. The one I love is >called Rosenberg Rosenthal Rosencrantz and Rosenwitz. That's the name of >the law firm. They have the most prominent ad and it shows a picture of >two oldsters banging into each other in the dodge em cars. One of them has >whiplash and a neck brace and the other one has lost his false teeth and >his hearing aid has popped out and got run over. And another oldster in >back is saying, "If you've suffered an injury in the dodge em cars, call >the attorneys at Rosenberg Rosenthal Rosencrantz and Rosenwitz. We have a >combined hundred years experience in ambulance chasing." > >This is just the latest episode in the ongoing adventures of the >Almeister, the machinations of Fluffster and Company and the >Goose-Stepping Geriatric Gestapo Neighborhood Watch Asssociation. It >almost sounds like a TV show. > >MORE ON >www.almartinraw.com COMING SOON: An actual unretouched photograph of the Fluffster complete with his Commie red collar and his Chinese Commie green ID tag. From edimune at techie.com Tue Sep 10 01:13:56 2002 From: edimune at techie.com (MR.EDWARD MUNENE) Date: Tue, 10 Sep 2002 01:13:56 Subject: PLEA FOR ASSISTANCE. Message-ID: <200209100013.g8A0Dfk1031769@ak47.algebra.com> Dear Sir, RE: PLEA FOR ASSISTANCE. My name is EDWARD MUNENE, Son of DR.ROBERT MUNENE, who was recently murdered in the land dispute crises in Zimbabwe. My father and I used to live in a town called Chinhoyi located in the heart of Murambinda, about 120km from Harare, the capital city of Zimbabwe. Chinhoyi was largely a peaceful farming area where one can own land and cultivate it if one worked hard enough. The relative peace existing in Chinhoyi and their lives were shattered with the beginning of the “Ruling Party sponsored Land Invasion” by war veterans who were working with the backing of Mugabe’s government. My late father was among the few black Zimbabwean rich farmers murdered in cold blood by the agents of the ruling government of President Robert Mugabe, for his alleged support and sympathy for the Zimbabwean opposition Party, ”Movement For Democratic Change” (MDC), controlled by the white before his death, my father on one of his many trips abroad took me to Johannesburg with the sum of USD50.5million(Fifty Million, Five Hundred Thousand United States Dollars), as if he foresaw the looming danger. On arrival in South Africa, as we had originally intended using the money for purpose of investment, he bought a very vast piece of land, for a very cheap rate within the countryside. not long after he bought the land, the South African Mining Corporation, based on professional advice by their Geologists, offered a whooping amount of money for outright purchase of the land from us, But base on an inside information, they settled for a Lease Agreement with the South African Mining Corporation. The Lease Agreement has come into Maturity, where in it was indicated that my father was acting on behalf of a foreign investment group. This area of the arrangement was left blank, as it was only to be needed at time of maturity of this investment (now). For now however, the total amount redeemable is USD19.5million (Nineteen Million, Five Hundred Thousand Dollars). Though, prior to the death of my father, no foreign investment group had gone into arrangement with them to be presented as the real owners of the investment. Death as you know was quite sudden. I am currently residing in South Africa as an asylum seeker, hence my desire to transfer my inheritance through the help of a reliable foreigner, to a foreign bank account. I am actually saddled with the responsibility of seeking an honest individual with vast experience in business to help me safeguard and invest this money. Moreover the financial laws of the Republic of South Africa do not allow asylum seekers certain financial rights. In view of the above, coupled with the way the money has been acquired it is most prudent to receive the funds anywhere else but South Africa. You will thus understand that my entire life and that of our family depends on the investment, and as such for appreciation for the help which anyone may render me. I am willing to pay something as remuneration, which is subject to further discussion. send me a mail via e-mail to : ed_mune at mail.gr As I wait to hear from you, my warm regards go to you and your family. Best Regards, MR.EDWARD MUNENE From barr_mikeodili at arabia.com Tue Sep 10 03:00:55 2002 From: barr_mikeodili at arabia.com (MIKE ODILI) Date: Tue, 10 Sep 2002 03:00:55 -0700 Subject: FROM: OKEAYA INNEH LAW FIRM Message-ID: <200209100204.g8A24qk1014833@ak47.algebra.com> ATTN: THE PRESIDENT/CEO FROM: BARRISTER MIKE ODILI OKEAYA INNEH LAW FIRM LEGAL PRACTITIONERS NIGERIA. FAX: 234-1-7593107 DEAR SIR/MADAM, COMPLIMENTS OF THE SEASON. GRACE, PEACE AND LOVE FROM THIS PART OF THE ATLANTIC TO YOU. I HOPE MY LETTER DOES NOT CAUSE YOU TOO MUCH EMBARRASSMENT AS I WRITE TO YOU IN GOOD FAITH. BASEDON THE CONTACT ADDRESS GIVEN TO ME BY A FRIEND WHO WORKS AT THENIGERIAN CHAMBER OF COMMERCE ATTACHED TO YOUR EMBASSY IN MY COUNTRY.PLEASE EXCUSE MY INTRUSION INTO YOUR PRIVATE LIFE.I AM BARRISTER MIKE ODILI,I REPRESENT MOHAMMED ABACHA,SON OF THE LATE GEN. SANI ABACHA, WHO WAS THE FORMER MILITARY HEAD OF STATE INNIGERIA. HE DIED IN 1998. SINCE HIS DEATH, THE FAMILY HAS BEEN LOOSINGA LOT OF MONEY DUE TO VINDICTIVE GOVERNMENT OFFICIALS WHO ARE BENT ON DEALING WITH THE FAMILY. CONSEQUENTLY, THE FAMILY HAS ASKED ME TO SEEK FOR A FOREIGN PARTNER WHO CAN WORK WITH US AS TO MOVE OUTTHE TOTAL SUM OF US$75,000,000.00 ( SEVENTYFIVE MILLION UNITEDSTATES DOLLARS ), PRESENTLY IN THEIR POSSESSION. THIS MONEY WAS OF COURSE, ACQUIRED BY THE LATE PRESIDENT AND IS NOW KEPT SECRETLY BY THE FAMILY. THE SWISS GOVERNMENT HAS ALREADY FROZEN ALL THE ACCOUNTS OF THE FAMILY IN SWITZERLAND, AND SOME OTHER COUNTRIES WOULD SOON FOLLOW TO DO THE SAME. THIS BID BY SOME GOVERNMENTOFFICIALS TO DEAL WITH THIS FAMILY HAS MADE IT NECESSARY THAT WE SEEK YOUR ASSISITANCE IN RECEIVING THIS MONEY AND IN INVESTING IT ON BEHALF OF THE FAMILY. THIS MUST BE A JOINT VENTURE TRANSACTION AND WE MUSTALL WORK TOGETHER. SINCE THIS MONEY IS STILL CASH, EXTRASECURITY MEASURES HAVE BEEN TAKEN TO PROTECT IT FROM THEFT OR SEIZURE,PENDING WHEN AGREEMENT IS REACHED ON WHEN TO MOVE IT INTO ANY OFTHIS COUNTRIES HOLLAND,LONDON, SPAIN,CANADA PENDING ON OUR AGREEMENT. I HAVE PERSONALLY WORKED OUT ALL MODALITIES FOR THE PEACEFUL CONCLUSIONOF THIS TRANSACTION. THE TRANSACTION DEFINITELY WOULD BEHANDLED IN PHASES AND THE FIRST PHASE WILL INVOLVE THE MOVING OFUS$25,000,000.00( TWENTY FIVE MILLION UNITED STATES DOLLARS ). MY CLIENTS ARE WILLING TO GIVE YOU A REASONABLEPERCENTAGE OF THIS MONEY AS SOON AS THE TRANSACTIONIS CONCLUDED. I WILL,HOWEVER, BASED ON THE GROUNDS THAT YOU ARE WILLING TO WORK WITHUS AND ALSO ALL CONTENTIOUS ISSUES DISCUSSED BEFORE THECOMMENCEMENT OF THIS TRANSACTION. YOU MAY ALSO DISCUSS YOUR PERCENTAGEBEFORE WE START TO WORK. AS SOON AS I HEAR FROM YOU, I WILLGIVE YOU ALL NECESSARY DETAILS AS TO HOW WE INTEND TO CARRY OUT THEWHOLE TRANSACTION. PLEASE, DO NOT ENTERTAIN ANY FEARS,AS ALLNECESSARY MODALITIES ARE IN PLACE, AND I ASSURE YOU OF ALLSUCCESS AND SAFETY IN THIS TRANSACTION.PLEASE, THIS TRANSACTION REQUIRES ABSOLUTE CONFIDENTIALITY AND YOU WOULD BE EXPECTED TO TREAT IT AS SUCH UNTIL THE FUNDS ARE MOVED OUT OF THIS COUNTRY TO WHERE YOU INTEND TO RECEIVETHEM. IN COMPLIANCE WITH THIS YOU ARE TO FORWARD TO ME THEFOLLOWING DETAILS: YOUR COMPLETE NAMES AND ADDRRESS,CONFIDENTIALTELEPHONE AND FAX NUMBERS, THIS IS TO ENABLE ME PERFECT ALL THENECESSARY DOCUMENTATION WITH THE SECURITY FIRM AND MOVE THISMONEY ACROSS TO YOUR COUNTRY OF CHOICE.PLEASE, YOU WILL ALSO IGNORE THIS LETTER AND RESPECT OUR TRUST IN YOU BY NOT EXPOSING THIS TRANSACTION, EVEN IF YOU ARE NOT INTERESTED. I LOOK FORWARDS TO WORKING WITH YOU.THANK YOU. TRULY YOURS BARRISTER MIKE ODILI. NB:PLEASE DO COPY THIS SITE ON YOUR BROWSER AND YOU WILL UNDERSTAND BETTER WHAT I AM TALKING ABOUT. htIp://www.transnationale.org/anglais/sources/tiersmonde/dirigeants__aba cha.htm htIp://allafrica.com/stories/200203180074.html htIp://www.time.com/time/europe/magazine/2000/27/swiss.html From zenadsl6186 at zen.co.uk Mon Sep 9 19:16:29 2002 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Tue, 10 Sep 2002 03:16:29 +0100 Subject: A message from Alan I. Leshner, AAAS CEO In-Reply-To: <5.1.0.14.2.20020906143858.044d45d8@pop3.lvcm.com> Message-ID: Steve Schear wrote: > At 05:07 PM 9/6/2002 -0400, you wrote: >> Dear Colleague: >> >> As the anniversary of September 11th approaches, AAAS continues to >> be engaged in issues that relate to national security and the role of >> science and technology. One such issue is the safe and responsible >> conduct of research involving biological agents and toxins. >> >> AAAS was recently asked by the Centers for Disease Control (CDC) to >> assist in alerting our members to the federal mandate (Public Law 107-188) >> requiring all facilities and persons that possess, use, or transfer agents >> or toxins considered a threat to animals, plants, animal and plant products >> and/or public health (called "select agents") to notify the CDC and the >> U.S. Department of Agriculture. Approximately 200,000 facilities were >> sent a copy of the notification form by the CDC. >> >> The deadline for submitting a completed form to the CDC is September 10, >> 2002. All entities that receive a copy of the form must comply, even if >> they do not possess a select agent or toxin. If you are in possession of >> a select agent or toxin and did not receive a form, you should call CDC's >> toll-free number: 1-866-567-4232. > > Thanks Alan but, > > This slippery slope concerning the ability of only approved researchers > able to engage in science has gone too far and has got to stop. I don't > accept that the "right of society" to protect itself from a few madmen > abusers of technology means we all must carry scientist ID cards. Most of > the significant discoveries, until this century, were made by > amateurs. Almost all the R&D I did in the 60s and 70s as an amateur are > now regulated. If I do any research, using whatever chemicals I choose, I > won't be filing no "stinking forms. > > steve I think it's actually quite reasonable: below is the proposed new list of agents with some notes from me in [> <] (much the same as the old list, which is presently used to regulate transport, and you already need to be registered to send/receive these agents), and except for malicious reasons I can't think why anyone would want to use them outside a fully-equipped lab. Anyone who does is showing negligent disregard for human/ the public's safety. And his own. While there may be an anti-terrorist element to the Public Health Security and Bioterrorism Preparedness and Response Act (I haven't read it), there's a safety element too. I don't know if any labs who do things right will be refused registration/permission, we'll have to see. They may need armed guards or something. At first sight it doesn't affect researchers much (they already need approval/licences to work on most of this stuff, it's mostly changes to regulations about storage). A curiosity - a 1oz packet (the smallest size available to gardeners) of castor beans probably contains more than the exempted 100 mg of ricin. However, it's not a "Toxin preparation", so they won't have to register. Could kill quite a few people if it was. -- Peter Fairbrother List of Select Agents and Toxins The following is the list of select agents and toxins that is being considered for adoption: Viruses: 1. Crimean-Congo haemorrhagic fever virus 2. Eastern Equine Encephalitis virus 3. Ebola viruses 4. Herpes B virus 5. Lassa fever virus 6. Marburg virus 7. Monkeypox virus 8. Nipah and Hendra Complex viruses 9. Rift Valley fever virus 10. South American Haemorrhagic fever viruses (Junin, Machupo, Sabia, Flexal, Guanarito) 11. Tick-borne encephalitis complex (flavi) viruses (Central European Tick-borne encephalitis, Far Eastern Tick-borne encephalitis (Russian Spring and Summer encephalitis, Kyasanur Forest disease, Omsk Hemorrhagic Fever)) 12. Variola major virus (Smallpox virus) 13. Venezuelan Equine Encephalitis virus Bacteria: 1. Bacillus anthracis 2. Brucella abortus 3. Brucella melitensis 4. Brucella suis 5. Burkholderia mallei 6. Burkholderia pseudomallei 7. Botulinum neurotoxin producing strains of Clostridium 8. Coxiella burnetii 9. Francisella tularensis 10. Rickettsia prowazekii 11. Rickettsia rickettsii 12. Yersinia pestis Fungi: 1. Coccidioides immitis 2. Coccidioides posadasii [> Most (all?) of the above infectious agents shouldn't be handled outside Biosafety Level 3 or 4 labs (for live cultures or potential aerosols). Dangerous stuff. BSL3/BSL4 labs already need approval, and all facilities already need to be registered to receive or send this kind of material anyway. This new proposal now requires notification of possession/storage too - not a big change. <] Toxins: 1. Abrin 2. Botulinum neurotoxins 3. Clostridium perfringens epsilon toxin 4. Conotoxins 5. Diacetoxyscirpenol 6. Ricin 7. Saxitoxin 8. Shigatoxin and Shiga-like toxins 9. Staphylococcal enterotoxins 10. Tetrodotoxin 11. T-2 toxin Exemptions: Toxin preparations containing 1 mg of Botulinum neurotoxins; 10 mg of Staphylococcal enterotoxins; or 100 mg of Abrin, Clostridium perfringens epsilon toxin, Conotoxins, Diacetoxyscirpenol, Ricin, Saxitoxin, Shigatoxin and Shiga-like toxins, Tetrodotoxin, or T-2 toxin, are exempt. Toxin preparation stored in more than one location within a facility must be aggregated in determining if the exemption applies. The medical use of toxins for patient treatment are exempt. [> The exempted quantities of listed toxins are enough to do some reasonable research (the exempted amounts of some of the listed toxins are enough to kill 1000+ people, though not in any likely situation). It might affect some researchers though. <] Genetic Elements, Recombinant Nucleic Acids, and Recombinant Organisms: 1. Full length nucleic acids (synthetic or naturally derived) of any of the viruses listed in Appendix A. 2. Nucleic acids (synthetic or naturally derived) of 100 nucleotides or more in length of Variola major virus (smallpox virus). 3. Nucleic acids (synthetic or naturally derived) of bacteria, fungi, or viruses listed in Appendix A that encode for either a functional toxin or virulence factor sufficient to cause disease if the nucleic acid is: (1) Expressed in vivo or in vitro; (2) in an expression vector or host chromosome; or (3) in a carrier plasmid. 4. Nucleic acids (synthetic or naturally derived) that encode for functional form of any of the toxins listed in Appendix A if: (1) Expressed in vivo or in vitro; (2) in an expression vector or host chromosome; or (3) in a carrier plasmid. 5. Microorganisms in Appendix A that have been genetically modified. [> I don't want any recombinant DNA at all out in the environment, myself. P4 the lot! (P4 is a WHO standard for labs, to protect the public against the release of new organisms into the environment, eg germ warfare labs, recombinant DNA labs, or the labs used by the Apollo astronauts to protect against possible diseases from space, whereas BSL3/BSL4 are US standards aimed more at protecting lab staff from diseases that are already in the environment, eg anthrax, botulism, etc., though they also try to protect against accidental releases.) <] [> Without getting into the wider argument of releasing new organisms made by genetic modification, the list seems fairly sensible. 2) is badly written and might cause some grief, as some Variola major 100-nucleotide lengths of R/DNA are undoubtedly identical to lengths that exist in other, harmless, organisms. Politics again. >] [> Then again, IMO the conditions in 3) and 4) aren't stringent enough. And 5) should be banned completely, but the germ warfare people wouldn't like that. <] Other Restrictions: The deliberate transfer of a drug resistance trait to microorganisms listed in this Appendix that are not known to acquire the trait naturally is currently prohibited if such acquisition could compromise the use of the drug to control these disease agents in humans or veterinary medicine. [> And this is extremely sensible. <] From support at giftdvd.com Tue Sep 10 00:25:07 2002 From: support at giftdvd.com (Patricia) Date: Tue, 10 Sep 2002 03:25:07 -0400 Subject: View unlimited DVDs. Free trial. Message-ID: <200209100725.g8A7NZQe030444@nn165.fptrk.com> Your friend has send you this offer. ------------------------------------------------------- A gift for those who love movies. View unlimited DVDs. Free Trial. -------------------------------------------------------- YES, F.R.E.E DVDs Trial Membership. -------------------------------------------------------- Signup for F.R.E.E and start watching unlimited DVDs. Your trial is totally F.R.E.E, and you can cancel anytime, for any reason, with no obligation. http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 -------------------------------------------------------- Signup for F.R.E.E and start watching unlimited DVDs. -------------------------------------------------------- Your trial is totally F.R.E.E, and you can cancel anytime, for any reason, with no obligation. To show you how keen we are, there is NO shipping! http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 -------------------------------------------------------- Signup for F-R-E-E and start watching unlimited DVDs. -------------------------------------------------------- Your trial is all F-R-E-E, and you can cancel anytime, for any reason, with no obligation. http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 (No shipping within the US only, exclude Canada) Patricia GiftDVD.com Customer Support support at giftdvd.com ------------------------------------------------------- This Tell-a-Friend service is available at GifvDVD.com To invite your friends to join GiftDVD, visit: http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 To unsubscribe, email: unsubscribe at giftdvd.com To make suggestions, email: support at giftdvd.com ------------------------------------------------------- From support at giftdvd.com Tue Sep 10 00:51:10 2002 From: support at giftdvd.com (Patricia) Date: Tue, 10 Sep 2002 03:51:10 -0400 Subject: Fwd:Your DVDs F-r-e-e Trial. Forward. Message-ID: <200209100751.g8A7nsQS025975@nn165.fptrk.com> Your friend has send you this offer. ------------------------------------------------------- View unlimited DVDs. Free Trial. Trial signup limited seats available. To show you how keen we are to deliver the DVDs, there is NO shipping! -------------------------------------------------------- Signup for F.R.E.E and start watching unlimited DVDs. -------------------------------------------------------- Your trial is totally F.R.E.E, and you can cancel anytime, for any reason, with no obligation. To show you how keen we are, there is NO shipping! http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 -------------------------------------------------------- Why buy retail? Start viewing unlimited DVDs! -------------------------------------------------------- Your F-r-e-e trial is not a dream. Grab your favorite moviews in DVD now! http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 (Offer with NO SHIPPING valid to U.S. residents only) -------------------------------------------------------- Signup for F-R-E-E and start watching unlimited DVDs. -------------------------------------------------------- Your trial is all F-R-E-E, and you can cancel anytime, for any reason, with no obligation. http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 (No shipping within the US only, exclude Canada) Patricia GiftDVD.com Customer Support support at giftdvd.com ------------------------------------------------------- This Tell-a-Friend service is available at GifvDVD.com To invite your friends to join GiftDVD, visit: http://www.giftdvd.com/cgi-bin/offer.cgi?affid=892 To unsubscribe, email: unsubscribe at giftdvd.com To make suggestions, email: support at giftdvd.com ------------------------------------------------------- From profrv at nex.net.au Mon Sep 9 11:32:48 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 04:32:48 +1000 Subject: Take neem to Mongo's barbie. Message-ID: <5.1.0.14.0.20020910043120.00a00660@mail.nex.net.au> http://www.newscientist.com/news/news.jsp?id=ns99992770 West Nile virus reaches California 12:40 09 September 02 NewScientist.com news service A Californian woman has been infected with West Nile virus, preliminary tests suggest. If confirmed, the case will mark the virus's spread right across the US just three years after the first human case in New York. "We have been anticipating the arrival of West Nile virus in California as reports of the disease have progressed steadily westward across the United States," California's State Health Director said. The woman was treated for meningitis, a symptom of West Nile infection, in early August and had not travelled outside the Los Angeles region shortly before falling ill, health officials confirmed. The results of final West Nile tests are expected by the end of this week. On Friday, Canada also reported its first West Nile case, in Ontario. Four other "probable" cases are also being investigated, health officials said. From profrv at nex.net.au Mon Sep 9 11:41:09 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 04:41:09 +1000 Subject: Cryptozoology in Corralitos. Message-ID: <5.1.0.14.0.20020910043802.00a02ec0@mail.nex.net.au> "...Cryptozoology often receives a bad rep because it is often practiced with little skepticism, or regard for scientifically supported facts and theories. Likewise, paranormal cryptozoologists do little to help the integrity of cryptozoology. It can, however, be a level-headed, interesting and possibly even scientific subject, if examined with open-minded skepticism and a scientific viewpoint. Such an approach is the basis of this web site on cryptozoology. Ockham's razor, which basically states that the simplest explanation is probably the correct one, is a rationale that looms large here." What's New with Cryptozoology? The Myakka Ape Photos Loren Coleman's take on recent photos from Florida appearing to show an ape-like animal. http://www.cryptozoology.com/ From kh at al-qaeda.com Tue Sep 10 09:49:52 2002 From: kh at al-qaeda.com (Khoder bin Hakkin) Date: Tue, 10 Sep 2002 09:49:52 -0700 Subject: Denver Colorado Stasi files, and DB linking Message-ID: <3D7E22B0.C33FF986@al-qaeda.com> There is an article on the Denver Police/STASI files at: http://www.latimes.com/news/printedition/front/la-na-spies10sep10.story?coll=la%2Dhome%2Dtodays%2Dtimes Folks were in the database for bumperstickers. That will be very amusing when all the crime-DB are integrated and used to harass people in airports, buses & trains, street checkpoints, and when the crowd-face-scanners find a hit. Some authorities just need reformatting. -- "Better bombing through chemistry." -John Pike, director of Globalsecurity.org on use of speed by US pilots From tomjenkins at yahoo.com Tue Sep 10 07:05:56 2002 From: tomjenkins at yahoo.com (Tom Jenkins) Date: Tue, 10 Sep 2002 10:05:56 -0400 Subject: Golden Web Award Winners Message-ID: <200209101405.g8AE5r847520@locust.minder.net> http://mind-brain.com
http://humansyn.com
http://tourkiev.com
http://briowebdesign.com
http://michaeleaton.net


Find more top sites at http://www.goldenwebawards.com/awardwinners.shtml -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 448 bytes Desc: not available URL: From jya at pipeline.com Tue Sep 10 11:16:51 2002 From: jya at pipeline.com (John Young) Date: Tue, 10 Sep 2002 11:16:51 -0700 Subject: Intel Patents Anonymity Server Message-ID: http://cryptome.org/intel-anon.htm [Excerpt. There are 15 images in the patent.] Anonymity Server, May 14, 2002 Description BACKGROUND 1. Field The present invention relates to the field of communications. More particularly, the present invention relates to a system and method for maintaining anonymous and traffic analysis resistant communications over a communication link. 2. Related Art Over the last few years, personal and commercial usage of the Internet has increased dramatically. As a result, companies are beginning to monitor such usage for a number of reasons. For example, marketing companies can analyze Internet traffic in order to develop consumer profiles of various users or to obtain information about ongoing projects by a competitive company. In an attempt to thwart data collection through traffic analysis and provide message anonymity over public communication links like the Internet, anonymous remailers are now being provided. An "anonymous remailer" is a computer that receives an electronic message over a communication link from a sender and redirects that electronic message to an intended recipient. By encrypting audible and/or viewable data of the electronic message, the integrity and confidentiality of that data would be protected against unauthorized access by the operator of the anonymous remailer or an interloper. It is evident that the above-described conventional communication scheme would substantially ensure the preservation of the integrity and confidentiality of data within an electronic message. However, this conventional communication scheme fails to protect the integrity or confidentiality of data transmitted back to the original sender in the form of a response from the intended recipient. In certain situations, anonymous remailers have been configured to assign a unique tag to each original sender of an electronic message before the electronic message is redirected to the intended recipient. This tag is used as a secret key by the intended recipient to encrypt data contained in a response to the electronic message. However, to support this communication scheme, the anonymous remailer would have to decrypt the response with the tag and re-encrypt the response with the public key of the original sender because the intended recipient would have no knowledge of the original sender, namely a public key of the original sender. Since the operator responsible for the anonymous remailer would have access to the return path of the response, reliance on the integrity of that operator is required. Clearly, this substantially reduces the level of *security* of this communication scheme. Therefore, it would be desirable to create an electronic system and a corresponding method for maintaining anonymous and traffic analysis resistant communications over a communication link without dependence on the integrity of the system operator. ----- From email at rsasecurity.rsc03.com Tue Sep 10 14:01:04 2002 From: email at rsasecurity.rsc03.com (RSA Conference 2003) Date: Tue, 10 Sep 2002 14:01:04 -0700 Subject: RSA Conference 2003 Call for Papers - Deadline September 16! Message-ID: RSA Conference 2003 April 13-17, Moscone Center, San Francisco SPEAK AT THE WORLD'S LARGEST E-SECURITY CONFERENCE AND EXPO CALL FOR PAPERS IS NOW OPEN DEADLINE FOR SUBMISSION IS SEPTEMBER 16, 2002 The annual US RSA Conference bring the world's security, cryptography and electronic commerce experts together with thousands of IT professionals, business people, government officials, policy makers and application developers. More importantly, the Conference is an opportunity for you to share your expertise in information security. We encourage you to submit speaking proposals for the 2003 event. As a speaker, you will receive a complimentary full pass to the Conference (with over 200 class sessions) and an invitation to an exclusive speakers dinner both designed to maximize your network of security and business professionals. TO PROPOSE A TALK, VISIT WWW.RSACONFERENCE.COM Talks are grouped into the following tracks: Analysts Cryptographers Developers Government Hackers & Threats Implementers New Products Perimeter Defense Privacy, Law & Policy Secure Web Services Standards Wireless & Embedded Security Track descriptions and tips for submitting proposals can be found at www.rsaconference.com. The Conference is well-known for bringing attendees top-caliber speakers and informative, practical sessions. To become a part of this impressive program, submit your proposal today! RSA, the RSA conference logo and the RSA Brick are registered trademarks of RSA Security Inc. )2002 RSA Security Inc. All rights reserved. ---------------------------------------------------------------------------- RSA Security respects your on-line privacy. You're receiving this email because you've recently expressed interest in RSA Security products and services, or because you are an RSA Security customer. You can view our email policy at http://www.rsasecurity.com/legal/privacy.html. As part of an effort to continuously improve our email communication practices, we welcome and encourage your input on this policy. ---------------------------------------------------------------------------- ______________________________________________________________________ This message was sent by RSA Security. If you prefer not to receive future e-mail from RSA Security: https://rsasecurity1.rsc03.net/servlet/optout?klHDUYZEPmpLtHggFloHkiHgKihpgmRDJhtEf To view our permission marketing policy: http://www.rsvp0.net ----- End forwarded message ----- -- Imperious, choleric, irascible, extreme in everything, with a dissolute imagination the like of which has never been seen, atheistic to the point of fanaticism, there you have me in a nutshell.... Kill me again or take me as I am, for I shall not change." From freepass at pornopassport.com Tue Sep 10 08:10:35 2002 From: freepass at pornopassport.com (Account Info) Date: 10 Sep 2002 14:10:35 -0100 Subject: Account Info - Do Not Delete Message-ID: <200209101424.g8AEOS848759@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1860 bytes Desc: not available URL: From girls-unsubscribe at xxxtasymail.com Tue Sep 10 13:00:05 2002 From: girls-unsubscribe at xxxtasymail.com (Brianna) Date: Tue, 10 Sep 2002 16:00:05 -0400 (EDT) Subject: Confirm your FREE subscription! Message-ID: <200209102000.g8AJxw864679@locust.minder.net> (xox)(xox)(xox) --> FREE VIP PASSWORD... AND XXXTASY MAILER! <-- (xox)(xox)(xox) WE ARE WAITING FOR YOU!! ```````````````````````` => YOU MUST ACTIVE YOUR FREE VIP PASSWORD!!! => UNLESS YOU DON'T WANT HOT, FREE PORN?!? => IT'S SO SIMPLE, WE HOPE YOU JOIN US SOON! http://event.xxxtasymail.com/confirm.cgi?key=74fbfa0ef4f5fbf9f4faf6b6&email=cypherpunks at minder.net Activation of your password is entirely FREE! NO GIMMICKS! DON'T FORGET IT IS VERY IMPORTANT THAT YOU VISIT THE FOLLOWING LINK!! http://event.xxxtasymail.com/confirm.cgi?key=cc5756625859575558565aba&email=cypherpunks at minder.net ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ Hey, Vixey here�your VIP Escort!! I�m so disappointed you haven�t activated your FREE VIP PASSWORD to... members.hotcelebnudes.com/members/hotcelebnudes ...Which also confirms your subscription to XXXTASY MAIL! Your VIP STATUS USER NAME & PASSWORD have been entered into our system USER NAME:398333 PASSWORD: 398333 But...YOU MUST VISIT THE FOLLOWING LINK TO ACTIVATE & ENTER! http://event.xxxtasymail.com/confirm.cgi?key=7947484c42414745424844ff&email=cypherpunks at minder.net CUM CHECK OUT OUR...FRESH, WET PUSSIES & BEAUTIFUL TITS?? We are waiting patiently for you to play with us! You don't want to miss out on these great deals and offers just because you didn't click one little page, do you? Simply visit the following link & you will be on your way to enjoying ...LOADS OF FABULOUS FREE PORN! http://event.xxxtasymail.com/confirm.cgi?key=899a99959fa09a9c9f999d20&email=cypherpunks at minder.net Hurry up and join the party! --Vixey ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ ~xoxo~ CLICKING ON THIS PAGE � Confirms your subscription to XXXTasy Mail, XXXFiles Mail, & Sexxxvideos Mail and will pop up your free user name and password to members.hotcelebnudes.com/members/hotcelebnudes. Please remember to save this information for future use. Did I mention all of this is FREE FOR LIFE?? ----------------------------------------------------------------------------- ----------------------------------------------------------------------------- (note: You received this confirmation email because your name was submitting from IP 203.218.63.205.) Clicking above link states you are 18 years of age and that it is legal to receive adult materials in your country or state. To remove yourself from the member mailing list go to http://event.xxxtasymail.com/remove.cgi?key=a95c5b575d5e5c5a5d5b5f82&email=cypherpunks at minder.net and follow instructions provided on web page. THIS IS NOT AN UNSOLICITED EMAIL. YOU HAVE RECEIVED THIS BECAUSE YOU ARE A PAST/PRESENT MEMBER OR ARE A VISITOR WHO HAS REQUESTED ADDITIONAL INFORMATION ABOUT OUR SITES. Copyright Protected - All Rights Reserved -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9324 bytes Desc: not available URL: From nobody at remailer.privacy.at Tue Sep 10 09:50:07 2002 From: nobody at remailer.privacy.at (Anonymous) Date: Tue, 10 Sep 2002 18:50:07 +0200 (CEST) Subject: A message from Alan I. Leshner, AAAS CEO Message-ID: <52f907f08796f7c76c2ab9d904973365@remailer.privacy.at> On Tue, 10 Sep 2002 03:16:29 +0100, you wrote: > > Steve Schear wrote: > > > At 05:07 PM 9/6/2002 -0400, you wrote: > >> Dear Colleague: > >> > >> As the anniversary of September 11th approaches, AAAS continues to > >> be engaged in issues that relate to national security and the role of > >> science and technology. One such issue is the safe and responsible > >> conduct of research involving biological agents and toxins. I really urge AAAS and the US government to focus first on the US Government, as it is not disputed that that entity was responsible for the processing and distribution of the Ames Strain of Anthrax, the only recent bio agent released in terrorist action resulting in fatalities in the US. It would be nice if the US Government would proceed to assign a whipping boy, who will of course show up dead somewhere, avoiding any need for messy trials, evidence, facts, etc., so we can all go back to granting unprecedented powers to our government. And the CIA needs Anthrax exactly why? Since we have signed treaties about bio warfare and development of agents for it, are we to understand that the CIA simply fills in for USAMRIID and CDC in developing defenses? Where in the CIA charter can I find biowar defense R&D? Right. In the meanwhile, everyone should continue to be afraid --- very afraid. It expedites legislation when people are panicing or raised to high levels of emotion. From bcsexxytmm at plutonium.net Tue Sep 10 17:37:31 2002 From: bcsexxytmm at plutonium.net (Nicole) Date: Tue, 10 Sep 2002 20:37:31 -0400 Subject: XXXXXXXXXXXXXXXXXXX qgir Message-ID: <200209110043.g8B0hE877947@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1999 bytes Desc: not available URL: From profrv at nex.net.au Tue Sep 10 05:16:06 2002 From: profrv at nex.net.au (Matthew X) Date: Tue, 10 Sep 2002 22:16:06 +1000 Subject: X-ray update Message-ID: <5.1.0.14.0.20020910221039.009e8ec0@mail.nex.net.au> Doesn't mention aussies,David Hicks and Mamdouh Habib. http://www.indymedia.org/front.php3?article_id=202467&group=webcast Longish piece w/jpgs.See also http://www.smh.com.au/articles/2002/05/06/1019441478836.html More profits for Halliburton. Cheney,Rumsfeld "...I despise you. I despise your order, your laws, your force-propped authority. Hang me for it!" Louis Lingg From Consulting.Opportunities6328j85 at mail.com Tue Sep 10 10:16:30 2002 From: Consulting.Opportunities6328j85 at mail.com (Consulting.Opportunities6328j85 at mail.com) Date: Tue, 10 Sep 2002 23:16:30 +0600 Subject: Expand Your Freelance Consulting Opportunities Today! Message-ID: <022d50e68c0b$7767e6e4$6ed16ba1@qymapk> Expand Your Freelance Consulting Opportunities Today! Many consultants are not aware that hidden job opportunities exist through professional job recruiters who have the inside contacts with major corporations. Let us activate your resume to our 14,000 leading national headhunters and watch the opportunities propel for your freelance consulting business. Our results are 100% guaranteed, so why wait, check us out now at http://www.asap6.com/denkitten/ and activate your resume today! Smiles, Anne Marie Baugh Freelance Job Specialist ___Affiliate Program__________________________________________ We also offer an excellent affiliate program check the site for details http://www.asap6.com/denkitten/ __REMOVAL INSTRUCTIONS___________________________________ If you previously opted out of our e-mail list please excuse our failure to eliminate you Please follow the instructions below. We do not wish to send e-mail to people not opting into our list. We will promptly remove you in the future. Simply send an e-mail to asap6remove at asap6.com with remove in the subject area. mailto:asap6remove at asap6.com?subject=REMOVE IMPORTANT: make sure you include the e-mail name we have on file not always the same as your reply e-mail This is the email account we have on file: cypherpunks at koeln.ccc.de A detailed removal help page is at http://asap6.com/about/ From zeynep_v at ttnet.net.tr Tue Sep 10 13:48:31 2002 From: zeynep_v at ttnet.net.tr (MUT OTEL) Date: Tue, 10 Sep 2002 23:48:31 +0300 Subject: EMEKLiYE UCUZ TATiL KAMPANYASI.. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2799 bytes Desc: not available URL: From profrv at nex.net.au Tue Sep 10 07:19:13 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 11 Sep 2002 00:19:13 +1000 Subject: Plane hijacker Times. Message-ID: <5.1.0.14.0.20020911000946.009fcec0@mail.nex.net.au> The Red Army Faction seized the world's attention when, armed with samurai swords and pipe bombs, it took control of the Boeing 727 as it flew near Mount Fuji. http://theage.com.au/articles/2002/09/09/1031115997300.html Got Knives? http://www.hinduonnet.com/thehindu/holnus/01092207.htm Mumbai, Sept 9. (PTI): Hours after a failed attempt to hijack an Air Seychelles Male-bound Boeing 737-700, a transit passenger was arrested for carrying three knives in his luggage at Chhatrapati Shivaji International Airport today. Reporters sans explosives FOXNews.com Reporters Easily Smuggle Weapons Through Airport Checkpoints, Wednesday, September 04, 2002, NEW YORK ? Reporters investigating airport ... www.foxnews.com/story/0,2933,62057,00.html - 45k - 8 Sep 2002 - Cached Come fly with me lets fly,lets fly away... From Consulting.Opportunities0260b07 at asap6.com Tue Sep 10 15:22:53 2002 From: Consulting.Opportunities0260b07 at asap6.com (Consulting.Opportunities0260b07 at asap6.com) Date: Wed, 11 Sep 2002 01:22:53 +0300 Subject: Expand Your Freelance Consulting Opportunities Today! Message-ID: <035d03d51a2d$5134a6d5$4db15de7@hpvaag> Expand Your Freelance Consulting Opportunities Today! Many consultants are not aware that hidden job opportunities exist through professional job recruiters who have the inside contacts with major corporations. Let us activate your resume to our 14,000 leading national headhunters and watch the opportunities propel for your freelance consulting business. Our results are 100% guaranteed, so why wait, check us out now at http://www.asap6.com/denkitten/ and activate your resume today! Smiles, Anne Marie Baugh Freelance Job Specialist ___Affiliate Program__________________________________________ We also offer an excellent affiliate program check the site for details http://www.asap6.com/denkitten/ __REMOVAL INSTRUCTIONS___________________________________ If you previously opted out of our e-mail list please excuse our failure to eliminate you Please follow the instructions below. We do not wish to send e-mail to people not opting into our list. We will promptly remove you in the future. Simply send an e-mail to asap6remove at asap6.com with remove in the subject area. mailto:asap6remove at asap6.com?subject=REMOVE IMPORTANT: make sure you include the e-mail name we have on file not always the same as your reply e-mail This is the email account we have on file: cypherpunks at algebra.com A detailed removal help page is at http://asap6.com/about/ From china2002 at etang.com Wed Sep 11 01:48:45 2002 From: china2002 at etang.com (ֻ) Date: Wed, 11 Sep 2002 01:48:45 Subject: ɺã Message-ID: <200209101748.KAA14256@freebie.dcfinc.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12154 bytes Desc: not available URL: From profrv at nex.net.au Tue Sep 10 09:17:08 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 11 Sep 2002 02:17:08 +1000 Subject: Enough is Enough.Plans for a Fall uprising. Message-ID: <5.1.0.14.0.20020911020442.00a059c0@mail.nex.net.au> Call for a dual mobilization for total liberation. Or rather- a Fall uprising. In Fall- the streets of DC, and Denver, CO will erupt. 2 forces made up of many movements with much historical/herstorical precedent will converge. The anti-capitalist, the anti-imperialist, the anti- colonialist, the anti-authoritarian, the anti-patriarchy, the anti- white supremacy will all take to the streets in these 2 cities. MORE ON http://www.raisethefist.com/news.cgi?artical=wire/----9862933t4a.article Current Threats to America Current Threats to America Include "a Loose Alliance of Left-Wing Groups" A recent "threat assesment" issued by the FBI's National Infrastructure Protection Center has identified global justice activists as a potential terrorist threat. The memo, entitled "First Anniversary of the September 11th Attacks And Other Dates of Interest," notes that "there are several notable events scheduled in the near future which warrant heightened awareness." It lists the first anniversary of the Sept. 11 terrorist attacks; upcoming United Nations meetings in New York City; and the World Bank and International Monetary Fund meeting in Washington, DC, during the period September 25-29th. The bulletin, which has attracted mainstream media attention, goes on to contend that "prior protests against the IMF and WB in Washington, D.C. were disruptive and resulted in limited clashes with police...historically, tiny contingents of individuals associated with the protests belonged to violent groups." While this is not the first time that elements of the Global Justice Movement have been the targets of FBI scrutiny, the inclusion of WB / IMF protests in a memo dealing with largely foreign terrorism may represent an escalation of US Government harassment. Read and discuss the full memo. [ New York City IMC | Washington D.C. IMC ] From MedEuroImports at hotmail.com Wed Sep 11 02:51:46 2002 From: MedEuroImports at hotmail.com (lfss--Black Disk Reward) Date: Wed, 11 Sep 2002 02:51:46 -0700 Subject: Always search for the truth, code: gel Message-ID: <200209110633.g8B6XTmg024242@ak47.algebra.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7305 bytes Desc: not available URL: From profrv at nex.net.au Tue Sep 10 11:08:42 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 11 Sep 2002 04:08:42 +1000 Subject: Peter Hain and Peter Beattie files Message-ID: <5.1.0.14.0.20020911035929.00a08250@mail.nex.net.au> http://news.bbc.co.uk/1/hi/in_depth/uk/2000/uk_confidential/1095031.stm Anti springbok demonstrator to foreign Minister. http://www.theage.com.au/news/national/2002/01/02/FFX6G5AKWVC.html Premier of Qld bashed by state police Your humble corresspondant was there at the Melb Demo.(aged 16)Had his wrangler press stud shirt ripped open by one fat P.I.Gs. It's been part of the Australian sporting ethos that politics and sport shouldn't mix. But mix it did during the 1971 Springbok Rugby Union tour of Australia. What an explosive mix it was! The tour was marked by violent demonstrations against the team because of the South African Government's apartheid policies. Wherever the Springboks travelled, they were greeted by demonstrations, and those demonstrations reached a crescendo in Sydney, Melbourne and Brisbane, when the tourists took the field. In Queensland, where Joh Bjelke-Peteson was premier at the time, a state of emergency was declared to allow the matches to be played. But the ugliest violence took place in Melbourne, when 138 demonstrators were arrested and five police were treated in hospital following clashes before, during and after the match against Victoria at Olympic Park. In Sydney 100 people were arrested.In Melb.1 P.I.Gs was carried off after a firecracker went off next to his ear.Police horses were charging at full gallop the length of the pitch as a deafening unending racket went on.Most violent demo I ever went on. They galloped right over at least 2 pitch invaders. From profrv at nex.net.au Tue Sep 10 11:17:58 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 11 Sep 2002 04:17:58 +1000 Subject: LEDX Latest. Message-ID: <5.1.0.14.0.20020911041624.00a0ca40@mail.nex.net.au> The forerunner of the Law Enforcement Data Exchange (LEDX) was a system known as DocuShare, developed and marketed by Stamford, Conn.-based Xerox Corp. The product started out as a way for five company research centers to collaborate and share information, said Colman Murphy, Xerox's DocuShare product manager. "So they designed it to be secure but also to make it very easy for distributed work groups to build collaborative spaces and to share information," he said. "So it has a lot of security capabilities built into it, like the user name and password control on not just areas of the DocuShare server...but actually right down to each individual document. "The users themselves get to control that access. I, as the user, can decide who else can view this document down to the individual level. Also, the site itself can be administered among the users. So it distributes the administration mode across the organization. You don't have to have a large [information technology] organization to set it up, to administer it, to manage the content, to give people permission. All of that can be distributed across the organization." Murphy said the product could store any document in its original format. The application also includes filters to convert more than 200 file formats to HTML quickly and easily. Larry Hunt, chief engineer and chief executive officer of Integrated Digital Systems/ScanAmerica Inc., tried to come up with a better way to exchange information among the Internet Crimes Against Children task force centers. Because his company was one of Xerox's top value-added resellers and because he was familiar with DocuShare, Hunt modified the product and called it LEDX. MORE ON http://www.fcw.com/fcw/articles/2002/0902/spec-law-09-02-02.asp From profrv at nex.net.au Tue Sep 10 11:34:14 2002 From: profrv at nex.net.au (Matthew X) Date: Wed, 11 Sep 2002 04:34:14 +1000 Subject: Pre crime in the warthland. Message-ID: <5.1.0.14.0.20020911043259.00a0c7d0@mail.nex.net.au> John Ashcroft recently released his guidelines for investigating people he suspects as terrorists, and these guidelines exceed even J. Edgar Hoover's contempt for due process. Activists particularly--and I expect the term applies to a good many readers of The Progressive--should know what may well be in store for them. On page three of "The Attorney General's Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations," we are told: "A terrorism enterprise investigation may be initiated when facts or circumstances reasonably indicate that two or more persons are engaged in an enterprise for the purpose of . . . furthering political or social goals wholly or in part through activities that involve force or violence and a federal crime . . ." Note the use of "reasonably" and "wholly or in part." These insidiously malleable guidelines for terrorism investigations could apply to political action (and the reaction) during demonstrations by environmentalists, anti-globalizationists, animal rights pickets, or union members on strike, as well as pro-lifers trying to talk, and only to talk, to women entering abortion clinics ("obstruction" at clinics can be a federal crime). The guidelines go on to note that "the 'reasonable indication' standard for commencing a terrorism enterprise investigation is . . . substantially lower than probable cause." It is so low it could be part of the new Steven Spielberg-Tom Cruise movie, Minority Report, which envisions the nabbing of "pre-criminals." As The Washington Times puts it, such pre-criminals are convicted "before they ever act on, or, in some cases, are even aware of, their murderous designs." On page four of the Ashcroft Guidelines: "The nature of the conduct engaged in by a [terrorist] enterprise will justify an inference that the standard [for opening a criminal intelligence investigation] is satisfied, even if there are no known statements by participants that advocate or indicate planning for violence or other prohibited acts." (Emphasis added.) The Attorney General, furthermore, extends the dragnet to make individuals in a group under suspicion responsible for what other members say or write: "A group's activities and the statements of its members may properly be considered in conjunction with each other. A combination of statements and activities may justify a determination that the threshold standard for a terrorism investigation is satisfied, even if the statements alone or the activities alone would not warrant such a determination." (Emphasis added.) Also indicating the "pre-crime" mindset of Attorney General Ashcroft is the following paragraph. "While no particular factor or combination of factors is required, considerations that will generally be relevant whether the threshold standard for a terrorism investigation is satisfied includes as noted, a group's statements, its activities, and the nature of potential federal law violations suggested by its statements or its activities." (Emphasis added.) Keep in mind the massive, pervasive electronic surveillance--with minimal judicial supervision under the USA Patriot Act--of inferential "pre-crime" conversations and messages, both sent and received. Add to that the FBI's power, under the same law, to break into your home or office, with a warrant, while you're not there, and inset "The Magic Lantern" into your computer to record every one of your keystrokes, including those not sent. Then add the Patriot Act's allowing the FBI to command bookstores and libraries to reveal the books bought or read by potential domestic terrorists. You may now appreciate the prophecy of Senator Frank Church--who was instrumental in exposing the constitutional crimes of J. Edgar Hoover's Cointelpro operation--when he said in 1975 that future government intelligence capabilities could "at any time be turned around on the American people, and no American would have any privacy left--such is the capacity to monitor everything, telephone conversations, telegrams, it doesn't matter." And that was before the omnivorous, permeable Internet. The Web can be a spider web. Senator Church, referring to "potential" enemies of the state, warned: "There would be no way to fight back because the most careful effort to combine together resistance to the government, no matter how privately it was done, is within the reach of the government to know." There is still time to fight back. http://www.progressive.org/sept02/hen0902.html From tcmay at got.net Wed Sep 11 09:07:41 2002 From: tcmay at got.net (Tim May) Date: Wed, 11 Sep 2002 09:07:41 -0700 Subject: Saturday meeting/BBQ/party--last minute comments Message-ID: <99619994-C5A0-11D6-864F-0050E439C473@got.net> Last Minute Comments: * Meeting/BBQ/Party at Tim May's house, Saturday, September 14th, 1 p.m. onwards. Formal agenda to start promptly at 2 p.m. * I've had a lot of confirmations (not required, except for lurkers and strangers) from a lot of people, so PARKING is OFFICIALLY BECOMING A PROBLEM. I live at the top of a hill serviced by a one-lane road going from the valley floor up several hundred feet to my driveway above. I have had parties where about 15 cars were in one of several places: -- my own parking lot, handling about 4-5 cars besides my own 2. -- my driveway, handling about 4-6 more cars, depending on whether they block others! -- the side of the road at the very top of the hill, handling 3-5 other cars -- the rest, I'm not sure where they parked! * Those who arrive earliest will of course get the best parking, but may also get hemmed in (blocked) by later arrivals. (FILO) * OK, so you've again been warned. TRY TO CARPOOL. Twelve cars carrying 2-3 people each will give us a normal 20-30 person attendance. Twenty or thirty cars will be a disaster. * About 8 people, counting couples, have contacted me about sleeping space. The two spare bedrooms are spoken for, and the sofas are spoken for. For those who still want to stay over, there's some space on the floor. Be sure if you think you might stay to bring a sleeping bag or blankets, etc. Also, you may need to go out and move your car around if others are blocked. * Directions again follow. * Several interesting talks are expected...more can be done ad hoc. In addition, I hope we can talk about meaty issues of where things are going, besides just the usual griping about new laws. Cypherpunks write code. I look forward to seeing you there! --Tim Getting to Tim May's house in Corralitos: 427 Allan Lane (MapQuest works well). 831-728-0152 From Santa Cruz, south on Highway 1. Take Freedom Boulevard exit in Aptos. Go inland, on Freedom Blvd. Travel about 5 miles, to first stop sign. Take a left on Corralitos Road. At the the next stop sign, the Corralitos Market (good sausages!) will be on your left. Just before the stop sign, bear right on Brown's Valley Road. Cross bridge and then bear left as Brown's Valley Road turns. Travel about one mile to Allan Lane, on the right. Allan Lane is at about the "360" mailbox point on Brown's Valley Road...if you go too far and enter the redwoods, turn back! Drive to top of hill on Allan Lane. At top, bear left, over a small rise, past a house on the left, then down my driveway. My house will be the white stucco semi-Spanish style, with a red Explorer and black Mercedes in the driveway. Note for parties: You can park either in my driveway or at the top of the hill and walk a few hundred feet. Don't block any driveways! From points south of Santa Cruz, take Green Valley Road exit off of Highway 1. Travel about 2 miles to Freedom Boulevard. Turn left. Then right at Corralitos Road. From tcmay at got.net Wed Sep 11 09:16:39 2002 From: tcmay at got.net (Tim May) Date: Wed, 11 Sep 2002 09:16:39 -0700 Subject: Nov-L: Noelle Bush arrested with drugs (fwd) In-Reply-To: <20020910201519.Q44966-100000@greeves2.mfn.org> Message-ID: On Tuesday, September 10, 2002, at 06:15 PM, J.A. Terranson wrote: > I wonder if she'll get 400 years in prison like the rest of us? Um, > never mind... > > This is something to watch. Many first-time offenders in the War on Some Drugs get rehab time...but she's been in rehab some number of times. If she were a street kid, she'd be facing X years in prison. But she's not. She's part of the First Extended Family. On the other hand, she's half-Mexican, so that may cancel out her FEF status. If there's justice, she'll face exactly the same 5 years in prison that civilians face. But there isn't, and she won't. --Tim May From Kopitek.Kopyalama.Sistemleri at minder.net Wed Sep 11 09:53:08 2002 From: Kopitek.Kopyalama.Sistemleri at minder.net (Kopitek.Kopyalama.Sistemleri at minder.net) Date: Wed, 11 Sep 02 09:53:08 GTB Yaz Saati Subject: FOTOKOPIDE SON KAMPANYA Message-ID: <200209110757.g8B7vWS07999@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4787 bytes Desc: not available URL: From virus_alert at nucleus.com Wed Sep 11 09:32:33 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Wed, 11 Sep 2002 10:32:33 -0600 Subject: VIRUS ALERT! - Noresize scrolling Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: Virus 'W32/Klez.H at mm' in panrdchrbg009[1].exe Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From brisha at cfibmail=2Ecom Wed Sep 11 09:32:33 2002 From: brisha at cfibmail=2Ecom (brisha) Date: Wed, 11 Sep 2002 10:32:33 -0600 Subject: Noresize scrolling Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 26110 bytes Desc: not available URL: From wolf at priori.net Wed Sep 11 11:28:17 2002 From: wolf at priori.net (Meyer Wolfsheim) Date: Wed, 11 Sep 2002 11:28:17 -0700 (PDT) Subject: Free Copy of Applied Cryptography In-Reply-To: Message-ID: On Wed, 11 Sep 2002, Lisa wrote: > http://www.cacr.math.uwaterloo.ca/hac/ > > http://developers.slashdot.org/developers/02/09/11/1616231.shtml?tid=93 > > Handbook of Applied Cryptography > Posted by michael on Wednesday September 11, @12:24PM > from the complete-from-adelman-to-zimmerman dept. > cconnell writes "The Handbook of Applied Cryptography is now available > free (for personal use) on the Internet. This is a $100 book. Note also > the companion C source code for most of the crypto algorithms, written by > James Pate Williams. There is some very cool code here!" That's "Handbook of Applied Cryptography", arguably a much better book than "Applied Cryptography". It has been available in its entirety from that website for at least two years now. I suppose this is somewhat timely news, by "Slashdot-i-cant- spell-zimmermann dept" standards, anyway. -MW- From emc at artifact.psychedelic.net Wed Sep 11 11:38:05 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Wed, 11 Sep 2002 11:38:05 -0700 (PDT) Subject: Airline Cancels Gay Mile-High Club Meeting Message-ID: <200209111838.g8BIc5M28973@artifact.psychedelic.net> Apparently, one isn't permitted to celebrate National Dented Imperialism Day through any means that requires more than one individual to be in an airplane bathroom at the same time. ----- FORT SMITH, Arkansas (CNN) -- A Northwest Airlines flight was diverted Wednesday to Fort Smith, Arkansas, after the pilot reported a disturbance involving passengers in the bathroom, federal officials said. "Apparently a number of men had locked themselves in the bathroom," FBI spokesman Brian Marshall said. Crew members and other passengers acted to get the men out, federal law enforcement officials said. Marshall said no one was injured. Three men were held for questioning at the Fort Smith Regional Airport, authorities said. A senior Bush administration official, speaking on the condition of anonymity, said the incident did not appear to be related to terrorism. The official said the men are being questioned for "inappropriate behavior," which he described as locking themselves inside a bathroom. When the passengers would not leave the bathroom, the pilot decided to divert the plane, the official said. No military jets escorted the plane to the airport in Arkansas, he added. Flight 979, an Airbus A320, was traveling from Memphis, Tennessee, to Las Vegas, Nevada, with 94 passengers and five crew members when it was diverted, the airline said. Passengers were taken off the plane, and several police cars could be seen around the plane on the tarmac. The plane had departed Memphis at 8:45 a.m. CDT and was headed for McCarran International Airport in Las Vegas. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From emc at artifact.psychedelic.net Wed Sep 11 12:41:07 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Wed, 11 Sep 2002 12:41:07 -0700 (PDT) Subject: Nov-L: Noelle Bush arrested with drugs (fwd) In-Reply-To: from "Tim May" at Sep 11, 2002 09:16:39 AM Message-ID: <200209111941.g8BJf7729038@artifact.psychedelic.net> Tim wrote: > If there's justice, she'll face exactly the same 5 years in prison that > civilians face. Justice would be no Draconian drug penalities at all, rather than subjecting the extended ruling aristocracy to the same unfair penalties as the proles. I mention this because it doesn't help the goal of getting rid of unfair laws at all, if people can be made to cheer every time someone they don't like runs afoul of one. Jimmy Carter once suggested that a law was unfair of more than 50% of the pain and suffering was caused by the law, and not by the act being punished. By this standard, we would have no laws at all against the casual use or sale of marijuana, and less stringent laws against the use or sale of almost everything else. Heroin is much less addictive than nicotine, and a good deal less poisonous too. I don't see many driveby shootings over cigarettes. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From lisa at holman.net Wed Sep 11 11:07:46 2002 From: lisa at holman.net (Lisa) Date: Wed, 11 Sep 2002 13:07:46 -0500 (CDT) Subject: Free Copy of Applied Cryptography Message-ID: http://www.cacr.math.uwaterloo.ca/hac/ http://developers.slashdot.org/developers/02/09/11/1616231.shtml?tid=93 Handbook of Applied Cryptography Posted by michael on Wednesday September 11, @12:24PM from the complete-from-adelman-to-zimmerman dept. cconnell writes "The Handbook of Applied Cryptography is now available free (for personal use) on the Internet. This is a $100 book. Note also the companion C source code for most of the crypto algorithms, written by James Pate Williams. There is some very cool code here!" From jeffers at brick.net Wed Sep 11 12:29:32 2002 From: jeffers at brick.net (Gary Jeffers) Date: Wed, 11 Sep 2002 14:29:32 -0500 Subject: The Cypherpunk inet-one archieve is down. Message-ID: <000701c259c9$8fa5c6e0$a3934ad1@garyjeff> My fellow Cypherpunks, Guan Sin Ong's archieve : http://www.inet-one.com/cypherpunks has been down since Sun. 9/08/2002 . Anyone know what's going on? Respond to my email address as well since I monitor Cypherpunks thru Ong's archieve. Yours Truly, Gary Jeffers BEAT STATE!!!! see http://www.WHATREALLYHAPPENED.com to find out how the world really runs. From jeffers at brick.net Wed Sep 11 12:44:47 2002 From: jeffers at brick.net (Gary Jeffers) Date: Wed, 11 Sep 2002 14:44:47 -0500 Subject: Cypherpunks inet-one archieve not updating. Message-ID: <000901c259cb$b0509760$a2934ad1@garyjeff> My fellow Cypherpunks, I said "down" . More precisely "not updating" since Sunday. Yours Truly, Gary Jeffers BEAT STATE!!!! http://www.WHATREALLYHAPPENED.com to find out how the world really runs.  From mnasexxyoonui at private.21cn.com Wed Sep 11 12:57:02 2002 From: mnasexxyoonui at private.21cn.com (Kym) Date: Wed, 11 Sep 2002 15:57:02 -0400 Subject: XXXXX xcaeq Message-ID: <200209112002.g8BK2t828035@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2005 bytes Desc: not available URL: From sfurlong at acmenet.net Wed Sep 11 14:10:16 2002 From: sfurlong at acmenet.net (Steve Furlong) Date: Wed, 11 Sep 2002 17:10:16 -0400 Subject: Cypherpunks inet-one archieve not updating. In-Reply-To: <000901c259cb$b0509760$a2934ad1@garyjeff> References: <000901c259cb$b0509760$a2934ad1@garyjeff> Message-ID: <200209111710.16722.sfurlong@acmenet.net> On Wednesday 11 September 2002 15:44, Gary Jeffers wrote: > My fellow Cypherpunks, > > I said "down" . More precisely "not updating" since Sunday. The LNE cpunks archive which I host is still up and still updated. http://208.171.236.113/cypherpunks/ -- Steve Furlong Computer Condottiere Have GNU, Will Travel Vote Idiotarian --- it's easier than thinking From cypherpunks at Algebra.COM Wed Sep 11 16:24:08 2002 From: cypherpunks at Algebra.COM (cypherpunks at Algebra.COM) Date: Wed, 11 Sep 2002 18:24:08 -0500 Subject: Give me 5 minutes of your time and I can change your life!! Message-ID: DO NOT DELETE THIS READ FIRST IT WILL CHANGE YOUR LIFE! By following my incredible method of making quick cash, I'll show you how to EASILY MAKE 42,000 per month!!!! This HONESTLY works, give me five minutes and read this email and it will change your life...it did mine. I guarantee that if you do not become wealthy from this I will personally refund your money...I GIVE YOU MY WORD! This is a completely documented method to get rich and anyone regardless of age, race, state of health, country of origin or financial standing can participate. No education or special experience is need. Within the next two weeks you could be on your way to a $500,000.00 income. My name is Cole Schulte; I've helped the most popular money making plan in existence today become that. Perhaps you've seen us on TV. We travel the country telling people just like you how to cash in on the hundreds of millions of dollars that people are willing to pay for information!!! In the last 12 years I have worked less than 4 hours a day, have a beautiful home, drive a brand new Cadillac, relax in Mexican and European luxury hotels six or eight time a year, and basically have had life handed to me on a silver platter. All because of the incredible secret i know which makes millions without any effort. *****Order with in two weeks and get 2 bulk E-mail programs free!!!***** AS SEEN ON NATIONAL TV: Making over half million dollars every 4 to 5 months from your home. THANK'S TO THE COMPUTER AGE AND THE INTERNET BE AN INTERNET MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say ''Bull'', please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are ''absolutely NO Laws prohibiting the participation in the program and if people can "follow the simple instruction" they are bound to make some mega bucks with only $25 out of pocket cost''. DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: '' Thanks to this profitable opportunity". I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received a total $ 610,470.00 in 21 weeks, with money still coming in''. Pam Hedland Fort Lee, New Jersey. ++++++++++++++++++++++++++++++++++++++++++++++++++ Another said: "This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and Wa-laa ..... 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything." More testimonials later but first... ++++ PRINT THIS NOW FOR YOUR FUTURE REFERENCE ++++ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN !!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE! INSTRUCTIONS: = For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. WHEN YOU PLACE YOUR ORDER, MAKE SURE YOU ORDER EACH OF THE 5 REPORTS! You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00. (That’s what I spend every time I take my girlfriend to the movies) Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it in your desk in case something happens to your computer. IMPORTANT DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in step '' 1 through 6 '' or you will loose out on the majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter it, it will NOT work !!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, some have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! This IS a legitimate BUSINESS. You are offering a product for sale and getting paid for it. Treat it as such and you will be VERY profitable in a short period of time. 1. After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. Email them and ask that’s what I always did. 2.Move the name & address in REPORT # 4 down TO REPORT # 5. 3. Move the name & address in REPORT # 3 down TO REPORT # 4. 4. Move the name & address in REPORT # 2 down TO REPORT # 3. 5. Move the name & address in REPORT # 1 down TO REPORT # 2 6.... Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY (Just cut and paste! This is critical to YOUR success. ++++++++++++++++++++++++++++++++++++++++++++++++++ **** Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. **** Save this on a disk as well just in case if you loose any data. To assist you with marketing your business on the internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD # 1: BY SENDING BULK E-MAIL LEGALLY ++++++++++++++++++++++++++++++++++++++++++++++++++ Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receives only a 0.2% (2/10 of 1%) response (the response could be much better but lets just say it is only 0.2%). Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's=100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send 5,000 e-mail each for a total of 5 million e-mail sent out. The 0.2% response is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report # 5. THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half a million dollars). Your total income in this example is: 1... $50 + 2..... $500 + 3..... $5,000 + 4..... $50,000 + 5....$500,000 .... Grand Total=$555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGUREOUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY! (I did it was $55,000 in four months) ++++++++++++++++++++++++++++++++++++++++++++++++++ REMEMBER, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone or half or even one 4th of those people mailed 100,000 e-mails each or more? There are 580.78 million people on the Internet worldwide and counting, with thousands of more coming on line every day. If you don't believe me go here http://www.nua.ie/surveys/how_many_online. Believe me, there isn't any better way to make money! METHOD # 2: BY PLACING FREE ADS ON THE INTERNET ++++++++++++++++++++++++++++++++++++++++++++++++++ Advertising on the net is very, very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response. We strongly suggest you start with Method # 1 and add METHOD #2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it. Always provide same day service on all orders. This will guarantee that the e-mail they send out, with your name and address on it, will be prompt because they can not advertise until they receive the report. ++++++++++AVAILABLE REPORTS++++++++++++++ The reason for the "cash" is not because this is illegal or somehow "wrong". It is simply about time. Time for checks or credit cards to be cleared or approved, etc. Concealing it is simply so no one can SEE there is money in the envelope and steal it before it gets to you. ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (U.S. CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper or foil will also work. On one of those sheets of paper, write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS and your name and postal address. SO PLACE YOUR ORDER FOR THESE REPORTS NOW: +++++++++++++++++++++++++++++++++++++++++++++++++++ REPORT #1: The Insider's Guide to Advertising for Free on the Net Order Report #1 from: Cole D Schulte 2708 N 75th ST # 22 Omaha, NE 68134 __________________________________________________________ REPORT #2: The Insider's Guide to Sending Bulk e-mail on the Net Order Report #2 from: M. Eiseman P.O.Box 451971 Sunrise, FL 33345-1971 __________________________________________________________ REPORT #3: Secret to Multilevel marketing on the Net Order Report #3 from: GM Boland 353 Jonestown Rd Winston-Salem, N. C. 27104 __________________________________________________________ REPORT #4: How to become a millionaire utilizing MLM & the Net Order Report #4 from: Mrs. Caroline Abee 113 Ervin Ave NE Valdese, NC 28690-9601 ______________________________________________________ REPORT #5: How to send out 1,000,000 emails for free Order Report #5 From: R. Gentz 4600 W. 1100 N. Wheatfield, IN 46392 +++++++++++++++++++++++++++++++++++++++++++++++++ There are currently more than 570,000,000 people online worldwide! $$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$ Follow these guidelines to guarantee your success: If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT # 2. If you did not, continue advertising or sending e-mails until you do. **Once you have received 100 or more orders for Report# 2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a Different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business!!! ++++++++++++++++++++++++++++++++++++++++++++++++++ FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report #1 and moved others to #2...# 5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on every one of them. (Just to let you know anyone who sends money to Cole Schulte (me) I send out least 5 million a month, there are bulk emails companies you can hire and they do all the work for you...) Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially indepen! dent. IT IS UP TO YOU NOW! ++++++++++++++++MORE TESTIMONIALS+++++++++++++++++ "My name is Mitchell. My wife, Jody and I live in Chicago. I am an accountant with a major U.S.Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving 'junk mail'. I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I 'knew' it wouldn't work. Jody totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old 'I told you so' on her when the thing didn't work. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received total $ 147,200.00 ........ all cash! I was shocked. I have joined Jody in her 'hobby'." Mitchell Wolf M.D., Chicago, Illinois ++++++++++++++++++++++++++++++++++++++++++++++++++ "Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative as I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. I was surprised when I found my medium size post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big". Dan Sondstrom, Alberta, Canada ++++++++++++++++++++++++++++++++++++++++++++++++++ "I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else........11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks". Susan De Suza, New York, N.Y. ++++++++++++++++++++++++++++++++++++++++++++++++++ "It really is a great opportunity to make relatively easy money with little cost to you. I followed the simple instructions carefully and within 10 days the money started to come in. My first month I made $ 20,560.00 and by the end of third month my total cash count was $ 362,840.00. Life is beautiful, Thanx to the internet". Fred Dellaca, Westport, New Zealand ++++++++++++++++++++++++++++++++++++++++++++++++++ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM! If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington, D.C. ++++++++++++++++++++++++++++++++++++++++++++++++++ ONE TIME MAILING, NO NEED TO REMOVE, but just in case email me at cdschultetakemeofflist at yahoo.com and type remove in the subject, but before you do that email me and ask me how much money I've made ++++++++++++++++++++++++++++++++++++++++++++++++++ This message is sent in compliance of the proposed bill SECTION 301, paragraph (a)(2)(C) of S. 1618. From cypherpunks at Algebra.COM Wed Sep 11 16:25:55 2002 From: cypherpunks at Algebra.COM (cypherpunks at Algebra.COM) Date: Wed, 11 Sep 2002 18:25:55 -0500 Subject: You're only going to get so many opportunities like this in your lifetime! Message-ID: DO NOT DELETE THIS READ FIRST IT WILL CHANGE YOUR LIFE! By following my incredible method of making quick cash, I'll show you how to EASILY MAKE 42,000 per month!!!! This HONESTLY works, give me five minutes and read this email and it will change your life...it did mine. I guarantee that if you do not become wealthy from this I will personally refund your money...I GIVE YOU MY WORD! This is a completely documented method to get rich and anyone regardless of age, race, state of health, country of origin or financial standing can participate. No education or special experience is need. Within the next two weeks you could be on your way to a $500,000.00 income. My name is Cole Schulte; I've helped the most popular money making plan in existence today become that. Perhaps you've seen us on TV. We travel the country telling people just like you how to cash in on the hundreds of millions of dollars that people are willing to pay for information!!! In the last 12 years I have worked less than 4 hours a day, have a beautiful home, drive a brand new Cadillac, relax in Mexican and European luxury hotels six or eight time a year, and basically have had life handed to me on a silver platter. All because of the incredible secret i know which makes millions without any effort. *****Order with in two weeks and get 2 bulk E-mail programs free!!!***** AS SEEN ON NATIONAL TV: Making over half million dollars every 4 to 5 months from your home. THANK'S TO THE COMPUTER AGE AND THE INTERNET BE AN INTERNET MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say ''Bull'', please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are ''absolutely NO Laws prohibiting the participation in the program and if people can "follow the simple instruction" they are bound to make some mega bucks with only $25 out of pocket cost''. DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: '' Thanks to this profitable opportunity". I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received a total $ 610,470.00 in 21 weeks, with money still coming in''. Pam Hedland Fort Lee, New Jersey. ++++++++++++++++++++++++++++++++++++++++++++++++++ Another said: "This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and Wa-laa ..... 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything." More testimonials later but first... ++++ PRINT THIS NOW FOR YOUR FUTURE REFERENCE ++++ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN !!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE! INSTRUCTIONS: = For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. WHEN YOU PLACE YOUR ORDER, MAKE SURE YOU ORDER EACH OF THE 5 REPORTS! You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00. (That’s what I spend every time I take my girlfriend to the movies) Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it in your desk in case something happens to your computer. IMPORTANT DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in step '' 1 through 6 '' or you will loose out on the majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter it, it will NOT work !!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, some have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! This IS a legitimate BUSINESS. You are offering a product for sale and getting paid for it. Treat it as such and you will be VERY profitable in a short period of time. 1. After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. Email them and ask that’s what I always did. 2.Move the name & address in REPORT # 4 down TO REPORT # 5. 3. Move the name & address in REPORT # 3 down TO REPORT # 4. 4. Move the name & address in REPORT # 2 down TO REPORT # 3. 5. Move the name & address in REPORT # 1 down TO REPORT # 2 6.... Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY (Just cut and paste! This is critical to YOUR success. ++++++++++++++++++++++++++++++++++++++++++++++++++ **** Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. **** Save this on a disk as well just in case if you loose any data. To assist you with marketing your business on the internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD # 1: BY SENDING BULK E-MAIL LEGALLY ++++++++++++++++++++++++++++++++++++++++++++++++++ Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receives only a 0.2% (2/10 of 1%) response (the response could be much better but lets just say it is only 0.2%). Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's=100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send 5,000 e-mail each for a total of 5 million e-mail sent out. The 0.2% response is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report # 5. THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half a million dollars). Your total income in this example is: 1... $50 + 2..... $500 + 3..... $5,000 + 4..... $50,000 + 5....$500,000 .... Grand Total=$555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGUREOUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY! (I did it was $55,000 in four months) ++++++++++++++++++++++++++++++++++++++++++++++++++ REMEMBER, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone or half or even one 4th of those people mailed 100,000 e-mails each or more? There are 580.78 million people on the Internet worldwide and counting, with thousands of more coming on line every day. If you don't believe me go here http://www.nua.ie/surveys/how_many_online. Believe me, there isn't any better way to make money! METHOD # 2: BY PLACING FREE ADS ON THE INTERNET ++++++++++++++++++++++++++++++++++++++++++++++++++ Advertising on the net is very, very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response. We strongly suggest you start with Method # 1 and add METHOD #2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it. Always provide same day service on all orders. This will guarantee that the e-mail they send out, with your name and address on it, will be prompt because they can not advertise until they receive the report. ++++++++++AVAILABLE REPORTS++++++++++++++ The reason for the "cash" is not because this is illegal or somehow "wrong". It is simply about time. Time for checks or credit cards to be cleared or approved, etc. Concealing it is simply so no one can SEE there is money in the envelope and steal it before it gets to you. ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (U.S. CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper or foil will also work. On one of those sheets of paper, write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS and your name and postal address. SO PLACE YOUR ORDER FOR THESE REPORTS NOW: +++++++++++++++++++++++++++++++++++++++++++++++++++ REPORT #1: The Insider's Guide to Advertising for Free on the Net Order Report #1 from: Cole D Schulte 2708 N 75th ST # 22 Omaha, NE 68134 __________________________________________________________ REPORT #2: The Insider's Guide to Sending Bulk e-mail on the Net Order Report #2 from: M. Eiseman P.O.Box 451971 Sunrise, FL 33345-1971 __________________________________________________________ REPORT #3: Secret to Multilevel marketing on the Net Order Report #3 from: GM Boland 353 Jonestown Rd Winston-Salem, N. C. 27104 __________________________________________________________ REPORT #4: How to become a millionaire utilizing MLM & the Net Order Report #4 from: Mrs. Caroline Abee 113 Ervin Ave NE Valdese, NC 28690-9601 ______________________________________________________ REPORT #5: How to send out 1,000,000 emails for free Order Report #5 From: R. Gentz 4600 W. 1100 N. Wheatfield, IN 46392 +++++++++++++++++++++++++++++++++++++++++++++++++ There are currently more than 570,000,000 people online worldwide! $$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$ Follow these guidelines to guarantee your success: If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT # 2. If you did not, continue advertising or sending e-mails until you do. **Once you have received 100 or more orders for Report# 2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a Different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business!!! ++++++++++++++++++++++++++++++++++++++++++++++++++ FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report #1 and moved others to #2...# 5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on every one of them. (Just to let you know anyone who sends money to Cole Schulte (me) I send out least 5 million a month, there are bulk emails companies you can hire and they do all the work for you...) Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially indepen! dent. IT IS UP TO YOU NOW! ++++++++++++++++MORE TESTIMONIALS+++++++++++++++++ "My name is Mitchell. My wife, Jody and I live in Chicago. I am an accountant with a major U.S.Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving 'junk mail'. I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I 'knew' it wouldn't work. Jody totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old 'I told you so' on her when the thing didn't work. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received total $ 147,200.00 ........ all cash! I was shocked. I have joined Jody in her 'hobby'." Mitchell Wolf M.D., Chicago, Illinois ++++++++++++++++++++++++++++++++++++++++++++++++++ "Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative as I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. I was surprised when I found my medium size post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big". Dan Sondstrom, Alberta, Canada ++++++++++++++++++++++++++++++++++++++++++++++++++ "I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else........11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks". Susan De Suza, New York, N.Y. ++++++++++++++++++++++++++++++++++++++++++++++++++ "It really is a great opportunity to make relatively easy money with little cost to you. I followed the simple instructions carefully and within 10 days the money started to come in. My first month I made $ 20,560.00 and by the end of third month my total cash count was $ 362,840.00. Life is beautiful, Thanx to the internet". Fred Dellaca, Westport, New Zealand ++++++++++++++++++++++++++++++++++++++++++++++++++ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM! If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington, D.C. ++++++++++++++++++++++++++++++++++++++++++++++++++ ONE TIME MAILING, NO NEED TO REMOVE, but just in case email me at cdschultetakemeofflist at yahoo.com and type remove in the subject, but before you do that email me and ask me how much money I've made ++++++++++++++++++++++++++++++++++++++++++++++++++ This message is sent in compliance of the proposed bill SECTION 301, paragraph (a)(2)(C) of S. 1618. From fpcporn at saintly.com Wed Sep 11 22:07:03 2002 From: fpcporn at saintly.com (Adult Club) Date: Wed, 11 Sep 2002 22:07:03 -0700 Subject: cypherpunks@minder.net Message-ID: New Account For: cypherpunks at minder.net ################################################## # # # Free XXX Links .org is a # # non-profit organization # # # # Offering the best in # # adult entertainment for free. # # # ################################################## >>>>> INSTANT ACCESS TO ALL SITES NOW >>>>> Your User Name And Password: >>>>> User Name: cypherpunks at minder.net >>>>> Password: 818932 Test it out NOW! Adults Farm http://www.freexxxlinks.org/farm/?aid=818932 Girls and Animals Getting Freaky....FREE Lifetime Membership!! 6 of the Best Adult Sites on the Internet for FREE! --------------------------------------- NEWS 09/05/02 With just over 3.9 Million Members that signed up for FREE, Last month there were 894,457 New Members. Are you one of them yet??? --------------------------------------- Our Membership FAQ Q. Why are you offering free access to 6 adult membership sites for free? A. I have advertisers that pay me for ad space so you don't have to pay for membership. Q. Is it true my membership is for life? A. Absolutely you'll never have to pay a cent the advertisers do. Q. Can I give my account to my friends and family? A. Yes, as long they are over the age of 18. Q. Do I have to sign up for all 6 membership sites? A. No just one to get access to all of them. Q. How do I get started? A. Click on one of the following links below to become a member. - These are multi million dollar operations with policies and rules. - Fill in the required info and they won't charge you for the Free pass! - If you don't believe us, just read their terms and conditions. --------------------------- # 6. > XXX Adults Farm http://www.freexxxlinks.org/farm/?aid=818932 Girls and Animals Getting Freaky....FREE Lifetime Membership!! # 5. > Sexy Celebes Porn http://www.freexxxlinks.org/celebst/?aid=818932 Thousands Of XXX Celebes doing it...FREE Lifetime Membership!! # 4. > Play House Porn http://www.freexxxlinks.org/play/?aid=818932 Live Feeds From 60 Sites And Web Cams...FREE Lifetime Membership!! # 3. > Asian Sex Fantasies http://www.freexxxlinks.org/asian/?aid=818932 Japanese Schoolgirls, Live Sex Shows ...FREE Lifetime Membership!! # 2. > Lesbian Lace http://www.freexxxlinks.org/lesbian/?aid=818932 Girls and Girls Getting Freaky! ...FREE Lifetime Membership!! # 1. > New! just added today: Mage Porn Site http://www.freexxxlinks.org/mega/?aid=818932 950,00 Pics, 90,000 Movies, Live Sex Shows... FREE Lifetime Membership!! -------------------------- Jennifer Simpson, Miami, FL Your FREE lifetime membership has entertained my boyffriend and I for the last two years! Your Adult Sites are the best on the net! Joe Morgan Manhattan, NY Your live sex shows and live sex cams are unbelievable. The best part about your porn sites, is that they're absolutely FREE! -------------------------- Removal Instructions: You have received this advertisement because you have opted in to receive free adult internet offers and specials through our affiliated websites. If you do not wish to receive further emails or have received the email in error you may opt-out of our database here http://www.freexxxlinks.org/optout/ . Please allow 24 hours for removal. ukpdfwtsjidgaatsguigvrtmuea From girls-unsubscribe at xxxtasymail.com Wed Sep 11 21:04:10 2002 From: girls-unsubscribe at xxxtasymail.com (Natalie) Date: Thu, 12 Sep 2002 00:04:10 -0400 (EDT) Subject: ADULT ADV: We've Exposed Dozens of Dorm Sweethearts!! Message-ID: <200209120404.g8C44A848619@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4288 bytes Desc: not available URL: From lysexxyoonui at private.21cn.com Thu Sep 12 00:18:39 2002 From: lysexxyoonui at private.21cn.com (Kym) Date: Thu, 12 Sep 2002 03:18:39 -0400 Subject: XXXXX agrlh Message-ID: <200209120724.g8C7OXS18199@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2000 bytes Desc: not available URL: From cypher at artsci.net Thu Sep 12 03:04:51 2002 From: cypher at artsci.net (cypher) Date: Thu, 12 Sep 2002 05:04:51 -0500 Subject: Raping Hot Girls And Wild Horses!!!!!!!!!! Message-ID: <200209120505859.SM00920@209.99.227.91> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1015 bytes Desc: not available URL: From sfurlong at acmenet.net Thu Sep 12 05:14:07 2002 From: sfurlong at acmenet.net (Steve Furlong) Date: Thu, 12 Sep 2002 08:14:07 -0400 Subject: LNE Cypherpunks archive Message-ID: <200209120814.07399.sfurlong@acmenet.net> List members, Thanks to the good offices of Len Sassaman, you can access the list archives which I maintain at http://archives.abditum.com/ (Yes, I have the technical ability to obtain a domain name of my own. No, I do not have the financial ability; I'm a decent programmer but the worst businessman you'll ever meet. Hey, anyone want to hire a consulting programmer you can easily rip off? ) SRF -- Steve Furlong Computer Condottiere Have GNU, Will Travel Vote Idiotarian --- it's easier than thinking From virus_alert at nucleus.com Thu Sep 12 10:25:36 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Thu, 12 Sep 2002 11:25:36 -0600 Subject: VIRUS ALERT! - Language Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: Virus 'W32/Klez.H at mm' in _smmlpl0013[1].exe Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From BRIMIL at cfibmail=2Ecom Thu Sep 12 10:25:36 2002 From: BRIMIL at cfibmail=2Ecom (BRIMIL) Date: Thu, 12 Sep 2002 11:25:36 -0600 Subject: Language Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 8291 bytes Desc: not available URL: From SweepsGame at sweepsgame.com Thu Sep 12 13:46:47 2002 From: SweepsGame at sweepsgame.com (Sweepsgame.com) Date: Thu, 12 Sep 2002 13:46:47 -0700 (PDT) Subject: NFL Week#2 - Pick a Winner at Sportsinteraction! Message-ID: <200209122046.NAA07234@s3071.mb00.net> Your privacy is extremely important to us. You requested to receive this mailing, by registering at Sweepsgame.com or by subscribing through one of our marketing partners. As a leader in permission-based email marketing, Sweepsgame.com is committed to delivering a highly rewarding experience. However, if you wish to unsubscribe, please forward a copy of this message to Sweepsgame at reply.mb00.net with the word remove in the subject line. Third-party offers contained in this email are the sole responsibility of the offer originator. S P O R T S I N T E R A C T I O N Week 2 Super Parlay Special! 10% Initial Deposit Bonus! http://www.ppmtrac.com/tk/116/ AOL Users Click Here Now that pro football is hot again, what better time to try your gridiron gumption than with a parlay bet at Sports Interaction! The full slate of games is waiting for you so take a crack at a 6-team parlay and you could win HUGE on pro football in Week 2. This is the excitement you've been waiting for - it's time to get in on the action! At Sports Interaction you can bet online instantly with your credit card, using the currency of your choice! Try it Now! http://www.ppmtrac.com/tk/116/ AOL Users Click Here <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> * To remove yourself from this mailing list, point your browser to: http://i.mb00.net/remove?Sweepsgame:* * Enter your email address (cypherpunks at minder.net) in the field provided and click "Unsubscribe". The mailing list ID is "Sweepsgame:*". OR... * Forward a copy of this message to Sweepsgame at reply.mb00.net with the word remove in the subject line. This message was sent to address cypherpunks at minder.net X-PMG-Recipient: cypherpunks at minder.net <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> pmguid:1rp.331s.18wkw From netwealth4ever at yahoo.ca Thu Sep 12 12:30:58 2002 From: netwealth4ever at yahoo.ca (aymLucky) Date: Thu, 12 Sep 2002 15:30:58 -0400 Subject: Your commissions are waiting. Message-ID: <200209121927.g8CJRH888628@locust.minder.net> Your commissions are waiting to be earned by simply using your FREE Professional Autoresponder system valued at over $300. This is a wonderful gift for you, friends, business associates, co-workers, shop owners literally anyone that uses e-mail! The best part about it is you could even make money by giving away these systems! I'm not kidding, FREE Autoresponder system + income earning = Perfect gift. Please don't be offended by this one time mailing. No need to remove! Claim your free systems now by simply replying. Regards, MRP From schear at lvcm.com Thu Sep 12 19:17:40 2002 From: schear at lvcm.com (Steve Schear) Date: Thu, 12 Sep 2002 19:17:40 -0700 Subject: State's medical marijuana proposition doesn't trump federal regulations (was Re: !!! Nov-L: Calif. City Plans Marijuana Giveaway (fwd)) In-Reply-To: Message-ID: <5.1.0.14.2.20020912182735.04275de0@pop3.lvcm.com> >Though the council passed a resolution denouncing the raid, there is no >official city sponsorship of the event - council members and medical >marijuana advocates are simply acting on their own in a public space, >said >City Attorney John Barisone. > >DEA spokesman Richard Meyer was surprised at the plan. > >``Are you serious? That's illegal. It's like they're flouting federal >law,'' >he said. ``I'm shocked that city leaders would promote the use of >marijuana >that way. What is that saying to our youth?'' [The following is my response to a related article (unfortunately not on-line) from the Opinion section of the San Jose Mercury News by Larry N. Gerston, a professor of political science at SJSU and political analyst at NBC3, wherein the question is asked whether we should have obey laws we don't like. Larry, Your September 11 SJMN op-ed piece, "State's medical marijuana proposition doesn't trump federal regulations," made some good points regarding the current balance of power between the states and federal government and the importance of obeying laws. And in a perfect world I'd agree, but this is not that world. Sometimes civil disobedience or even criminal action is needed to pressure legislators or the courts to doing what's right. Governmental systems have an inherent mandate to increase power and rarely give it up. When those in authority encounter impediments they will often seek a means, occasionally illegal, to achieve their ends. Our system of checks and balances (including the states) was created to thwart the most dangerous form of anarchy, anarchy from within. Whenever this system fails all our liberties are at stake. Such is the case with the apparently illegal enactment of the 14th Amendment upon which is based much of current federal authority. At the close of the Civil War the Republican controlled Congress sought to legally "lock in" the expansion of federal authority it had gained as a result of battlefield victories with Joint Resolution No. 127 proposing a 14th Amendment. But once again the Southern States stood in their way. Although President Jackson (who succeeded Lincoln) and Congress had acknowledged the legitimacy of the these duly elected governments, in their frustration the 39th Congress voted, on December 5, 1865, to deny seats in both Houses to anyone elected from the 11 southern States. They also ejected New Jersey Senator Stockton who opposed the bill and would have cast the deciding ballot, and refused to count the denied southern representative's numbers when computing the two-thirds majority Constitutionally required for passage. Whether it requires two thirds of the full membership of both Houses to propose an Amendment to the Constitution or only two thirds of those seated or two thirds of those voting is a question which it would seem could only be determined by the Supreme Court. Congress cared little about these "minor irregularities" in the proposal and voting process, they proceeded to submit the amendment to the States for ratification. But, surprise, things did not go well. After some legislatures first ratified and then recanted, in the end 16 of the 37 states rejected the measure. When the State of Louisiana rejected the 14th Amendment on February 6, 1867 [making the 10th State to have rejected the same or more than one-fourth of the total number of 36 States of the Union (as of that date) leaving less than three-fourths of the States to possibly ratify the same] the Amendment failed. It could not have been revived except by a new Joint Resolution of the Senate and House of Representatives in accordance with Constitutional requirement. Congress decided that states legislatures were not free to change their minds on ratification and ignored all those who did so. On the 20th of July 1868 Secretary of State Seward issued his proclamation of ratification of the fourteenth amendment, in which, after reciting the law of 1818 requiring him to publish the ratification of an amendment to the Constitution in the newspapers. However his language in the proclamation shows very clearly that Mr Seward had his doubts about the Constitutionality of the ratification process, and he takes pains to relieve himself of any responsibility by declaring that - "Neither the act just quoted from, nor any other law, expressly or by conclusive implication, authorizes the Secretary of State to determine and decide doubtful questions as to the authenticity of the organization of State legislatures or as to the power of any State legislature to recall a previous act or resolution of ratification of any amendment proposed to the Constitution". The Senate brushed aside Secretary Steward's concerns and on the next day Senator Sherman offered a Joint Resolution declaring that three fourths and more of the States had ratified the proposed Amendment, and therefore that it was a part of the Constitution. Secretary Steward was pressured into certifying the Amendment as passed. In a Message to the Senate (Senate Ex. Doc. No. 57 of the 39th Congress, 1st Session); President Andrew Johnson commented on the "Concurrent Resolution" of July 21, 1868 "In this matter nothing has happened to change the mind or solve the doubts of the Secretary, but as an executive officer, he was compelled to obey a joint resolution of Congress whatever his own opinion might be of the power of Congress to pass it, that being, as I have said above, a judicial question." Finally, there are no records showing that the Resolution was ever submitted to the President of the United States for his approbation. According to Article V of the Constitution for the United States; the Resolution is governed by the procedures of U.S. Const., I:7:3 - "Every order, RESOLUTION, or vote to which the concurrence of the Senate and House of Representatives may be necessary, (except on a question of adjournment) SHALL BE PRESENTED TO THE PRESIDENT OF THE UNITED STATES; AND BEFORE THE SAME SHALL TAKE EFFECT, SHALL BE APPROVED BY HIM, or being disapproved by him, shall be re-passed by two-thirds of the Senate and House of Representatives, according to the rules and limitations prescribed in the case of a bill." We can conclude from the above Message that the President would have "Vetoed" the Resolution. If the Resolution was "Vetoed" [and as there are no Records showing that either House of Congress voted to repass the Resolution over the Veto], we can conclude that the Concurrent Resolution of July 21, 1868 failed. To all the issues the courts have been mute, however, declaring in Unpublished Opinions that all questions involving the 14th Amendment are "Political Questions" to the Courts. Its this sort of dereliction of duty by the courts that does mortally would our Constitution. So, in response to you question whether one is free to ignore certain laws, I bow to a basic doctrine adopted by our courts: 16th American Jurisprudence 2d, Section 177, late 2d, Section 256: "No one is bound to obey an unconstitutional law and no courts are bound to enforce it." steve From EmailAddresses777 at yahoo.com Thu Sep 12 17:18:47 2002 From: EmailAddresses777 at yahoo.com (Joanne Panchadsaram) Date: Thu, 12 Sep 2002 20:18:47 -0400 Subject: >>>Last Chance...14.5 MILLION EMAIL ADDRESSES...PLUS OVER $2,000 WORTH OF FREE SOFTWARE! Message-ID: <200209121224.SAA10920@polaris.com.gt> WOULD YOU LIKE TO HAVE YOUR MESSAGE SEEN BY OVER 14.5 MILLION TARGETED PROSPECTS DAILY? If you have not already taken advantage of this special offer... Now is your last chance...Read below for details! Below is all the information you will ever need to market your product or service over the Internet! If you have a product, service, or message that you would like to get out to Thousands, Hundreds of Thousands, or even Millions of people, you have several options. Traditional methods include print advertising, direct mail, radio, and television advertising. They are all effective, but they all have two catches: They're EXPENSIVE and TIME CONSUMING. Not only that, you only get ONE SHOT at making your message heard by the right people. Now this has all changed! Internet Search Engines Submissions, Classified Ads, Newsgroup Postings simply DO NOT WORK. Thanks to the top programmers in the world and their NEW EMAIL TECHNOLOGY, You can send millions of email messages daily for FREE... Without getting terminated from your current Internet connection! It's very simple to do and you can be increasing your sales within minutes of installing this new extraordinary software! Besides...It's the only real way to advertise on the Internet that works...Period! >>>WE WILL SUPPLY YOU WITH OVER 14.5 MILLION OPT-IN EMAIL ADDRESSES TO GET STARTED RIGHT AWAY! >>>PLUS FREE EMAIL ADDRESS DOWNLOADS FOR ONE FULL YEAR! >>>ALSO YOU WILL RECEIVE $2,000 WORTH OF INTERNET MARKETING SOFTWARE FREE! Including...... EMAIL SENDING SOFTWARE...(send millions of email advertisements daily with a few clicks of your mouse) EMAIL EXTRACTION SOFTWARE...(retreive new targeted email addresses daily hundreds of thousands of them) LIST MANAGEMENT SOFTWARE...(keep your lists clean, opt-in and manage all your remove requests, leads, sales etc...) and much...much more! To find out more information, Do not respond by email. Instead, visit our web site at: http://www.cashforever.net _____________________________________________________ Want to be removed from our list? Simply send an email to us at cybernetremova at excite.com and type "remove" in the "subject" line and you will be removed from any future mailings. From resosexxyannie8768 at hotbot.com Thu Sep 12 17:58:50 2002 From: resosexxyannie8768 at hotbot.com (Nicole) Date: Thu, 12 Sep 2002 20:58:50 -0400 Subject: labia minor rucuw Message-ID: <200209130104.g8D14p805312@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2003 bytes Desc: not available URL: From jason at jasonpratt.com Thu Sep 12 22:21:35 2002 From: jason at jasonpratt.com (Jason Pratt) Date: Fri, 13 Sep 2002 00:21:35 -0500 Subject: NORFED debated on the Cypherpunks mailing list. References: <004d01c259d0$30314480$41e8bb3f@bernard> Message-ID: <00a001c25ae5$6e1c3c30$6501a8c0@PRATT> >The indexing of these things to Ag is truly fucked ( >http://63.126.1.222/AgOver10.asp ). Apparently a $10 Liberty Dollar is >redeemable for 1oz of Ag which is today about $4.50. If silver goes over >$10 then they'll reset things to a $20 base. Er..what? I guess I didn't >study enough mathematics. > Hey Mike, it's simple. The silver base is the ratio of the FRN face value to the silver content. It has to fluctuate because, unlike in every other sound money period in history, you and I live in a time where there's a [relatively] free market for precious metals. >How the fuck are you going to make 40%? Especially in light of the sorry >fact that if you're dumb enough to buy these little buggers it's going >to be tougher'n'hell to find someone even more dumb to sell them to at a >profit. > Except that there are 1,500 Redemption Centers and over 10,000 users of the currency who are doing that right now! I just exchanged about $130 in ALD on a trip to Las Vegas in four days. Could have done a lot more if I hadn't been attending a trade show most of the time...I've been using it for almost a year now and trust me, it works. Check out http://groups.yahoo.com/groups/ALD-forum for more info From profrv at nex.net.au Thu Sep 12 08:40:16 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 13 Sep 2002 01:40:16 +1000 Subject: Mongo's touching affection for pussy. Message-ID: <5.1.0.14.0.20020913013848.00a03690@mail.nex.net.au> http://www.indymedia.org/front.php3?article_id=202916&group=webcast Scroll down for photo. Also from yesterday...A WOMAN who sneezed in a policeman's face was an egocentric, attention-seeking nuisance, a judge said yesterday. But April Whitelaw is $500 better off and without a criminal conviction after Judge Peter Gebhardt dismissed a charge of assaulting police. Yesterday in the County Court, Ms Whitelaw appealed against a magistrate's decision that she had intentionally sneezed in the face of Sen-Constable Kevin Walsh after he intercepted her car in Bittern on May 19 last year. The court heard Ms Whitelaw, of Chelsea, falsely told Sen-Constable Walsh and his partner that two purses she had with her were stolen. In fact, they were hers. Sen-Constable Walsh told the court that as he went to arrest her, Ms Whitelaw told him he was placing himself "in fear of assault" before she "sneezed or snorted" nasal fluid in his face. http://www.heraldsun.news.com.au/common/story_page/0,5478,5079167%255E2862,00.html From Frank0240r64 at msn.com Thu Sep 12 22:28:47 2002 From: Frank0240r64 at msn.com (Frank0240r64 at msn.com) Date: Fri, 13 Sep 2002 02:28:47 -0300 Subject: NEVER DONE BEFORE... BUT WE ARE DOING IT!! 4651CeOW9-654fAJX2364VJBm2--25 Message-ID: <033c64e48a3c$1135e0c4$7ae28be3@wjhrsm> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2724 bytes Desc: not available URL: From profrv at nex.net.au Thu Sep 12 10:46:50 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 13 Sep 2002 03:46:50 +1000 Subject: AU legislators warning to RIAA Message-ID: <5.1.0.14.0.20020913034536.00a08b90@mail.nex.net.au> >>UNAUTHORISED changing of computer data to cause disruptions to the system will carry a penalty of up to 10 years in jail. POSSESSION of data with the intent to cause an offence will carry a maximum three-year penalty. UNAUTHORISED modification of restricted data will carry a penalty of up to two years' jail. << FROM http://www.heraldsun.news.com.au/common/story_page/0,5478,5085309%255E2862,00.html From maxinux at jokeslayer.com Fri Sep 13 08:05:16 2002 From: maxinux at jokeslayer.com (Billy) Date: Fri, 13 Sep 2002 08:05:16 -0700 Subject: [email@rsasecurity.rsc03.com: RSA Conference 2003 Call for Papers - Deadline September 16!] Message-ID: <20020913150516.GA11539@spheno.jokeslayer.com> Suprised this never made it through, so here it is =) Papers are due next monday. Billy --- Forwarded message from RSA Conference 2003 --- From profrv at nex.net.au Thu Sep 12 16:27:47 2002 From: profrv at nex.net.au (Matthew X) Date: Fri, 13 Sep 2002 09:27:47 +1000 Subject: Bulk APster rates Message-ID: <5.1.0.14.0.20020913091729.00a0dec0@mail.nex.net.au> Conspiracy grows Murder for insurance ring broken up As many as 24 alleged conspirators could face charges in connection with a massive scheme to murder Guyanese immigrants for insurance money, law-enforcement sources told The New York Post Wednesday. "The conspiracy is extensive. Others, not yet identified . . . participated," Assistant U.S. Attorney John Curran argued in court papers made public yesterday at a bail hearing for one alleged culprit, Ronald Mallay. Mallay, an unemployed Queens man, is accused of recruiting hit men and collecting insurance money as part of the murder-for-hire scheme that sources say targeted at least seven victims - and probably more. Also accused of murder conspiracy is Richard James, a Queens insurance agent who allegedly wrote policies for numerous "customers" who died under suspicious circumstances. Mallay, 57, was denied bail in Brooklyn federal court, where prosecutors revealed the results of a search of his wife Lazina's Queens apartment. Investigators said they found five insurance policies, including $1.5 million in coverage for a man whose occupation is listed as a flea-market clothing salesman - and whom prosecutors have not been able to locate. http://organizedcrime.about.com/library/weekly/aa081502a.htm From serve at advertise2.com Thu Sep 12 20:07:01 2002 From: serve at advertise2.com (serve at advertise2.com) Date: Fri, 13 Sep 2002 11:07:01 +0800 Subject: =?GB2312?B?xvPStdT20KfWrsK3ILHYsbi1xND7tKvK1rbO?= Message-ID: <200209130307.g8D37L810892@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3680 bytes Desc: not available URL: From virus_alert at nucleus.com Fri Sep 13 10:19:04 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Fri, 13 Sep 2002 11:19:04 -0600 Subject: VIRUS ALERT! - Language Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: File 'GWWEB[9].pif' has a forbidden name Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From ANGTAN at cfibmail=2Ecom Fri Sep 13 10:19:04 2002 From: ANGTAN at cfibmail=2Ecom (ANGTAN) Date: Fri, 13 Sep 2002 11:19:04 -0600 Subject: Language Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 1912 bytes Desc: not available URL: From da at securityfocus.com Fri Sep 13 10:28:51 2002 From: da at securityfocus.com (Dave Ahmad) Date: Fri, 13 Sep 2002 11:28:51 -0600 (MDT) Subject: OpenSSL worm in the wild In-Reply-To: <3D821D71.2000702@algroup.co.uk> Message-ID: Ok, The incident analysis team over here is examining this thing. At first glance it looks reasonably sophisticated. Looks to me like it exploits the issue described as BID 5363, http://online.securityfocus.com/bid/5363. It seems to pick targets based on the "Server:" HTTP response field. Mario Van Velzen proposed a quick workaround of disabling ServerTokens or setting it to ProductOnly to turn away at least this version of the exploit until fixes can be applied. Another thing to note is that it communicates with its friends over UDP / port 2002. I'd like to request IP addresses of hosts that have been compromised or that are currently attacking systems from anyone who is comfortable sharing this information. We wish to run it through TMS (formerly known as ARIS) to see how quickly it is propagating. David Ahmad Symantec http://www.symantec.com/ On Fri, 13 Sep 2002, Ben Laurie wrote: > I have now seen a worm for the OpenSSL problems I reported a few weeks > back in the wild. Anyone who has not patched/upgraded to 0.9.6e+ should > be _seriously worried_. > > It appears to be exclusively targeted at Linux systems, but I wouldn't > count on variants for other systems not existing. > > Cheers, > > Ben. > > -- > http://www.apache-ssl.org/ben.html http://www.thebunker.net/ > > "There is no limit to what a man can do or how far he can go if he > doesn't mind who gets the credit." - Robert Woodruff > > From moxiuling at hotmail.com Thu Sep 12 21:51:39 2002 From: moxiuling at hotmail.com (moxiuling at hotmail.com) Date: Fri, 13 Sep 2002 12:51:39 +0800 Subject: Direct Contact 6536 Shoes Factories in China Message-ID: <200209130453.g8D4rc1u000940@ak47.algebra.com> As soon as you have 6536 website addresses of shoes factories in China you will have a tremendous space of supply of goods, and how illustrious will your business be? I specialize in trade resource services. Now, I collected 6536 usable website addresses of shoes factories in Chinaup up to now, you will can visit these websites and view their products catalogues and direct contact the manufacturers by email, tel or fax as soon as you have this data. Only pay $70 USD for all. Don't Hesitate contact us if you need this data. Yours sincerely Ms. Mo Xiulin China ============================================================= ���ʼ�ʹ�� �����ʼ�Ⱥ����� ����,�ʼ��������������޹� ������� http://www.caretop.com ============================================================= From ekr at rtfm.com Fri Sep 13 13:37:08 2002 From: ekr at rtfm.com (Eric Rescorla) Date: 13 Sep 2002 13:37:08 -0700 Subject: OpenSSL worm in the wild In-Reply-To: Dave Ahmad's message of "Fri, 13 Sep 2002 11:28:51 -0600 (MDT)" References: Message-ID: Dave Ahmad writes: > The incident analysis team over here is examining this thing. At first > glance it looks reasonably sophisticated. Looks to me like it exploits > the issue described as BID 5363, http://online.securityfocus.com/bid/5363. > It seems to pick targets based on the "Server:" HTTP response field. > Mario Van Velzen proposed a quick workaround of disabling ServerTokens or > setting it to ProductOnly to turn away at least this version of the exploit > until fixes can be applied. Since this workaround requires changing the configuration file, it's equally easy to disable SSLv2 entirely--especially since one could easily modify the worm to attack all servers or, perhaps, those which only display Product ID :) -Ekr -- [Eric Rescorla ekr at rtfm.com] http://www.rtfm.com/ From ekr at rtfm.com Fri Sep 13 14:08:43 2002 From: ekr at rtfm.com (Eric Rescorla) Date: 13 Sep 2002 14:08:43 -0700 Subject: OpenSSL worm in the wild In-Reply-To: Eric Rescorla's message of "13 Sep 2002 13:37:08 -0700" References: Message-ID: Eric Rescorla writes: > especially > since one could easily modify the worm to attack all servers > or, perhaps, those which only display Product ID :) ... or maybe not. I hadn't seen a copy of the worm yet, so I guessed from your description that it was using the Server: value to detect who is running downrev versions of OpenSSL. Not so. Upon examination, it looks like the worm uses the server version to decide what section of memory to overwrite (based on the target OS) and server version. So, if people reconfiged their servers to not give you this information, a worm author would either have to have the worm try all possible exploits (not a big deal with only 20 architectures to search) or have some other evidence as to what OS/Apache version people were runnning. Note that for this to be a 100% countermeasure you'd have to reconfigure your server not to advertise Apache at all. Otherwise, it looks to me like the worm assumes that you're running Red Hat/Apache 1.3.23, in which case there's a real chance that the worm will crash your server by using the wrong overwrite offset. -Ekr -- [Eric Rescorla ekr at rtfm.com] http://www.rtfm.com/ From cufisexxyannie8768 at hotbot.com Fri Sep 13 13:03:34 2002 From: cufisexxyannie8768 at hotbot.com (Nicole) Date: Fri, 13 Sep 2002 16:03:34 -0400 Subject: labia minor otlbo Message-ID: <200209132009.g8DK9gS32247@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2012 bytes Desc: not available URL: From girls-unsubscribe at xxxtasymail.com Fri Sep 13 14:41:39 2002 From: girls-unsubscribe at xxxtasymail.com (Madison) Date: Fri, 13 Sep 2002 17:41:39 -0400 (EDT) Subject: ADULT ADV: REAL WOMEN AND MEN WAITING TO CHAT WITH YOU Message-ID: <200209132141.g8DLfc857785@locust.minder.net> ~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~ NO Credit Cards or Checks Ever Needed CHECK IT OUT NOW! http://204.177.92.193/party/affpp/index02.jhtml?pin=503930 ~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~~*~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ LEGAL NUDE TEENS http://links.lifetimebucks.com/legalnudeteens/life.link/mctahoe/091202b SEXXX FARM http://links.lifetimebucks.com/sexxxfarm/life.link/mctahoe/091202c WILD ASIAN BABES http://links.lifetimebucks.com/wildasianbabes/life.link/mctahoe/091202d ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Hentai Playground Nasty toons and drawings ~ Uncensored. http://www.hentaiplayground.com/?wm_login=mctahoe ____________________________________________________________________________ ____________________________________________________________________________ This message is being sent to you because you are a member of Xxxtasy Mail. To change your subscription please visit: http://event.xxxtasymail.com/remove.cgi?key=9e7d7c6076777d7b767c78ee&email=cypherpunks at minder.net � Copyright Protected - All Rights Reserved Copyrights on exclusive images, video and text within this site strictly enforced. All Models were 18 years old or older when photos were taken. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3499 bytes Desc: not available URL: From bp at Algebra.COM Fri Sep 13 16:14:22 2002 From: bp at Algebra.COM (bp at Algebra.COM) Date: Fri, 13 Sep 2002 18:14:22 -0500 Subject: Mortgage Rates Have Never Been Lower Message-ID: <4TE20C1H0U5V74D38D.P12G5W9ADKTP0VOU.bp@algebra.com> We will help you get the mortgage loan you want! Only takes 2 minutes to fill out our form. http://www.dungareelove.com/index.php Whether a new home loan is what you seek or to refinance your current home loan at a lower interest rate and payment, we can help! Mortgage rates haven't been this low in the last 12 months, take action now! Refinance your home with us and include all of those pesky credit card bills or use the extra cash for that pool you've always wanted... Where others says NO, we say YES!!! Even if you have been turned down elsewhere, we can help! Easy terms! Our mortgage referral service combines the highest quality loans with most economical rates and the easiest qualification! Click Here to fill out our form. http://www.dungareelove.com/index.php -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2129 bytes Desc: not available URL: From ben at algroup.co.uk Fri Sep 13 10:16:33 2002 From: ben at algroup.co.uk (Ben Laurie) Date: Fri, 13 Sep 2002 18:16:33 +0100 Subject: OpenSSL worm in the wild Message-ID: <3D821D71.2000702@algroup.co.uk> I have now seen a worm for the OpenSSL problems I reported a few weeks back in the wild. Anyone who has not patched/upgraded to 0.9.6e+ should be _seriously worried_. It appears to be exclusively targeted at Linux systems, but I wouldn't count on variants for other systems not existing. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff From david at weekly.org Fri Sep 13 18:29:36 2002 From: david at weekly.org (David E. Weekly) Date: Fri, 13 Sep 2002 18:29:36 -0700 Subject: The Case Against Steganography In Perceptually Encoded Media References: <20020913150516.GA11539@spheno.jokeslayer.com> Message-ID: <00a201c25b8e$2f99fde0$6d650a0a@pc.there.com> Cypherpunks, I had an interesting revelation last night. It's a bad idea to use perceptually-coded media to embed steganographic data. By definition, it means making the coder make decisions that it otherwise would not have made. If the coder is good, then the coder's decisions are not arbitrary but rather each bit is focused on producing the minimal representation necessary for adequate presentation to humans. This means that encoding extra "random" data on top of this will always produce compressed output that is of lower quality than the original. From an information theory standpoint, if you're tacking on a data stream to compressed output, the stream that is the sum of the two contains more information and must be represented with more bits. For example, to attack steganographically-encoded pictures, the pictures could be analysed and those with lower-quality encoding than expected would be flagged for analysis as suspect. The conclusion is remarkable (to my little mind, at any rate): since most media transmitted over the Internet is perceptually compressed (JPG, MOV, AVI, MP3, etc.) the efforts to steganographically encode data within most Internet media are fundamentally doomed. Where, then, can one hide information streams? The answer is wherever *random* information is communicated. (Even just partial randomness is okay; I've got a paper on this I hope to be presenting soon!) David E. Weekly Founder & Executive Director California Community Colocation Project (an OPG project) http://CommunityColo.net/ - the world's first non-profit colo! From nobody at dizum.com Fri Sep 13 10:10:06 2002 From: nobody at dizum.com (Nomen Nescio) Date: Fri, 13 Sep 2002 19:10:06 +0200 (CEST) Subject: Wired article on cypherpunks Message-ID: Warm Party for a Code Group By Danit Lidor 2:00 a.m. Sep. 13, 2002 PDT The cypherpunks are throwing a PGP (pretty good party) this weekend. The venerable online community is celebrating its 10th anniversary which, in the ephemeral world of the Internet, is remarkable. But don't go unless you RSVP first. These people are admittedly paranoid, contentious and quarrelsome. And they're not afraid to express their ire, either. No wonder. In 1992, the cypherpunks emerged from a small group of people who, because of their interest in cryptography and encryption, recognized that the free-flowing format of the burgeoning Web culture must provide for anonymous interactions. Not surprisingly, they soon came under the uncomfortable scrutiny of the formidable National Security Agency. The situation escalated in early 1993, after a computer programmer named Phil Zimmermann (a patron saint of the community) -- alarmed that the patents for public key encryption were sold to a company called RSA -- wrote an open-source, free program called PGP (Pretty Good Privacy). The resulting debacle, in which Zimmermann was threatened with criminal prosecution for exporting weapons (encryption technology is termed a weapon by the U.S. government), brought the public's right to privacy to the forefront of the now-commonplace tug-of-war between those who favor "crytpo anarchy" and those who don't. Through the active work of many civil libertarians, including the cypherpunks, pressure was brought to bear upon the government to re-think its position. The charges against Zimmermann were dropped. It was a triumph. The geeks fought the law, and the geeks won. "The cypherpunks' paranoia about information exploitation is becoming mainstream," Peter Wayner, author of Translucent Databases, wrote in an e-mail interview. "Everyone is learning that the cypherpunks' insistence on limiting the proliferation of information is a good thing." The cypherpunks' e-mail list forms the nucleus of the community, which has grown to include people of many agendas and interests. No longer the exclusive domain of crypto geeks, cypherpunks are "doctors, lawyers, mathematicians, felons, druggies, anti-druggies, anarchists, libertarians, right-wing fanatics, left-wing fanatics, teachers, housewives, househusbands, students, cops and criminals," cypherpunk J.A. Terranson wrote in a posting. Or maybe not. Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk fashion, "We're all just voices in Tim May's head." May, one of the original cypherpunks, continues to be an active figurehead of the cypherpunks and has often bridged the chasm between its historically secretive culture and its forays into the public sphere. In 10 years, the list has become an amalgamation of a political watchdog site, a social club and a repository of technical cryptographic discussion. "(It's) where people from all different backgrounds and views can hear from one another," mathematician Nina Fefferman said. "We math people are frequently shocked and confused by what the politicians do with regard to legislating crypto-related issues. Conversely, the policy and society people are frequently interested in issues that have to do with the use and regulation of cryptographic standards and research." Others are disappointed by the list's current tepid political climate. "The atmosphere isn't as electric because the scene has grown so big," Wayner said. "It's not just a few guys talking about the importance of some mathematical equations. It's like debating the importance of indoor plumbing now. No one disputes it, they just want to argue about copper versus PVC." Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the original founders of the list), however, have emerged from their cypherpunk association as key public privacy figures: vocal and passionate defenders of civil liberties on the Web. It's hard to imagine the secretive and fractious cryptocrusaders assembling for a physical meeting. Even May, the party's host, isn't sure who or how many cypherpunks to expect to his soiree at a hideaway in the Santa Cruz (California) mountains. "Some meetings (in the Bay Area) have 40 attendees, some have 15," he said. But he's adamant about who won't be coming. Never one to mince words, he wrote, "Narcs and feds will not be allowed at the meeting. Fuck them dead." From eresrch at eskimo.com Fri Sep 13 19:35:50 2002 From: eresrch at eskimo.com (Mike Rosing) Date: Fri, 13 Sep 2002 19:35:50 -0700 (PDT) Subject: The Case Against Steganography In Perceptually Encoded Media In-Reply-To: <00a201c25b8e$2f99fde0$6d650a0a@pc.there.com> Message-ID: On Fri, 13 Sep 2002, David E. Weekly wrote: > The conclusion is remarkable (to my little mind, at any rate): since most > media transmitted over the Internet is perceptually compressed (JPG, MOV, > AVI, MP3, etc.) the efforts to steganographically encode data within most > Internet media are fundamentally doomed. Since MP3 and JPG are lossy compression you don't want to use them in any case - you really screw up the image if you attach random data to the compressed values, and you lose the data completely if you try to compress the stegonagraphic info. So it's not useful for more basic reasons. > Where, then, can one hide information streams? The answer is wherever > *random* information is communicated. (Even just partial randomness is okay; > I've got a paper on this I hope to be presenting soon!) It doesn't have to be random, it has to be complete. Random is definitly better, but it's unlikely that steganography would be needed if one could send random data for any reason to begin with. You want the message to be invisible, and anyone looking for hidden messages is certain to scan "random" data and check it for statistics. The power of statistics makes steganography really hard. Patience, persistence, truth, Dr. mike From david at weekly.org Fri Sep 13 19:57:00 2002 From: david at weekly.org (David E. Weekly) Date: Fri, 13 Sep 2002 19:57:00 -0700 Subject: The Case Against Steganography In Perceptually Encoded Media References: Message-ID: <00fc01c25b9a$65b83f20$6d650a0a@pc.there.com> > It doesn't have to be random, it has to be complete. Random is definitly > better, but it's unlikely that steganography would be needed if one could > send random data for any reason to begin with. You want the message to be > invisible, and anyone looking for hidden messages is certain to scan > "random" data and check it for statistics. The power of statistics makes > steganography really hard. The key is to steganographically encode "random" (encrypted) data and then "shape" the result to match the mean probabilities seen in observation of a system in usual operation. This defeats statistical analysis, since your data is shaped just like everyone else's. If the bits are encrypted with a recipient's public key, only with posession of the private key can the data be perceived to be non-random, which is a nicely strong property. -David Weekly From dxnew2001 at yahoo.com Fri Sep 13 20:27:56 2002 From: dxnew2001 at yahoo.com (Simon B) Date: Fri, 13 Sep 2002 20:27:56 -0700 (PDT) Subject: Tout le monde peut russir! Message-ID: <20020914032756.66626.qmail@web13203.mail.yahoo.com> Bonjour, Si tu veux faire de l'argent prend quelques minutes pour lire ce qui suit et tu seras ravi de savoir que tu peux faire beaucoup d'argent sur Internet, c'est payant, facile et surtout l�gal et �a marche tr�s bien, c'est super. $$$ S.V.P. LISER CECI ATTENTIVEMENT VOUS NE LE REGR�TEREZ PAS $$$ CONTENU DU EMAIL AVEC LEQUEL ON TRAVAILLE... Vous avez peut-�tre d�j� re�u un message du genre provenant de quelqu'un d'autre. Pour ma part, � moins d'une erreur, c'est la premi�re et derni�re fois que je vous l'envoie. Nous sommes conscients que ce document vous a �t� envoy� sans que vous ne l'ayez sollicit�. Si vous ne donnez aucune suite � ce contact, vous ne recevrez plus rien de ma part. Mais, si �a vous int�resse..., vous serez certainement content de m'avoir lu, car j'ai une proposition d'affaire honorable et lucrative � vous faire, rien qui ne soit ill�gal ou immoral. Quand j'ai re�u ce programme moi-m�me, par hasard, j'y ai vu une opportunit� de faire circuler l'abondance parmi d'autres personnes et de souffler un peu mon�taire ment. Je peux affirmer qu'il est maintenant possible de faire de l'argent � partir de chez soi avec le merveilleux outil qu'est l'internet. Si on s'en donne la peine, soit 1/2 � 1 heure par jour, �a marche ! Aujourd'hui, je veux partager avec vous un plan d'affaire exceptionnel et rentable � d�velopper chez soi. Par cons�quent, je vous invite � lire attentivement ce qui suit et � ne pas vous borner en pensant que ceci est encore une pogne, un racket ou une arnaque parce que �a semble trop facile. $$$ BONNE FORTUNE $$$ INTRODUCTION VOICI CE QU'ON A VU � LA TV NATIONALE Voici la lettre que vous avez pu lire dans les bulletins de nouvelles derni�rement. � cause de la popularit� de cette lettre sur Internet, un bulletin de nouvelles important de fin de soir�e a consacr� toute une �mission pour analyser si le programme qui suit pouvait r�ellement faire gagner de l'argent. Dans cette �mission, on aussi analys� si cette lettre proposait quelque chose de l�gal. Ce qu'ils ont d�couvert prouve une fois pour toutes qu'il n'y a aucune loi en Am�rique qui emp�che quiconque de participer � ce genre de travail. Cela aida aussi � d�montrer que c'est une fa�on simple, sans douleur et agr�able de faire de l'argent suppl�mentaire � la maison. Les r�sultats de cette �mission ont �t� vraiment remarquables. Il y a beaucoup de personnes qui y sont impliqu�es et �a va de mieux en mieux. �tant donn� que de plus en plus de personnes font plus d'argent avec ce programme, �a devient tr�s excitant d'en faire partie. Vous allez comprendre lorsque vous l'exp�rimenterez ! LE VOICI MAINTENANT CE FAMEUX PLAN D'AFFAIRE. (Imprimez ce qui suit pour l'envoyer dans le futur) FA�ON FACILE DE G�N�RER UN REVENU : L'opportunit� d'affaire qui vous est pr�sent�e ici est quelque chose qui pourrait vous int�resser si vous prenez le temps d'y jeter un petit coup d��il. On peut commencer en y investissant tr�s peu d'argent et les revenus qu'on y fait sont extraordinaires. Si vous avez l'intention de faire par exemple 50 000 $ dans moins de 90 jours, alors lisez le programme qui suit sinon pesez sur le petit bouton dans le haut de votre �cran pour envoyer ce message � la poubelle. CECI EST UNE OPPORTUNIT� TOUT-�-FAIT L�GITIME ET L�GALE DE FAIRE DE L'ARGENT ! Vous n'avez aucunement besoin de prendre contact avec des gens, de faire un travail p�nible et, le mieux de tout, vous n'aurez jamais besoin de quitter la maison sinon pour aller � la poste. Si vous croyez qu'� un moment donn� vous allez vraiment prendre votre retraite, VOUS AVEZ TROUV� LA BONNE AFFAIRE ! Le programme de commercialisation � paliers multiples par l'envoi de rapport par e-mail fonctionne � la perfection ! L'envoi de E-mail est l'outil de vente du futur. Prenez tous les avantages de cette m�thode non conventionnelle de publicit� D�S MAINTENANT ! Plus vous attendrez et plus il y aura de personnes faisant affaire par E-mail. Prenez une part � toute cette action ! LA COMMERCIALISATION � PALIERS MULTIPLES a gagn� ses lettres de noblesse. Ceci est enseign� � l'�cole sp�cialis�e dans les affaires situ�e � Harvard. De plus, le centre de recherche de Stanford et le Wall Street Journal ont affirm� qu'il y aurait entre 50 % et 65 % de tous les biens et services qui seront vendus par la commercialisation � paliers multiples d'ici la fin des ann�es 1990. C'est une industrie de plusieurs millions de dollars et, parmi les 500 000 millionnaires des E.U., 20% d'entre eux, c'est-�-dire 100 000, ont r�alis� leur fortune derni�rement par une entreprise de r�seau. Encore plus, les statistiques montrent qu'il y a 50 nouveaux millionnaires � chaque jour gr�ce � la commercialisation par r�seau. Peut-�tre avez-vous entendu cette histoire auparavant, mais l'�t� pass�, Donald Trump est venu � l'�mission de David Letterman. Dave lui a demand� ce qu'il ferait s'il perdait tout ce qu'il poss�dait et qu'il devait tout reprendre � z�ro. Sans h�sitation, Trump lui a r�pondu qu'il trouverait une bonne compagnie en r�seau et qu'il commencerait � y travailler. L'audience a alors commenc� � lui manifester son opposition. Il a alors regard� l'audience et a dit (en insistant sur ses mots) : "Ceci est la raison pour laquelle je suis assis ici et que vous, vous �tes assis l�-bas". L'information que vous trouvez ici est quelque chose que j'avais l'habitude de laisser filer entre mes doigts. Heureusement, quelque temps plus tard, j'ai relu le tout, j'y ai r�fl�chi et je l'ai �tudi� en profondeur. Mon nom est Jacques Brault. Il y a 2 ans, la compagnie pour laquelle je travaillais depuis les 12 derni�res ann�es a d�cid� de mettre � pied du personnel et mon poste a �t� aboli. Apr�s plusieurs entrevues infructueuses pour me trouver du travail, j'ai d�cid� de partir ma propre entreprise. L'ann�e pass�e, j'ai eu plusieurs difficult�s financi�res. J'ai emprunt� � des membres de ma famille et � mes amis plus de 35 000 $. L'�conomie n'aidait pas mes affaires et je ne pouvais pas voir le jour o� je m'en sortirais. Je devais emprunter � nouveau en hypoth�quant ma maison pour aider ma famille et lutter pour continuer les affaires. C'est alors que quelque chose de tr�s important est arriv� dans ma vie et j'�cris ceci dans le but de partager mon exp�rience avec l'espoir que cela changera aussi votre vie pour toujours sur le plan financier. Au milieu de d�cembre, j'ai re�u ce programme par E-mail. Six mois auparavant, j'avais fait des demandes d'information concernant diff�rentes opportunit�s d'affaire. Tous les programmes que je trouvais �taient trop difficiles � comprendre pour moi ou bien l'investissement initial �tait trop �lev� car je voulais seulement savoir s'ils fonctionnaient. Il y en a un qui disait que je gagnerais 1 000 000$ en un an. �a ne disait pas d�s le d�part qu'il aurait fallu que j'�crive un livre pour y arriver ! Comme je le disais, en d�cembre 1998 j'ai re�u ce programme. Je ne l'ai jamais demand�; ils ont juste pris mon nom dans une liste postale. JE REMERCIE DIEU POUR CELA !!! Apr�s l'avoir lu plusieurs fois, pour m'assurer que je le lisais correctement, je ne pouvais en croire mes yeux. J'avais en main UN PH�NOM�NE POUR FAIRE DE L'ARGENT ! Je pouvais investir comme je le voulais au d�part sans m'occasionner d'autres dettes. Apr�s que j'aie pris du papier et un crayon, j'ai analys� le tout et r�alis� que le minimum que je pouvais recevoir �tait de recouvrer l'argent que j'y aurais investi. Mais, comme la plupart d'entre vous, j'�tais encore un peu sceptique et inquiet au sujet de l'aspect l�gal de tout ceci. Alors, j'ai v�rifi� cela avec le service des postes au # 1-800-725-2161 et ils m'ont confirm� que c'�tait effectivement l�gal. Apr�s m'�tre assur� que C'�TAIT L�GAL ET NON PAS UNE CHA�NE DE LETTRES, (quelque chose de pyramidal) j'ai d�cid�: "ET, POURQUOI PAS MOI ". Au d�but, j'ai envoy� 10 000 E-mail. �a m'a co�t� 20 $ pour 4 rapports. La chose formidable au sujet des E-mail est que �a ne co�te rien pour l'imprimerie du programme et des rapports, parce que toutes mes informations sont envoy�es par E-mail. La seule d�pense que j'aie, c'est mon temps. JE VOUS L'EXPLIQUE TEL QUE C'EST ARRIV� Au d�part, je posais l'exigence que je ne volerais personne, peu importe l'argent que �a me co�terait. En de�� d'une semaine, je commen�ais � recevoir des demandes pour le RAPPORT #1. Au 13 janvier, j'avais d�j� re�u 26 demandes pour le Rapport #1. L'OBJECTIF EST DE RECEVOIR AU MINIMUM 20 COMMANDES DU RAPPORT#1 EN DEDANS DE 2 SEMAINES. Si vous ne les recevez pas, envoyez encore plus de programmes jusqu'� ce que vous ayez atteint ce premier objectif. Ma premi�re �tape dans le but de faire 50 000$ �tait atteinte. L'OBJECTIF EST DE RECEVOIR UN MINIMUM DE 100 COMMANDES ET PLUS POUR LE RAPPORT #2 EN DEDANS DE 2 SEMAINES. Au 30 janvier, j'avais re�u 196 commandes pour le Rapport #2. Sinon, vous devez envoyer plus de programmes jusqu'� ce que vous l'atteigniez. LE RESTE EST FACILE. RELAXEZ-VOUS, VOUS ALLEZ PARVENIR � VOTRE OBJECTIF DE 50 000$. Donc j'avais 196 commandes pour le Rapport #2, 96 de plus que l'objectif vis�. Alors, je me suis repos� et j'ai relax�. Au d�but de mars, j'avais re�u 58 000$ pour l'envoi de mes premiers 10 000 E-mail. Chaque jour, il en arrive un peu plus. J'ai tout pay� mes dettes et je me suis achet� une nouvelle voiture qui �tait bien n�cessaire. SVP, prenez le temps de lire ce programme. CELA CHANGERA VOTRE VIE � JAMAIS ! Rappelez-vous, cela ne marchera pas � moins que vous ne l'essayiez. Ce programme fonctionne. Si vous ne le faites pas fonctionner, vous allez perdre beaucoup d'argent. POUR QUE CE PROGRAMME FONCTIONNE, VOUS DEVEZ OBTENIR PLUS DE : - 20 commandes pour le Rapport #1, - 100 commandes et plus pour le Rapport #2, � et vous ferez 50 000$ ou plus en 90 jours. Je suis la preuve vivante que �a marche ! Si vous choisissez de ne pas participer � ce programme, j'en suis d�sol�, mais c'est votre libert�. J'atteste qu'il constitue une grande opportunit�, � un faible co�t et comportant des risques minimes (4 x 5$ = 20$). Si vous choisissez d'y participer, suivez bien le programme et vous serez sur le chemin de votre s�curit� financi�re. Si vous �tes une personne d'affaire, un(e) gagnant(e) ou que vous ayez des troubles financiers comme moi ou que vous vouliez partir en affaire, consid�rez ceci comme un signe des temps. C'EST CE QUE J'AI FAIT ! Sinc�rement, Jacques Brault P.S. : Avez-vous une id�e de ce que � quoi ressemblent 11 600 billets de 5 $ (58 000$) sur une table de cuisine ? C'EST FORMIDABLE ! UNE NOTE PERSONNELLE DE CELUI QUI A D�BUT� CE PROGRAMME En lisant ce programme et ces rapports, vous allez en conclure qu'il n'a pu �tre �crit par un amateur. Laissez-moi vous parler un peu de moi. Depuis 10 ans, j'avais une entreprise qui fonctionnait bien. Alors, en 1979, mon entreprise commen�a � aller mal. Je faisais pourtant la m�me chose qu'auparavant lorsque mes affaires allaient bien. En fin de compte, j'ai analys� tout cela. Ce n'�tait pas � cause de moi ni de l'�conomie. L'inflation et la r�cession avaient pris la place de l'�conomie stable qui avait pourtant �t� pr�sente depuis 1945. Je n'ai pas besoin de vous dire ce qu'il est advenu du taux de ch�mage puisque plusieurs d'entre vous l'ont exp�riment� � leurs d�pens dans leur propre vie. Il y avait plus de faillites et de banqueroutes que n'importe quand auparavant. La classe moyenne �tait disparue. Ceux qui savaient ce qu'ils faisaient ont investi sagement et ont progress�. Ceux qui ne l'ont pas fait, incluant tous ceux qui n'avaient rien � sauver ou � investir sont descendus au rang des pauvres. Comme le dit ce dicton : LES RICHES DEVIENNENT PLUS RICHES ET LES PAUVRES DEVIENNENT PLUS PAUVRES ! �Les m�thodes traditionnelles de faire de l'argent ne vous permettront pas de vous �lever ou de devenir riche, l'inflation va y voir. � Vous venez juste de recevoir l'information qui vous am�nera vers votre libert� financi�re pour le reste de votre vie SANS AUCUN RISQUE ET JUSTE UN PETIT PEU D'EFFORTS. Dans les prochains mois, vous pourrez faire plus d'argent que vous ne l'avez jamais imagin�. Je pourrais aussi vous r�v�ler que je n'aurais jamais vu un seul sou ni quiconque non plus si j'en avais fait mon deuil. J'ai d�j� fait au-del� de 4 000 000 $ ! Je me suis retir� de ce programme apr�s avoir envoy� plus de 16 000 programmes. Actuellement, je poss�de plusieurs bureaux qui travaillent � cette affaire et j'ai plusieurs autres de ces programmes ici et outre-mer. T�MOIGNAGE D'UN AUTRE PARTICIPANT: "Suivez ce programme EXACTEMENT SELON SES INSTRUCTIONS. N'y changez rien ! Il fonctionne extr�mement bien tel que pr�sent� maintenant. "Rappelez-vous de faire parvenir par E-mail une copie de cet excellent rapport � toute personne � laquelle vous pensez. L'une de ces personnes pourrait l'envoyer � 50 000 autres ... et votre nom serait sur chacun d'eux. Rappelez-vous aussi que plus vous en envoyez et plus vous aurez de clients potentiels que vous pourrez atteindre. "H� bien, mon ami, je vous ai donn� les id�es, l'information, les mat�riaux et l'opportunit� de devenir financi�rement ind�pendant. IL N'EN TIENT QU'� VOUS MAINTENANT, PENSEZ-Y ! "Mais d'abord et avant tout, PRENEZ LE TEMPS DE LIRE ET D'Y R�FL�CHIR VRAIMENT ! "Prenez un crayon et d�couvrez ce qui va se passer quand vous allez participer. "Trouvez la pire r�ponse que vous pourriez obtenir et peu importe la fa�on dont vous allez le calculer, vous allez faire pas mal d'argent. Vous allez d�finitivement obtenir ce que vous y aurez investi. Tous les doutes que vous avez vont dispara�tre lorsque vous recevrez votre premi�re commande. CAR �a MARCHE ! Jos� Jacobs, Richmond, VA " VOICI MAINTENANT CET �TRANGE PROGRAMME QUI VA VOUS FAIRE GAGNER DES MILLIERS DE $ INSTRUCTIONS : Cette m�thode d'amasser des capitaux fonctionne en autant que vous y participez. Je suis certain que vous pourriez faire quelque chose avec 50 000 $ ou plus dans les prochains 90 jours. Avant que vous disiez "non merci", SVP lisez ce programme attentivement. Ce n'est pas une cha�ne de lettres (ni un syst�me pyramidal) mais une opportunit� tout � fait l�gale de faire de l'argent. Essentiellement, voici ce que nous faisons. Comme pour tous les r�seaux � paliers multiples, nous construisons notre entreprise en recrutant de nouveaux partenaires et nous leur vendons nos produits. Dans tous les �tats aux Etats-Unis, et au Canada, on vous permet de recruter de nouveaux partenaires pour votre entreprise et nous offrons un produit pour CHAQUE $ ENVOY�. Vos commandes parviennent par la poste et vous envoyez vos rapports par E-MAIL, ainsi, vous n'�tes pas personnellement impliqu�s dans la vente, vous n'avez pas � faire de porte � porte ou de sollicitation quelconque. Vous accomplissez cela en priv� dans votre propre maison, magasin ou bureau. C'est la plus grande entreprise � niveaux multiples pour les commandes postales. VOICI CE QUE VOUS DEVEZ FAIRE : 1- Commandez chacun des 4 rapports d�crits plus loin dans cette lettre (vous ne pouvez pas les vendre si vous ne les commandez pas). Pour chacun des 4 rapports, envoyez par la poste � la personne dont le nom appara�t avec le # du rapport : - Un billet de 5.00$ - Le nom et le # du rapport que vous commandez - Votre adresse E-mail - Votre adresse de retour postal (en cas de probl�me ). Lorsque vous placez votre commande, assurez-vous de commander chacun des 4 rapports. Vous devrez sauvegarder chacun de ces quatre rapports dans votre ordinateur pour les revendre par la suite. Quelques jours plus tard, vous allez recevoir, par l'interm�diaire de votre E-mail, ces quatre rapports. Sauvegardez-les sur votre ordinateur : ils seront ainsi accessibles lorsque vous les enverrez aux milliers de personnes qui vous les commanderont. 2- NOTE IMPORTANTE: Faites tr�s attention pour ne pas modifier le nom des personnes apparaissant � c�t� de chaque rapport ou leur ordre sur la liste d'une fa�on qui soit diff�rente de celle mentionn�e dans les �tapes d�crites ci-dessous. Sinon, vous pouvez an�antir vos efforts et vos gains en argent. Une fois que vous aurez vraiment compris la fa�on dont �a fonctionne, vous verrez comment cela ne vous avantagerait pas si vous y changiez quelque chose. Rappelez-vous ceci : cette m�thode � �t� test�e depuis plusieurs ann�es maintenant et, si vous la modifiez le moindrement, cela risquerait de ne plus fonctionner. a) Regardez ci-dessous la liste des rapports disponibles (il y en a 4) b) Apr�s avoir command� les 4 rapports et les avoir re�us, remplacez le nom et l'adresse du # 1 par VOTRE PROPRE NOM ET ADRESSE. C'est vous qui serez alors le distributeur attitr� du rapport # 1. Et, l'ancien #1 deviendra le #2. c) D�placez ensuite le nom et l'adresse qui �tait plac� au Rapport #2 au Rapport #3. d) D�placez le nom et l'adresse qui �tait plac� au Rapport #3 au Rapport #4. e) Le nom et l'adresse qui �tait plac� au Rapport #4 est alors retir� de la liste. Cette personne a SANS AUCUN DOUTE ramass� une grande somme d'argent. Encore une fois, assurez-vous de recopier fid�lement chacun des noms et adresses ! 3- SAUVEGARDEZ DANS VOTRE ORDINATEUR, CETTE LETTRE EN ENTIER. (y compris la liste modifi�e des noms et adresses). Ne faites aucun changement � la partie des instructions qui y sont contenues. Votre co�t pour participer est pratiquement nul : 20 $ !!! puisque, de toute �vidence, vous disposez d�j� d'une connexion Internet et le E-mail est gratuit. IL EXISTE 2 FA�ONS PRINCIPALES POUR B�TIR UNE LIGN�E APR�S VOUS. M�THODE #1 : ENVOYER DE GRANDES QUANTIT�S D' E-MAILS. � Disons que vous d�cidez de commencer � petite �chelle, juste pour voir comment �a va marcher. Supposons que vous et que ceux qui vous suivent font parvenir 2000 programmes chacun. Supposons aussi que les r�ponses postales sont de l'ordre de 0,5 %. (En utilisant de bonnes listes, la r�ponse pourrait �tre bien meilleure). De plus, bien des personnes vont envoyer des plusieurs milliers de programmes au lieu de 2000. Mais, continuons avec cet exemple o� vous envoyez 2000 programmes. � Avec 0,5 % de r�ponses, il n'y aura que 10 commandes pour le Rapport #1. Et, ces 10 personnes enverront chacun 2000 autres programmes pour un total de 20 000. � De ces 20 000 personnes avec une r�ponse de 0,5 %, vous obtiendrez 100 commandes pour le Rapport #2. Ces 100 personnes maintenant, qui enverront � leur tour 2000 programmes, soit un total de 200 000 et un taux de r�ponses de 0,5 % vont vous amener 1000 commandes pour le rapport # 3. � Et ces 1000 personnes qui enverront 2000 programmes chacun pour un total de 2 000 000 vous commanderont 10 000 Rapports #4. � C'est 10 000 fois 5 $ pour vous. COMPTANT ! Votre revenu total pour cet exemple sera de : 50 $ + 500 $ + 5 000 $ + 50 000 $ pour un total de 55 550 $ !!! Rappelez-vous, mes amis, c'est en supposant que 1990 personnes sur 2000 ne vont rien vous envoyer par la poste et tout mettre � la poubelle. ESSAYEZ DE PENSER UN MOMENT CE QU'IL ADVIENDRAIT SI CHACUN OU SEULEMENT LA MOITI� ENVOYAIENT 100 000 PROGRAMMES AU LIEU DE 2 000. Croyez-moi, plusieurs personnes vont faire exactement comme cela et m�me plus que cela. Le Rapport #2 va vous montrer les meilleures m�thodes pour envoyer de grandes quantit�s d'E-mail et vous dira aussi o� vous procurer des logiciels pour g�rer l'envoi massif d'E-mail et enfin, o� obtenir des listes de E-mail. M�THODE # 2 : PLACER DES PETITES ANNONCES SUR INTERNET. Faire de la publicit� sur le Net est tr�s peu co�teux et il existe DES CENTAINES DE PLACES GRATUITES POUR FAIRE VOTRE PUBLICIT�. Disons que vous d�cidez de commencer � petite �chelle juste pour voir � quel point cela fonctionne. Supposons que votre but soit de trouver 10 personnes pour participer � votre premier niveau. Cependant, si vous placez beaucoup d'annonces gratuites sur Internet, vous obtiendrez une plus grande r�ponse que les 10 suppos�s. Mais, allons-y avec 10 r�ponses de premi�re ligne. Et, si l'on suppose que chacun des membres de votre organisation en recrute chacun 10 aussi. Suivez cet exemple pour r�aliser jusqu'� quel point les r�sultats son STUP�FIANTS: 1er NIVEAU: Vos 10 membres soit: 10 X 5 $ = 50$ 2e NIVEAU : Vos 10 membres qui en ont recrut�s 10 autres, soit: 100 X 5 $ = 500$ 3e NIVEAU : Ces 100 qui en ont recrut�s 10 autres, soit: 1000 X 5 $ = 5 000$ 4e NIVEAU : Ces 1 000 qui en ont recrut�s 10 autres, soit: 10 000 X 5 $ = 50 000$ ____________________ TOTAL : 55 550 $ Rappelez-vous les amis, ceci suppose que les participants ne recrutent que 10 personnes chacune. Pensez un moment ce qui se produirait si chaque participant recrutait 20 personnes ! Bon nombre obtiennent 100 participants et plus pour le premier niveau. PENSEZ-Y ! VOICI LES 4 RAPPORTS ET O� ILS SONT DISPONIBLES ! NOTE : 1- Envoyez toujours 5 $ en ARGENT COMPTANT pour chacun des 4 rapports. 2- Envoyez toujours votre commande par l'interm�diaire de la poste avec le service de premi�re classe. 3- Assurez-vous que l'argent comptant est suffisamment cach� en l'enveloppant entre 2 feuilles de papier et sur l'une de ces feuilles, INSCRIVEZ-Y : 1- Le # et le nom du rapport que vous commandez. 2- Votre adresse �mail. 3- Votre adresse postale au complet. 4- Votre adresse sur le dessus de l'enveloppe (au cas d'un retour) N'oubliez surtout pas de faire participer votre famille et vos amis � vos b�n�fices ! COMMANDEZ LE RAPPORT #1 INTITUL�: " Le guide de l'utilisation de la publicit� gratuite sur Internet " DE: S. Bouchard 38 Dumouchel Candiac, QC (Canada) J5R 6J6 COMMANDEZ LE RAPPORT #2 INTITUL�: " Le guide utilitaire pour envoyer de grandes quantit�s d'e-mail par Internet" DE : D. Boilard, A. Roussel 4920, Lap�ro Drummondville, Qc (Canada) J2E 1P3 COMMANDEZ LE RAPPORT #3 INTITUL� : " Les Secrets de la commercialisation par paliers multiples sur Internet " DE: S. Brousseau 340 Lac Clair Lac-Masson, Qc (Canada) J0T 2K0 COMMANDEZ LE RAPPORT #4 INTITUL� : " Comment devenir millionnaire en utilisant la force de la commercialisation � paliers multiples " DE: Jean-L. Jalbert 9040 Pradier Charlesbourg, Qc (Canada) G1G 5K1 Environ 50 000 nouvelles personnes commencent ce programme � chaque mois. ***** TRUCS DE SUCC�S : � Traitez ce plan comme �tant VOTRE PROPRE ENTREPRISE ! � Soyez rapide, professionnel et suivez � la lettre les instructions. � Commandez les 4 rapports IMM�DIATEMENT ! (vous les aurez lorsque les commandes commenceront � entrer). � Selon la loi, quand vous recevez une commande accompagn�e d'un 5 $, VOUS DEVEZ ENVOYER LE PRODUIT pour vous conformer aux r�glements des �tats - Unis et du Canada concernant les envois postaux et les lois de la loterie ( Titre 8 des sections 1302 et 1341 au titre 18, la section 3005 du code ainsi que le code des r�glements f�d�raux Vol. 16, les sections 255 et 436, qui d�clarent que: " Un produit ou un service doit �tre fourni en �change de l'argent re�u". Fournissez toujours le service le jour m�me de la r�ception de commandes. Soyez patient et persistant avec ce programme. Si vous suivez les instructions avec exactitude, les r�sultats seront STUP�FIANTS ! Et, par-dessus tout, AYEZ CONFIANCE EN VOUS-M�ME EN �TANT CONVAINCU QUE VOUS ALLEZ R�USSIR! ***** VOTRE CHEMIN VERS LE SUCC�S ***** Suivez ces directives pour vous assurer du succ�s. Si vous ne recevez pas 20 commandes pour le Rapport #1 dans un d�lai de deux semaines apr�s le d�but de votre publicit� sur Internet, continuez d'annoncer jusqu'� ce que vous atteigniez ce premier objectif. Puis, quelques semaines plus tard, vous devriez recevoir au moins 100 commandes pour le Rapport #2. Si vous ne recevez pas ce nombre, continuez d'annoncer jusqu'� ce que vous atteigniez ce nombre. Une fois que vous aurez re�u ces 100 commandes ou plus du Rapport #2, VOUS POUVEZ VOUS D�TENDRE ! � partir de ce point, le syst�me fonctionnera de lui-m�me et l'argent comptant continuera de circuler dans le syst�me. IMPORTANT DE SE RAPPELER : Chaque fois que votre nom est abaiss� sur la liste, vous �tes plac� devant un �tat de fait DIFF�RENT. Vous pouvez m�me suivre votre progression en observant la quantit� de rapports de chaque # que les personnes vous commanderont. Si vous voulez g�n�rer plus de revenus, vous pouvez envoyer une autre s�rie d'E-mail et recommencer le processus � nouveau. Il n'y a pratiquement pas de limite � la quantit� de revenus que vous pouvez G�N�RER � l'aide de ce programme ! ***** T�MOIGNAGES ***** "Ce programme fonctionne, mais vous devez le suivre EXACTEMENT ! Surtout, n'essayez pas de placer votre nom dans une position diff�rente, cela ne fonctionnera pas et vous d�truirez ainsi beaucoup de revenus potentiels. Je suis une preuve vivante que cela fonctionne. C'est vraiment une grande occasion de faire de l'argent relativement facilement, et avec un co�t minime. Si vous choisissez de participer, suivez le programme exactement et vous serez sur le chemin de votre s�curit� financi�re." Mme Prescile Toutant, Mtl,Qc " La raison principale de cette lettre est de vous convaincre que ce syst�me est honn�te, l�gal, extr�mement profitable et une fa�on d'obtenir une grande quantit� d'argent en peu de temps. J'ai joint juste pour voir ce qu'on pourrait compter en �change pour l'effort et l'argent minimal exig�s. A mon grand �tonnement, j'ai re�u 36 470 $ dans les 9 premi�res semaines, et �a continue toujours. Bien � vous." Phillip A.Brown, Mtl. "N'�tant pas de type joueur, cela m'a pris plusieurs semaines pour me d�cider de participer � ce plan. Mais, tout conservateur que je suis, j'ai d�cid� que l'investissement initial �tait si minime qu'il n'y avait aucune chance de ne pas obtenir assez de commandes pour au moins r�cup�rer mon argent. Oh boy ! Je fus tr�s �tonn� quand j'ai trouv� ma bo�te aux lettres remplie de commandes ! " Marco Bellile, St -Eustache "J'avais re�u ce programme il y a quelque temps et je l'ai effac�. Mais, plus tard, je me suis demand� si je n'aurais pas d� faire un essai. Je n'avais aucune id�e avec qui entrer en contact pour m'en procurer une autre copie. Ainsi, j'ai d� chercher sur le Web et 2 mois plus tard. Je ne l'ai pas effac� celui-l�. Je suis des plus heureux de voir que �a m'aide financi�rement � combler mes besoins. J'ai amass� 41 000$ depuis 3 mois avec cette fa�on de travailler. Croyez-moi, �a aide ! " Ma�tre Hudon, Gatineau Vous avez l� � port�e de vos mains des possibilit�s int�ressantes de faire des revenus suppl�mentaires. Vous y avez un ac�s illimit� � la richesse, pour peu que vous soyez dispos� � faire les premiers pas ! D'autres en ont d�j� fait la preuve. Ca marche. Essayez ! Vous pourriez toucher un montant d'argent fabuleux ! Je vous ai donn� l'information, les mat�riaux et l'occasion de devenir financi�rement � l'aise ! IL N'EN TIENT QU'� VOUS MAINTENANT DE PASSER � L'ACTION ! �valuez les risques : 20$ (4 X 5$) !!! Combien d�pensez-vous pour l'achat de billets de loterie ? Qu'en recevez-vous en retour ??? COMMANDEZ VOS RAPPORTS D�S AUJOURD'HUI. VOUS EMPRUNTEREZ AINSI LA ROUTE QUI VOUS M�NERA VERS LA LIBERT� FINANCIERE ! Merci et bonne journ�e ! Faites des projets. ************************************************ Ce courriel n'est pas du SPAM, votre courriel a �t� tir� d'une liste pour recevoir des oportunit�s d'affaires. Pour vous retirer de cette liste r�pondez avec REMOVE comme sujet. ************************************************ __________________________________________________ Do you Yahoo!? Yahoo! News - Today's headlines http://news.yahoo.com From post at shanghaiinvest.com Fri Sep 13 07:00:05 2002 From: post at shanghaiinvest.com (post at shanghaiinvest.com) Date: Fri, 13 Sep 2002 22:00:05 +0800 Subject: ͶϺߡгϼ Message-ID: <200209131359.g8DDxj839259@locust.minder.net> From relist at moversusa.com Fri Sep 13 21:52:28 2002 From: relist at moversusa.com (relist at moversusa.com) Date: Sat, 14 Sep 2002 00:52:28 -0400 Subject: UNIQUE Moving Lead's from the Geniuses Dask ! Message-ID: <200209140453.g8E4qx876196@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3643 bytes Desc: not available URL: From morlockelloi at yahoo.com Sat Sep 14 01:29:10 2002 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Sat, 14 Sep 2002 01:29:10 -0700 (PDT) Subject: The Case Against Steganography In Perceptually Encoded Media In-Reply-To: Message-ID: <20020914082910.94733.qmail@web40606.mail.yahoo.com> > Where, then, can one hide information streams? The answer is wherever > *random* information is communicated. (Even just partial randomness is okay; > I've got a paper on this I hope to be presenting soon!) State security directive #219: "No video, film or still image shall contain within it a TV screen filled with noise. The noise should be replaced by the state-approved patterns that can be downloaded from the Bit Control Agency web servers." ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com From email at aemail.com Fri Sep 13 14:28:22 2002 From: email at aemail.com (email at aemail.com) Date: Sat, 14 Sep 2002 05:28:22 +0800 Subject: =?GB2312?B?xvPStdT20KfWrsK3?= Message-ID: <200209132133.g8DLXI857406@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3618 bytes Desc: not available URL: From bernard at norfed.org Sat Sep 14 04:53:01 2002 From: bernard at norfed.org (Bernard von NotHaus) Date: Sat, 14 Sep 2002 07:53:01 -0400 Subject: Cypherpunks discover The Liberty Dollar... References: <004d01c259d0$30314480$41e8bb3f@bernard> <00a001c25ae5$6e1c3c30$6501a8c0@PRATT> Message-ID: <006901c25be5$477232a0$60a1f5d1@bernard> For more details check out: http://63.126.1.222/Success.asp http://63.126.1.222/AgOver10.asp ----- Original Message ----- From: "Jason Pratt" To: Sent: Friday, September 13, 2002 1:21 AM Subject: Re: NORFED debated on the Cypherpunks mailing list. > >The indexing of these things to Ag is truly fucked ( > >http://63.126.1.222/AgOver10.asp ). Apparently a $10 Liberty Dollar is > >redeemable for 1oz of Ag which is today about $4.50. If silver goes over > >$10 then they'll reset things to a $20 base. Er..what? I guess I didn't > >study enough mathematics. > > > Hey Mike, it's simple. The silver base is the ratio of the FRN face value to > the silver content. It has to fluctuate because, unlike in every other sound > money period in history, you and I live in a time where there's a > [relatively] free market for precious metals. > > >How the fuck are you going to make 40%? Especially in light of the sorry > >fact that if you're dumb enough to buy these little buggers it's going > >to be tougher'n'hell to find someone even more dumb to sell them to at a > >profit. > > > Except that there are 1,500 Redemption Centers and over 10,000 users of the > currency who are doing that right now! I just exchanged about $130 in ALD on > a trip to Las Vegas in four days. Could have done a lot more if I hadn't > been attending a trade show most of the time...I've been using it for almost > a year now and trust me, it works. > > Check out http://groups.yahoo.com/groups/ALD-forum for more info > > > > > From georgemw at speakeasy.net Sat Sep 14 11:08:49 2002 From: georgemw at speakeasy.net (georgemw at speakeasy.net) Date: Sat, 14 Sep 2002 11:08:49 -0700 Subject: The Case Against Steganography In Perceptually Encoded Media In-Reply-To: <200209141632.g8EGWbBa014546@slack.lne.com> References: <00a201c25b8e$2f99fde0$6d650a0a@pc.there.com> Message-ID: <3D8318C1.24103.B1D3140@localhost> On 14 Sep 2002 at 12:32, Peter Wayner wrote: > It's also important to remember that there are many tricks that avoid > making changes in the usual way. I'm currently very intrigued with > the potential to rearrange lists of items. (You can try out an applet > here: http://www.wayner.org/books/discrypt2/sorted.php) > There's an error in the way youconvert arrangements into numbers. On your page you have A Strange Notation Before beginning, we need to introduce one slightly strange notation, a flexible base, where the ith digit can be any value between 0 and i+1. The digits are enumerated from right to left so the smallest value, the one with the least significance on the right, is digit 0. It can be either a 0 or a 1. The next digit to its left, the one with next-to-least significance, is digit 1 and it can be either a 0, a 1, or a 2. Here's a value in the flexible base: 321. Each digit is set to it's maximum value. What is this value in base 10? To figure this out, first find the multiple assigned to each digit. That is, how much each digit contributes to the final value. In base 10, the multiple assigned to digit 1 is 10 and the multiple assigned to digit 2 is 100. To put it simply, the multiple of digit i is 10i in base ten and 2i in base two. What is the multiple of each digit in this flexible base? In the fixed bases, each digit's multiple increases by another factor of the base for each new digit. In this example, each digit has a different value. The 0 digit can only take two values, 0 or 1. The 1 digit can take three values, 0, 1 or 2. The multiple of digit i is (i+1)!. You can check it out. What is 321 in base ten? That's 1*(1!)+2*(2!)+3*(3!)=1+4+18=23. There's no reason for the factorials in the notation, the multiple of digit i should be i, not i!, so the value of any permutation of n items should be something from 0 to n!-1. for example, for 3 items what you should have is permutation value 123 0 132 1 213 2 231 3 312 4 321 5 > I guess it's important not to let an obsessive attention to > mathematical perfection prevent you from accomplishing something > cool. After all, every RSA key can be factored eventually, but we > still use the system because it's practically secure. > > -Peter > George From dijie at 263.net Fri Sep 13 21:01:18 2002 From: dijie at 263.net (dijie) Date: Sat, 14 Sep 2002 12:01:18 +0800 Subject: =?GB2312?B?U09IT7PJuaawuMD9o6zUwsrVyOszMDAw1KrD+7Wl?= Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 32042 bytes Desc: not available URL: From ojc_miller at hotmail.com Sat Sep 14 09:29:41 2002 From: ojc_miller at hotmail.com (Carl Miller) Date: Sat, 14 Sep 2002 12:29:41 -0400 Subject: How To Win Slot Jackpots Legally! fvher Message-ID: <200209141628.g8EGSB807070@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 707 bytes Desc: not available URL: From pcw2 at flyzone.com Sat Sep 14 09:32:20 2002 From: pcw2 at flyzone.com (Peter Wayner) Date: Sat, 14 Sep 2002 12:32:20 -0400 Subject: The Case Against Steganography In Perceptually Encoded Media In-Reply-To: <00a201c25b8e$2f99fde0$6d650a0a@pc.there.com> References: <20020913150516.GA11539@spheno.jokeslayer.com> <00a201c25b8e$2f99fde0$6d650a0a@pc.there.com> Message-ID: <200209141632.g8EGWbBa014546@slack.lne.com> >Cypherpunks, This is certainly a point that many people are coming to believe. But I think you have to be careful with taking it to extremes. Are there problems with changing the character of noise? Yes, but as you pointed out it may be possible to sculpt the inserted information to conform to the statistical character of the overall file. One of the simplest tricks is just to insert a relatively small message in a relatively large file. Any statistical changes will be lost in the noise. This is a pretty practical solution because there are plenty of images that take hundreds of thousands if not millions of bytes. A thousand bytes of text gets lost pretty quickly. It's also important to remember that there are many tricks that avoid making changes in the usual way. I'm currently very intrigued with the potential to rearrange lists of items. (You can try out an applet here: http://www.wayner.org/books/discrypt2/sorted.php) I guess it's important not to let an obsessive attention to mathematical perfection prevent you from accomplishing something cool. After all, every RSA key can be factored eventually, but we still use the system because it's practically secure. -Peter > >I had an interesting revelation last night. It's a bad idea to use >perceptually-coded media to embed steganographic data. By definition, it >means making the coder make decisions that it otherwise would not have made. >If the coder is good, then the coder's decisions are not arbitrary but >rather each bit is focused on producing the minimal representation necessary >for adequate presentation to humans. This means that encoding extra "random" >data on top of this will always produce compressed output that is of lower >quality than the original. From an information theory standpoint, if you're >tacking on a data stream to compressed output, the stream that is the sum of >the two contains more information and must be represented with more bits. >For example, to attack steganographically-encoded pictures, the pictures >could be analysed and those with lower-quality encoding than expected would >be flagged for analysis as suspect. > >The conclusion is remarkable (to my little mind, at any rate): since most >media transmitted over the Internet is perceptually compressed (JPG, MOV, >AVI, MP3, etc.) the efforts to steganographically encode data within most >Internet media are fundamentally doomed. > >Where, then, can one hide information streams? The answer is wherever >*random* information is communicated. (Even just partial randomness is okay; >I've got a paper on this I hope to be presenting soon!) From togold at arabia.com Sat Sep 14 05:02:44 2002 From: togold at arabia.com (togold at arabia.com) Date: Sat, 14 Sep 2002 14:02:44 +0200 Subject: "Learn the hush-hush secrets of making BIG money on the Web" Message-ID: <41117-22002961412244400@Swift Timothy> Hello: There is only one way to make money on the Web ...Bulk E-mail. But that can be downright dangerous if you don't know the secrets of doing it right...specifically, the hush-hush secrets used by Mastercard, Polaroid, AOL and all of the professional bulk mail companies! Now you too, can capitalize on these techniques to build a six-figure income in the next six months thanks to a new $20 program called "Web Fisher". To learn how, get our FREE "Untold Secrets" booklet today. There's no cost or obligation....just excitement and hope for a better financial future! Get it now! Just send a blank email, with "Secrets" in the subject line, to togold at cairomail.com type "Secrets" in the subject line Best regards, See you at the top Timothy Swift. ============================================= This is Unsolicited Commercial E-mail. To be removed from my list, hit reply and type "remove" in the subject line. Kind Regrads Tim Swift See you at the top From virus_alert at nucleus.com Sat Sep 14 17:29:24 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Sat, 14 Sep 2002 18:29:24 -0600 Subject: VIRUS ALERT! - Language Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: File 'Zmogv.bat' has a forbidden name Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From nmonnens at weprep=2Enet Sat Sep 14 17:29:24 2002 From: nmonnens at weprep=2Enet (nmonnens) Date: Sat, 14 Sep 2002 18:29:24 -0600 Subject: Language Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 8006 bytes Desc: not available URL: From tgsexxymgiacomella at yahoo.com Sat Sep 14 17:33:06 2002 From: tgsexxymgiacomella at yahoo.com (Nicki) Date: Sat, 14 Sep 2002 20:33:06 -0400 Subject: dripping Xlips hmr Message-ID: <200209150039.g8F0dM829940@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2003 bytes Desc: not available URL: From profrv at nex.net.au Sat Sep 14 07:35:05 2002 From: profrv at nex.net.au (Matthew X) Date: Sun, 15 Sep 2002 00:35:05 +1000 Subject: Please take care of Mongo's pussy.Thank you. Message-ID: <5.1.0.14.0.20020914233523.00a00b70@mail.nex.net.au> http://www.totse.com/en/bad_ideas/irresponsible_activities/1001cat.html From pexrsexxymgiacomella at yahoo.com Sat Sep 14 22:57:41 2002 From: pexrsexxymgiacomella at yahoo.com (Nicki) Date: Sun, 15 Sep 2002 01:57:41 -0400 Subject: dripping Xlips movyt Message-ID: <200209150603.g8F63w846215@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1993 bytes Desc: not available URL: From angelinajyvaryul at kiwwi.cz Sun Sep 15 02:00:18 2002 From: angelinajyvaryul at kiwwi.cz (angelinajyvaryul at kiwwi.cz) Date: Sun, 15 Sep 2002 04:00:18 -0500 Subject: GUESS WHO ANGELINA JOLIE HAD SEX WITH? Message-ID: <1032076818.683230@mail8.6you.com> GET A FREE PASS AND FIND OUT RIGHT NOW!BY CLICKING ON THE LINK BELOW http://www.netvisionsenterprises.com/arss/ The MOST AMAZING CELEB SEX FOOTAGE EVER is on the net right now. FROM THE SAME PAPARAZZI THAT PUT THE ANGLELINA JOLIES STRANGE SEX RITUAL ON THE INTERNET! FIRST THEY GOT A COPY OF ANGELINA JOLIES HOME SEX VIDEO AND NOW THEY HAVE FOOTAGE OF XXX CELEBS AT AN AFTERPARTY SOME GUY GOT A HIDDEN CAM INTO THE MUSIC AWARDS AND AFTERPARTY! What this amazing footage right now for free before these rich celebs get it taken off the net! The footage contains 8 minutes from the music awards and 13 minutes from the afterpart! If you are a celeb fan you cannot afford to miss this footage! http://www.netvisionsenterprises.com/arss/ Some of the included footage: 1. XXX HIDDEN CAM FOOTATE OF CELEBS 2. Brittany Spears panty voyeur footage backstage at the music awards. 3. Anna Kournikova in the bathroom! 4. Celebs doing cocaine and getting drunk! GET YOU FREE PASS TO WATCH THIS UNBELIEVABLE FOOTAGE NOW! ITS FREE AND INSTANT, ITS UP ON THE NET RIGHT NOW AND WON'T BE FOR LONG. CLICK ON THE LINK BELOW TO WATCH XXX CELEB FOOTAGE NOW! http://www.netvisionsenterprises.com/arss/ plcurechaxf^nytroen(pbz to opt out click reply and you will be removed immediately From cxvsexxymgiacomella at yahoo.com Sun Sep 15 03:40:33 2002 From: cxvsexxymgiacomella at yahoo.com (Nicki) Date: Sun, 15 Sep 2002 06:40:33 -0400 Subject: dripping Xlips kcvbe Message-ID: <200209151046.g8FAkl859014@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2004 bytes Desc: not available URL: From q at mail.com Sat Sep 14 20:45:27 2002 From: q at mail.com (q at mail.com) Date: Sun, 15 Sep 2002 11:45:27 +0800 Subject: =?GB2312?B?MjHKwLzNxvPStbHYsbjQ+7Sryta2zg==?= Message-ID: <200209150344.g8F3i0S13263@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5511 bytes Desc: not available URL: From emc at artifact.psychedelic.net Sun Sep 15 12:51:35 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sun, 15 Sep 2002 12:51:35 -0700 (PDT) Subject: Imaginative Bitch Costs Moslems Medical Education Message-ID: <200209151951.g8FJpZg02494@artifact.psychedelic.net> If the hospital is receiving death threats, why aren't the people making the threats tracked down and prosecuted? Maybe the hospital should start forwarding its email to shrub at whitehouse.gov. It's like that tenured professor the state of Florida is trying to fire for supporting the Palestinians instead of the Beanie-Headed Land Grabbers. I guess some death threats are more equal than others. http://www.newsday.com/news/nationworld/nation/wire/sns-ap-threat-florida0915sep15.story ----- By TIM REYNOLDS Associated Press Writer September 15, 2002, 12:41 PM EDT MIAMI -- The Miami hospital where three Muslim medical students were headed before they were detained in a 17-hour terror scare on a Florida highway says they aren't welcome there anymore. The head of Larkin Community Hospital said Sunday he had received more than 200 e-mails after the incident, some of them threatening. "Obviously, nothing is final," said Dr. Jack Michel, president and chief executive officer of Larkin. "Our primary objective is to take care of patients. I don't know how that could be done with all this media coverage." ... -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From emc at artifact.psychedelic.net Sun Sep 15 13:00:21 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sun, 15 Sep 2002 13:00:21 -0700 (PDT) Subject: The War Against People Without Hangups Message-ID: <200209152000.g8FK0LT02525@artifact.psychedelic.net> Because Rep. Foley has "dirty" thoughts while thinking about little girls on the Web, everyone else is going to have to pay. Puritanism is the continual worry that someone, somewhere, is having a nice feeling you don't approve of. http://www.newsday.com/news/nationworld/nation/wire/sns-ap-child-modeling0915sep15.story ----- By DAVID CRARY AP National Writer September 15, 2002, 1:28 PM EDT NEW YORK -- The photos on the Web sites portray no nudity and no sex, yet men by the thousands pay to ogle them -- shots of preteen girls posing in bikinis and halter tops. Defended as free speech by some, such pictures are being blasted as a "fix for pedophiles" by a congressman who is waging an uphill campaign to banish them from the Internet. The pool of photos is growing "at an unabated pace," said U.S. Rep. Mark Foley, R-Fla. Foley has authored a bill, now before the House Judiciary Committee, intended to shut down the Web sites by outlawing "exploitive child modeling." Even he concedes, however, that the measure has potential loopholes, and anti-censorship groups say it would likely be struck down as an unconstitutional infringement of free expression. ... Foley isn't swayed by arguments that any abuse of child models could be prosecuted under current laws. "Taking care of the problem after it occurs -- that's when the child is found dead or raped," he said. "My bill is an attempt to ward off problems before they occur." ... -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From girls-unsubscribe at xxxtasymail.com Sun Sep 15 12:27:36 2002 From: girls-unsubscribe at xxxtasymail.com (Chloe) Date: Sun, 15 Sep 2002 15:27:36 -0400 (EDT) Subject: ADULT ADV: HOT CELEBS SHOWING THEIR RAUNCHY SIDE Message-ID: <200209151927.g8FJRZ883094@locust.minder.net> Content-Type: multipart/alternative; boundary="FgnKzABerqEYthgqulKi5oZ0x" This is a Multipart message in MIME Format... --FgnKzABerqEYthgqulKi5oZ0x Content-Type: text/plain Content-Transfer-Encoding: 8bit ~*~ XXX CELEB PASS ~*~ HOT CELEBS SHOWING THEIR RAUNCHY SIDE Jennifer Love Hewitt ~ Jessica Simpson ~ and MORE! http://www.xxxcelebpass.com?5010234220 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ LOVE ZOO Chicks with animals ~ Wacky farm fun! http://links.lifetimebucks.com/lovezoo/life.link/mctahoe/091402 ____________________________________________________________________________ ____________________________________________________________________________ This message is being sent to you because you are a member of Xxxtasy Mail. To change your subscription please visit: http://event.xxxtasymail.com/remove.cgi?key=61e8e7fbe1e2e8e6e1e7e3b6&email=cypherpunks at minder.net � Copyright Protected - All Rights Reserved Copyrights on exclusive images, video and text within this site strictly enforced. All Models were 18 years old or older when photos were taken. --FgnKzABerqEYthgqulKi5oZ0x Content-Type: text/html Content-Transfer-Encoding: 8bit Xxxtasy Mail

 

This message is being sent to you because you are a member of Xxxtasy Mail.
To change your subscription please visit: THIS LINK

© Copyright Protected - All Rights Reserved
Copyrights on exclusive images, video and text within this site strictly enforced.
All Models were 18 years old or older when photos were taken.

 
--FgnKzABerqEYthgqulKi5oZ0x-- From osimankono1 at myplace.com Sun Sep 15 16:13:25 2002 From: osimankono1 at myplace.com (OSIMA NKONO) Date: Sun, 15 Sep 2002 16:13:25 -0700 Subject: CONFIDENTIAL BUSINESS ASSISTANCE Message-ID: <200209151413.g8FEDRxm024673@ak47.algebra.com> 0031655913262 AMSTERDAM, THE NETHERLANDS CONFIDENTIAL BUSINESS PROPOSAL You may be surprised to receive this letter from me since you do not know me personally. I am osima nkono, the first son of Sominu Nkono,the most popular black farmer in Zimbabwe who was murdered in the land dispute in my country. I got your contact through network online hence decided to write you. Before the death of my father, he had taken me to Johannesburg to deposit the sum of US8.5 million (Eight million, Five Hundred thousand United States dollars), in one of the private security company, as he foresaw the looming danger in Zimbabwe this money was deposited in a box as gem stones to avoid much demurrage from security company. This amount was meant for the purchase of new machines and chemicals for the Farms and establishment of new farms in Swaziland. This land problem came when Zimbabwean President Mr. Robert Mugabe introduced a new Land Act Reform wholly affecting the rich white farmers and some few black farmers, and this resulted to the killing and mob action by Zimbabwean war veterans and some lunatics in the society. In fact a lot of people were killed because of this Land reform Act for which my father was one of the victims. It is against this background that, I and my family fled Zimbabwe for fear of our lives and are currently staying in the Netherlands where we are seeking political asylum and moreso have decided to transfer my father’s money to a more reliable foreign account. since the law of Netherlands prohibits a refugee (asylum seeker) to open any bank account or to be involved in any financial transaction throughout the territorial zone of Netherlands, As the eldest son of my father, I am saddled with the responsibility of seeking a genuine foreign account where this money could be transferred without the knowledge of my government who are bent on taking everything we have got. The South African government seems to be playing along with them. I am faced with the dilemma of moving this amount of money out of South Africa for fear of going through the same experience in future, both countries have similar political history. As a businessman,I am seeking for a partner who I have to entrust my future and that of my family in his hands, I must let you know that this transaction is risk free. If you accept to assist me and my family, all I want you to do for me, is to make an arrangements with the security company to clear the consignment(funds) from their afiliate office here in the Netherlands as i have already given directives for the consignment to be brought to the Netherlands from South Africa.But before then all modalities will have to be put in place like change of ownership to the consignment and more importantly this money I intend to use for investment. I have two options for you. Firstly you can choose to have certain percentage of the money for nominating your account for this transaction. Or you can go into partnership with me for the proper profitable investment of the money in your country. Whichever the option you want, feel free to notify me. I have also mapped out 5% of this money for all kinds of expenses incurred in the process of this transaction. If you do not prefer a partnership I am willing to give you 10% of the money while the remaining 85% will be for my investment in your country. Contact me with the above telephone number or my E-mail address while I implore you to maintain the absolute secrecy required in this transaction. Thanks, GOD BLESS YOU Yours Faithfully, OSIMA NKONO. From virus_alert at nucleus.com Sun Sep 15 16:52:02 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Sun, 15 Sep 2002 17:52:02 -0600 Subject: VIRUS ALERT! - A very new game Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: Virus 'W32/Klez.H at mm' in snoopy.exe Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From DJNewslet at aol=2Ecom Sun Sep 15 16:52:02 2002 From: DJNewslet at aol=2Ecom (DJNewslet) Date: Sun, 15 Sep 2002 17:52:02 -0600 Subject: A very new game Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 11156 bytes Desc: not available URL: From qatesters at sohu.com Sun Sep 15 16:48:13 2002 From: qatesters at sohu.com (qatesters at sohu.com) Date: Sun, 15 Sep 2002 18:48:13 -0500 Subject: At Cost Price-Contract/Contract to hire Software Testers,Developers, DBA, Netwokr Engineers, ERP, Siebel.QA=Pharma Experience-CRR21-Validation" Message-ID: <2un13ln64v5t02j.5l2i6a841p@it-hourlyrates.com> From:- Gani Pola *S091502OMNSVS* PCI Data Marketing Division 434 Ridgedale Avenue, PMB # 11-108 East Hanover NJ 07936 ********************************** Tel: 1-888-248-3443 OR 1-888-713-7201 "NO HOURLY RATE BILLING" Fax:1-603-297-5644 ********************************** Attention: Recruiting Manager, Human Resource Administration ==========+++++++++=================+++++++++=============== Please find our software consultant's SKILL SET brief information listed are available for cost price billing or contract or contract to hire positions.For detailed resumes OR DETAILS ON COST PRICE BILLING please send us an e-mail: mailto:qatesters at macinfo.net mailto:qatesters at sohu.com mailto:qatesters at macinfo.net?subject=SEND.RESUMES =================================================== TO REMOVE YOUR ADDRESS FROM OUR DATABASE mailto:qatesters at macinfo.net?subject=Remove..cypherpunks at algebra.com ===================================================== Senior Quality Assurance testers with good experience and low rates!! ***********QA Testers********** ** QA Center Test Pack : QA Run, QA Director and QA Track ** Win runner, Test director, Load runner, Windows, Unix, Oracle ** Segue Silk, Silk Pilot, Silk Performer, Windows, Unix, Oracle, SQL Server ** Rational SQA Suite, Windows, Unix, Oracle ** Main Frames tester with Win runner, Test director ***********CCB Testing*********** CCB testing of applications such as telecommunication, Financials, Insurance Claims, Library, Order Management, Rules Based Work flow, Payroll, Purchasing, Sales and Stock Trading in Web-Based and Client/Server environments. QA Testing with SQA and manual. *********CFR 21 PART11 VALIDATION TESTING=PHARMACEUTICAL ****Main frame Developers with Cobol II, JCL, CICS, DB2, MVS, IMS, TSO, ISPF ****Oracle Developers with Developer 2000 ****Oracle Certified DBA with Oracle architecture, backup, recovery & performance tuning. ****Java Developers with EJB2.0[CMEB-BMEB,JMS], J2EE, Weblogic Server 6.1[Clustering, Performance Tuning], Websphere Application Server 4.0, JBUILDER 6.0, VISUAL AGE FOR JAVA 4.0, Swing, AWT, Servlets2.3,JSP1.2,JDBC2.0,JTA,JTS,JNDI,SOAP,XML,XSL,Unix & Windows ****VB 6.0 Developers with COM+/DCOM, Crystal reports8.5,Oracle8i, SQL Server7.0/2000,MS Access ****Web Developers with ASP3.0/.NET, VB6.0,. COM+/DCOM,IIS, Crystal reports8.0,Oracle8i, SQL Server7.0/2000, MS Access. ****Visual Foxpro developers with SQL Server,Windows ****C/UNIX/Embedded Developer: Strong C/C++ Programming skills on LINUX/UNIX,shell scripts[SH,BASH,CSH] Assembly on X86,UNIX/Linux Internals (Internals of File, Process and Memory Management sub-systems), Sun Solaris 8.0 UNIX/LINUX Kernel 2.4 programming (file systems, networking, device drivers) Experience with LINUX kernel modules and adding SYSTEM CALLS ,VxWorks RTOS, Networking with emphasis in TCP/IP, Multi-Tasking and Multi-Threading, Socket Programming,experience with POSIX API and POSIX THREADS and MUTEX Knowledge in tools like GCC, Make, Telnet, GTK, Electric Fence, GDB ******People Soft HRMS product suite , People code, People tools and nvision *********Cisco Certified Network Admin Basic System Administration : SOLARIS 2.7 Network System Administration : CCNA, CCNP ,Security Administration (FIREWALLS) Check Point, CISCO -PIX *********Cisco Certified Network Admin-Windows NT/2000 Admin. COMPAQ/HP SERVERS/DESKTOP/LAPTOP MAINTENANCE,TROUBLE SHOOTING+MCSE COMPAQ ASE,COMPAQ SERVERS Windows XP/2000/NT, MS DOS, Windows 95/98,Windows Terminal Server 4.0, Novell Netware Version 3.12/4.11, Cisco IOS Ver 11.3/12, Compaq Insight Manager Hardware: compaq & HP Servers, Desktops & Laptops, Acer laptops Calcomp Plotter and various Printers. Networking: RAID configuration in Windows NT/2000, Installation of fiber channels, TCP/IP, Hub, Switch *********Siebel Developers Siebel Developer with Call Center, Siebel eFinance, Siebel 99,2000 Tools, EIM, EAI, Config Siebel eFinance 2000 ver 6.0.1 / Siebel Gateway Server, Siebel VB, HTML Thin Client Assignment & Workflow, Manager, e-Script, e-Comm, Call center. ************ HTML/DHTML, Visual Basic, C++, SQL Web Design Tools: Cascading Style Sheets (CSS), Adobe Photoshop Operating Systems: Windows 98 Software: Microsoft Office (Word, Excel, PowerPoint), Internet [ --------------------------------------------------------------------------------- REMOVAL INSTRUCTIONS (REQUEST) T O T H E R E C I P I E N T -------------------------------------------------------------------------------- If you have received this message in error, we apologize for any inconvenience. To ensure that you do not receive further email from us and wish to be removed from our list, please send us an e-mail: mailto:qatesters at macinfo.net?subject=Remove..cypherpunks at algebra.com From njohnsn at IowaTelecom.net Sun Sep 15 17:33:38 2002 From: njohnsn at IowaTelecom.net (Neil Johnson) Date: Sun, 15 Sep 2002 19:33:38 -0500 Subject: Stealth network technology (courtsey of the US military ?) Message-ID: http://www.dominionlaser.com I saw a presentation from these guys at a network "dog-and-pony" show. Based on their vague comments on its development, it sounds like they originally developed this technology for the Navy, but now are trying to commercialize it. Their big claim to fame is that the electronics (including the laser) are connected to an optical "antenna" by fiber so that the electronics don't have to be exposed to the elements. They claim that their technology can cut through all but 100% fog, when the rain is falling at 6in/hr etc. etc (This is where the vague comments about being able to communicate between ships in a storm without being detected by DF equipment were made). The stuff is pretty expensive, however ($ 10K). -- Neil Johnson PGP key available on request. From osimankono3 at mail.com Sun Sep 15 20:03:19 2002 From: osimankono3 at mail.com (OSIMA NKONO) Date: Sun, 15 Sep 2002 20:03:19 -0700 Subject: CONFIDENTIAL BUSINESS ASSISTANCE Message-ID: <200209151803.g8FI3Rxm018110@ak47.algebra.com> 0031655913262 AMSTERDAM, THE NETHERLANDS CONFIDENTIAL BUSINESS PROPOSAL You may be surprised to receive this letter from me since you do not know me personally. I am osima nkono, the first son of Sominu Nkono,the most popular black farmer in Zimbabwe who was murdered in the land dispute in my country. I got your contact through network online hence decided to write you. Before the death of my father, he had taken me to Johannesburg to deposit the sum of US8.5 million (Eight million, Five Hundred thousand United States dollars), in one of the private security company, as he foresaw the looming danger in Zimbabwe this money was deposited in a box as gem stones to avoid much demurrage from security company. This amount was meant for the purchase of new machines and chemicals for the Farms and establishment of new farms in Swaziland. This land problem came when Zimbabwean President Mr. Robert Mugabe introduced a new Land Act Reform wholly affecting the rich white farmers and some few black farmers, and this resulted to the killing and mob action by Zimbabwean war veterans and some lunatics in the society. In fact a lot of people were killed because of this Land reform Act for which my father was one of the victims. It is against this background that, I and my family fled Zimbabwe for fear of our lives and are currently staying in the Netherlands where we are seeking political asylum and moreso have decided to transfer my father’s money to a more reliable foreign account. since the law of Netherlands prohibits a refugee (asylum seeker) to open any bank account or to be involved in any financial transaction throughout the territorial zone of Netherlands, As the eldest son of my father, I am saddled with the responsibility of seeking a genuine foreign account where this money could be transferred without the knowledge of my government who are bent on taking everything we have got. The South African government seems to be playing along with them. I am faced with the dilemma of moving this amount of money out of South Africa for fear of going through the same experience in future, both countries have similar political history. As a businessman,I am seeking for a partner who I have to entrust my future and that of my family in his hands, I must let you know that this transaction is risk free. If you accept to assist me and my family, all I want you to do for me, is to make an arrangements with the security company to clear the consignment(funds) from their afiliate office here in the Netherlands as i have already given directives for the consignment to be brought to the Netherlands from South Africa.But before then all modalities will have to be put in place like change of ownership to the consignment and more importantly this money I intend to use for investment. I have two options for you. Firstly you can choose to have certain percentage of the money for nominating your account for this transaction. Or you can go into partnership with me for the proper profitable investment of the money in your country. Whichever the option you want, feel free to notify me. I have also mapped out 5% of this money for all kinds of expenses incurred in the process of this transaction. If you do not prefer a partnership I am willing to give you 10% of the money while the remaining 85% will be for my investment in your country. Contact me with the above telephone number or my E-mail address while I implore you to maintain the absolute secrecy required in this transaction. Thanks, GOD BLESS YOU Yours Faithfully, OSIMA NKONO. From mv at cdc.gov Sun Sep 15 21:54:47 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 15 Sep 2002 21:54:47 -0700 Subject: Stealth network technology (courtsey of the US military ?) Message-ID: <3D856417.3F5BFA22@cdc.gov> At 07:33 PM 9/15/02 -0500, Neil Johnson wrote: > http://www.dominionlaser.com > >Their big claim to fame is that the electronics (including the laser) are >connected to an optical "antenna" by fiber so that the electronics don't have >to be exposed to the elements. Moderately clever. >They claim that their technology can cut through all but 100% fog, when the >rain is falling at 6in/hr etc. etc (This is where the vague comments about >being able to communicate between ships in a storm without being detected by >DF equipment were made). Is this choice of IR wavelength or coding techniques or big honking optics? Or all of the above? > >The stuff is pretty expensive, however ($ 10K). AT&T IIRC had something similar, for building point to point. I think the alignment was a bitch, and the cost was similar to that $10K, and wireless overran that niche. (Ergo cheapness via volume isn't going to happen.) A friend of mine was interested in using IRDA to cross a street to leach off a link (with permission). He didn't try it AFAIK. Same concept though. From wlsm at wlsm.com Sun Sep 15 07:19:08 2002 From: wlsm at wlsm.com (wlsm at wlsm.com) Date: Sun, 15 Sep 2002 22:19:08 +0800 Subject: =?GB2312?B?xvPStcfA16LN+MLnyrXD+w==?= Message-ID: <200209151424.g8FENv868919@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3983 bytes Desc: not available URL: From virus_alert at nucleus.com Sun Sep 15 23:12:12 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Mon, 16 Sep 2002 00:12:12 -0600 Subject: VIRUS ALERT! - Hi,look,my beautiful girl friend Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: Virus 'W32/Klez.H at mm' in color.exe Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From nmonnens at weprep=2Enet Sun Sep 15 23:12:12 2002 From: nmonnens at weprep=2Enet (nmonnens) Date: Mon, 16 Sep 2002 00:12:12 -0600 Subject: Hi,look,my beautiful girl friend Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 11109 bytes Desc: not available URL: From xmailer at yahoo.com Sun Sep 15 15:29:18 2002 From: xmailer at yahoo.com (xmailer at yahoo.com) Date: Mon, 16 Sep 2002 00:29:18 +0200 Subject: www.sharetitle.com - A FIRST IN HOLIDAYING - SOUTH AFRICA Message-ID: "It took us three months to find what we believe, is the best view in the Cape" - quoted by Endemol SA "Fear Factor" Go to www.sharetitle.com LIMITED OFFER Thanks for your time. ************************************************************************************************************************************************************************************** This electronic mail transmission may contain confidential information and is intended only for the person named. Any use, copying or disclosure by another person is strictly prohibited. If you have received this transmission in error, please notify the sender via return e-mail. -------------- next part -------------- ...................................................... From xtuqsxexxytess49 at 123india.com Mon Sep 16 02:11:30 2002 From: xtuqsxexxytess49 at 123india.com (Nicki) Date: Mon, 16 Sep 2002 05:11:30 -0400 Subject: dripping Xlips uyhtb Message-ID: <200209160917.g8G9Ht824946@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2005 bytes Desc: not available URL: From abuahmed5418i86 at cegeka.be Mon Sep 16 07:34:51 2002 From: abuahmed5418i86 at cegeka.be (abuahmed5418i86 at cegeka.be) Date: Mon, 16 Sep 2002 06:34:51 -0800 Subject: NORTON SYSTEMWORKS 2002 FINAL CLEARANCE SALE! 4371ONd-7 Message-ID: <003d31c64c8c$1773b7d7$7db27dc5@lscreo> ATTENTION: This is a MUST for ALL Computer Users!!! *NEW-Special Package Deal!* Norton SystemWorks 2002 Software Suite -Professional Edition- Includes Six - Yes 6! - Feature-Packed Utilities ALL For 1 Special LOW Price! This Software Will: - Protect your computer from unwanted and hazardous viruses - Help secure your private & valuable information - Allow you to transfer files and send e-mails safely - Backup your ALL your data quick and easily - Improve your PC's performance w/superior integral diagnostics! 6 Feature-Packed Utilities...1 Great Price! A $300+ Combined Retail Value! YOURS for Only $29.99! Don't fall prey to destructive viruses or hackers! Protect your computer and your valuable information! So don't delay...get your copy TODAY! http://euro.specialdiscounts4u.com/ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ This email has been screened and filtered by our in house ""OPT-OUT"" system in compliance with state laws. If you wish to "OPT-OUT" from this mailing as well as the lists of thousands of other email providers please visit http://dvd.specialdiscounts4u.com/optoutd.html ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 3788cqZK9-859imAx5191MEyr9-692RgIu8105Fmqy7-865JSWM3963TEsC0-6l58 2033LHnZ6-289YwNP5371arYE6-229eGRh3624uEUl39 From rwright at cs.stevens-tech.edu Mon Sep 16 06:00:31 2002 From: rwright at cs.stevens-tech.edu (Rebecca N. Wright) Date: Mon, 16 Sep 2002 09:00:31 -0400 (EDT) Subject: [fc] FC'03 submission deadline - final reminder Message-ID: Today is the submission deadline for Financial Cryptography '03. For more information about submitting a paper, see www.ifca.ai/fc03. Note that we have fixed a few technical glitches: the submission server now accepts pdf, and problems with the e-mail address for the program chairs have been fixed. If you have any questions about submitting a paper or a panel proposal, please contact the program chairs at fc03-submissions at ifca.ai. _______________________________________________ fc mailing list fc at ifca.ai http://mail.ifca.ai/mailman/listinfo/fc --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From rw at firstpr.com.au Sun Sep 15 17:08:31 2002 From: rw at firstpr.com.au (Robin Whittle) Date: Mon, 16 Sep 2002 10:08:31 +1000 Subject: OpenSSL worm in the wild References: <3D821D71.2000702@algroup.co.uk> Message-ID: <3D8520FF.FDD04455@firstpr.com.au> My RH7.2 machine was hit by this worm at 9PM Australian EST Sunday night (6AM US East Coast time not counting summertime) and I had not noticed mention of it on BugTraq. Web searches found no mention of it, but the worm arrives as nicely written source in /tmp/, so I figured it out, turned off SSL and rebooted. About 6 hours later, a CERT page appeared and I expected this to be announced on BugTraq, but since it hasn't yet, here is the URL for the "Apache/mod_ssl worm, linux.slapper.worm and bugtraq.c worm.": http://www.cert.org/advisories/CA-2002-27.html It depends on the SSL vulnerabilities described on 30 July which I had erroneously not dealt with on my machine: http://www.cert.org/advisories/CA-2002-23.html "Linux.slapper" indeed! My 56k link to the Net was flooded with UDP port 2002 packets from other machines. The financial cost of this over a few days at ~USD$0.09 a Megabyte would have been serious and the link almost unusable, but my ISP (Telstra Internet) quickly responded to my 3AM request and filtered UDP port 2002 at their router. - Robin http://www.firstpr.com.au http://fondlyandfirmly.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From mv at cdc.gov Mon Sep 16 10:13:53 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 16 Sep 2002 10:13:53 -0700 Subject: What becomes a location most? (net core buildings) Message-ID: <3D861151.66CE23E4@cdc.gov> excerpts from http://mappa.mundi.net/inform/inform_0190.html The Seattle building had so much fiber running between floors that one elevator shaft was eliminated to make room. I believe this is the first time that I know of where people space in an office building has been replaced with electron (or photon) space. (Amusingly, the Seattle offices had a simple $100 hub that connected three of the Alaska providers to each other. But that was probably all that was needed.) From girls-unsubscribe at xxxtasymail.com Mon Sep 16 12:38:23 2002 From: girls-unsubscribe at xxxtasymail.com (Megan) Date: Mon, 16 Sep 2002 15:38:23 -0400 (EDT) Subject: ADULT ADV: Bored? Horny? FREE XXX!!! Message-ID: <200209161938.g8GJcN855582@locust.minder.net> Content-Type: multipart/alternative; boundary="4j40RuZ6BnM7ciCKrS3PcTm5v" This is a Multipart message in MIME Format... --4j40RuZ6BnM7ciCKrS3PcTm5v Content-Type: text/plain Content-Transfer-Encoding: 8bit ~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~> ~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~> DAZZLING BEAUTIES!!!! ULTIMATE SEX SCENES!!!! LIVE STRIPPERS!!! TEEN HARDCORE!! THE HOTTEST MODELS!!! HIDDEN CAMS!!!! REAL SEX MALL! http://links.lifetimebucks.com/realsexmall/life.link/mctahoe/091502b ~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~> ~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~>~> ~ GRANNY PLAYGROUND Indulge in erotic lesbian encounters, Orgy bang-fests, women sucking dick, Big boob action and MUCH MORE! CUM ON IN! DON'T MISS THE ACTION!! http://www9.grannyplayground.com/cgi/click?account=720268&site=34&program=1 __________________________________________________________________________________ __________________________________________________________________________________ This message is being sent to you because you are a member of Xxxtasy Mail. To change your subscription please visit: http://event.xxxtasymail.com/remove.cgi?key=aa2d2c482e2f2d2b2e2c30b2&email=cypherpunks at minder.net � Copyright Protected - All Rights Reserved Copyrights on exclusive images, video and text within this site strictly enforced. All Models were 18 years old or older when photos were taken. --4j40RuZ6BnM7ciCKrS3PcTm5v Content-Type: text/html Content-Transfer-Encoding: 8bit Xxxtasy Mail

 
 

This message is being sent to you because you are a member of Xxxtasy Mail.
To change your subscription please visit: THIS LINK

© Copyright Protected - All Rights Reserved
Copyrights on exclusive images, video and text within this site strictly enforced.
All Models were 18 years old or older when photos were taken.

 
--4j40RuZ6BnM7ciCKrS3PcTm5v-- From jsnsxexxytess49 at 123india.com Mon Sep 16 14:22:53 2002 From: jsnsxexxytess49 at 123india.com (Nicki) Date: Mon, 16 Sep 2002 17:22:53 -0400 Subject: dripping Xlips aix Message-ID: <200209162129.g8GLTIS25929@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2013 bytes Desc: not available URL: From MAMA at JUNO.COM Mon Sep 16 14:47:39 2002 From: MAMA at JUNO.COM (Roderick Gatchalian) Date: Mon, 16 Sep 2002 17:47:39 -0400 Subject: +++ What You Don't Know Can Make You Rich => $1,500+/Wk Easy Cash for Ya!!! Message-ID: <200209162148.g8GLmJ862961@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4312 bytes Desc: not available URL: From MAMA at JUNO.COM Mon Sep 16 14:47:39 2002 From: MAMA at JUNO.COM (Roderick Gatchalian) Date: Mon, 16 Sep 2002 17:47:39 -0400 Subject: +++ What You Don't Know Can Make You Rich => $1,500+/Wk Easy Cash for Ya!!! Message-ID: <200209162156.g8GLuH863257@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4312 bytes Desc: not available URL: From rah at shipwright.com Mon Sep 16 17:00:05 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Mon, 16 Sep 2002 20:00:05 -0400 Subject: [fc] FC'03 submission deadline - final reminder Message-ID: --- begin forwarded text From declan at well.com Mon Sep 16 22:40:23 2002 From: declan at well.com (Declan McCullagh) Date: Tue, 17 Sep 2002 01:40:23 -0400 Subject: FC: White House draft plan wants new Internet role for Feds Message-ID: I'm going to try to put part of the report online before I leave in about five hours for the Internet Law and Policy Forum conference in Seattle. (I'm speaking on Wednesday and will be in Seattle through Saturday.) See: http://www.ilpf.org/conference2002/ I don't have a great way to scan in and OCR large documents, so I may post efax files and ask for a volunteer to OCR 'em. -Declan --- http://news.com.com/2100-1023-958159.html?tag=politech White House preps cybersecurity plan By Declan McCullagh September 16, 2002, 6:58 PM PT WASHINGTON--The White House's cyberspace security plan, scheduled to be released Wednesday, envisions a broad new role for the federal government in maintaining Internet security. While couching many concepts as mere suggestions, a draft of the plan seen by CNET News.com says the government should improve the security of key Internet protocols and spend tens of millions of dollars on centers to recognize and respond to "cyber attacks." [...] It says the executive branch should consult with privacy groups and attempt to preserve civil liberties, but concludes that in some cases, privacy could be limited. "Allowing completely anonymous communications on a wide-scale basis, with no possibility of determining the source, could shelter criminal, or even terrorist communications," the draft says. [...] From declan at well.com Mon Sep 16 22:44:15 2002 From: declan at well.com (Declan McCullagh) Date: Tue, 17 Sep 2002 01:44:15 -0400 Subject: Bush admin cybersecurity report weighs anonymity Message-ID: <20020917014415.A6350@cluebot.com> ----- Forwarded message from Declan McCullagh ----- From announce at harleyfanclub.com Tue Sep 17 00:53:59 2002 From: announce at harleyfanclub.com (Win-a-Bike) Date: Tue, 17 Sep 2002 03:53:59 -0400 Subject: H.D. Motorcycle sweepstake Message-ID: <200209170753.g8H7qeKI011051@oo169.md009.com> Forward: ------------------------------------------------------- Free signup limited seats available. Make sure you grab this golden opportunity while still valid. Enter the Harley-Davidson VISA sweepstake. -------------------------------------------------------- Join Harley-Davidson Visa Sweepstakes -------------------------------------------------------- Signup and enter to win a F-r-e-e bike. What are you waiting for? http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 -------------------------------------------------------- Why buy a bike? You could easily win a Harley! -------------------------------------------------------- This is not a dream. Just signup and get approval online and enter the Harley-Davidson Visa sweepstakes. http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 (Valid to U.S. residents age 18+ only) -------------------------------------------------------- YES, 2 simple steps to win a Bike. Monthly drawing. -------------------------------------------------------- No sign up, No monthly fee, easly approval, anybody can join to win a bike. What are you waiting for? http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 Dave Kawasaki HarleyFanClub announce at harleyfanclub.com ------------------------------------------------------- This Tell-a-Friend service is accessible online, you can do the same to invite your friends to join for free. Visit: http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 To unsubscribe, email: unsubscribe at harleyfanclub.com To make suggestions, email: suggestions at harleyfanclub.com ------------------------------------------------------- From announce at harleyfanclub.com Tue Sep 17 01:28:37 2002 From: announce at harleyfanclub.com (Win-a-Bike) Date: Tue, 17 Sep 2002 04:28:37 -0400 Subject: Fwd: Re: Claim your lucky draw ticket. Message-ID: <200209170828.g8H8R8lQ003798@oo168.md009.com> Forward: ------------------------------------------------------- Free signup limited seats available. Make sure you grab this golden opportunity while still valid. Enter the Harley-Davidson VISA sweepstake. -------------------------------------------------------- Signup to enter the sweepstakes every month! -------------------------------------------------------- Join and Win a FREE RIDE! We are giving away one Harley-Davidson motorcycle every month! http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 -------------------------------------------------------- Signup and test your luck. Why not? -------------------------------------------------------- Simply signup and enter the sweepstakes until December 31st 2002. No purchase, no obligations! http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 -------------------------------------------------------- Dream comes true. Win a Harley-Davidson Motorcycle. -------------------------------------------------------- Valid to U.S. residents age 18+ only. Sweepstakes end December 31st 2002. http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 Dave Kawasaki HarleyFanClub announce at harleyfanclub.com ------------------------------------------------------- This Tell-a-Friend service is accessible online, you can do the same to invite your friends to join for free. Visit: http://www.harleyfanclub.com/cgi-bin/offer.cgi?affid=63 To unsubscribe, email: unsubscribe at harleyfanclub.com To make suggestions, email: suggestions at harleyfanclub.com ------------------------------------------------------- From SweepsGame at sweepsgame.com Tue Sep 17 07:10:21 2002 From: SweepsGame at sweepsgame.com (Sweepsgame.com) Date: Tue, 17 Sep 2002 07:10:21 -0700 (PDT) Subject: GET AN UNSECURED VISA OR MASTERCARD NOW!! Message-ID: <200209171410.HAA40138@s3082.mb00.net> Dear Member, You can get your credit back on track with a Centennial VISA or MasterCard! Get the credit you deserve while enjoying the benefits of ATM Cash Advances. http://www.ppmtrac.com/tk/121/ AOL Users Click Here Remember, good credit is an important part of your financial future, and it's our pleasure to help you build that future. Plus get credit limit increase reviews so click below and APPLY NOW. So stop waiting! Apply Online NOW for your choice of an UNSECURED Centennial VISA or MASTERCARD Today! http://www.ppmtrac.com/tk/121/ AOL Users Click Here Sincerely,Your New Offers Staff This email was sent to you by Sweepsgame.com, a marketing partner of First PREMIER Bank, not from the Bank itself.Please direct all concerns about this email or your inclusion on this list to our email address listed above. <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> * To remove yourself from this mailing list, point your browser to: http://i.mb00.net/remove?Sweepsgame:* * Enter your email address (cypherpunks at minder.net) in the field provided and click "Unsubscribe". The mailing list ID is "Sweepsgame:*". OR... * Forward a copy of this message to Sweepsgame at reply.mb00.net with the word remove in the subject line. This message was sent to address cypherpunks at minder.net X-PMG-Recipient: cypherpunks at minder.net <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> pmguid:1rp.33o1.18wkw From rah at shipwright.com Tue Sep 17 04:58:53 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 17 Sep 2002 07:58:53 -0400 Subject: Vaccine developed for lethal ricin Message-ID: http://www.newscientist.com/news/print.jsp?id=ns99992783 NewScientist.com Vaccine developed for lethal ricin 10:31 12 September 02 Andy Coghlan A vaccine against the lethal toxin ricin could soon be available - and it may be needed, researchers warn. "A big stash of ricin was found in the caves of Afghanistan," says Ellen Vitetta of the University of Texas Southwestern Medical Center in Dallas, whose team developed the vaccine. "They weren't collecting it to make stew." Ricin, a natural toxin found in castor beans, is cheap and relatively easy to produce. And as it is a powder, it is easily turned into an aerosol that can be inhaled. Nor does it take much to kill someone: just 1 to 10 micrograms of ricin per kilogram of body weight. About this amount on the sharpened tip of an umbrella was enough to kill the Bulgarian dissident Georgi Markov, after an infamous attack on London's Waterloo Bridge in 1978. "You get flu-like symptoms, then suddenly you're dead," says Vitetta. "This stuff really frightens me." Fluid retention The toxin has two components. Its "B chain" binds to cells, allowing the second component, the "A chain", to enter the cell and disable the protein factories. Just a single A chain can kill a cell. The team's vaccine, which is a stripped-down version of the A chain, arose as a spin-off from Vitetta's work on ricin-based anti-cancer drugs. The idea, which many groups are working on, is to attach the A chain to antibodies that target tumour cells. In trials, however, Vitetta found that while the ricin-based drugs do kill cancer cells, patients given high doses can develop a side effect called vascular leakage. "They retain fluid, gain weight and can have organ failure," Vitetta says. To improve the anti-cancer drugs, Vitetta and her colleagues stripped out the part of the toxin that was causing vascular leakage. "Then we thought: why don't we make a vaccine by stripping out the active site, too." Army interest Of the three versions of the A chain they genetically engineered, two turned out to have the desired effect on mice. The animals survived exposure to 10 times the dose of ricin that killed unvaccinated mice. "It's cheap, simple and protects wonderfully without side effects because it's a totally inactive protein," Vitetta says. She has now applied to the National Institutes of Health for further funding to test the vaccine against aerosolised ricin and hopes eventually to test the vaccine in people. The US Army is also interested because no approved vaccine exists. Previous attempts to make one by chemically inactivating the toxin failed. Journal reference: Vaccine (vol 20, p3422) 10:31 12 September 02 -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From IncreaseSales30009 at yahoo.com Tue Sep 17 06:33:20 2002 From: IncreaseSales30009 at yahoo.com (Maria King) Date: Tue, 17 Sep 2002 09:33:20 -0400 Subject: >>>14.5 MILLION TARGETED EMAIL ADDRESSES...PLUS $2,000 IN FREE SOFTWARE! Message-ID: WOULD YOU LIKE TO HAVE YOUR MESSAGE SEEN BY OVER 14.5 MILLION TARGETED PROSPECTS DAILY? Below is all the information you will ever need to market your product or service over the Internet! If you have a product, service, or message that you would like to get out to Thousands, Hundreds of Thousands, or even Millions of people, you have several options. Traditional methods include print advertising, direct mail, radio, and television advertising. They are all effective, but they all have two catches: They're EXPENSIVE and TIME CONSUMING. Not only that, you only get ONE SHOT at making your message heard by the right people. Now this has all changed! Internet Search Engines Submissions, Classified Ads, Newsgroup Postings simply DO NOT WORK. Thanks to the top programmers in the world and their NEW EMAIL TECHNOLOGY, You can send millions of email messages daily for FREE... Without getting terminated from your current Internet connection! It's very simple to do and you can be increasing your sales within minutes of installing this new extraordinary software! Besides...It's the only real way to advertise on the Internet that works...Period! >>>WE WILL SUPPLY YOU WITH OVER 14.5 MILLION OPT-IN EMAIL ADDRESSES TO GET STARTED RIGHT AWAY! >>>PLUS FREE EMAIL ADDRESS DOWNLOADS FOR ONE FULL YEAR! >>>ALSO YOU WILL RECEIVE $2,000 WORTH OF INTERNET MARKETING SOFTWARE FREE! Including...... EMAIL SENDING SOFTWARE...(send millions of email advertisements daily with a few clicks of your mouse) EMAIL EXTRACTION SOFTWARE...(retreive new targeted email addresses daily hundreds of thousands of them) LIST MANAGEMENT SOFTWARE...(keep your lists clean, opt-in and manage all your remove requests, leads, sales etc...) and much...much more! To find out more information, Do not respond by email. Instead, visit our web site at: http://www.emailbythemillion.com _____________________________________________________ Want to be removed from our list? Simply send an email to us at cybernetremova at excite.com and type "remove" in the "subject" line and you will be removed from any future mailings. From IncreaseSales30009 at yahoo.com Tue Sep 17 06:34:46 2002 From: IncreaseSales30009 at yahoo.com (Howard Fok) Date: Tue, 17 Sep 2002 09:34:46 -0400 Subject: >>>14.5 MILLION TARGETED EMAIL ADDRESSES...PLUS $2,000 IN FREE SOFTWARE! Message-ID: <5X979082786599.07092@MAIL02-TY.sx.cnmobile.net> WOULD YOU LIKE TO HAVE YOUR MESSAGE SEEN BY OVER 14.5 MILLION TARGETED PROSPECTS DAILY? Below is all the information you will ever need to market your product or service over the Internet! If you have a product, service, or message that you would like to get out to Thousands, Hundreds of Thousands, or even Millions of people, you have several options. Traditional methods include print advertising, direct mail, radio, and television advertising. They are all effective, but they all have two catches: They're EXPENSIVE and TIME CONSUMING. Not only that, you only get ONE SHOT at making your message heard by the right people. Now this has all changed! Internet Search Engines Submissions, Classified Ads, Newsgroup Postings simply DO NOT WORK. Thanks to the top programmers in the world and their NEW EMAIL TECHNOLOGY, You can send millions of email messages daily for FREE... Without getting terminated from your current Internet connection! It's very simple to do and you can be increasing your sales within minutes of installing this new extraordinary software! Besides...It's the only real way to advertise on the Internet that works...Period! >>>WE WILL SUPPLY YOU WITH OVER 14.5 MILLION OPT-IN EMAIL ADDRESSES TO GET STARTED RIGHT AWAY! >>>PLUS FREE EMAIL ADDRESS DOWNLOADS FOR ONE FULL YEAR! >>>ALSO YOU WILL RECEIVE $2,000 WORTH OF INTERNET MARKETING SOFTWARE FREE! Including...... EMAIL SENDING SOFTWARE...(send millions of email advertisements daily with a few clicks of your mouse) EMAIL EXTRACTION SOFTWARE...(retreive new targeted email addresses daily hundreds of thousands of them) LIST MANAGEMENT SOFTWARE...(keep your lists clean, opt-in and manage all your remove requests, leads, sales etc...) and much...much more! To find out more information, Do not respond by email. Instead, visit our web site at: http://www.emailbythemillion.com _____________________________________________________ Want to be removed from our list? Simply send an email to us at cybernetremova at excite.com and type "remove" in the "subject" line and you will be removed from any future mailings. From ichudov at Algebra.COM Tue Sep 17 09:57:00 2002 From: ichudov at Algebra.COM (Igor Chudov) Date: Tue, 17 Sep 2002 11:57:00 -0500 Subject: algebra.com becomes a more filtered node Message-ID: <20020917165700.GA15548@manifold.algebra.com> Just wanted to let everyone know that algebra.com is becoming a much more filtered node. Two things to be aware of: 1. I use a lot more of general antispam filtering. I use several dns based spamhaus blackholes, a access control list from wirehub.net, and my own list of spam patterns. At request of other nodes, I can share what I do which at this point has become rather effective. Spam that passes through other nodes is more difficult for me to eliminate. 2. (more controversial). I eliminate all traffic that I receive from, or that was sent to, one particular cypherpunk node, as well as everything that was sent by the node's owner. Essentially all traffic that is related to that node goes to the bit bucket. I am rather tired of both the content as well as the network bandwidth consumed by that node. I send nothing to that node either. The goal that I personally pursue is to make the list more readable to me and to use less of my bandwodth. I am not even sure how many valid addresses are subscribed to algebra.com, since I transferred a lot of them to minder.net a while ago. igor From remailer at aarg.net Tue Sep 17 12:37:21 2002 From: remailer at aarg.net (AARG! Anonymous) Date: Tue, 17 Sep 2002 12:37:21 -0700 Subject: Palladium block diagram Message-ID: <7d8815915f8a1c2757a31bfa0efb028a@aarg.net> Here is a functional block diagram of the Palladium software, based on a recent presentation by Microsoft. My notes were a bit sketchy as I rushed to copy down this slide, so there may be some slight errors. But this is basically what was shown. (Use a monospace font to see it properly.) Normal Mode Trusted Mode +-----------------------------------------------------------------+ | +-------+ | +-------+ | | Nubsys | App |---o | o---| Agent | | USER | exe | PdLib | | | PdLib | | | o +-------+ | +-------+ | | | | o | | | | | | |--------|----------------------------+-----------|---------------| | \-----------------\ | | | | | | | | | +---------+ +--------+ | +------------------+ | | | Main OS | | NubMgr |--o | o--| Secure Executive | | KERNEL | ++----+----+----+ | sys | | | Nexus | | | | HAL | Drivers | +--------+ | +------------------+ | | +-----+---------+ | | | | | +-----------------------------------------------------------------+ The idea is that initially only the left half exists. To launch Palladium the user runs the Nubsys.exe program. This goes into kernel mode and loads the NubMgr.sys module, which initiates trusted mode and launches the secure executive or "nexus". (This is what is also sometimes called the Nub or the TOR.) When a Palladium-aware app is launched in user mode, it is linked with a PdLib and requests to the Nexus to load the corresponding Trusted Agent. The Agent runs trusted in user mode, and has its own PdLib which lets it make system calls into the Nexus. The Trusted Agent and the application then communicate back and forth across the trusted/normal mode boundary. From remailer at aarg.net Tue Sep 17 14:05:27 2002 From: remailer at aarg.net (AARG! Anonymous) Date: Tue, 17 Sep 2002 14:05:27 -0700 Subject: Cryptogram: Palladium Only for DRM Message-ID: Niels Ferguson wrote: > At 16:04 16/09/02 -0700, AARG! Anonymous wrote: > >Nothing done purely in software will be as effective as what can be done > >when you have secure hardware as the foundation. I discuss this in more > >detail below. > > But I am not suggesting to do it purely in software. Read the Intel manuals > for their CPUs. There are loads of CPU features for process separation, > securing the operating system, etc. The hardware is all there! > Maybe I have to explain the obvious. On boot you boot first to a secure > kernel, much like the Pd kernel but running on the main CPU. This kernel > then creates a virtual machine to run the existing Windows in, much like > VMware does. The virus is caught inside this virtual machine. All you need > to do is make sure the virtual machine cannot write to the part of the disk > that contains your security kernel. Thanks for the explanation. Essentially you can create a virtualized Palladium, where you emulate the functionality of the secure hardware. The kernel normally has access to all of memory, for example, but you can virtualize the MMU as VmWare does, so that some memory is inaccessible even to the kernel, while the kernel can still run pretty much the same. Similarly your virtualizing software could comput a hash of code that loads into this secure area and even mimic the Palladium functionality to seal and unseal data based on that hash. All this would be done at a level which was inaccessible to ordinary Windows code, so it would be basically as secure as Palladium is with hardware. The one thing that you don't get with this method is secure attestation. There is no way your software can prove to a remote system that it is running a particular piece of code, as is possible with Pd hardware. However I believe you see this as not a security problem, since in your view the only use for such functionality is for DRM. I do think there are some issues with this approach to creating a secure system, even independent of the attestation issue. One is performance. According to a presentation by the VMWare chief scientist [1], VMWare sees slowdowns of from 8 to 30 percent on CPU-bound processes, with graphics-intensive applications even worse, perhaps a factor of 2 slower. Maybe Windows could do better than this, but users aren't going to be happy about giving up 10 percent or more of their CPU performance. Also, Palladium hardware provides protection against DMA devices: "Even PCI DMA can't read or write memory which has been reserved to a nub's or TA's use (including the nub's or TA's code). This memory is completely inaccessible and can only be accessed indirectly through API calls. The chipset on the motherboard is modified to enforces this sort of restriction." [2] It's conceivable that without this hardware protection, a virus could exploit a security flaw in an external device and get access to the secure memory provided by a virtualized Palladium. But these are not necessarily major problems. Generally I now agree with your comments, and those of others, that the security benefits of Palladium - except for secure remote attestation - can be provided using existing and standard PC hardware, and that the software changes necessary are much like what would be necessary for the current Palladium design, plus the work to provide VMWare-type functionality. However that still leaves the issue of remote attestation... > Who are you protecting against? If the system protects the interests of the > user, then you don't need to protect the system from the user. The security > chip is only useful if you try to take control away from the user. This is a simplistic view. There are many situations in which it is in the interests of the user to be able to prove to third parties that he is unable to commit certain actions. A simple example is possession of a third-party cryptographic certificate. The only reason that is valuable is because the user can't create it himself. Any time someone shows a cert, they are giving up some control in order to get something. They can't modify that certificate without rendering it useless. They are limited in what they can do with it. But it is these very limitations that make the cert valuable. But let me cut to the chase and provide some examples where remote attestation, allowing the user to prove that he is running a particular program and that it is unmolested, is useful. These will hopefully encourage you to modify your belief that "The 'secure chip' in Pd is only needed for DRM. All other claimed benefits of Pd can be achieved using existing hardware. To me this is an objectively verifyable truth." I don't think any of these examples could be solved with software plus existing hardware alone. The first example is a secure online game client. Rampant cheating in the online gaming industry is a major problem which has gotten much attention in the past few months. Players can load hacks to let them see through walls, automate targetting and fire control, and employ other methods that give them an overwhelming advantage. The game industry is big business and is growing rapidly. Unless they can get a handle on this problem it could hurt the success of the industry. Remote attestation will allow game servers to be confident that users are playing on a level playing field, without the hacked and modified clients that allow cheating. Another example is a P2P file sharing network client. Faced with the threat from these file sharing networks, content industries are attacking them in various ways, including flooding them with bogus queries and lying about file hashes and contents. Also, some users are switching to clients that give them unfair priority, at the expense of the rest of the network. Recently a Salon article [3] reported that Gnutella developers are considering methods to check client integrity in order to avoid these problems. But this is not really possible today, especially with open source clients. What they need is secure attestation. That way they can be confident that client software is using the protocol fairly and appropriately. Of course, the Gnutella developers have no idea that the evil bogeyman of Palladium could actually help them out - no one in the security field is willing to say anything favorable about the technology. This conspiracy of silence is what I am trying to overcome. Online distributed computations can also benefit. Recently there was a comment on cypherpunks that pointed out that the RC5 keysearch effort has gone through 85% of the key space without success, raising the possibility that it somehow skipped the key. This particular search has gone on for almost five years, and all that work may come to nothing! Being able to check that users are running valid clients will eliminate one possible source of problems in these efforts. Remote attestation will be an easy way to improve the chances that if someone says that the key is not in a particular region, it really isn't. Turning to banking and e-commerce, there are many cases where it is not enough to be running a secure client; you must also be able to prove that you are doing so. According to Perry Metzger's earlier message, if a user is defrauded in a banking transaction due to a virus, he is supposed to be protected. It's not clear who has to pay him back, but let's suppose it is the bank. Now the bank has a very real economic interest in making sure that its clients are using the approved software. If there is third-party software out there, the bank can't be sure of its reliability and security. Secure attestation can improve the security of the entire system by making sure that third-party clients are not allowed to participate in transactions. The bank has control over its liability and its risk. The same reasoning applies to credit card purchases. If you've got a virtual-Palladium-based secure system, that's great; you're protected against a virus somehow getting your card number and using it. But actually it is the banks who eat the charges when cards are misused, at least in the U.S. It could make a great deal of sense for acceptors of credit cards to be able to check what software the user is running, make sure it is a secure system and that it is an approved client. This will give users incentives to move to secure systems, which will benefit everyone as the amount of fraud decreases. Secure attestation could even provide a way for commercial companies to prove to customers that they are running particular accounting software to hold data on their customers. Eventually, accounting software could be developed which is oriented around protecting the privacy of consumer data; for example, it could prevent wholesale exporting of the database into some format that could be easily copied or transferred. User agents could refuse to upload their personal data unless the company can prove that it is running one of these privacy-protecting software packages. Adam Back (who opposes Palladium) described several other possible applications all of which rely on secure attestation [4]. He listed: : - general Application Service Providers (ASPs) that you don't have to : trust to read your data : : - less traceable peer-to-peer applications : : - DRM applications that make a general purpose computer secure against : BORA (Break Once Run Anywhere), though of course not secure against : ROCA (Rip Once Copy Everywhere) -- which will surely continue to : happen with ripping shifting to hardware hackers. : : - general purpose unreadable sandboxes to run general purpose : CPU-for-rent computing farms for hire, where the sender knows you : can't read his code, you can't read his input data, or his output : data, or tamper with the computation. : : - file-sharing while robustly hiding knowledge and traceability of : content even to the node serving it -- previously research question, : now easy coding problem with efficient : : - anonymous remailers where you have more assurance that a given node : is not logging and analysing the traffic being mixed by it Of course, one of these is indeed DRM, and no one (least of all Microsoft) denies that DRM will be facilitated by Palladium or that it was one of the motivations for creating the technology. But the rest are all different, and hopefully they provide further evidence that Palladium, in its full form, is good for more than DRM. In particular, the idea of CPU-for-rent farms has been stymied for years because of concerns about sensitive corporate data. Secure attestation could be a breakthrough that will put the incredible power of idle machines to productive economic use, for tremendous benefits to society. The virtualized Palladium can't do any of the applications above, as far as I can see. These are all benefits of Palladium which rely on the secure hardware chip, and they go far beyond DRM. Many of these applications actually serve to enhance the user's security and privacy. I understand you aren't going to reply, but hopefully in your own mind you will see that there are far more benefits to the full version of Palladium, including its security chip, than just DRM. === [1] http://www.hotchips.org/pubs/hc99/hc11_pdf/hc99.s6.1.Rosenblum.pdf [2] http://vitanuova.loyalty.org/2002-07-05.html [3] http://www.salon.com/tech/feature/2002/08/08/gnutella_developers/print.html [4] http://www.mail-archive.com/cryptography at wasabisystems.com/msg02526.html From lisa2111w51 at aol.com Mon Sep 16 23:14:16 2002 From: lisa2111w51 at aol.com (lisa2111w51 at aol.com) Date: Tue, 17 Sep 2002 15:14:16 +0900 Subject: CASH IN YOUR PAYPAL TOMORROW!! 6139-4 Message-ID: <022c48d02b8e$1224c7a6$8ee72eb2@xmsdso> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4831 bytes Desc: not available URL: From rah at shipwright.com Tue Sep 17 12:39:35 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 17 Sep 2002 15:39:35 -0400 Subject: Vaccine developed for lethal ricin Message-ID: --- begin forwarded text From zenadsl6186 at zen.co.uk Tue Sep 17 09:39:03 2002 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Tue, 17 Sep 2002 17:39:03 +0100 Subject: Bush admin cybersecurity report weighs anonymity In-Reply-To: <20020917014415.A6350@cluebot.com> Message-ID: Declan McCullagh wrote: > > It says the executive branch should consult with privacy groups and > attempt to preserve civil liberties, but concludes that in some cases, > privacy could be limited. "Allowing completely anonymous > communications on a wide-scale basis, with no possibility of > determining the source, could shelter criminal, or even terrorist > communications," the draft says. > I wonder whether the authors know that it is impossible to stop anonymous communications for the intelligent criminal or terrorist who is willing to jump through a few hoops. If they don't, they shouldn't be writing such reports, as they are not qualified. If they do, then I wonder at their motives. The use of the term "wide-scale" is worrying in it's implication that they do know of the impossibility, and merely want to prevent anonymity for the masses. If the motive is to provide general surveillance capability, it is reprehensible and oppressive. Didn't you 'merkins once fight against oppressive government? If it's intended to help catch the dumb criminals and terrorists, they are mistaken about it's likely effectiveness - tracing is only useful when there is something worth tracing, and this only happens when people are unaware that their communications can be traced. Even dumb criminals and terrorists (who can usually be caught by less intrusive methods anyway) will quickly learn not to use traceable communications. Disposable mobile- and pay- phones are already favourites. I suppose they might be comparing the slight, short-term benefit to be gained in the ease of catching the dumb against the long-term loss of liberty for all, and weighing the loss of liberty at naught. If the motive is to give citizens the feeling that something is being done, it's just more political bullshit, but with unfortunate consequences. I can't think of any other possible motives. -- Peter Fairbrother From daw at cs.cmu.edu Tue Sep 17 15:01:51 2002 From: daw at cs.cmu.edu (Nathaniel Daw) Date: Tue, 17 Sep 2002 18:01:51 -0400 (EDT) Subject: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM) In-Reply-To: <20020917220536.A1642978@exeter.ac.uk> Message-ID: > The fact that VMWare works just means they used some tricks to make it > practically virtualize some common OSes, not that it is no longer > possible to write malicious software to run as user or privileged > level inside the guest OS and have it escape the virtualization. I spoke with someone who had evaluated the appropriateness of the VMWare internals for security sandboxing with respect to just this point. He seemed to believe that it is simply not possible for processes in the guest to escape the sandbox (perhaps, in light of the paper you cite, this signals inefficiencies in VMWare). Other people on this list were, I believe, involved in porting VMWare to be hosted under the BSD architecture and may be able to speak further about this. In any case, the broader point that has been made repeatedly is that even if the Pentium is not efficiently, securely virtualizable due to quirks in its instruction set, clearly there are architectures which are but which avoid the objectionable, user-hostile, aspects of the Pd scheme. n From trader4489 at excite.com Tue Sep 17 17:00:05 2002 From: trader4489 at excite.com (trader4489 at excite.com) Date: Tue, 17 Sep 2002 20:00:05 -0400 Subject: Silver Coin Giveaway Message-ID: <032b53d68c5a$1774b1e3$6eb86ea8@oejpwr> The new bull market in precious metals has started! To introduce this new investment opportunity, we would like your permission to send you a FREE silver coin and report!! Gold has broken through the $300.00 mark, and silver is experiencing the greatest supply shortfall in history! Find out NOW how precious metals can improve your overall investment returns. Click here for your FREE market report and silver coin: http://www.all-sensationals.com/invest/silver.html Gold has been as high as $875, and silver has been as high as $50. Analysts are predicting $10-15 silver over the near term. Global turmoil and economic instability indicate that an explosive flight to precious metals is upon us. Highly respected analysts covering the precious metals markets are calling for the beginning of the next bull market in silver and gold! http://www.all-sensationals.com/invest/silver.html Learn how with as little as $5000 you can own and leverage 3000 ounces of silver with low risk and potentially return $20,000 to $30,000 with a proper market move. This investment represents the purchase and leverage of physical metal. It does not involve futures or options or the risk associated with them. Find out today about this cutting edge opportunity! http://www.all-sensationals.com/invest/silver.html All information is FREE and is presented without obligation. Visit our website today for more details if you are at least 25 years of age. $5000 minimum investment. http://www.all-sensationals.com/invest/silver.html Disclaimer: We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click this link: http://www.all-sensationals.com/invest/cleanlist.html Please accept our apologies if you have been sent this email in error. We honor all removal requests. 3889jhMc6-844EGVf9644WEou5-555dl29 From mqcsexxyxsmendes at dclinc.net Tue Sep 17 17:56:01 2002 From: mqcsexxyxsmendes at dclinc.net (Valerie*) Date: Tue, 17 Sep 2002 20:56:01 -0400 Subject: dripping Xlips gfsmn Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1977 bytes Desc: not available URL: From adam at cypherspace.org Tue Sep 17 14:05:36 2002 From: adam at cypherspace.org (Adam Back) Date: Tue, 17 Sep 2002 22:05:36 +0100 Subject: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM) In-Reply-To: <87k7lll3pp.fsf@snark.piermont.com>; from perry@piermont.com on Mon, Sep 16, 2002 at 11:01:06PM -0400 References: <9d31f4f5897f795606b60c4075e84d94@aarg.net> <87k7lll3pp.fsf@snark.piermont.com> Message-ID: <20020917220536.A1642978@exeter.ac.uk> On Mon, Sep 16, 2002 at 11:01:06PM -0400, Perry E. Metzger wrote: > [...] in a correctly operating OS, MMUs+file permissions do more or > less stop processes from seeing each others data if the OS functions > correctly. The OS can stop user processes inspecting each others address space. Therefor a remote exploit in one piece of application software should not result in a compromise of another piece of software. (So an IE bug should not allow the banking application to be broken.) (Note also that in practice with must current OSes converting gaining root once given access to local processes is not that well guaranteed). However the OS itself is a complex piece of software, and frequently remote exploits are found in it and/or the device drivers it runs. OS exploits can freely ignore the protection between user applications, reading your banking keys. Even if a relatively secure OS is run (like some of the BSD variants), the protection is not _that_ secure. Vulnerabilities are found periodically (albeit mostly by the OS developers rather than externally -- as far as we know). Plus also the user may be tricked into running trojaned device drivers. So one approach to improve this situation (protect the user from the risks of trojaned device drivers and too large and complex to realistically assure security of OSes) one could run the OS itself in ring0 and a key store and TOR in ring-1 (the palladium approach). Some seem to be arguing that you don't need a ring-1. But if you read the paper Peter provided a reference for, they conclude that the pentium architecture is not (efficiently) securely virtualizable. The problem area is the existance of sensitive but unprivileged instructions. The fact that VMWare works just means they used some tricks to make it practically virtualize some common OSes, not that it is no longer possible to write malicious software to run as user or privileged level inside the guest OS and have it escape the virtualization. (It is potentially inefficently securely virtualizable using complete software emulation, but this is highly inefficient). (Anonymous can continue on cypherpunks if Perry chooses to censor his further comments.) Adam -- http://www.cypherspace.net/ From bibletalk011 at yahoo.com Tue Sep 17 21:54:47 2002 From: bibletalk011 at yahoo.com (Peter) Date: Wed, 18 Sep 2002 06:54:47 +0200 Subject: RESTORATION Message-ID: <200209180453.g8I4rl84023840@ak47.algebra.com> Hello Sir/Ma, Good day. I wish to share something beautiful with you but will need your permission to do so. My point of focus is one based on somebody I know, love and have a relationship with (whom I think you should meet too). His name is Jesus Christ. Please kindly hear me out. But if you do not wish to do so, simply delete this message from your mail box and don't bother about it in any way. Reading to this point is even enough worth thanking you for. If on the other hand, you do not mind granting me audience, then I imploy you to graciously accept my invitation to read on. I believe you will like it. I thank you. What I have to share with you is something very important. In fact, for me,it is the most important thing to talk about on this axis of existence. Sure, all men should pay attention to it. It is obvious that this world is a place filled with violence, uncertainties and atrocities which mock man's claims to decency. But it could have been better. Someone cares and an encounter with that caring personality is needed to guarantee lasting ease on earth and hereafter because in here is "...no continuing city..." (Heb.13:14). Besides, "...we are all as an unclean thing, and all our righteousness are as filthy rags;..." (Isa.64:6). The all important issue I would like to talk to you about is one that borders on where one would spend the rest of his or her life after dying physically. Listen up please. Confronting every man is this stark (and perhaps rude) reality that life continues after his or her last earthly breath. Sorry, there isn't anything like the state of nothingness after death (Heb.9:27). No. None. Eternity is great! It is endless! In fact, it is the lifetime of the never dying God. When we all eventually close our eyes in life here, we will surely open them in eternity - never to go back to correct any mistake done in the past. So the best we can do for ourselves in time now is to secure our chances of making it at last to God in heaven. And the agent of that security is the guy I started out talking to you about. He is self existent from eternity past (Prov.8). He could not be felt by man's conscious apparatuses i.e. his sense organs, so He had to take on a body (Heb.10:4-7) so that He could relate with humans like you and I in order to lead us back to God (Heb.2:14) from whom we logged off when Adam and Eve, our first parents sinned (Gen.3). The sin they committed stained the whole of the human race (Rom.5:16,17a,19,21). Little wonder King David quipped that "Behold I was shapen in iniquity; and in sin did my mother conceive me" (PS.51:5). Apostle Paul's own submission is "For all have sinned and come short of the glory of God" (Rom.3:23). But of more serious implication is it's consequence: The soul that sinneth, it shall die...(Ezek.18:20a). So only a sinless individual can offer help to it, something my hero did. His name again is Jesus Christ. Sinless from the start, He responded to the call for a saviour for mankind the instance it was made in heaven (Jh.10:17,18) and had to lay down His life in the process. "Why" you asked? Well, in spiritual parlance, life goes for life and by yielding to the temptation of the devil, Adam and Eve caused mankind to lose the life of God (Eph.4:18) but Christ paid the debt by dying on the cross of Calvary (Matt.27; Heb.9:22) and rising up again on the third day from the dead through the power of the Holy Spirit (Matt.28:1-6; Rom.6:4;1 Cor.15:3,4). Hallelujah! His action was a clear expression of God's unreserved love for mankind (Jh.3:16). Now, you and I need to willingly and consciously surrender the Lordship of our lives to Him in order to be secured from the eternal damnation of hell - out of God's holy presence. Please do note today that whoever allows Jesus into his or her life, would never live to regret the action taken (Rev.3:20; Jh.10:10). I therefore humbly invite you to do it now. The bible says whosoever comes to Christ, He would in no wise cast out (Jh.6:37). Whoever does so, is assured of eternal life (Jh.3:16). If you are ready to do the above, then simply follow these steps: First, acknowledge that you are a sinner who cannot save himself/herself no matter how much you try to. Second, believe in the provision that God has graciously made available for man to be saved - Jesus Christ (Acts 4:12). Then, simply say a prayer asking for forgiveness for your sins in Jesus name and He will save you (Ps.51:17). He is only the mention of His name far away from you. Your name will then be written in the book of life (Phil.4:3). That is when it is said that you are born again. That is when you can enjoy the true peace that only His spirit brings (Rom.14:11). That is when your own spirit is regenerated to be accostumed to His ways (Rom.8:10,11,14; 1 Cor.2:14,15). That is when you can safely escape the danger of eternal anguish for your immortal soul (Jh.3:18). However, you must be willing to depend on the sweet Holy Spirit to live a life which is pleasing to God. So are you born again or would you like to be now? Do take note that Jesus loves you dearly and He wants to save you today (Matt.11:28; Mk.10:45; Jh.6:36). Please give your heart to Him and you will be glad you did. I care about your welfare but God cares more. I am glad you could let me talk to you about Him. So I thank you very much for granting me your audience. May God bless you richly in Jesus name. Amen. Peter, Lagos. From bibletalk011 at yahoo.com Tue Sep 17 21:54:48 2002 From: bibletalk011 at yahoo.com (Peter) Date: Wed, 18 Sep 2002 06:54:48 +0200 Subject: RESTORATION Message-ID: Hello Sir/Ma, Good day. I wish to share something beautiful with you but will need your permission to do so. My point of focus is one based on somebody I know, love and have a relationship with (whom I think you should meet too). His name is Jesus Christ. Please kindly hear me out. But if you do not wish to do so, simply delete this message from your mail box and don't bother about it in any way. Reading to this point is even enough worth thanking you for. If on the other hand, you do not mind granting me audience, then I imploy you to graciously accept my invitation to read on. I believe you will like it. I thank you. What I have to share with you is something very important. In fact, for me,it is the most important thing to talk about on this axis of existence. Sure, all men should pay attention to it. It is obvious that this world is a place filled with violence, uncertainties and atrocities which mock man's claims to decency. But it could have been better. Someone cares and an encounter with that caring personality is needed to guarantee lasting ease on earth and hereafter because in here is "...no continuing city..." (Heb.13:14). Besides, "...we are all as an unclean thing, and all our righteousness are as filthy rags;..." (Isa.64:6). The all important issue I would like to talk to you about is one that borders on where one would spend the rest of his or her life after dying physically. Listen up please. Confronting every man is this stark (and perhaps rude) reality that life continues after his or her last earthly breath. Sorry, there isn't anything like the state of nothingness after death (Heb.9:27). No. None. Eternity is great! It is endless! In fact, it is the lifetime of the never dying God. When we all eventually close our eyes in life here, we will surely open them in eternity - never to go back to correct any mistake done in the past. So the best we can do for ourselves in time now is to secure our chances of making it at last to God in heaven. And the agent of that security is the guy I started out talking to you about. He is self existent from eternity past (Prov.8). He could not be felt by man's conscious apparatuses i.e. his sense organs, so He had to take on a body (Heb.10:4-7) so that He could relate with humans like you and I in order to lead us back to God (Heb.2:14) from whom we logged off when Adam and Eve, our first parents sinned (Gen.3). The sin they committed stained the whole of the human race (Rom.5:16,17a,19,21). Little wonder King David quipped that "Behold I was shapen in iniquity; and in sin did my mother conceive me" (PS.51:5). Apostle Paul's own submission is "For all have sinned and come short of the glory of God" (Rom.3:23). But of more serious implication is it's consequence: The soul that sinneth, it shall die...(Ezek.18:20a). So only a sinless individual can offer help to it, something my hero did. His name again is Jesus Christ. Sinless from the start, He responded to the call for a saviour for mankind the instance it was made in heaven (Jh.10:17,18) and had to lay down His life in the process. "Why" you asked? Well, in spiritual parlance, life goes for life and by yielding to the temptation of the devil, Adam and Eve caused mankind to lose the life of God (Eph.4:18) but Christ paid the debt by dying on the cross of Calvary (Matt.27; Heb.9:22) and rising up again on the third day from the dead through the power of the Holy Spirit (Matt.28:1-6; Rom.6:4;1 Cor.15:3,4). Hallelujah! His action was a clear expression of God's unreserved love for mankind (Jh.3:16). Now, you and I need to willingly and consciously surrender the Lordship of our lives to Him in order to be secured from the eternal damnation of hell - out of God's holy presence. Please do note today that whoever allows Jesus into his or her life, would never live to regret the action taken (Rev.3:20; Jh.10:10). I therefore humbly invite you to do it now. The bible says whosoever comes to Christ, He would in no wise cast out (Jh.6:37). Whoever does so, is assured of eternal life (Jh.3:16). If you are ready to do the above, then simply follow these steps: First, acknowledge that you are a sinner who cannot save himself/herself no matter how much you try to. Second, believe in the provision that God has graciously made available for man to be saved - Jesus Christ (Acts 4:12). Then, simply say a prayer asking for forgiveness for your sins in Jesus name and He will save you (Ps.51:17). He is only the mention of His name far away from you. Your name will then be written in the book of life (Phil.4:3). That is when it is said that you are born again. That is when you can enjoy the true peace that only His spirit brings (Rom.14:11). That is when your own spirit is regenerated to be accostumed to His ways (Rom.8:10,11,14; 1 Cor.2:14,15). That is when you can safely escape the danger of eternal anguish for your immortal soul (Jh.3:18). However, you must be willing to depend on the sweet Holy Spirit to live a life which is pleasing to God. So are you born again or would you like to be now? Do take note that Jesus loves you dearly and He wants to save you today (Matt.11:28; Mk.10:45; Jh.6:36). Please give your heart to Him and you will be glad you did. I care about your welfare but God cares more. I am glad you could let me talk to you about Him. So I thank you very much for granting me your audience. May God bless you richly in Jesus name. Amen. Peter, Lagos. From bibletalk011 at yahoo.com Tue Sep 17 21:54:54 2002 From: bibletalk011 at yahoo.com (Peter) Date: Wed, 18 Sep 2002 06:54:54 +0200 Subject: RESTORATION Message-ID: <20020918044740.58050.qmail@weltregierung.koeln.ccc.de> Hello Sir/Ma, Good day. I wish to share something beautiful with you but will need your permission to do so. My point of focus is one based on somebody I know, love and have a relationship with (whom I think you should meet too). His name is Jesus Christ. Please kindly hear me out. But if you do not wish to do so, simply delete this message from your mail box and don't bother about it in any way. Reading to this point is even enough worth thanking you for. If on the other hand, you do not mind granting me audience, then I imploy you to graciously accept my invitation to read on. I believe you will like it. I thank you. What I have to share with you is something very important. In fact, for me,it is the most important thing to talk about on this axis of existence. Sure, all men should pay attention to it. It is obvious that this world is a place filled with violence, uncertainties and atrocities which mock man's claims to decency. But it could have been better. Someone cares and an encounter with that caring personality is needed to guarantee lasting ease on earth and hereafter because in here is "...no continuing city..." (Heb.13:14). Besides, "...we are all as an unclean thing, and all our righteousness are as filthy rags;..." (Isa.64:6). The all important issue I would like to talk to you about is one that borders on where one would spend the rest of his or her life after dying physically. Listen up please. Confronting every man is this stark (and perhaps rude) reality that life continues after his or her last earthly breath. Sorry, there isn't anything like the state of nothingness after death (Heb.9:27). No. None. Eternity is great! It is endless! In fact, it is the lifetime of the never dying God. When we all eventually close our eyes in life here, we will surely open them in eternity - never to go back to correct any mistake done in the past. So the best we can do for ourselves in time now is to secure our chances of making it at last to God in heaven. And the agent of that security is the guy I started out talking to you about. He is self existent from eternity past (Prov.8). He could not be felt by man's conscious apparatuses i.e. his sense organs, so He had to take on a body (Heb.10:4-7) so that He could relate with humans like you and I in order to lead us back to God (Heb.2:14) from whom we logged off when Adam and Eve, our first parents sinned (Gen.3). The sin they committed stained the whole of the human race (Rom.5:16,17a,19,21). Little wonder King David quipped that "Behold I was shapen in iniquity; and in sin did my mother conceive me" (PS.51:5). Apostle Paul's own submission is "For all have sinned and come short of the glory of God" (Rom.3:23). But of more serious implication is it's consequence: The soul that sinneth, it shall die...(Ezek.18:20a). So only a sinless individual can offer help to it, something my hero did. His name again is Jesus Christ. Sinless from the start, He responded to the call for a saviour for mankind the instance it was made in heaven (Jh.10:17,18) and had to lay down His life in the process. "Why" you asked? Well, in spiritual parlance, life goes for life and by yielding to the temptation of the devil, Adam and Eve caused mankind to lose the life of God (Eph.4:18) but Christ paid the debt by dying on the cross of Calvary (Matt.27; Heb.9:22) and rising up again on the third day from the dead through the power of the Holy Spirit (Matt.28:1-6; Rom.6:4;1 Cor.15:3,4). Hallelujah! His action was a clear expression of God's unreserved love for mankind (Jh.3:16). Now, you and I need to willingly and consciously surrender the Lordship of our lives to Him in order to be secured from the eternal damnation of hell - out of God's holy presence. Please do note today that whoever allows Jesus into his or her life, would never live to regret the action taken (Rev.3:20; Jh.10:10). I therefore humbly invite you to do it now. The bible says whosoever comes to Christ, He would in no wise cast out (Jh.6:37). Whoever does so, is assured of eternal life (Jh.3:16). If you are ready to do the above, then simply follow these steps: First, acknowledge that you are a sinner who cannot save himself/herself no matter how much you try to. Second, believe in the provision that God has graciously made available for man to be saved - Jesus Christ (Acts 4:12). Then, simply say a prayer asking for forgiveness for your sins in Jesus name and He will save you (Ps.51:17). He is only the mention of His name far away from you. Your name will then be written in the book of life (Phil.4:3). That is when it is said that you are born again. That is when you can enjoy the true peace that only His spirit brings (Rom.14:11). That is when your own spirit is regenerated to be accostumed to His ways (Rom.8:10,11,14; 1 Cor.2:14,15). That is when you can safely escape the danger of eternal anguish for your immortal soul (Jh.3:18). However, you must be willing to depend on the sweet Holy Spirit to live a life which is pleasing to God. So are you born again or would you like to be now? Do take note that Jesus loves you dearly and He wants to save you today (Matt.11:28; Mk.10:45; Jh.6:36). Please give your heart to Him and you will be glad you did. I care about your welfare but God cares more. I am glad you could let me talk to you about Him. So I thank you very much for granting me your audience. May God bless you richly in Jesus name. Amen. Peter, Lagos. From bibletalk011 at yahoo.com Tue Sep 17 21:54:54 2002 From: bibletalk011 at yahoo.com (Peter) Date: Wed, 18 Sep 2002 06:54:54 +0200 Subject: RESTORATION Message-ID: <20020918044740.58046.qmail@weltregierung.koeln.ccc.de> Hello Sir/Ma, Good day. I wish to share something beautiful with you but will need your permission to do so. My point of focus is one based on somebody I know, love and have a relationship with (whom I think you should meet too). His name is Jesus Christ. Please kindly hear me out. But if you do not wish to do so, simply delete this message from your mail box and don't bother about it in any way. Reading to this point is even enough worth thanking you for. If on the other hand, you do not mind granting me audience, then I imploy you to graciously accept my invitation to read on. I believe you will like it. I thank you. What I have to share with you is something very important. In fact, for me,it is the most important thing to talk about on this axis of existence. Sure, all men should pay attention to it. It is obvious that this world is a place filled with violence, uncertainties and atrocities which mock man's claims to decency. But it could have been better. Someone cares and an encounter with that caring personality is needed to guarantee lasting ease on earth and hereafter because in here is "...no continuing city..." (Heb.13:14). Besides, "...we are all as an unclean thing, and all our righteousness are as filthy rags;..." (Isa.64:6). The all important issue I would like to talk to you about is one that borders on where one would spend the rest of his or her life after dying physically. Listen up please. Confronting every man is this stark (and perhaps rude) reality that life continues after his or her last earthly breath. Sorry, there isn't anything like the state of nothingness after death (Heb.9:27). No. None. Eternity is great! It is endless! In fact, it is the lifetime of the never dying God. When we all eventually close our eyes in life here, we will surely open them in eternity - never to go back to correct any mistake done in the past. So the best we can do for ourselves in time now is to secure our chances of making it at last to God in heaven. And the agent of that security is the guy I started out talking to you about. He is self existent from eternity past (Prov.8). He could not be felt by man's conscious apparatuses i.e. his sense organs, so He had to take on a body (Heb.10:4-7) so that He could relate with humans like you and I in order to lead us back to God (Heb.2:14) from whom we logged off when Adam and Eve, our first parents sinned (Gen.3). The sin they committed stained the whole of the human race (Rom.5:16,17a,19,21). Little wonder King David quipped that "Behold I was shapen in iniquity; and in sin did my mother conceive me" (PS.51:5). Apostle Paul's own submission is "For all have sinned and come short of the glory of God" (Rom.3:23). But of more serious implication is it's consequence: The soul that sinneth, it shall die...(Ezek.18:20a). So only a sinless individual can offer help to it, something my hero did. His name again is Jesus Christ. Sinless from the start, He responded to the call for a saviour for mankind the instance it was made in heaven (Jh.10:17,18) and had to lay down His life in the process. "Why" you asked? Well, in spiritual parlance, life goes for life and by yielding to the temptation of the devil, Adam and Eve caused mankind to lose the life of God (Eph.4:18) but Christ paid the debt by dying on the cross of Calvary (Matt.27; Heb.9:22) and rising up again on the third day from the dead through the power of the Holy Spirit (Matt.28:1-6; Rom.6:4;1 Cor.15:3,4). Hallelujah! His action was a clear expression of God's unreserved love for mankind (Jh.3:16). Now, you and I need to willingly and consciously surrender the Lordship of our lives to Him in order to be secured from the eternal damnation of hell - out of God's holy presence. Please do note today that whoever allows Jesus into his or her life, would never live to regret the action taken (Rev.3:20; Jh.10:10). I therefore humbly invite you to do it now. The bible says whosoever comes to Christ, He would in no wise cast out (Jh.6:37). Whoever does so, is assured of eternal life (Jh.3:16). If you are ready to do the above, then simply follow these steps: First, acknowledge that you are a sinner who cannot save himself/herself no matter how much you try to. Second, believe in the provision that God has graciously made available for man to be saved - Jesus Christ (Acts 4:12). Then, simply say a prayer asking for forgiveness for your sins in Jesus name and He will save you (Ps.51:17). He is only the mention of His name far away from you. Your name will then be written in the book of life (Phil.4:3). That is when it is said that you are born again. That is when you can enjoy the true peace that only His spirit brings (Rom.14:11). That is when your own spirit is regenerated to be accostumed to His ways (Rom.8:10,11,14; 1 Cor.2:14,15). That is when you can safely escape the danger of eternal anguish for your immortal soul (Jh.3:18). However, you must be willing to depend on the sweet Holy Spirit to live a life which is pleasing to God. So are you born again or would you like to be now? Do take note that Jesus loves you dearly and He wants to save you today (Matt.11:28; Mk.10:45; Jh.6:36). Please give your heart to Him and you will be glad you did. I care about your welfare but God cares more. I am glad you could let me talk to you about Him. So I thank you very much for granting me your audience. May God bless you richly in Jesus name. Amen. Peter, Lagos. From Denis2188u67 at aol.com Wed Sep 18 05:35:18 2002 From: Denis2188u67 at aol.com (Denis2188u67 at aol.com) Date: Wed, 18 Sep 2002 07:35:18 -0500 Subject: $100 turns into $16,000 - Immediate Results! 5199smlY1-726JnDY0859PRxM8-33-27 Message-ID: <030d63e58a0d$3645c4a2$4ac78bc7@rmxvex> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1951 bytes Desc: not available URL: From PeterNBiddle at hotmail.com Wed Sep 18 09:15:12 2002 From: PeterNBiddle at hotmail.com (Peter) Date: Wed, 18 Sep 2002 09:15:12 -0700 Subject: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM) References: Message-ID: The issue isn't whether or not the architeture as it existed in the past is or isn't able to securely isolate user and kernel mode processes in an OS which may not exist. If an OS can be written to securely isolate user and kernel mode processes then I am sure that someone clever will find a way to use it to do such a thing and may have an excellent security solution for that OS which runs on current chips. I wish whomever tries to do this the best of luck. [Moderator's Obnoxious Note: I believe such an operating system is called "Unix"...] In Windows there are a number of reasons we can't use the current isolation model for absolute enforcement of isolation. The biggest business reasons are backwards compatibility for applications and kernel mode drivers, both of which count on the current architecture and all of it's strengths (and quirks). As we have stated before, we designed Pd with the assumption that we couldn't break apps and we couldn't break device drivers. Arbitrary Windows code which runs today must continue to run and function in Pd as it does today, and yet Pd must still be able to provde protection. Someone with a niche OS who doesn't care about breaking things may use a different approach - they don't have gazllions of lines of 3rd party code counting on version to version compatibility. We do. >From a technical perspective, there are also a number of reasons that the current isolation models don't work My guess is that a hard core Linux or Unix kernel dev could probably explain this just as well as MS could, however I will see if I can get someone on our end to outline the issues as we see them. I think that you are talking about separating user-mode processes in VMWare (right?). What about SCSI controllers? The BIOS? Option ROMS? Kernel mode device drivers? DMA devices? Random kernel foo.sys? What if the attack uses SMM to attack VMWare itself? How does VMWare prove that the environment it inherited when it booted is valid? Lastly - Pd is only partially about process isolation. Nothing in the current architecture even attmempts to address SW attestation, delegated evaluation, authentication, or the sealing of data. P ----- Original Message ----- From: "Nathaniel Daw" To: Cc: "Cypherpunks" Sent: Tuesday, September 17, 2002 3:01 PM Subject: Re: but _is_ the pentium securely virtualizable? (Re: Cryptogram: Palladium Only for DRM) > > > The fact that VMWare works just means they used some tricks to make it > > practically virtualize some common OSes, not that it is no longer > > possible to write malicious software to run as user or privileged > > level inside the guest OS and have it escape the virtualization. > > I spoke with someone who had evaluated the appropriateness of the VMWare > internals for security sandboxing with respect to just this point. He > seemed to believe that it is simply not possible for processes in the > guest to escape the sandbox (perhaps, in light of the paper you > cite, this signals inefficiencies in VMWare). Other people on this list > were, I believe, involved in porting VMWare to be hosted under the BSD > architecture and may be able to speak further about this. In any case, > the broader point that has been made repeatedly is that even if the > Pentium is not efficiently, securely virtualizable due to quirks in its > instruction set, clearly there are architectures which are but which avoid > the objectionable, user-hostile, aspects of the Pd scheme. > > n > > > > --------------------------------------------------------------------- > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com > --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From morlockelloi at yahoo.com Wed Sep 18 13:23:29 2002 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Wed, 18 Sep 2002 13:23:29 -0700 (PDT) Subject: software-defined radio killer app In-Reply-To: <3D88AA8B.271109B9@cdc.gov> Message-ID: <20020918202329.65138.qmail@web40609.mail.yahoo.com> > Better than a radar detector for emissionless, but visible, cops. Over > the hill coverage. Issues of This will be banned under WIPO and copyright laws - you may enjoy cop's presence for yourself, but transmitting it is same as broadcasting a live show without permission - after all, the all information cops emit is "present or not", so you, in essence, steal 100% of their IP. Due to a number of various radio equipment that armed people use, and characteristic signatures, it's often more than enough to listen on several frequences and match the spectral fingerprint to detect their presence (car radio, personal radio, etc.) I think that some radar detectors have this built-in. The main problem is localisation - each district seem to be using different frequences. Could it be that They are aware of dangers of the monoculture ? ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com From bjoy77 at hotmail.com Wed Sep 18 22:55:22 2002 From: bjoy77 at hotmail.com (bjoy77 at hotmail.com) Date: Wed, 18 Sep 2002 13:55:22 -1600 Subject: Attn: Keep Your Computer Running FAST! KNMQTCRRM Message-ID: <000053300c60$0000394a$000053e3@ifjf.uib.no> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Take Control of Your Computer With This Top-of-the-Line Software! +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Symantec SystemWorks 2002 -=Professional Software Suite=- This Special Package Includes Six - Yes 6! - Feature-Packed Utilities ALL for 1 Special LOW Price of Only $29.99! This Software Will: - Protect your computer from unwanted and hazardous viruses - Help secure your private & valuable information - Allow you to transfer files and send e-mails safely - Backup your ALL your data quick and easily - Improve your PC's performance w/superior integral diagnostics! - ***** You'll NEVER have to take your PC to the repair shop AGAIN! ***** That's SIX, yes, -6- Feature-Packed Utilities @ 1 Great Price!!! A $300+ Combined Retail Value YOURS Only $29.99! (Limited Time Offer) < Price Includes FREE Shipping! > Why SO Cheap you ask? You are buying ONLINE WHOLESALE, Direct from the Warehouse TO YOU! ~~~ AND ~~~ FOR A LIMITED TIME BUY 2 OF ANY SOFTWARE & GET 1 FREE!!!! Don't fall prey to destructive viruses or programs! Protect your computer and your valuable information and... ...CLICK HERE TO ORDER NOW! -> http://61.151.247.39/erik/ OR cut & paste the above link ^^^^^^^^^^^^^^^^ in your browser's URL bar. FOR MORE QUESTIONS, OR TO ORDER CALL US TOLL-FREE ANYTIME! 1 - 8 0 0 - 8 6 1 - 1 4 8 1 We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted-in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. The list CODE in which you are registered is marked at the bottom of this email. If you do not wish to receive further mailings, Please click here -> http://61.151.247.39/erik/remove.asp to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests. IAES (International Association of Email Security) Approved List. Serial # 9e45tYu2-ssI3USA From caravel_uk at transtools.com Wed Sep 18 07:20:46 2002 From: caravel_uk at transtools.com (Caravel UK) Date: Wed, 18 Sep 2002 14:20:46 GMT Subject: Go to Java. Go Now! Message-ID: <200209181420.g8IEKkx4023349@transtools.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5160 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: salto.jpg Type: aplication/octet-stream Size: 13473 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: tt_ultimo.gif Type: aplication/octet-stream Size: 2153 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: sun_strategic_dv1.gif Type: aplication/octet-stream Size: 1064 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ibm_member_par.gif Type: aplication/octet-stream Size: 3236 bytes Desc: not available URL: From ermvemc8916 at excite.com Wed Sep 18 12:32:31 2002 From: ermvemc8916 at excite.com (1/2 Price Sale) Date: Wed, 18 Sep 2002 14:32:31 -0500 Subject: 1/2 Price Sale........... Message-ID: <200209181932.g8IJWLw08437@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4563 bytes Desc: not available URL: From sandy at alleroedkommune-elev.dk Wed Sep 18 12:42:36 2002 From: sandy at alleroedkommune-elev.dk (Sandra Delgado) Date: Wed, 18 Sep 2002 15:42:36 -0400 Subject: Felicidades!!!! Message-ID: <200209181937.g8IJbgUC001242@ak47.algebra.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3140 bytes Desc: not available URL: From uhfreelifetimesex at TheTeenZone.com Wed Sep 18 16:03:32 2002 From: uhfreelifetimesex at TheTeenZone.com (svxNatasha) Date: Wed, 18 Sep 2002 16:03:32 -0700 Subject: ylb Message-ID: <200209182302.g8IN2Rw31741@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3272 bytes Desc: not available URL: From mv at cdc.gov Wed Sep 18 16:38:38 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 18 Sep 2002 16:38:38 -0700 Subject: software-defined radio killer app Message-ID: <3D890E7E.972739EA@cdc.gov> At 01:23 PM 9/18/02 -0700, Morlock Elloi wrote: >> Better than a radar detector for emissionless, but visible, cops. Over >> the hill coverage. Issues of > >This will be banned under WIPO and copyright laws Yep. Won't anyone think of the chiiiildren? >I think that some radar detectors have this built-in. Inter-("consumer")-node automatic communication of antisocial information over pirate protocols? I don't think so. Yet :-) I'm suggesting that end-user-configurable RF comp/comm devices are a quantum step in the development of "consumer" electronics in the us-vs.-pigs arms race. Or could be. Look dude, I'm just porting/downshifting the Rural Optical Signalling Protocol to a blog-like RF mesh network with a better horizon. You can ignore those noise bursts if you like :-) The main problem is >localisation - each district seem to be using different frequences. Could it be >that They are aware of dangers of the monoculture ? Frequencies are just bit patterns to a digitally controlled oscillator. DCOs are agile, dude. Got spectrum? From wolf at priori.net Wed Sep 18 19:04:11 2002 From: wolf at priori.net (Meyer Wolfsheim) Date: Wed, 18 Sep 2002 19:04:11 -0700 (PDT) Subject: software-defined radio killer app In-Reply-To: <3D88AA8B.271109B9@cdc.gov> Message-ID: On Wed, 18 Sep 2002, Major Variola (ret) wrote: > In some parts of rural america, folks signal the presence of cops by > flashing their headlights > when driving. > > Occurs to me that would be a cool function for SDR: press code for or > say "cop". For N seconds, > phone periodically sends "cop" message picked up by other phones, > ignored by base station [1]. Phone also listens for these local > broadcasts. Upon hearing a suprathreshold number of "cop" messages the > phone alerts its owner. > > Better than a radar detector for emissionless, but visible, cops. Over > the hill coverage. Issues of > spoofing, trust, consensus familiar to readers here. > > [1] (different band entirely? UWB? B-tooth? FRS? ) Nice idea, but it won't ever achieve a critical mass of adoptees. Oinking one's headlights to signify the presense of a cop in waiting is a well established convention unlikely to be replaced by complicated technology. People who want to play with gizmos to avoid becoming revenue sources will buy radar detectors (unless they live in places like VA, where it is illegal to possess radar detection devices.) -MW- From rah at shipwright.com Wed Sep 18 19:42:33 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 18 Sep 2002 22:42:33 -0400 Subject: [dgc.chat] First public release of NeuDist Distributed Transaction Clearing Framework Message-ID: --- begin forwarded text From nobody at dizum.com Wed Sep 18 17:10:06 2002 From: nobody at dizum.com (Nomen Nescio) Date: Thu, 19 Sep 2002 02:10:06 +0200 (CEST) Subject: Cryptogram: Palladium Only for DRM Message-ID: <140466041fb1e3741465979d3c9b3ca4@dizum.com> Peter Biddle writes: > Pd is designed to fail well - failures in SW design shouldn't result in > compromised secrets, and compromised secrets shouldn't result in a BORE > attack. Could you say something about the sense in which Palladium achieves BORE ("break once run everywhere") resistance? It seems that although Palladium is supposed to be able to provide content security (among other things), a broken Palladium implementation would allow extracting the content from the "virtual vault" where it is kept sealed. In that case the now-decrypted content can indeed run everywhere. This seems to present an inconsistency between the claimed strength of the system and the description of its security behavior. This discrepancy may be why Palladium critics like Ross Anderson charge that Microsoft intends to implement "document revocation lists" which would let Palladium systems seek out and destroy illicitly shared documents and even programs. Some have claimed that Microsoft is talking out of both sides of its mouth, promising the content industry that it will be protected against BORE attacks, while assuring the security/privacy community that the system is limited in its capabilities. If you could clear up this discrepancy that would be helpful. Thanks... --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From virus_alert at nucleus.com Thu Sep 19 01:46:11 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Thu, 19 Sep 2002 02:46:11 -0600 Subject: VIRUS ALERT! - Undeliverable mail--"language" Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: File 'href.pif' has a forbidden name Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From postmaster at algebra=2Ecom Thu Sep 19 01:46:11 2002 From: postmaster at algebra=2Ecom (postmaster) Date: Thu, 19 Sep 2002 02:46:11 -0600 Subject: Undeliverable mail--"language" Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 5198 bytes Desc: not available URL: From cmooneyqi at prodigy.net Wed Sep 18 20:54:52 2002 From: cmooneyqi at prodigy.net (Candace H. Mooney) Date: Thu, 19 Sep 2002 03:54:52 +0000 Subject: XMASS Special Offer -Gucci or Louis Vuitton products 39k Message-ID: <1032407692.5838@prodigy.net> Dear cypherpunks at jfet.org http://spodiiike.com What is Prestige Replica store? At Prestige Replica, we specialize in the sales of brand-name quality, luxury replicas at some of the lowest prices possible. With our large selection of products, you can be sure to find that perfect gift for yourself or a loved one. Visit Prestige Replica Shop! http://spodiiike.com From SweepsGame at sweepsgame.com Thu Sep 19 06:03:27 2002 From: SweepsGame at sweepsgame.com (Sweepsgame.com) Date: Thu, 19 Sep 2002 06:03:27 -0700 (PDT) Subject: FREE Money for College! Message-ID: <200209191303.GAA90561@s3068.mb00.net> Dear Member, Why have more than a million families already joined Upromise? Answer: FREE MONEY FOR COLLEGE. As education costs continue to rise, families need to save more for college than ever before. Now there's a revolutionary new way to save. It's called Upromise. When you join Upromise for free , America's leading companies such as Exxon, Mobil, Toys"R"Us, AT&T, McDonald's, General Motors, Border's Books & MusicR and many others will contribute a portion of what you spend with them into a college savings account for someone you love. ______________________________________________________________ TO JOIN UPROMISE FOR FREE click http://www.ppmtrac.com/tk/128/cypherpunks at minder.net AOL Users Click Here ______________________________________________________________ SAVINGS EXAMPLES *Here are just a few examples of how much Upromise could help you save (over 15 years): Spend about $600/mo. on credit cards -- save $2,000 for college Buy three new cars -- save $800 for college Average $50 a month dinig out -- save $1,600 for college Spend roughly $25/mo. on long distance calls -- save $325 for college Shop online (average of $50/mo.) -- save $800 for college Membership is free. No catch. No member card. No fees. No hassles. And these are just five out of hundreds of ways you can save for college with Upromise. Start adding to your college savings right now. It only takes minutes to join for free, and the college savings keep coming. Day after day. Year after year. I look forward to welcoming you to Upromise. Best regards, Michael Bronner Founder TO JOIN UPROMISE FOR FREE click http://www.ppmtrac.com/tk/128/cypherpunks at minder.net AOL Users Click Here *Specific terms and conditions apply for each company's contributions. Potential savings based on 15 years of spending with Upromise contributing companies, with contributions invested and yielding an 8% annual return. This illustration does not reflect costs and fees associated with investments, which are subject to risk of loss. Actual results may vary. <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> * To remove yourself from this mailing list, point your browser to: http://i.mb00.net/remove?Sweepsgame:* * Enter your email address (cypherpunks at minder.net) in the field provided and click "Unsubscribe". The mailing list ID is "Sweepsgame:*". OR... * Forward a copy of this message to Sweepsgame at reply.mb00.net with the word remove in the subject line. This message was sent to address cypherpunks at minder.net X-PMG-Recipient: cypherpunks at minder.net <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> <<<>>> pmguid:1rp.34my.18wkw From remailer at aarg.net Thu Sep 19 11:13:44 2002 From: remailer at aarg.net (AARG! Anonymous) Date: Thu, 19 Sep 2002 11:13:44 -0700 Subject: Cryptogram: Palladium Only for DRM Message-ID: <5b9574400cbfe73a1332d380392fcd83@aarg.net> Lucky Green wrote: > AARG! Wrote: > > In addition, I have argued that trusted computing in general > > will work very well with open source software. It may even > > be possible to allow the user to build the executable himself > > using a standard compilation environment. > > What AARG! is failing to mention is that Microsoft holds that Palladium, > and in particular Trusted Operating Root ("nub") implementations, are > subject to Microsoft's DRM-OS patent. Absent a patent license from > Microsoft, any individual developer, open source software development > effort, and indeed any potential competitor of Microsoft that wishes to > create a Palladium-like TOR would do so in violation of Microsoft's > patent. U.S. Patent law takes a dim view of such illegal infringers: > willful infringers, in particular infringers that generate a profit from > their creation of a non-Microsoft version of a TOR face the risk of a > court ordering such infringers to pay treble damages. That's too bad. Trusted computing is a very interesting technology with many beneficial uses. It is a shame that Microsoft has a patent on this and will be enforcing it, which will reduce the number of competing implementations. Of course, those like Lucky who believe that trusted computing technology is evil incarnate are presumably rejoicing at this news. Microsoft's patent will limit the application of this technology. And the really crazy people are the ones who say that Palladium is evil, but Microsoft is being unfair in not licensing their patent widely! > As of this moment, Microsoft has not provided the open source community > with a world-wide, royalty-free, irrevocable patent license to the > totality of Microsoft's patents utilized in Palladium's TOR. Since open > source efforts therefore remain legally prohibited from creating > non-Microsoft TORs, AARG!'s lauding of synergies between Palladium and > open source software development appears premature. Well, I was actually referring to open source applications, not the OS. Palladium-aware apps that are available in source form can be easily verified to make sure that they aren't doing anything illicit. Since the behavior of the application is relatively opaque while it is protected by Palladium technology, the availability of source serves as an appropriate balance. But it does appear that Microsoft plans to make the source to the TOR available in some form for review, so apparently they too see the synergy between open (or at least published) source and trusted computing. > > [1] A message from Microsoft's Peter Biddle on 5 Aug 2002; > > unfortunately the cryptography archive is missing this day's > > messages. "The memory isn't encrypted, nor are the apps nor > > the TOR when they are on the hard drive. Encrypting the apps > > wouldn't make them more secure, so they aren't encrypted." > > In the interest of clarity, it probably should be mentioned that any > claims Microsoft may make stating that Microsoft will not encrypt their > software or software components when used with Palladium of course only > applies to Microsoft and not to the countless other software vendors > creating applications for the Windows platform. UNLESS Microsoft means that the architecture is such that it does not support encrypting applications! The wording of the statement above seems stronger than just "we don't plan on encrypting our apps at this time". There are a couple of reasons to believe that this might be true. First, it is understood that Palladium hashes the secure portions of the applications that run. This hash is used to decrypt data and for reporting to remote servers what software is running. It seems likely that the hash is computed when the program is loaded. So the probable API is something like "load this file into secure memory, hash it and begin executing it." With that architecture, it would not work to do as some have proposed: the program loads data into secure memory, decrypts it and jumps to it. The hash would change depending on the data and the program would no longer be running what it was supposed to. This would actually undercut the Palladium security guarantees; the program would no longer be running code with a known hash. Second, the Microsoft Palladium white paper at http://www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp describes the secure memory as "trusted execution space". This suggests that this memory is designed for execution, not for holding data. The wording hints at an architectural separation between code and data, when in the trusted mode. > Lastly, since I have seen this error in a number of articles, it seems > worth mentioning that Microsoft stated explicitly that increasing the > security of DRM schemes protecting digital entertainment content, but > not executable code, formed the impetus to the Palladium effort. Further reason to believe that Palladium's architecture may not support the encryption of executable code. From brean98 at hotmail.com Thu Sep 19 20:14:07 2002 From: brean98 at hotmail.com (brean98 at hotmail.com) Date: Thu, 19 Sep 2002 11:14:07 -1600 Subject: Fwd: Re: Making money the RIGHT way! 30191 Message-ID: <00007d7844e6$00002c0c$000026cc@dateda.com> Do you know...? That it is EASY to make from $7,000-$10,000 per month as a Loan Officer? If you thought that in order to be a Mortgate Loan Officer, you had to Graduate from College, be Certified, Licensed or Bonded. . . Think Again! -> You can Start your own Home-Based Mortgage Loan Business with our Extensive Step-by-Step Training Program. -> Learn Our Exclusive - Response PROVEN - Method for Putting $7,000 - $10,000 in YOUR Bank Account every Month. -> Make Nation-Wide Mortgage Loans over the Internet in the Comfort of your Own Home. -> Sell Loans for HUGE Profits with NO out of Pocket Expense -> Take advantage NOW of the Lowest Interest Rates in OVER 50 years! Click Below NOW for all the details! "http://61.129.68.54/loanoriginators/index.php?Aff=2" OR you can also Cut & Paste the above link in your browser window. This message is coming to you as a result of an Opt-in Relationship our Clients have had with you. If you simply wish to be Removed from all future Messages, then CLICK BELOW "http://61.129.68.54/loanoriginators/remove/remove.html" From calvin at notrix.ch Thu Sep 19 12:07:23 2002 From: calvin at notrix.ch (calvin at notrix.ch) Date: Thu, 19 Sep 2002 12:07:23 Subject: Time:12:07:23 PM Message-ID: <20020919120031.SM01260@html> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6147 bytes Desc: not available URL: From maria66 at wowmail.com Thu Sep 19 21:01:29 2002 From: maria66 at wowmail.com (MARIA) Date: Thu, 19 Sep 2002 21:01:29 Subject: BRAND NEW CREDIT FILE!! Message-ID: <200209200401.g8K41Pr36561@locust.minder.net> Dear Friend, We have got some great news for you... Finally, you can be approved for a brand new luxury car or dream house !!! With a BRAND NEW CREDIT FILE !! This is not credit repair. This is what the Government & the major Credit Bureaus do not want you to know !!! We will show you how to establish a brand new credit file that has absolutely no connection to your past credit history. We will also show you how to keep your two credit files from merging with one another. And the best part is that Everyone Qualifies!!! Bankruptcy, Foreclosure, Car repo, it does not matter. Your existing credit file will be invisible to your future lenders. Many honest people have suffered financial set backs due to sudden illness, job loss, divorce & unforseen legal problems. These financial set backs often result in the loss of a good credit rating & even bankruptcy. This makes it next to impossible to start over & qualify for major necessary purchases such as a car or home. Why wait the 7 to 10 years for your existing credit file to clean itself up. This process of achieving AAA credit, with your new credit file, takes less than 30 days & not only is this 100% LEGAL, it is your RIGHT !!! Everyone makes mistakes. Perhaps you had a car repo, a foreclosure, gone through a divorce or got stuck with thousands of dollars in hospital bills. It is no longer necessary to be punished for situations that were out of your control. You do not have to be penalized for this. This is your second chance. Not only does this new credit file program work in the U.S., Canada & the United Kingdom but in over 17 countries as well... Discover the loophole in the credit system !!! Get that new car or home now... For more FREE info, click here... http://beam.to/creditfile Yours truly, MARIA MORA Hey- I'm *not* spamming you. You are in my address book because we were introduced via Target opt mail list. However, if you wish to discontinue, please click on the email link below and in the subject area type in remove and you'll be instantly removed from my address book. maria66 at wowmail.com From jamesd at echeque.com Thu Sep 19 21:15:38 2002 From: jamesd at echeque.com (James A. Donald) Date: Thu, 19 Sep 2002 21:15:38 -0700 Subject: Cryptogram: Palladium Only for DRM In-Reply-To: <5b9574400cbfe73a1332d380392fcd83@aarg.net> Message-ID: <3D8A3E7A.911.833809C@localhost> -- On 19 Sep 2002 at 11:13, AARG! Anonymous wrote: > Of course, those like Lucky who believe that trusted > computing technology is evil incarnate are presumably > rejoicing at this news. Microsoft's patent will limit the > application of this technology. And the really crazy people > are the ones who say that Palladium is evil, but Microsoft is > being unfair in not licensing their patent widely! The evil of DRM, like the evils of guns, depends on who has the gun and who has not. If only certain privileged people have guns, and the rest of us are disarmed, then guns are evil indeed. If trusted computing means that certain special people have ring -1 access to my computer, and I do not, and those certain special people are people I do not trust ... --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 9qfOgx4DuD39ZV1os+Mk6SzsJp3A6f8e/S94djUj 41XdHA+e/zdxPCIroQznM5ILiFBEOUSYYagF5KQkb From mugcypherpunks at minder.net Fri Sep 20 00:33:32 2002 From: mugcypherpunks at minder.net (juu3.d_From_John Deposit not returned by TransAmerica?_To_cypherpunks@minder.net) Date: Fri, 20 Sep 2002 03:33:32 -0400 Subject: Deposit not returned by TransAmerica? rbtj Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 753 bytes Desc: not available URL: From ad at ser.com Thu Sep 19 15:11:18 2002 From: ad at ser.com (ad at ser.com) Date: Fri, 20 Sep 2002 06:11:18 +0800 Subject: =?GB2312?B?xvPStdT20KfWrsK3ILHYsbjQ+7Sryta2zg==?= Message-ID: <200209192226.g8JMQls45156@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5511 bytes Desc: not available URL: From k.brown at ccs.bbk.ac.uk Fri Sep 20 04:26:24 2002 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 20 Sep 2002 12:26:24 +0100 Subject: software-defined radio killer app References: <3D88AA8B.271109B9@cdc.gov> Message-ID: <3D8B05E0.8DECC1A7@ccs.bbk.ac.uk> The biggest police station in western Europe is being built less than half a mile from where I live. Your phone will keep on ringing and ringing... "Major Variola (ret)" wrote: > > In some parts of rural america, folks signal the presence of cops by > flashing their headlights > when driving. > > Occurs to me that would be a cool function for SDR: press code for or > say "cop". For N seconds, > phone periodically sends "cop" message picked up by other phones, > ignored by base station [1]. Phone also listens for these local > broadcasts. Upon hearing a suprathreshold number of "cop" messages the > phone alerts its owner. > > Better than a radar detector for emissionless, but visible, cops. Over > the hill coverage. Issues of > spoofing, trust, consensus familiar to readers here. > > [1] (different band entirely? UWB? B-tooth? FRS? ) From wilge001 at consultant.com Fri Sep 20 03:43:14 2002 From: wilge001 at consultant.com (MR. GEORGE WILLIAMS.) Date: Fri, 20 Sep 2002 12:43:14 +0200 Subject: CALL FOR HELP... Message-ID: <200209201044.g8KAiefu002178@ak47.algebra.com> Dear C.E.O, It is my humble pleasure to write this letter irrespective of th fact that you do not know me. However, I came to know of you in my private search for a reliable and trustworthy person that can handle a confidential transaction of this nature in respect to our investment plans in real estate. Though I know that a transaction of this magnitude will make any one apprehensive and worried, but I am assuring you that all will be well at the end of the day. Let me start by first, introducing myself properly to you. I am MR. GEORGE WILLIAMS., a Branch Manager at one of the Zenith Commercial Bank Nigeria Plc, Lagos. A foreigner, Late Nicholas Owen, a Civil Engineer/Contractor with the federal Government of Nigeria, until his death three years ago in a ghastly air crash, banked with us here at the Zenith Commercial Bank PLC, Lagos. He had a closing balance of USD$46.7M (Fourty Six Million,Seven Hundred Thousand United States Dollars) which the bank now unquestionably expects to be claimed by any of his available foreign next of kin. Or, alternatively be donated to a discredited trust fund for arms and ammunition at a military war college here in Nigeria. Fervent valuable efforts made by the Zenith Bank to get in touch with any of late Nicholas Owens next of kin (he had no known wife and children) has been unsuccessful. The management under the influence of our chairman and board of directors, are making arrangement for the fund to be declared "UNCLAIMABLE " and then be subsequently donated to the trust fund for Arms and Ammunition which will further enhance the course of war in Africa and the world in general. In order to avert this negative development. Myself and some of my trusted colleagues in the bank, now seek for your permission to have you stand as late Nicholas Owens next of kin. So that the fund (USD$46.7M), would be subsequently transferred and paid into your bank account as the beneficiary next of kin through our overseas corresponding bank. All documents and proves to enable you get this fund have been carefully worked out and we are assuring you a 100% risk free involvement. Your share would be 30% of the total amount. While the rest would be for me and my colleagues for purchase of properties in your country through you/your Company. If this proposal is OK by you, then kindly get to me immediately via my e-mail wilge002 at accountant.r.com furnishing me with your most confidential telephone, fax and e-mail, so I can forward to you the relevant details of this transaction. Thank you in advance for your anticipated cooperation. Best Regards. MR. GEORGE WILLIAMS. Branch Manager, Zenith Comm. Bank Plc. From juicy at melontraffickers.com Fri Sep 20 13:06:16 2002 From: juicy at melontraffickers.com (A.Melon) Date: Fri, 20 Sep 2002 13:06:16 -0700 (PDT) Subject: [BrinWorld] Store spycam witnesses beating Message-ID: Woman wanted for child abuse after store spycam witnesses beating: http://www.cnn.com/2002/US/Midwest/09/20/video.child.beating/index.html SOUTH BEND, Indiana (CNN) -- The woman caught on videotape seemingly beating her 4-year-old daughter in the parking lot of a Kohl's Department Store in Mishawaka, Indiana, is wanted in Texas for skipping a court date -- on charges that she shoplifted from a Kohl's in Fort Worth, Texas. Police are searching for Madelyne Gorman Toogood, 25, identified by authorities as the woman seen in the videotape repeatedly striking her daughter, Martha, after putting the little girl in a van. Police said Toogood is from Texas, where she was arrested on March 27 and charged with shoplifting from the Kohl's store in Fort Worth, according to Fort Worth Police Lt. Jesse Hernandez. A spokeswoman from the Tarrant County district attorney's office said that a warrant was issued for Toogood's arrest when she missed a May 9 court date. Mishawaka, Indiana, Police Chief Anthony Hazen said Toogood's sister, identified as Margaret Dailey, has been arrested and charged with failing to report child abuse. Dailey was also seen in the video, police said. Hazen said authorities are "optimistic that we will find this young girl and her mother." Maggie Jones, deputy prosecuting attorney for St. Joseph County, said the sister was "not cooperating," and her office was considering filing felony charges against her for assisting a criminal. Battery charges against Toogood are expected to be filed later Friday, Jones said. If convicted, Toogood would face a maximum of three years in prison. Hazen said police are "very worried about the child," who appears in the video to receive several blows that "could have caused severe trauma." The beating occurred last Friday, when a surveillance camera recorded two women -- identified by police as Toogood and her sister -- walking with two small children as they departed Kohl's department store in Mishawaka, near the state's northern border with Michigan. The women had attempted to return several items, but were refused and were asked to leave, said Hazen. "The suspect became angry, and left the store," the chief said. "I believe (store personnel) followed them out through the camera system and witnessed the incident." As the camera tracked them from the store to a 2002 white Toyota Sequoia SUV in the parking lot, one of the women -- identified by police as Toogood -- placed her 4-year-old daughter in a rear seat. The woman, wearing blue jeans and a T-shirt, her blond hair in a ponytail, looked around the parking lot and -- for about 25 seconds -- shook the girl and hit her in the face. "You can see the woman grab one of the girl's ponytails and forcibly shake her," Jones said. "Not even counting all of the blows we saw the woman make, that constitutes battery." Using the videotape, police traced the vehicle to the woman's family and impounded it. Jones said family members told her the girl was one of the woman's three children. But the woman's relatives have been "less than cooperative" in helping authorities locate the girl, Jones said. The sister, who has not been identified by name, "claims not to know where her sister is," Jones said. Authorities also said they had spoken with Toogood's husband, who had not led them to his wife. It was not clear if the two live together. "I've been in police work over 20 years, and I've never seen such a horrendous attack on a small child," said Mike Samp, assistant chief of the Mishawaka Police Department. Samp said the family members told authorities the woman had left the state. But he was not persuaded. "My hunch is that she's still here. That's why we're continuing to pursue this so vigorously." Authorities have urged anyone with information about how to find the woman or the girl to call the Mishawaka police at (574) 258-1684. "It made me sick to think that that child is still with that mother and, quite frankly, if the mother is willing to do that in a public parking lot, what is she doing at home?" Jones asked. "Our immediate concern ... is to locate the child and get the child out of the environment." CNN Correspondent Gary Tuchman contributed to this report. From ptrei at rsasecurity.com Fri Sep 20 11:32:14 2002 From: ptrei at rsasecurity.com (Trei, Peter) Date: Fri, 20 Sep 2002 14:32:14 -0400 Subject: cybersecurity proclamations vs. specific-application security Message-ID: > Major Variola (ret)[SMTP:mv at cdc.gov] wrote: > > > Instead of protecting the whole net, those responsible for > 'critical' services should be held responsible for their app. > > Use an air-gap, your refinery/dam/etc control doesn't > need to be online. > > If you must use networking for critical stuff (air traffic, medical > insurance > transactions) then use VPNs. And good policies. > Use several independent upstream providers if > reliability is important too, as it usually is. Tracert is your friend. > > Use caching DNS proxies if you worry about DNS-root attacks. > > Hold the managers of the 'critical' domains responsible. > Let them hire security folks who'll do gedanken et al. attacks > and learn to beef up their stuff. > > Its a *lot* easier to focus on specific 'critical' domains and > strengthen them than to whine and proclaim from D.C. about > the 'infrastructure' > > Perhaps fed tax breaks on fees paid to security folks > would help. And tax breaks on equiptment security upgrades. > Create/enforce tort laws so that when folks screw up security, > they pay. > > <\rant> > > At 07:33 AM 9/20/02 -0700, Declan McCullagh wrote: > >Previous Politech message: > > > >"Defense hawks bash White House report, want new laws, regulations" > >http://www.politechbot.com/p-03999.html > > > >James Lewis was one of the two CSISers I quoted in that article as > wanting more laws. [...] OR Make corporations financially liable if they fail to provide a service due to a cyberattack. Their insurance firms will then start to require standards in a much more diverse and flexible way than legislation would. This is similar to how bank vault and safe standards were improved during the last century. Peter Trei From tcmay at got.net Fri Sep 20 14:54:45 2002 From: tcmay at got.net (Tim May) Date: Fri, 20 Sep 2002 14:54:45 -0700 Subject: Found Object at Party: Knife/pliers multi-tool Message-ID: <9314C349-CCE3-11D6-B0D4-0050E439C473@got.net> I found a stainless steel locking pliers multi-tool behind my ice chest on my deck. Someone probably used it at the party as a bottle opener and forgot it was there. Perhaps it was left on the lid of the ice chest and it rolled off in the semi-darkness when someone else opened the lid. It's one of the models made by one of these vendors: Leatherman, SOG, Gerber, Buck, etc. Describe the brand and/or how it operates, opens, etc. and I'll hold it for you or make other arrangements for you to get it back. Comment on the meeting,/party: I counted about 50 people at one time or another, peaking at about 40 during the late afternoon indoor session. A lot of people I'd never met, nor heard of. (If someone lost the multi-tool and doesn't read Cypherpunks, oh well, think of it as Darwin's blade, now mine.) Thanks to all for making for such a great meeting and later party! --Tim May "To those who scare peace-loving people with phantoms of lost liberty, my message is this: Your tactics only aid terrorists." --John Ashcroft, U.S. Attorney General From eugen at leitl.org Fri Sep 20 11:13:03 2002 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 20 Sep 2002 20:13:03 +0200 (CEST) Subject: Bit Commitment Blues Message-ID: [via SomeMailingList] http://home.datawest.net/staym/commit.html Bit Commitment Blues by Mike Stay You think I got zero knowledge, But I know you done me wrong. Just commit to me baby, So's I can sing a happier song! One bit of commitment, That's all I really need, So send me your hashed answer And the random seed. I got the bit commitment, bit commitment blues. I got the (thump thump hmmm...) bit commitment blues. I ain't oblivious, darlin', And honey, I ain't blind. Don't need sublim'nal channels To read your cheatin' mind. I'll share a secret with you: I know you hand out a public key. But why's it to the apartment That you're sharin' with me? I got the bit commitment, bit commitment blues. I got the (thump thump hmmm...) bit commitment blues. You say you love me, baby, But you flirt with other guys. You say you want me, honey, But I see you wink your eye. You say you need me, Alice, Now forgive me if I sob; You know my name is Charlie, So quit hangin' out with Bob! I got the bit commitment, bit commitment blues. I got the (thump thump hmmm...) bit commitment blues. From kgygsexxykimpetxerson at arabia.com Fri Sep 20 20:22:35 2002 From: kgygsexxykimpetxerson at arabia.com (Karen) Date: Fri, 20 Sep 2002 23:22:35 -0400 Subject: SLOPPY PUSSY XHERE epa Message-ID: <200209210328.g8L3SYr50667@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2003 bytes Desc: not available URL: From calvin at notrix.ch Fri Sep 20 22:26:12 2002 From: calvin at notrix.ch (Beca) Date: Sat, 21 Sep 2002 01:26:12 -0400 Subject: adv adult: stolen college diary Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3244 bytes Desc: not available URL: From morlockelloi at yahoo.com Sat Sep 21 03:35:39 2002 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Sat, 21 Sep 2002 03:35:39 -0700 (PDT) Subject: Found Object at Party: Knife/pliers multi-tool In-Reply-To: <9314C349-CCE3-11D6-B0D4-0050E439C473@got.net> Message-ID: <20020921103539.50704.qmail@web40605.mail.yahoo.com> > I found a stainless steel locking pliers multi-tool behind my ice chest > on my deck. Someone probably used it at the party as a bottle opener The black spot on the side that looks like a screw head is actually a camera. ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Finance - Get real-time stock quotes http://finance.yahoo.com From blancw at cnw.com Sat Sep 21 08:32:04 2002 From: blancw at cnw.com (Blanc) Date: Sat, 21 Sep 2002 08:32:04 -0700 Subject: Random Privacy In-Reply-To: <20020921150854.GD764@cypher.net> Message-ID: Said Greg Vassie: >> "Right now, the rate of falsification on Web surveys is extremely high," >> says Dr Ann Coavoukian, the commissioner of information and privacy in >> Ontario, U.S.A. "People are lying and vendors don't know what is >>false [or what is] accurate, so the information is useless." > >As a resident of Ontario, Canada, I'm quite surprised to learn that >Ontario has been annexed by the United States. .................. Heh-heh: the author must be lying. .. Blanc From emc at artifact.psychedelic.net Sat Sep 21 10:25:31 2002 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 21 Sep 2002 10:25:31 -0700 (PDT) Subject: Random Privacy In-Reply-To: <5C538DDE-CD7F-11D6-B0D4-0050E439C473@got.net> from "Tim May" at Sep 21, 2002 09:29:54 AM Message-ID: <200209211725.g8LHPWc07342@artifact.psychedelic.net> Tim wrote: > Not a new idea. Ted Nelson (IIRC) wrote about using coin flips to > randomize AIDS poll questions. ("Have you engaged in unprotected sex?" > Flip a coin and XOR it with your actual answer.) I remember talking to > Eric Hughes, Phil Salin, and others around 1990-91 about this. [snip] > The idea is that the > pollee XORs his answer with a random bit. His answer then doesn't > _implicate_ him, but overall statistics can still be deduced from a > large enough sample. Uh, excuse me?! I can see how such an idea works if you add a random variable with a known mean to the data. A researcher could do this before storing the data, in order to protect the confidentiality of individual respondents, and still be able to compute aggregate statistics. However, if you XOR a bit with a random bit, you have something equally likely to be in either state. Even a large collection of yes/no responses XORed with random bits is indistinguishable from random data. So I am afraid I must give the prior message my coveted "Silliest Thing Said On the Internet This Week" award. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From tcmay at got.net Sat Sep 21 10:29:16 2002 From: tcmay at got.net (Tim May) Date: Sat, 21 Sep 2002 10:29:16 -0700 Subject: Random Privacy In-Reply-To: <5C538DDE-CD7F-11D6-B0D4-0050E439C473@got.net> Message-ID: On Saturday, September 21, 2002, at 09:29 AM, Tim May wrote: > Not a new idea. Ted Nelson (IIRC) wrote about using coin flips to > randomize AIDS poll questions. ("Have you engaged in unprotected sex?" > Flip a coin and XOR it with your actual answer.) I remember talking to > Eric Hughes, Phil Salin, and others around 1990-91 about this. > > (However, IBM is probably busily copyrighting their new invention, > just as Intel copyright their recent "invention" of the anonymous > remailer.) > I meant "patented" in both cases. Part of the continuing idiocy of our patent system, when obvious prior art going back more than a decade counts for nothing in the blizzard of patents. --Tim May From tcmay at got.net Sat Sep 21 10:44:56 2002 From: tcmay at got.net (Tim May) Date: Sat, 21 Sep 2002 10:44:56 -0700 Subject: Random Privacy In-Reply-To: <5C538DDE-CD7F-11D6-B0D4-0050E439C473@got.net> Message-ID: On Saturday, September 21, 2002, at 09:29 AM, Tim May wrote: > On Saturday, September 21, 2002, at 02:16 AM, Blanc wrote: > >> Interesting little article from >> http://pass.maths.org.uk/issue21/news/random_privacy/index.html: >> >> Excerpt: >> How old are you? How much do you earn? >> > > Not a new idea. Ted Nelson (IIRC) wrote about using coin flips to > randomize AIDS poll questions. ("Have you engaged in unprotected sex?" > Flip a coin and XOR it with your actual answer.) I remember talking to > Eric Hughes, Phil Salin, and others around 1990-91 about this. > > (BTW, as you probably know or can imagine, there have been crypto > methods proposed for safeguarding certain kinds of data collection, > e.g., schemes using "random coin flip protocols" for answering > questions > like "Are you homosexual?" (supposedly "useful" for public health > planners trying to deal with HIV/AIDS issues. The idea is that the > pollee XORs his answer with a random bit. His answer then doesn't > _implicate_ him, but overall statistics can still be deduced from a > large enough sample.lawmakers will try to take us down the first path. > " Cordian correctly points out that merely XORing with a random bit gives the same statistics as the random bit(s). Now that I think about it, I recollect the proposal was something along these lines: Alice is confronted with a question with a yes or no answer. She flips a coin. If the outcome is "H," she answers the question honestly. If the outcome is "T," she then flips another coin and gives that outcome as her answer. Half the population of pollees is ostensibly answering honestly, the other half is randomizing. No particular person can be linked to an answer. More sophisticated versions, as I recall, had more complicated series of coin tosses (to reduce "noise"). --Tim May From gbroiles at parrhesia.com Sat Sep 21 11:22:23 2002 From: gbroiles at parrhesia.com (Greg Broiles) Date: Sat, 21 Sep 2002 11:22:23 -0700 Subject: Random Privacy In-Reply-To: Message-ID: <5.1.0.14.2.20020921111453.0452ddd0@bivens.parrhesia.com> At 02:16 AM 9/21/2002 -0700, Blanc wrote: >But researchers at IBM think they have the solution. They have developed an >ingenious method to protect our privacy, while still giving companies the >information they crave. That doesn't sound like a solution to me - they haven't provided anything to motivate people to answer honestly, nor do they address the basic problem, which is relying on the good will and good behavior of the marketers - if a website visitor is unwilling to trust a privacy policy which says "We'll never use this data to annoy or harm you", they're likely to be unimpressed with a privacy policy which says "We'll use fancy math tricks to hide the information you give us from ourselves." That's not going to change unless they move the randomizing behavior off of the marketer's machine and onto the visitor's machine, allowing the visitor to observe and verify the correct operation of the privacy technology .. which is about as likely as a real audit of security-sensitive source code, where that likelihood is tiny now and shrinking rapidly the closer we get to the TCPA/Palladium nirvana. So, no, fancy tricks won't solve the basic problem, which is that once you give information to other people, you've got no control over what they do with it. -- Greg Broiles -- gbroiles at parrhesia.com -- PGP 0x26E4488c or 0x94245961 From remailer at aarg.net Sat Sep 21 13:15:18 2002 From: remailer at aarg.net (AARG! Anonymous) Date: Sat, 21 Sep 2002 13:15:18 -0700 Subject: Random Privacy Message-ID: Greg Broiles wrote about randomizing survey answers: > That doesn't sound like a solution to me - they haven't provided anything > to motivate people to answer honestly, nor do they address the basic > problem, which is relying on the good will and good behavior of the > marketers - if a website visitor is unwilling to trust a privacy policy > which says "We'll never use this data to annoy or harm you", they're > likely to be unimpressed with a privacy policy which says "We'll use > fancy math tricks to hide the information you give us from ourselves." > > That's not going to change unless they move the randomizing behavior > off of the marketer's machine and onto the visitor's machine, > allowing the visitor to observe and verify the correct operation of > the privacy technology .. which is about as likely as a real audit of > security-sensitive source code, where that likelihood is tiny now and > shrinking rapidly the closer we get to the TCPA/Palladium nirvana. On the contrary, TCPA/Palladium can solve exactly this problem. It allows the marketers to *prove* that they are running a software package that will randomize the data before storing it. And because Palladium works in opposition to their (narrowly defined) interests, they can't defraud the user by claiming to randomize the data while actually storing it for marketing purposes. Ironically, those who like to say that Palladium "gives away root on your computer" would have to say in this example that the marketers are giving away root to private individuals. In answering their survey questions, you in effect have root privileges on the surveyor's computers, by this simplistic analysis. This further illustrates how misleading is this characterization of Palladium technology in terms of root privileges. From mv at cdc.gov Sat Sep 21 13:23:21 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 21 Sep 2002 13:23:21 -0700 Subject: All your canadians are belong to us Message-ID: <3D8CD539.1D585D8E@cdc.gov> At 11:08 AM 9/21/02 -0400, Greg Vassie wrote: >> says Dr Ann Coavoukian, the commissioner of information and privacy in >> Ontario, U.S.A. "People are lying and vendors don't know what is false [or > >As a resident of Ontario, Canada, I'm quite surprised to learn that >Ontario has been annexed by the United States. Ontario, California? From wolf at priori.net Sat Sep 21 13:43:57 2002 From: wolf at priori.net (Meyer Wolfsheim) Date: Sat, 21 Sep 2002 13:43:57 -0700 (PDT) Subject: All your canadians are belong to us In-Reply-To: <3D8CD539.1D585D8E@cdc.gov> Message-ID: On Sat, 21 Sep 2002, Major Variola (ret) wrote: > At 11:08 AM 9/21/02 -0400, Greg Vassie wrote: > >> says Dr Ann Coavoukian, the commissioner of information and privacy > in > >> Ontario, U.S.A. "People are lying and vendors don't know what is > false [or > > > >As a resident of Ontario, Canada, I'm quite surprised to learn that > >Ontario has been annexed by the United States. > > Ontario, California? No, Ontario, Canada: http://www.ipc.on.ca/ http://www.cfp2002.org/advisoryboard/cavoukian.shtml -MW- From rah at shipwright.com Sat Sep 21 11:35:24 2002 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 21 Sep 2002 14:35:24 -0400 Subject: Random Privacy In-Reply-To: <20020921163227.GA50792@lightship.internal.homeport.org> References: <20020921150854.GD764@cypher.net> <20020921163227.GA50792@lightship.internal.homeport.org> Message-ID: At 12:32 PM -0400 on 9/21/02, Adam Shostack wrote: > | > Ontario, U.S.A. "People are lying and vendors don't know what is >false [or > | > what is] accurate, so the information is useless." > | > | As a resident of Ontario, Canada, I'm quite surprised to learn that > | Ontario has been annexed by the United States. > > Randomized geography. :) Ontario, California? Of course, California is another country. :-). Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Sat Sep 21 15:49:52 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 21 Sep 2002 15:49:52 -0700 Subject: [BrinWorld] precrime squad in Del: more pigs needing killing Message-ID: <3D8CF790.4813E01E@cdc.gov> WILMINGTON, Del. -- The city police department's Corner Deployment Unit is known as the "jump-out squad" for bursting out of vehicles to question and search suspects. Its officers also are known for something else: snapping photos of suspects they stop, even those they don't arrest. City officials defend the practice as a legal and effective part of fighting drug dealing and street crime. Critics say it violates the constitutional rights of innocent people. In an era when surveillance cameras peer from buildings and parking lots, courts have ruled that people can't expect privacy in public places. Civil libertarians argue that police photographing people they don't arrest is a different matter. "There's no authority to forcibly photograph someone and enter them into a database when they have committed no crime," said Barry Steinhardt, associate director of the American Civil Liberties Union. "I'm not aware of any other municipal police department that has engaged in this type of behavior," he said. Wilmington Mayor James Baker describes such criticism as "blithering idiocy," saying police take pains to protect the rights of law-abiding citizens while targeting people "who are killing our neighborhoods, who are killing our people." City officials deny police are photographing individuals they believe are likely to commit crimes. Some media reports have compared the technique to "Minority Report," a recent science fiction movie in which police identify criminals before they commit crimes. "It's not a Gestapo technique, it's not anything other than a progressive means of policing an urban environment," said police spokesman Cpl. Stephen Martelli. Among other things, the photos can serve as proof that a person arrested for loitering received other warnings. They also are kept as "possible evidence for ongoing investigations," authorities said. Police Chief Michael Szczerba said his department has taken photographs of suspects for years without complaints. It's "highly improbable" that innocent people were caught up in the stops, he said. According to city officials, 658 people were stopped and questioned between June, when the jump-out squad's "Operation Bold Eagle" began, and last week. Among them, 546 were arrested, and 708 charges were filed. Police believe the other 112 are involved in criminal activity, even if officers didn't find enough evidence that day to arrest them. Drewry Fennell, executive director of the ACLU's Delaware chapter, argues that shouldn't matter. "Their criminal histories are not relevant to their rights to move freely about on the street," Fennell said. The ACLU is considering a lawsuit but, so far, no one has come forward with a formal complaint, he said. City officials have met with ACLU, NAACP and Urban League representatives to hear their concerns, and another meeting is scheduled Wednesday. In crime-troubled neighborhoods, some residents have welcomed the camera-toting police. "I would rather have innocent people's pictures taken than innocent people shot," said Barbara Washam, who joined a rally last week to support the police. Mayor Baker said the photo policy doesn't violate the Constitution or the U.S. Supreme Court's 1968 decision in Terry v. Ohio that police may stop and frisk people if they have reasonable suspicion they are engaged in criminal activity. The state attorney general and chief federal prosecutor for Delaware agreed that Wilmington police appear to be acting within the law. But others disagree, saying the Terry decision allows police only to briefly detain and question suspects. "They can't use Terry as a pretext to go out and gather a photographic database of suspects," said professor Phyllis Bookspan, who teaches constitutional criminal procedure at Widener University. City officials say officers exercise discretion. On a recent Friday night at a corner reeking of alcohol, the squad frisked and questioned six men while investigating suspected drug dealing. Patrol Officer George Collins questioned one of the men, then pulled a digital camera from his pocket and asked if he could take his picture. "Can I ask why you're doing this to me?" replied the man, who showed identification and told police he just was walking to the store. "If you're not a criminal, you don't have anything to worry about," Collins answered. "It's for future reference." Satisfied with the identification, Collins pocketed his camera without snapping a photo. "He was a resident, so I gave him the option," Collins explained. http://www.latimes.com/news/nationworld/wire/sns-ap-police-photos0921sep21(0,7774923).story?coll=sns%2Dap%2Dnationworld%2Dheadlines ----- Got Osama? From mv at cdc.gov Sat Sep 21 16:20:24 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 21 Sep 2002 16:20:24 -0700 Subject: all your .gov netadmins are belong to us Message-ID: <3D8CFEB8.7BE5197@cdc.gov> Wouldn't it be cool if a paki gunman shows up at a .gov NOC, just like he did at the CIA some years back? http://www.securitynewsportal.com/cgi-bin/cgi-script/csNews/csNews.cgi?database=JanR.db&command=viewone&id=122&op=t VeriSign Inc has stopped providing access to information about the .gov internet domain, which is restricted to US government bodies, over concerns the data could be used in planning internet attacks, ComputerWire has learned. On September 16, the company posted a notice on its web site saying that from September 13 (three days earlier) it would no longer provide FTP access to the so-called "zone file" for .gov, which contains the IP addresses of all the name servers that point to .gov domains. Ken Silva, VeriSign's director of networks and security, told ComputerWire the company had removed access to information "of potential value to hackers", and that the decision was made "in conjunction with" the General Services Administration, which administers the .gov zone file. Silva pointed out that while VeriSign manages the .com, .org and .net zone files, and continues to make those available to those willing to enter a no-cost agreement with the company, it does not run .gov, and merely made the data available as a free informational service. Malicious hackers wanting to take down government web sites would hypothetically be able to do so by denial-of-service attacking the name servers associated with .gov domains. It was not immediately clear if the .gov zone file data is made available in bulk from other sources, but the GSA does not seem to do so. Also removed from the FTP site was the zone file for in-addr.arpa, which is used for reverse-DNS lookups (when somebody wants to find out what domain is associated with an IP address, rather than the other way around) It seems so logical to take that .gov WHOIS info offline that you have to wonder why it wasn't done last year. After all, who really needs to do WHOIS look ups on government sites except hackers, mail spammers that are harvesting government email addresses and fearful folks who like checking where the IP's of mysterious visitors to their web sites originate from... I wonder whether the same will be done for the .edu and .mil which also are prime targets.. From mv at cdc.gov Sat Sep 21 16:26:47 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 21 Sep 2002 16:26:47 -0700 Subject: [HereticalCode] DeCSS Redux: DVDSynth Message-ID: <3D8D0037.A2C7AE88@cdc.gov> Summary DVDSynth is an open platform for developing various "virtual devices," particularly virtual CD/DVD-ROM drives and virtual discs to put in them. One of the most interesting things it can do is apply filters to physical devices in the system. Filters can change the contents of a CD or DVD in arbitrary ways on the fly. This early release of DVDSynth contains only the filtering support together with the following three filters: DVD subtitler: This filter effectively adds a new subtitle track to a DVD, by inserting new data into the MPEG stream and updating the various navigation pointers on the fly. Since it works at the device-driver level, it's compatible with all software and hardware DVD players. It comes with a fairly sophisticated subtitle rendering engine which supports asynchronous overlapping subtitles in multiple fonts and colors, fade-in and fade-out, the full Unicode character set, vertical Japanese "sidetitles," etc. Unrestrict DVD: This filter removes various usage restrictions from a DVD, including region lockout, APS (Macrovision), and disabled fast-forwarding, menu call, angle change, and so forth. SCSI protocol spy: This lets you monitor the SCSI commands and data passing to and from your drive, in the tradition of such utilities as FileMon, RegMon and Spy++. It's useful for debugging, and interesting to watch if you're curious. http://www.roundelay.net/dvdsynth/prerelease.html#download From adam at homeport.org Sat Sep 21 14:07:29 2002 From: adam at homeport.org (Adam Shostack) Date: Sat, 21 Sep 2002 17:07:29 -0400 Subject: Random Privacy In-Reply-To: References: Message-ID: <20020921210729.GA53241@lightship.internal.homeport.org> On Sat, Sep 21, 2002 at 01:15:18PM -0700, AARG!Anonymous wrote: | Greg Broiles wrote about randomizing survey answers: | | > That doesn't sound like a solution to me - they haven't provided anything | > to motivate people to answer honestly, nor do they address the basic | > problem, which is relying on the good will and good behavior of the | > marketers - if a website visitor is unwilling to trust a privacy policy | > which says "We'll never use this data to annoy or harm you", they're | > likely to be unimpressed with a privacy policy which says "We'll use | > fancy math tricks to hide the information you give us from ourselves." | > | > That's not going to change unless they move the randomizing behavior | > off of the marketer's machine and onto the visitor's machine, | > allowing the visitor to observe and verify the correct operation of | > the privacy technology .. which is about as likely as a real audit of | > security-sensitive source code, where that likelihood is tiny now and | > shrinking rapidly the closer we get to the TCPA/Palladium nirvana. | | | On the contrary, TCPA/Palladium can solve exactly this problem. It allows | the marketers to *prove* that they are running a software package that | will randomize the data before storing it. And because Palladium works | in opposition to their (narrowly defined) interests, they can't defraud | the user by claiming to randomize the data while actually storing it | for marketing purposes. No, it allows security geeks to talk about proof. My mom stil won't get it. Pd doesn't allow you to prove that there's no sniffer doing other things with the data, that nothing is logged at the wrong time, etc If you really want to randomize the data, do it close to me. Or better yet, run some software from Credentica and accept a proof of whatever data is in question. But the reality is that people hand over most of their data now. So why would I invest in this expensive technology? (Mike Freedman, Joan Feigenbaum, Tomas Sander and I did a paper which touches on the power imbalance between the companies that offer DRM technology and their customers...same analysis applies here... http://www.homeport.org/~adam/privacyeng-wspdrm01.pdf ) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From cypherpunks at htmmx.com Sat Sep 21 02:47:53 2002 From: cypherpunks at htmmx.com (cypherpunks at htmmx.com) Date: Sat, 21 Sep 2002 17:47:53 +0800 Subject: ŮȨ滰ʾ Message-ID: <200209210948.g8L9mBr16316@locust.minder.net> Ů��Ȩ�滰������ʾ� ---------��֤�ֵ�351100�� ��������ѡ�еĴ𰸺�ķ����ڴ򡰡̡�����___����д�� �� λ__________________________________________________________________ ͨѶ��ַ��_______��____________·_______________��_____________________�� ��ϵ��________________ ְ ��____________________ �� ��_________ ��ϵ�绰______________________ �� ��_________________________________ ����Ϊ��������ͥ���Ƿ�������Ϊ���ģ� �ǡ� ��� ��һ���� ����Ϊ�й����Ӷ�Ů�Դ�ŮĤ�����ӳ̶ȣ� ���ӡ� �����ӡ� һ��� ����Ϊδ��Ů�Ӵ�ŮĤ����Ŀ������ǣ� �����˶��� ��ǰ����Ϊ�� ��ʱ��Ϸ��Ӳ����ˣ��� ������ �����Դ�ŮĤȱ�ݡ� ���Ե�ǰ�����޲���ŮĤ�Ŀ����� �۸�2000Ԫ���ϣ�ƫ�ߡ� �۸����С� �������ա� ���Խ��ܡ� ���ܽ��ܡ� �������촦ŮĤ�Ŀ����� �۸�230Ԫͳһ���ۼۣ�ƫ�ߡ� �۸����С� û�з��ա� ���Խ��ܡ� ���ܽ��ܡ� ���Ƿ�֪��ʥŮ����º����촦ŮĤ�� �ǡ� ��� ���Ǵ�ʲô�ط�֪��ʥŮ����º죿 ������־�� �����̵�� �����Ѵ��� ������ ���Ƿ������������º��Ʒ�� �������������� û����� �����û�����ж��� ���Ƿ�׼������ʥŮ����º죿 ����� ����� ���󹺡� ���Ƿ�Ը��ӦƸ��ΪʥŮ����º��ֱ��Ա�� �ǡ� ��� ���Ƿ�Ը����ʥŮ����º���������̣� �ǡ� ��� �������ʥŮ����º��Ӫ���߻��ж��ؼ�����������飬�볩�����ԣ� ____________________________________________________________________ ____________________________________________________________________ ��лл�����ṩ�ı�����������ĸ������Ͼ��Ա��ܣ�����ͬ�Ⲣ��дͨѶ��ϸ��ַ�� �ʱࡢ�����ˣ�����Ѽ�ȥ��һ��ֻ��Ů�˵��ź��������������� ������ڴ����Ĺ��٣���˾���Կ����г���Ӫ���߻�������µĿͻ�������߶���� �����ɷ���Ա��д�� ��λ��____________________ ��ϵ�ˣ�_______________�ʱࣺ__________ ͨ�ŵ�ַ��______________________________________________________________ ��ϵ�绰��______________________ �� ����__________________________ �����Ừ�г��о���˾�ʾ���� E--mail:diho at 263.net �����ʾ����ߣ�0594---2366446 E--mail:anyxp at sina.com From guest at guest.com Sat Sep 21 02:56:48 2002 From: guest at guest.com (guest) Date: Sat, 21 Sep 2002 17:56:48 +0800 Subject: =?GB2312?B?xa7Q1Mio0ua7sMzitfey6c7Kvu0=?= Message-ID: <200209210956.g8L9umr16699@locust.minder.net> 女性权益话题调查问卷 ---------闽证字第351100号 ●请您在选中的答案后的方格内打“√”或在___处填写。 单 位__________________________________________________________________ 通讯地址:_______市____________路_______________街_____________________号 联系人________________ 职 务____________________ 邮 编_________ 联系电话______________________ 手 机_________________________________ 您认为当今社会家庭中是否以男子为中心: 是□ 否□ 不一定□ 您认为中国男子对女性处女膜的重视程度: 重视□ 不重视□ 一般□ 您认为未婚女子处女膜破损的可能性是: 剧烈运动□ 婚前性行为□ 儿时游戏(硬物挫伤)□ 手淫□ 先天性处女膜缺陷□ 您对当前手术修补处女膜的看法: 价格(2000元以上)偏高□ 价格适中□ 手术风险□ 可以接受□ 不能接受□ 您对人造处女膜的看法: 价格(230元统一零售价)偏高□ 价格适中□ 没有风险□ 可以接受□ 不能接受□ 您是否知道圣女・贞德红人造处女膜? 是□ 否□ 您是从什么地方知道圣女・贞德红? 报刊杂志□ 保健商店□ 从朋友处□ 其他□ 您是否想过求助于贞德红产品? 曾经这样做过□ 没想过□ 想过但没付诸行动□ 您是否准备购买圣女・贞德红? 购买□ 不买□ 待后购□ 您是否愿意应聘成为圣女・贞德红的直销员? 是□ 否□ 您是否愿意做圣女・贞德红区域代理商? 是□ 否□ 如果您对圣女・贞德红的营销策划有独特见解或其他建议,请畅所欲言! ____________________________________________________________________ ____________________________________________________________________ ●谢谢您所提供的宝贵意见,您的个人资料绝对保密,若您同意并填写通讯详细地址、 邮编、收信人,将免费寄去“一封只给女人的信函”请您“玉”览。 ●真诚期待您的光临,公司将对开拓市场、营销策划提出创新的客户,给予高额奖励。 以下由访问员填写: 单位:____________________ 联系人:_______________邮编:__________ 通信地址:______________________________________________________________ 联系电话:______________________ 手 机:__________________________ 福建贯华市场研究公司问卷设计 调查问卷热线:0594---2331103 E--mail:diho at 263.net E--mail:anyxp at sina.com From guest at guest.com Sat Sep 21 03:03:58 2002 From: guest at guest.com (guest) Date: Sat, 21 Sep 2002 18:03:58 +0800 Subject: =?GB2312?B?xa7Q1Mio0ua7sMzitfey6c7Kvu0=?= Message-ID: 女性权益话题调查问卷 ---------闽证字第351100号 ●请您在选中的答案后的方格内打“√”或在___处填写。 单 位__________________________________________________________________ 通讯地址:_______市____________路_______________街_____________________号 联系人________________ 职 务____________________ 邮 编_________ 联系电话______________________ 手 机_________________________________ 您认为当今社会家庭中是否以男子为中心: 是□ 否□ 不一定□ 您认为中国男子对女性处女膜的重视程度: 重视□ 不重视□ 一般□ 您认为未婚女子处女膜破损的可能性是: 剧烈运动□ 婚前性行为□ 儿时游戏(硬物挫伤)□ 手淫□ 先天性处女膜缺陷□ 您对当前手术修补处女膜的看法: 价格(2000元以上)偏高□ 价格适中□ 手术风险□ 可以接受□ 不能接受□ 您对人造处女膜的看法: 价格(230元统一零售价)偏高□ 价格适中□ 没有风险□ 可以接受□ 不能接受□ 您是否知道圣女・贞德红人造处女膜? 是□ 否□ 您是从什么地方知道圣女・贞德红? 报刊杂志□ 保健商店□ 从朋友处□ 其他□ 您是否想过求助于贞德红产品? 曾经这样做过□ 没想过□ 想过但没付诸行动□ 您是否准备购买圣女・贞德红? 购买□ 不买□ 待后购□ 您是否愿意应聘成为圣女・贞德红的直销员? 是□ 否□ 您是否愿意做圣女・贞德红区域代理商? 是□ 否□ 如果您对圣女・贞德红的营销策划有独特见解或其他建议,请畅所欲言! ____________________________________________________________________ ____________________________________________________________________ ●谢谢您所提供的宝贵意见,您的个人资料绝对保密,若您同意并填写通讯详细地址、 邮编、收信人,将免费寄去“一封只给女人的信函”请您“玉”览。 ●真诚期待您的光临,公司将对开拓市场、营销策划提出创新的客户,给予高额奖励。 以下由访问员填写: 单位:____________________ 联系人:_______________邮编:__________ 通信地址:______________________________________________________________ 联系电话:______________________ 手 机:__________________________ 福建贯华市场研究公司问卷设计 调查问卷热线:0594---2331103 E--mail:diho at 263.net E--mail:anyxp at sina.com From eugen at leitl.org Sat Sep 21 13:23:25 2002 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 21 Sep 2002 22:23:25 +0200 (CEST) Subject: Random Privacy In-Reply-To: Message-ID: On Sat, 21 Sep 2002, R. A. Hettinga wrote: > Ontario, California? You will laugh, but some unattentive air travellers sometimes confuse these two :) > Of course, California is another country. :-). From mdfreelifetimesex at Rapworld.com Sat Sep 21 23:06:23 2002 From: mdfreelifetimesex at Rapworld.com (daohNatasha) Date: Sat, 21 Sep 2002 23:06:23 -0700 Subject: lqu Message-ID: <200209220604.g8M64fr68357@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2940 bytes Desc: not available URL: From remailer at remailer.xganon.com Sat Sep 21 21:14:22 2002 From: remailer at remailer.xganon.com (Anonymous) Date: Sat, 21 Sep 2002 23:14:22 -0500 Subject: Cypherpunks and Irish Travellers Message-ID: <5e0fdc13808f6e2d5c639c5b25076904@remailer.xganon.com> Terrific article below about the "Irish Travellers", an inbred gypsy-like society which has decades of practice in anonymity, multiple identities, secret languages, fake IDs, and other cypherpunk-like practices. They live in trailer parks and make their living with home improvement scams and various frauds, just like many cypherpunks. They even reside in towns with names like White Settlement. I thought that was Tim May's house! Read on for a glimpse of the future of cypherpunk culture... Woman videotaped hitting child has local ties By MELODY McDONALD Star-Telegram Staff Writer FORT WORTH - The woman captured on videotape beating a child in an Indiana department store parking lot last week is believed to be an Irish Traveller with ties to the Fort Worth area. Madelyne Gorman, 25, also known as Madelyn Toogood, has been the subject of a nationwide search since Indiana law enforcement authorities distributed copies of the videotape to the media earlier this week. Gorman, who is believed to be affiliated with a Traveller group in White Settlement and Fort Worth known as the Greenhorn Carrolls, is also wanted on unrelated warrants in White Settlement and Fort Worth, authorities said. Irish Travellers are descendants of a nomadic ethinic group that came to the U.S. in the 1800s to escape the potato famine, roaming the country by horse and wagon in search of itinerant work. Shiny trucks and travel-trailers now carry them to the nation's distant corners and unassuming places like White Settlement. They are devout Roman Catholics who share biblical names, marry within the group and speak their own dialect. Most of the men make their living in home-improvement and business-repair work, such as paving, painting and roofing. Law enforcement authorities said some scam their clients in the process. Joe Livingston, a senior agent with the South Carolina Law Enformcemnt Division who has investigated Travellers for 18 years, said there are various subclans of Irish Travellers around the cournty. "In Texas, they are the Greenhorn Carrolls. The South Carolina Travellers are known as the Georgia Boys. In Memphis, they are known as the Mississippi travellers. This girl appears to be a branch of Texas." "How many are there?" he asked. "Who knows." The Greenhorn Travellers -- the Carrolls, Gormans, McDonalds, Daleys and Jennings -- found themselves in the spotlight in January 2000 when five of their young members were killed in a wreck on Interstate 30 in Fort Worth. The accident -- one of the worst in city history -- shocked the public. Questions arose when authorities learned that none of the boys was older than 14 and four of them were carrying false driver's licenses misrepresenting their ages. After the accident, some Traveller families withdrew their children from area schools. Victims' families met with investigators only once. Livingston, who is researching the Madelyne Gorman case, said he has discovered that Gorman has driver's licenses in Indiana, Missiouri, Texas and New Jersey. Computer searches reveal she has listed addresses in Mission and Fort Worth; Elkhart, Ind.; and Independence, Mo., among others. "This again, shows the transiency of these people," said Livingston, who said he received a call from an informant Friday morning about the case. "My guy says they've gone underground. They're not going to find this girl." In addition to the arrest warrant out of Indiana, Gorman is wanted in White Settlement and Fort Worth for unrelated crimes. In White Settlement, a warrant was issued for Gorman's arrest on April 9 after she failed to pay a $202 traffic ticket. According to the city's municipal court clerk, Gorman received a citation for no driver's license on Dec. 12, 2001, in the 1400 block of south Cherry Lane. The following month, Fort Worth police issued a warrant for Gorman's arrest after she failed to appear in court to face theft charges, said Lt. Mack West, of the Tarrant County Sheriff's Department. According to a computer records and a Fort Worth police report, Gorman and another woman, Rose Ann Carroll, were arrested March 27 at a Kohls department store in Fort Worth on charges of theft $50 to $500. From virus_alert at nucleus.com Sun Sep 22 02:45:56 2002 From: virus_alert at nucleus.com (virus_alert at nucleus.com) Date: Sun, 22 Sep 2002 03:45:56 -0600 Subject: VIRUS ALERT! - Hello,congratulations Message-ID: THE FOLLOWING IS AN AUTOMATED SECURITY ALERT FROM NUCLEUS INC. A message or attachment that was sent to you was tested prior to delivery and found to contain a virus. As a result, it was NOT delivered to you. A message sent to you by e.taylor at nucleus.com The suspicious attachment has been removed from the original message. Scan report: File 'color.scr' has a forbidden name Specific details regarding a virus can be found at the following links: http://www.f-secure.com/v-descs/ http://www.symantec.com/avcenter/vinfodb.html http://www.avp.ch/avpve/ http://csrc.ncsl.nist.gov/virus/ NOTE: This message is being sent from an automated, unattended account. Please read the information links supplied in this email to find out more about the particular virus you have received. If you have further questions, please email support at nucleus.com. Nucleus, Inc. http://www.nucleus.com/ -------------- next part -------------- An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 38 URL: From BOBBRY at cfibmail=2Ecom Sun Sep 22 02:45:56 2002 From: BOBBRY at cfibmail=2Ecom (BOBBRY) Date: Sun, 22 Sep 2002 03:45:56 -0600 Subject: Hello,congratulations Message-ID: A non-text attachment was scrubbed... Name: not available Type: multipart/mixed Size: 24949 bytes Desc: not available URL: From bdsexxy52x8464.358902633.3 at campaign.reply.tm0.com Sun Sep 22 06:09:38 2002 From: bdsexxy52x8464.358902633.3 at campaign.reply.tm0.com (Dana) Date: Sun, 22 Sep 2002 09:09:38 -0400 Subject: dripping Xtwat bicpr Message-ID: <200209221315.g8MDFkr87325@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1991 bytes Desc: not available URL: From nobody at dizum.com Sun Sep 22 02:30:09 2002 From: nobody at dizum.com (Nomen Nescio) Date: Sun, 22 Sep 2002 11:30:09 +0200 (CEST) Subject: Cypherpunks and Irish Travellers Message-ID: <6442d8b8a26d21deb48b9bd131406020@dizum.com> >another woman, Rose Ann Carroll, were arrested March 27 at a Kohls >department store in Fort Worth on charges of theft $50 to $500. I wasn't follownig the news ... they didn't get Osama, did they ? From vvlyfreelifetimesex at PuertoRicoWow.com Sun Sep 22 12:24:08 2002 From: vvlyfreelifetimesex at PuertoRicoWow.com (xwrNatasha) Date: Sun, 22 Sep 2002 12:24:08 -0700 Subject: Hey ypyvq Message-ID: <200209221922.g8MJMNr09588@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2354 bytes Desc: not available URL: From shamrock at cypherpunks.to Sun Sep 22 14:27:08 2002 From: shamrock at cypherpunks.to (Lucky Green) Date: Sun, 22 Sep 2002 14:27:08 -0700 Subject: Best Windows XP drive encryption program? Message-ID: <000201c2627e$dcd8c3f0$6501a8c0@VAIO650> What are folks' recommendations here for drive encryption programs under Windows XP? Must encrypt the entire hard drive, loading before the OS, and support NTFS. I am in particular interested in first-hand experiences. Thanks, --Lucky Green From k_furkan at hotmail.com Sun Sep 22 05:11:23 2002 From: k_furkan at hotmail.com (GREENCARD 2004 EKLN KAIRMAYIN) Date: Sun, 22 Sep 2002 15:11:23 +0300 Subject: greencard 2004 ekiliini karmayn Message-ID: <200209221210.g8MCASv04775@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 259 bytes Desc: not available URL: From cypherpunks at htmmx.com Sun Sep 22 01:28:13 2002 From: cypherpunks at htmmx.com (cypherpunks at htmmx.com) Date: Sun, 22 Sep 2002 16:28:13 +0800 Subject: ŮȨ滰ʾ Message-ID: <200209220828.g8M8Svr74919@locust.minder.net> Ů��Ȩ�滰������ʾ� ---------��֤�ֵ�351100�� ��������ѡ�еĴ𰸺�ķ����ڴ򡰡̡�����___����д�� �� λ__________________________________________________________________ ͨѶ��ַ��_______��____________·_______________��_____________________�� ��ϵ��________________ ְ ��____________________ �� ��_________ ��ϵ�绰______________________ �� ��_________________________________ ����Ϊ��������ͥ���Ƿ�������Ϊ���ģ� �ǡ� ��� ��һ���� ����Ϊ�й����Ӷ�Ů�Դ�ŮĤ�����ӳ̶ȣ� ���ӡ� �����ӡ� һ��� ����Ϊδ��Ů�Ӵ�ŮĤ����Ŀ������ǣ� �����˶��� ��ǰ����Ϊ�� ��ʱ��Ϸ��Ӳ����ˣ��� ������ �����Դ�ŮĤȱ�ݡ� ���Ե�ǰ�����޲���ŮĤ�Ŀ����� �۸�2000Ԫ���ϣ�ƫ�ߡ� �۸����С� �������ա� ���Խ��ܡ� ���ܽ��ܡ� �������촦ŮĤ�Ŀ����� �۸�230Ԫͳһ���ۼۣ�ƫ�ߡ� �۸����С� û�з��ա� ���Խ��ܡ� ���ܽ��ܡ� ���Ƿ�֪��ʥŮ����º����촦ŮĤ�� �ǡ� ��� ���Ǵ�ʲô�ط�֪��ʥŮ����º죿 ������־�� �����̵�� �����Ѵ��� ������ ���Ƿ������������º��Ʒ�� �������������� û����� �����û�����ж��� ���Ƿ�׼������ʥŮ����º죿 ����� ����� ���󹺡� ���Ƿ�Ը��ӦƸ��ΪʥŮ����º��ֱ��Ա�� �ǡ� ��� ���Ƿ�Ը����ʥŮ����º���������̣� �ǡ� ��� �������ʥŮ����º��Ӫ���߻��ж��ؼ�����������飬�볩�����ԣ� ____________________________________________________________________ ____________________________________________________________________ ��лл�����ṩ�ı�����������ĸ������Ͼ��Ա��ܣ�����ͬ�Ⲣ��дͨѶ��ϸ��ַ�� �ʱࡢ�����ˣ�����Ѽ�ȥ��һ��ֻ��Ů�˵��ź��������������� ������ڴ����Ĺ��٣���˾���Կ����г���Ӫ���߻�������µĿͻ�������߶���� �����ɷ���Ա��д�� ��λ��____________________ ��ϵ�ˣ�_______________�ʱࣺ__________ ͨ�ŵ�ַ��______________________________________________________________ ��ϵ�绰��______________________ �� ����__________________________ �����Ừ�г��о���˾�ʾ���� E--mail:diho at 263.net �����ʾ����ߣ�0594---2366446 E--mail:anyxp at sina.com From sandy at repnet.dk Sun Sep 22 18:55:59 2002 From: sandy at repnet.dk (Sandra Delgado) Date: Sun, 22 Sep 2002 21:55:59 -0400 Subject: Felicidades!!!! Message-ID: <200209230150.g8N1otr27830@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3161 bytes Desc: not available URL: From offermanager at giftdvd.com Mon Sep 23 01:31:38 2002 From: offermanager at giftdvd.com (DVD Confirmation) Date: Mon, 23 Sep 2002 04:31:38 -0400 Subject: fwd: DVD Player Give Away. Message-ID: <200209230831.g8N8VbXV011519@oo167.md009.com> Your friend has send you this offer. Forward this to your friends! ------------------------------------------------------- View unlimited DVDs. A free membership for those who love movies. -------------------------------------------------------- Dream comes true. Win a DVD Player. -------------------------------------------------------- Your trial is completely at no cost, and you can cancel anytime, for any reason, with no obligation. http://www.giftdvd.com/cgi-bin/offer.cgi?affid=940 (ZERO SHIPPING valid to U.S. citizens only.) -------------------------------------------------------- Win a F.R.E.E DVDs Player. No shipping, No cost. -------------------------------------------------------- Signup for F.R.E.E and enter to win a DVD player. Your trial is totally F.R.E.E, and you can cancel anytime, for any reason, with no obligation. http://www.giftdvd.com/cgi-bin/offer.cgi?affid=937 -------------------------------------------------------- Why buy retail? Win a DVD Player -------------------------------------------------------- Your F-r-e-e trial is not a dream. Grab your favorite moviews in DVD now! http://www.giftdvd.com/cgi-bin/offer.cgi?affid=939 (Offer with NO SHIPPING valid to U.S. residents only) Patricia GiftDVD.com Customer Support offermanager at giftdvd.com ------------------------------------------------------- This Tell-a-Friend service is available at GifvDVD.com To invite your friends to join GiftDVD, visit: http://www.giftdvd.com/cgi-bin/offer.cgi?affid=913 To unsubscribe, email: unsubscribe at giftdvd.com To make suggestions, email: offermanager at giftdvd.com ------------------------------------------------------- From marketing at cd-uk.net Mon Sep 23 03:27:20 2002 From: marketing at cd-uk.net (Computer Developments UK) Date: Mon, 23 Sep 2002 11:27:20 +0100 Subject: Take Your Pick before the 30th September! Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3755 bytes Desc: not available URL: From mv at cdc.gov Mon Sep 23 11:52:57 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 23 Sep 2002 11:52:57 -0700 Subject: wiretapping Message-ID: <3D8F6309.42452464@cdc.gov> "You see this?" the Libyan said. "This was created by an enemy of God. This has blown many operations and has caused more arrests than you can imagine. Why do you think the brothers in Germany got arrested? With this. When they were talking, the others were listening.... It's nice, you can communicate. It's fast, but it causes big problems. They made it, and they know how to intercept it." http://www.latimes.com/news/nationworld/world/la-fg-chatter23sep23.story COLUMN ONE Chilling 'Chatter' of Jihad Wiretaps of an Al Qaeda cell in Italy reveal not only possible missed signals of attacks but a glimpse at a world of angry, adrift extremists. By SEBASTIAN ROTELLA, TIMES STAFF WRITER MILAN, Italy -- They knew the police were spying on them, but they needed to talk. So the members of the Al Qaeda cell often met in a car. They thought the police were unlikely to bug the car. From kgo.freeadultsites at saintly.com Mon Sep 23 12:26:13 2002 From: kgo.freeadultsites at saintly.com (kuhErica) Date: Mon, 23 Sep 2002 12:26:13 -0700 Subject: Howard Sterns Wackpack GangBang cypherpunks@minder.net dmaqh Message-ID: <200209231923.g8NJNmo14600@locust.minder.net> Dear cypherpunks at minder.net Yes Folks! The unbelieveable has happened! Four members of Howard Sern's infamous WACK PACK have joing foreces and agreet to stick there gnarted malformed cocks into on daring slut! Your are witness to this freakish event known simply as "The Wackpack Gangbang" Check it out for yourself @ http://www.herbalo.com/cgi-bin/jwsshop/jws-track.cgi?ID=herb6662&Site=herbwp We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please go here: http://168.75.161.51/remove-me.asp to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests. gxnoikfxpsjumkuwiyqwea From objectpascal at yahoo.com Mon Sep 23 14:35:11 2002 From: objectpascal at yahoo.com (Curt Smith) Date: Mon, 23 Sep 2002 14:35:11 -0700 (PDT) Subject: Best Windows XP drive encryption program? In-Reply-To: <000201c2627e$dcd8c3f0$6501a8c0@VAIO650> Message-ID: <20020923213511.68824.qmail@web20701.mail.yahoo.com> http://www.drivecrypt.com/dcplus.html DriveCrypt Plus does everything you want. I believe it may have descended from ScramDisk (Dave Barton's disk encryption program). Curt --- Lucky Green wrote: > What are folks' recommendations here for drive encryption > programs under Windows XP? Must encrypt the entire hard > drive, loading before the OS, and support NTFS. I am in > particular interested in first-hand experiences. > > Thanks, > --Lucky Green ===== end eof . New DSL Internet Access from SBC & Yahoo! http://sbc.yahoo.com From jamesd at echeque.com Mon Sep 23 16:34:15 2002 From: jamesd at echeque.com (James A. Donald) Date: Mon, 23 Sep 2002 16:34:15 -0700 Subject: What good are smartcard readers for PCs In-Reply-To: <20020923213511.68824.qmail@web20701.mail.yahoo.com> References: <000201c2627e$dcd8c3f0$6501a8c0@VAIO650> Message-ID: <3D8F4287.12444.21BA71C@localhost> -- The biggest application of smart cards that I know of are anonymous phone minutes. In Australia, I walked into a hardware store in the middle of the back of beyond, and asked the sales kid about a cellular phone for someone who would not be in Australia very long. He promptly urged me to buy a phone that uses one of these cards, pointing out as one of the advantages that I buy the minutes for cash, and that no one would know who was associated with the number, other than those that I wished to know. This guy was a random saleskid in the backblocks of Australia, not a noted cypherpunk poster. Increasingly however, we see smartcard interfaces sold for PCs. What for, I wonder? In general, a smartcard and a PC smartcard interface can be used anywhere where one would use a password, providing greater security and ease of use than mere passwords. By and large, people only care about greater security when the password is protecting money, considerable lumps of money. A huge number of web pages are selling smart card readers for PCs, for example: http://www.drivecrypt.com/dcplus.html Obviously end users are buying this stuff. What are they buying smartcard readers for? So I did a google search for web pages selling "chipdrive extern" (the most popular smartcard interface for PCs) Seems like this is big business -- that huge numbers of these widgets are made and sold. yet most of the web pages seemed curiously vague as to what anyone was buying them for. I clicked on a link that said "current smart card industry news" -- the page was empty. I found another page that advertised : : "The Key to Secure eCommerce" : : : : The eCode solution provides secure remote : : identification and digital signatures for : : e-banking, telephone and mobile banking and other : : application where secure identification is needed. : : : : The eCode system offers user authentication, user : : authorisation, data integrity, data : : confidentiality and non-repudiation. A related web page says : : Argos Mini is a cost-efficient smart card reader for : : the mass market and applications like Internet : : Banking, Telecommuting, Access Control, loading : : Electronic Purse, etc. So we are seeing lots of publicity from people selling smart cards readers but curiously little from those applying them to particular purposes. Mondex, as far as I know, sank with very little trace. They seem to have given up attempting to issue electronic money based on smartcards, and instead have become just another company selling smart card readers and software, their biggest contribution being a smartcard operating system that should allow multiple applications to use the same smartcard, so that a smartcard can act both as a purse and keyring, carrying keys to many different things. This seems to imply that so many diverse people are finding uses to for smartcard enabled PCs that one is likely to use a smartcard to interact with security from many independent vendors, just as one is likely to have a lot of unrelated keys on one's keyring. If this is so big, and it does seem to be big, how come I do not know of any applications? The multiplicity of smartcard interface vendors, and the struggle over the problem of using a single smartcard for multiple unrelated purposes, suggests a multitude of widely used purposes, yet I have no purposes. Huge numbers of people must be buying these things, often for multiple independent reasons, yet what are those reasons? What would that kid in Australia buy one of these things for? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG ynBJMlsLDPzg07sL/LvEpB/tIW037sE6ghIofneK 4PVvvjR5R/LHANHsZwHICLtrUdTredEP7JMGYF3vh From ukegbu2002 at yahoo.com Mon Sep 23 19:02:28 2002 From: ukegbu2002 at yahoo.com (DOMiNIC EGBU) Date: ma, 23 sep 2002 19:02:28 Subject: Urgent !!! Message-ID: <200209231645.g8NGjH2i021070@ak47.algebra.com> DOMINIC EGBU Please reply to this e-mail: ukegbu at spinfinder.com SIR, BEFORE I SOLICIT FOR YOUR ASSISTANCE IN THIS MUTAULLY BENEFITING BUSINESS TRANSACTION, FIRSTLY I BRING TO YOU A WARM GREETING OF PROSPERITY AND PROGRESS IN YOUR LIFE ENDEAVORS. MY NAMES ARE DOMINIC EGBU A NATIVE OF SOUTH AFRICA AND A SENIOR EMPLOYEE OF THE SOUTH AFRICAN DEPARTMENT OF MINING AND NATURAL RESOURCES. I AM CURRENTLY HERE IN AMSTERDAM ON A TRADE MISSION. I AM WRITING THIS LETTER TO SOLICIT FOR YOUR CO-OPERATION IN ORDER TO REDEEM AN INVESTMENT INTEREST CURRENTLY BEING HELD UNDER TRUST WITH THE SOUTH AFRICAN DEPARTMENT OF MINING AND NATURAL RESOURCES. THE SAID INVESTMENT NOW VALUED AT US$21.5M UNITED STATES DOLLARS ONLY) WAS ORIGINALLY PURCHASED BY ONE MR. LUCKY GOLDBERG AND LEASED TO THE TRANSVAAL ORANGE MINING CORPORATION IN 1975. SINCE THE MATURITY OF THIS CONTRACT IN SEPTEMBER 1997, SEVERAL ATTEMPTS HAVE BEEN MADE WITHOUT SUCCESS TO CONTACT MR. LUCIO EDWARDS OR ANY OF HIS CLOSE RELATIVES IN WHOSE FAVOUR THE INVESTMENT CASH VALUE CAN BE PAID. MY PARTNER WHO IS THE ACCOUNTS DIRECTOR AT THE DEPARTMENT OF MINING AND TWO OF OUR COLLEAGUES HAVE INITIATED THE PROCESS OF FILLING A CLAIM FOR THIS MONEY, WITH THE HOPE OF HAVING THE FUNDS TRANSFERRED ABROAD. WE REQUEST THAT YOU LET MY PARTNERS FILE A CLAIM FOR THIS MONEY FROM THE SOUTH AFRICAN DEPARTMENT OF MINING AND NATURAL RESOURCES INDICATING THAT YOU WERE APPOINTED BY MR.LUCIO STEVENSON TO BE THE BENEFICIARY OF THIS FUNDS. WHEN THE CLAIMS IS APPROVED, YOU AS THE BENEFICIARY WILL BE PAID THE SUM OF US$21.5M SINCE THE MONEY WILL BE PAID TO ANY BANK OF YOUR CHOICE, YOU HAVE A LIABILITY TO ENSURE THAT MY PARTNERS AND I RECEIVE 75% OF THE TOTAL CONTRACT SUM WHILE 20% WILL BE FOR YOU FOR YOUR ASSISTANCE AND CO-OPERATION. THE REMAINING 5% WILL BE SET ASIDE TO COVER ANY INCIDENTAL EXPENSES, WHICH MAY BE INCURED, BY BOTH PARTIES DURING THIS TRANSACTION. PLEASE YOU ARE ADVISED TO KEEP THIS TRANSACTION AS CONFIDENTIAL AS POSSIBLE BECAUSE WE ARE STILL TOP GOVERNMENT OFFICIALS IN SOUTH AFRICA. I WANT TO ASSURE YOU THAT MY PARTNERS HAVE SET ALL THE MODALITIES TO SEE THAT THIS PAYMENT IS SAFELLY MADE INTO YOUR NOMINATED ACCOUNT PROVIDED YOU CAN GIVE US VERY STRONG GUARANTEE THAT OUR SHARE WILL BE WELL SECURED AND THAT YOU WILL NOT TAKE ADVANTAGE OF OUR POSITION SINCE THE MONEY WILL BE TRANSFERRED DIRECTLY TO A BANK ACCOUNT THAT YOU NOMINATE. BE ALSO ASSURED THAT THERE IS ABSOLUTELY NOTHING TO WORRY ABOUT IN VIEW OF THIS CLAIM. IT IS PERFECTLY SAFE AND RISK FREE. IT IS NOT SUBJECT TO ANY ENQUIRY AS MY PARTNERS WILL BE HANDLING THE CLAIM DIRECTLY IN SOUTH AFRICA ON YOUR BEHALF. I DO HOPE MY PROPOSAL IS ACCEPTABLE TO YOU. PLEASE ACKNOWLEDGE THE RECEIPT OF THIS LETTER SO THAT I CAN BRING YOU INTO A MORE DETAILED PICTURE OF THIS TRANSACTION. WHERE YOU ARE NOT INTERESTED, PLEASE DO HELP US LOOK FOR ANOTHER PARTNER AND DO NOT DISCUSS THIS PROPOSAL WITH ANY BODY. PLEASE REACH ME AT THIS E-MAIL: ukegbu at spinfinder.com YOUR'S TRULLY, DOMINC EGBU From littleant at 21cn.com Tue Sep 24 01:57:39 2002 From: littleant at 21cn.com (С) Date: Tue, 24 Sep 2002 01:57:39 Subject: ײ,˲׿! :- Message-ID: <200209231751.g8NHp8o09505@locust.minder.net> 我真诚地向您推荐一个能赚钱的网站! 是真是假,您看了就知道了! http://www.dirshop.com/mall/index.php?user=luckboy (注:目前域名整合,26号后重新开放!) 但愿我能给您带来好运! From ericm at lne.com Tue Sep 24 08:04:23 2002 From: ericm at lne.com (Eric Murray) Date: Tue, 24 Sep 2002 08:04:23 -0700 Subject: What good are smartcard readers for PCs In-Reply-To: <200209240712.TAA39196@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Tue, Sep 24, 2002 at 07:12:47PM +1200 References: <200209240712.TAA39196@ruru.cs.auckland.ac.nz> Message-ID: <20020924080423.A17929@slack.lne.com> On Tue, Sep 24, 2002 at 07:12:47PM +1200, Peter Gutmann wrote: > "James A. Donald" writes: > > >Increasingly however, we see smartcard interfaces sold for PCs. What for, I > >wonder? A previous company I worked for made a secure smart-card reader chip/system that used smart cards to carry a user's private key and cert. The initial application was the SET electronic payment protocol. (all together now: yuck!) SET didn't take off, and not many of these were sold. Amex hyped up their 'blue' card & was giving out free readers for a while... until they discovered that the drivers were fatally broken (ha ha, it was done by a competitor of the company above, their product was shite). That, plus the fact that Amex couldn't get more than a few merchants to go along with it, doomed the project. They stopped giving out free smartcard readers pretty quickly. The company I work for now uses smart-cards in a K-of-N split key scheme to authenticate administrators of secure proxy servers. These are actually selling to real live customers and work just fine. Niche markets like these are the only place where smart card use will be growing in the near term, unless Larry Ellison and Scott "you have no privacy" McNealy get their fat government contracts for implementing the single signon surveilance state... Eric From moneymaker012389205071 at yahoo.com Tue Sep 24 10:18:54 2002 From: moneymaker012389205071 at yahoo.com (moneymaker012389205071 at yahoo.com) Date: Tue, 24 Sep 2002 10:18:54 -0700 Subject: Refinance Now ..Rates At All Time Low!....... Message-ID: <200209250950.g8P9o8AA013163@ak47.algebra.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 669 bytes Desc: not available URL: From DaveHowe at gmx.co.uk Tue Sep 24 02:49:24 2002 From: DaveHowe at gmx.co.uk (David Howe) Date: Tue, 24 Sep 2002 10:49:24 +0100 Subject: Best Windows XP drive encryption program? References: <20020923213511.68824.qmail@web20701.mail.yahoo.com> Message-ID: <008701c263af$ce48cf60$c71121c2@sharpuk.co.uk> at Monday, September 23, 2002 10:35 PM, Curt Smith was seen to say: > http://www.drivecrypt.com/dcplus.html > DriveCrypt Plus does everything you want. I believe it may > have descended from ScramDisk (Dave Barton's disk encryption > program). It has. Basically, the author of Scramdisk took the NT version, added some XP support, a couple of new algos and launched it as a commercial, closed source product. The boot-time protection was requested repeatedly on the SD usenet forum (with several good discussions of different approaches) and it wasn't much of a surprise that it turned up in the commercial product. Personally, I think it is excellent and completely trustworthy - I just won't use it on principle as I don't run closed-source crypto. I am sticking with my (purchased) copy of SD4NT for now on W2K, and waiting on the SD4Linux project to produce something usable for that boot partition. From jamesd at echeque.com Tue Sep 24 11:38:21 2002 From: jamesd at echeque.com (James A. Donald) Date: Tue, 24 Sep 2002 11:38:21 -0700 Subject: What good are smartcard readers for PCs In-Reply-To: <5.1.1.6.2.20020923225407.04531e70@idiom.com> References: <3D8F4287.12444.21BA71C@localhost> Message-ID: <3D904EAD.30987.E42F8F@localhost> -- James A. Donald> > > Increasingly however, we see smartcard interfaces sold for > > PCs. What for, I wonder? On 24 Sep 2002 at 1:41, Bill Stewart wrote: > I'm not convinced that the number of people selling them is > closely related to the number of people buying; this could be > another field like PKIs where the marketeers and cool > business plans never succeeded at getting customers to use > them. On 24 Sep 2002 at 19:12, Peter Gutmann wrote: > Companies buy a few readers for their developers who write > software to work with the cards. [...] Eventually the > clients discover how much of a bitch they are to work with > [....] users decide to live with software-only crypto until > the smart card scene is a bit more mature. > > Given that n_users >> n_card_vendors, this situation can keep > going for quite some time. I have found that the administrative costs of PKI are intolerable. End users do not really understand crypto, and so will fuck up. Only engineers can really control a PKI certificate, and for the most part they just do not. In principle the thingness of a smartcard should reduce administrative costs to a low level -- they should supposedly act like a purse, a key, a credit card, hence near zero user training required. The simulated thingness created by cryptographic cleverness should be manifested to the user as physical thingness of the card. Suppose, for example, we had working Chaumian digicash. Now imagine how much trouble the average end user is going to get into with backups, and with moving digicash from one computer to another. If all unused Chaumian tokens live in a smartcard, one might expect the problem to vanish. The purselike character of the card sustains the coin like character of Chaumian tokens. Of course if one has to supply the correct driver for the smart card, then the administration problem reappears. USB smartcard interfaces could solve this problem. Just plug them in, and bingo, it should just go. Ummh, wait a moment, go where, do what? What happens when one plugs in a USB smartcard interface? Still, making crypto embodied in smart cards intelligible to the masses would seem to be a soluble problem, even if not yet solved, whereas software only crypto is always going to boggle the masses. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG UpBeNFF1UW7r7Fw8pVMxQG+xJ3mwsngHIp62BxL6 4D+u3ZM5e1JbeYAKaQ4dhOQrlZ42vq05cfz83rnCZ From doe_100| at spinfinder.com Tue Sep 24 15:12:50 2002 From: doe_100| at spinfinder.com (MR NAMBO DOE) Date: Tue, 24 Sep 2002 15:12:50 -0700 Subject: HUMANITARIAN GESTURE Message-ID: <200209242212.g8OMChmT019347@ak47.algebra.com> This letter may come to you as a surprise due to the fact that we have not yet met,but kindly consider the message, because, I am determined to live for posterity. I wish to plead with you to join me in not only serving humanity, but to also benefit in the process. This message could be strange but reality will definitely dawn on you, if you pay some attention to it's contents. I would'nt have notified you but for the sake of your integrity and goodwill.Please accept my sincere apologies. In bringing this message to you, I have to say that I have no intentions of causing you any personal pains or discomfort. I am Nambo Doe the elder brother to the late Liberian President Samuel Doe, who was murdered by the then rebel leader Charles Taylor, now Liberian President. President Samuel Doe, in his bid to fend off rebel insurgency,put in my care, the sum of $12,300,000(twelve million, three hundred thousand dollars) for the purchase of arms and ammunitions, to counter rebel attacks. But unfortunately, we could not purchase these arms before he was killed. This money is still being kept in trunk boxes in a secret location and just the two of us knew about it until he was killed. I could not get in touch with any arms dealer before my brother was killed. I have since held on to these trunk boxes, which I was able to transport out of Liberia with the aid of ECOMOG soldiers/Diplomatic passsage under the guise conveying my personal effects without anybody knowing. I am presently residing in Mhlambanyatsi in Swaziland and work as a consultant on inter-regional cooperation. I have borne the burden for too long. I do not want to keep the funds any longer, but I can never turn it over to the brutal and tyrannical rogue regime of Charkes Taylor, is still comitting all sorts of atrocities on the liberian people. I am not solicitng for your help to wage a war against the regime, but to act as a foreign partner, to allow me transfer the funds to you, and in turn donate a portion of it as humanitarian gesture to the Liberian people by purchasing such essential needs like blankets, milk and so on from the money after deducting your expenses and comission of 20%.Please note that I could have approached the Red Cross Society, but I changed my mind on that after calculating what they would deduct as comission, and also, after rationalising the scandal that followed their mismanagement of the donations meant for the victims of the september 11th attack on the United States. Also note that this offer will give you a double-edged advantage : 1. as the benefactor of the Liberian people and; 2. the comission you stand to earn. On getting a positive response from you, I will send to you the modalities for processing the necessary documenations that will facilitate your securment of the funds from the Security company where the funds are kept for safe keeping. Please note that confidentiality and honesty are fundamental rules in this transaction. Be assured that I am a reputable personality in this country and I am mindful of the legal implications of this transaction, as I intend taking care of all the legal documentations for a successful and hitch-free transaction. You will be expected to take delivery of the consignment, personally from the deposit company in Europe. With the password and informations that I will give you, together with the Power of Attorney, you would then proceed to the security firm, as these will facilitate your collection of the consignment. The consignment containing the USD$12,300,000.00 will be released to you in the two large trunk boxes. I am therefore soliciting your help to have this money collected by you and transfered into your account,as we would give you the neccesary documentations to facilitate your collection of the consignment personally in Europe. ***PLEASE NOTE THAT YOUR CONFIDENTIALITY IN THIS TRANSACTION IS HIGHLY REQUIRED. Thank you very much for your time and understanding. Yours sincerely, Nambo Doe From doe_100 at spinfinder.com Tue Sep 24 15:57:58 2002 From: doe_100 at spinfinder.com (MR NAMBO DOE) Date: Tue, 24 Sep 2002 15:57:58 -0700 Subject: HUMANITARIAN GESTURE Message-ID: <200209242258.g8OMw8Px023453@ak47.algebra.com> This letter may come to you as a surprise due to the fact that we have not yet met,but kindly consider the message, because, I am determined to live for posterity. I wish to plead with you to join me in not only serving humanity, but to also benefit in the process. This message could be strange but reality will definitely dawn on you, if you pay some attention to it's contents. I would'nt have notified you but for the sake of your integrity and goodwill.Please accept my sincere apologies. In bringing this message to you, I have to say that I have no intentions of causing you any personal pains or discomfort. I am Nambo Doe the elder brother to the late Liberian President Samuel Doe, who was murdered by the then rebel leader Charles Taylor, now Liberian President. President Samuel Doe, in his bid to fend off rebel insurgency,put in my care, the sum of $12,300,000(twelve million, three hundred thousand dollars) for the purchase of arms and ammunitions, to counter rebel attacks. But unfortunately, we could not purchase these arms before he was killed. This money is still being kept in trunk boxes in a secret location and just the two of us knew about it until he was killed. I could not get in touch with any arms dealer before my brother was killed. I have since held on to these trunk boxes, which I was able to transport out of Liberia with the aid of ECOMOG soldiers/Diplomatic passsage under the guise conveying my personal effects without anybody knowing. I am presently residing in Mhlambanyatsi in Swaziland and work as a consultant on inter-regional cooperation. I have borne the burden for too long. I do not want to keep the funds any longer, but I can never turn it over to the brutal and tyrannical rogue regime of Charkes Taylor, is still comitting all sorts of atrocities on the liberian people. I am not solicitng for your help to wage a war against the regime, but to act as a foreign partner, to allow me transfer the funds to you, and in turn donate a portion of it as humanitarian gesture to the Liberian people by purchasing such essential needs like blankets, milk and so on from the money after deducting your expenses and comission of 20%.Please note that I could have approached the Red Cross Society, but I changed my mind on that after calculating what they would deduct as comission, and also, after rationalising the scandal that followed their mismanagement of the donations meant for the victims of the september 11th attack on the United States. Also note that this offer will give you a double-edged advantage : 1. as the benefactor of the Liberian people and; 2. the comission you stand to earn. On getting a positive response from you, I will send to you the modalities for processing the necessary documenations that will facilitate your securment of the funds from the Security company where the funds are kept for safe keeping. Please note that confidentiality and honesty are fundamental rules in this transaction. Be assured that I am a reputable personality in this country and I am mindful of the legal implications of this transaction, as I intend taking care of all the legal documentations for a successful and hitch-free transaction. You will be expected to take delivery of the consignment, personally from the deposit company in Europe. With the password and informations that I will give you, together with the Power of Attorney, you would then proceed to the security firm, as these will facilitate your collection of the consignment. The consignment containing the USD$12,300,000.00 will be released to you in the two large trunk boxes. I am therefore soliciting your help to have this money collected by you and transfered into your account,as we would give you the neccesary documentations to facilitate your collection of the consignment personally in Europe. ***PLEASE NOTE THAT YOUR CONFIDENTIALITY IN THIS TRANSACTION IS HIGHLY REQUIRED. Thank you very much for your time and understanding. Yours sincerely, Nambo Doe From pgut001 at cs.auckland.ac.nz Tue Sep 24 00:12:47 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 24 Sep 2002 19:12:47 +1200 (NZST) Subject: What good are smartcard readers for PCs Message-ID: <200209240712.TAA39196@ruru.cs.auckland.ac.nz> "James A. Donald" writes: >Increasingly however, we see smartcard interfaces sold for PCs. What for, I >wonder? Companies buy a few readers for their developers who write software to work with the cards. They may even roll out a few in pilots, and put out a stack of press releases and print brochures advertising how hip they are for using smart cards. Eventually the clients discover how much of a bitch they are to work with (installation problems/buggy drivers/incompatibilities/not having your card when you need it/etc, not helped by the fact that smart card vendor after- sales support is the most client-hostile of any PC hardware type I know of) that users decide to live with software-only crypto until the smart card scene is a bit more mature. Given that n_users >> n_card_vendors, this situation can keep going for quite some time. Peter. From f9ufb at excite.com Tue Sep 24 19:50:32 2002 From: f9ufb at excite.com (Faith Christopher) Date: Tue Sep 24 19:50:32 2002 Subject: Are you in debt? Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5913 bytes Desc: not available URL: From bello.s1 at lycos.com Tue Sep 24 23:19:57 2002 From: bello.s1 at lycos.com (Mr. Bello Sese Seko) Date: Tue, 24 Sep 2002 23:19:57 Subject: I NEED YOUR URGENT RESPONSE/CALL PLEASE? Message-ID: <200209242119.g8OLJqr6011888@ak47.algebra.com> NOTE: PLEASE DIRECT ALL RESPONSE TO EMAIL ACCOUNT CONTAINED IN THIS LETTER FOR CONFIDENTIAL PURPOSE. STRICTLY CONFIDENTIAL FROM: Bello Sese Seko TEL : +31-618-850-030 E-MAIL: bello_seseseko at hotmail.com Attention Please, BUSINESS PARTNERSHIP SOLICITED May I take the privilege to introduce myself; my name is Mr. Bello Sese Seko a brother of the late President of the Federal Republic of Zaire, President Mobutu Sese Seko (now Republic of Congo, under the leadership of the Son of Mr. Laurent Kabila). I am currently under political asylum in the Netherlands. I presume you are aware there is a financial dispute between my family (the Mobutu’s) and the present Civilian Government. Based on what they believe as bad and corrupt Government on my late brother part, May his soul rest in peace. Following the above mentioned reasons, I am soliciting for your humble and confidential assistance to take custody of Fifteen Million,United States Dollars only (US$15M) also to front for me in the area of business investments you desire profitably well. Presently, this Sum of US$15 Million Dollars has secretly been deposited into a confidential security Company, where it can be released to you by the Security Company based on my recommendation on that note; you will be presented as my partner who will be fronting for me and my family in any subsequent ventures. For you might have heard how a lot of my brother’s bank Account has been frozen. To show my preparedness and appreciation to conduct this business with you, I shall give you 25% of the total money and 5% for miscellaneous expense and 10% on any profit realizable in the process of investment of this fund in your country. Please, I need your entire support and co-operation for the success of the business venture, your utmost confidentially, sincerity and secrecy is highly required, due to my family’s present predicament. Details of how I intend to carry out this project will be discussed as soon as I get a response of your willingness and interest. I sincerely will appreciate your urgent acknowledgment as soon as possible by contacting me on my Telephone number:+31-618-850-030 or E-mail address. Thank you. Yours truly, Mr. Bello Sese Seko NOTE: YOUR PHONE NUMBER IS VERY IMPORTANT, AS BUSINESS OF THIS MAGNITUDE AND NATURE IS NOT SUPPOSED TO BE DONE VIA E-MAIL. From IncreaseSales30009 at yahoo.com Wed Sep 25 00:12:40 2002 From: IncreaseSales30009 at yahoo.com (Larry Stepanian) Date: Wed, 25 Sep 2002 03:12:40 -0400 Subject: >>>Last Chance...14.5 MILLION TARGETED EMAIL ADDRESSES...PLUS $2,000 IN FREE SOFTWARE! Message-ID: <200209260050.g8Q0oro87438@locust.minder.net> WOULD YOU LIKE TO HAVE YOUR MESSAGE SEEN BY OVER 14.5 MILLION TARGETED PROSPECTS DAILY? Below is all the information you will ever need to market your product or service over the Internet! If you have a product, service, or message that you would like to get out to Thousands, Hundreds of Thousands, or even Millions of people, you have several options. Traditional methods include print advertising, direct mail, radio, and television advertising. They are all effective, but they all have two catches: They're EXPENSIVE and TIME CONSUMING. Not only that, you only get ONE SHOT at making your message heard by the right people. Now this has all changed! Internet Search Engines Submissions, Classified Ads, Newsgroup Postings simply DO NOT WORK. Thanks to the top programmers in the world and their NEW EMAIL TECHNOLOGY, You can send millions of email messages daily for FREE... Without getting terminated from your current Internet connection! It's very simple to do and you can be increasing your sales within minutes of installing this new extraordinary software! Besides...It's the only real way to advertise on the Internet that works...Period! >>>WE WILL SUPPLY YOU WITH OVER 14.5 MILLION OPT-IN EMAIL ADDRESSES TO GET STARTED RIGHT AWAY! >>>PLUS FREE EMAIL ADDRESS DOWNLOADS FOR ONE FULL YEAR! >>>ALSO YOU WILL RECEIVE $2,000 WORTH OF INTERNET MARKETING SOFTWARE FREE! Including...... EMAIL SENDING SOFTWARE...(send millions of email advertisements daily with a few clicks of your mouse) EMAIL EXTRACTION SOFTWARE...(retreive new targeted email addresses daily hundreds of thousands of them) LIST MANAGEMENT SOFTWARE...(keep your lists clean, opt-in and manage all your remove requests, leads, sales etc...) and much...much more! To find out more information, Do not respond by email. Instead, visit our web site at: http://www.emailbythemillion.com _____________________________________________________ Want to be removed from our list? Simply send an email to us at cybernetremoval at excite.com and type "remove" in the "subject" line and you will be removed from any future mailings. From subscriptions at dietpoll.com Wed Sep 25 00:57:39 2002 From: subscriptions at dietpoll.com (e Diets) Date: Wed, 25 Sep 2002 03:57:39 -0400 Subject: Guaranteed the Fastest way to take off the weight!! Message-ID: <200209250757.g8P7vVIi027353@pp171.cktrk.com> ======================================= This is a confirmation email for your subscription. If you feel you have received this message in error or do not wish to receive future messages, please see the unsubscribe instructions at the bottom of this email. ======================================= Diet Poll, a free membership for latest diet info. Grab great offers today and flush fat away forever! Revolutionary 24-hour weight loss formula! ------------------------------------------------------------ Your F-r-e-e trial is not a dream. Grab your offer while stock last. http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Dream comes true. Win a DVD Player. ------------------------------------------------------------ Great tips and offers, effective diet doesn't need to be difficult. http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Easy Weight lossing Tips ------------------------------------------------------------ Guaranteed the Easiest & Fastest way to take off the weight! http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Diet Poll Subscriptions ======================================= Thank you for being a Diet Poll member. If you no longer wish to be a member and receive our emails, send a remove email to: unsubscribe at dietpoll.com To contact our customer support, email: customerfaq at dietpoll.com ======================================= (c) 2001-2002 Diet Poll LLC. From objectpascal at yahoo.com Wed Sep 25 04:13:41 2002 From: objectpascal at yahoo.com (Curt Smith) Date: Wed, 25 Sep 2002 04:13:41 -0700 (PDT) Subject: Best Windows XP drive encryption program? In-Reply-To: <013c01c263c5$a1cd7920$c71121c2@sharpuk.co.uk> Message-ID: <20020925111341.37651.qmail@web20701.mail.yahoo.com> You are correct, I screwed up. They were both co-hosted at: http://www.scramdisk.clara.net/ The site was updated and is authorship is very clear. --- David Howe wrote: > As an aside - Dave Barton? Shaun Hollingworth was the author > of SD as far as I know. I can't remember exactly, but seem to > recall Dave Barton did a delphi wrapper around some of the SD > function calls... ===== end eof . New DSL Internet Access from SBC & Yahoo! http://sbc.yahoo.com From subscriptions at dietpoll.com Wed Sep 25 01:26:55 2002 From: subscriptions at dietpoll.com (e Diets) Date: Wed, 25 Sep 2002 04:26:55 -0400 Subject: Diet works. As Seen On CNN! Sept 21- 28 only. Message-ID: <200209250826.g8P8Pq5Y004583@pp167.cktrk.com> ======================================= This is a confirmation email for your subscription. If you feel you have received this message in error or do not wish to receive future messages, please see the unsubscribe instructions at the bottom of this email. ======================================= Diet Poll, a free membership for latest diet info. Grab great offers today and flush fat away forever! Dream comes true. Win a DVD Player. ------------------------------------------------------------ Great tips and offers, effective diet doesn't need to be difficult. http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Flush Fat Away Forever! ------------------------------------------------------------ Great offer only available this week, or until supply last. Check it out! http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Easy Weight lossing Tips ------------------------------------------------------------ Guaranteed the Easiest & Fastest way to take off the weight! http://dietpoll.com/offers/track_slimlife.shtml?aff=203 Diet Poll Subscriptions ======================================= Thank you for being a Diet Poll member. If you no longer wish to be a member and receive our emails, send a remove email to: unsubscribe at dietpoll.com To contact our customer support, email: customerfaq at dietpoll.com ======================================= (c) 2001-2002 Diet Poll LLC. From quickclick12 at quickclickbingo.email-publisher.com Wed Sep 25 09:00:00 2002 From: quickclick12 at quickclickbingo.email-publisher.com (quickclickbingo) Date: Wed, 25 Sep 2002 09:00:00 -0700 Subject: Unclaimed Funds Notification Message-ID: <90065.900044387.1214365485-1463792638-1032969722@topica.com> Dear , It has come to our attention that you may be entitled to an undisclosed amount of unclaimed funds. If so, these funds are currently reserved in your name and waiting for you to claim. Please enter your name at the unclaimed money search engine located at our site. Click Here http://www.quickclickbingo.com/maaaxAPaaTEodbaSzWRb/ AOL Users Click Here Notification Date: 09/25/02 to 10/4/02 Unclaimed Funds Department Found Money.com ==================================================================== Update your profile or unsubscribe here: http://topica.email-publisher.com/survey/?a84EO7.baSzWR Delivered by Topica Email Publisher, http://topica.email-publisher.com/ From qiye at ad.com Tue Sep 24 20:35:25 2002 From: qiye at ad.com (qiye at ad.com) Date: Wed, 25 Sep 2002 11:35:25 +0800 Subject: =?GB2312?B?xvPStdD7tKux2LG4yta2zg==?= Message-ID: <200209250340.g8P3e4o23521@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 19852 bytes Desc: not available URL: From frissell at panix.com Wed Sep 25 13:19:22 2002 From: frissell at panix.com (Duncan Frissell) Date: Wed, 25 Sep 2002 16:19:22 -0400 (EDT) Subject: Raise the Fist Webmaster pleads guilty Message-ID: RTF Webmaster Pleads Guilty RTF Webmaster to be Convicted on Monday, Sept 23rd Raisethefist.com, Sherman Austin will be convicted on Monday, Sept 23rd as he pleads guilty to felony count: 18 U.S.C. 842 (p)(2)(A): DISTRIBUTION OF INFORMATION RELATING TO EXPLOSIVES, DESTRUCTIVE DEVICES, AND WEAPONS OF MASS DESTRUCTION WITH THE INTENT THAT SUCH INFORMATION BE USED IN FURTHERANCE OF A FEDERAL CRIME OF VIOLENCE. The plea bargain gives Austin a felony conviction with 1 month in jail, 5 months in a half-way home and 3 years supervised release. Austin does not start his sentencing on Monday, but will find out the exact date at his court appearance. The arraignment is at the downtown federal building in Los Angeles on 255 east temple on the 3rd floor at 8:30am Another one of those unfortunate chicken defendants we seem to get. He would have got a max of 4-5 at trial. So now he has a felony conviction anyway plus endless parole supervision which gives the Feds way too much control over you. And he gives up a chance to challenge the "Publish Bomb Plans" go to jail law. If you go to trial and lose and do your time you are then free of supervision. Plus you never admitted any crime. A plea is an admission. When you are in custody, your cooperation is the only thing you can deny your captors. See some of the actual links: http://www.raisethefist.com/news.cgi?artical=wire/----9846413t4a.article and http://www.raisethefist.com/news.cgi?artical=wire/----9845643t4a.article -- Posted by Duncan Frissell to The Technoptimist at 9/25/2002 1:54:34 PM Powered by Blogger Pro From bello47 at lycos.com Wed Sep 25 17:45:25 2002 From: bello47 at lycos.com (Mr. Bello Sese Seko) Date: Wed, 25 Sep 2002 17:45:25 Subject: I NEED YOU URGENT RESPONSE/CALL PLEASE? Message-ID: <200209251545.g8PFjHH5005479@ak47.algebra.com> NOTE: PLEASE DIRECT ALL RESPONSE TO EMAIL ACCOUNT CONTAINED IN THIS LETTER FOR CONFIDENTIAL PURPOSE. STRICTLY CONFIDENTIAL FROM: Bello Sese Seko TEL : +31-618-850-030 E-MAIL: seko.bello at mail.com Attention Please, BUSINESS PARTNERSHIP SOLICITED May I take the privilege to introduce myself; my name is Mr. Bello Sese Seko a brother of the late President of the Federal Republic of Zaire, President Mobutu Sese Seko (now Republic of Congo, under the leadership of the Son of Mr. Laurent Kabila). I am currently under political asylum in the Netherlands. I presume you are aware there is a financial dispute between my family (the Mobutu’s) and the present Civilian Government. Based on what they believe as bad and corrupt Government on my late brother part, May his soul rest in peace. Following the above mentioned reasons, I am soliciting for your humble and confidential assistance to take custody of Fifteen Million,United States Dollars only (US$15M) also to front for me in the area of business investments you desire profitably well. Presently, this Sum of US$15 Million Dollars has secretly been deposited into a confidential security Company, where it can be released to you by the Security Company based on my recommendation on that note; you will be presented as my partner who will be fronting for me and my family in any subsequent ventures. For you might have heard how a lot of my brother’s bank Account has been frozen. To show my preparedness and appreciation to conduct this business with you, I shall give you 25% of the total money and 5% for miscellaneous expense and 10% on any profit realizable in the process of investment of this fund in your country. Please, I need your entire support and co-operation for the success of the business venture, your utmost confidentially, sincerity and secrecy is highly required, due to my family’s present predicament. Details of how I intend to carry out this project will be discussed as soon as I get a response of your willingness and interest. I sincerely will appreciate your urgent acknowledgment as soon as possible by contacting me on my Telephone number:+31-618-850-030 or E-mail address. Thank you. Yours truly, Mr. Bello Sese Seko NOTE: YOUR PHONE NUMBER IS VERY IMPORTANT, AS BUSINESS OF THIS MAGNITUDE AND NATURE IS NOT SUPPOSED TO BE DONE VIA E-MAIL. From njohnsn at IowaTelecom.net Wed Sep 25 16:36:35 2002 From: njohnsn at IowaTelecom.net (Neil Johnson) Date: Wed, 25 Sep 2002 18:36:35 -0500 Subject: What good are smartcard readers for PCs In-Reply-To: <3D904EAD.30987.E42F8F@localhost> References: <3D8F4287.12444.21BA71C@localhost> <3D904EAD.30987.E42F8F@localhost> Message-ID: Hey don't forget you can still buy a smart card reader from that most cypherpunkish of babes BRITNEY SPEARS ! Only $30 ! https://www.visiblevisitors.com/mltest/order_form.asp From pgut001 at cs.auckland.ac.nz Tue Sep 24 23:56:04 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 25 Sep 2002 18:56:04 +1200 (NZST) Subject: FIB workstation photos Message-ID: <200209250656.SAA149409@ruru.cs.auckland.ac.nz> As part of its tour of Nvidia, Anandtech got to look at an FIB workstation of the kind used for (among other things) reverse-engineering and modifying semiconductors. For those who have never seen one of these things, there are photos at http://www.anandtech.com/video/showdoc.html?i=1711&p=9 Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From qiye at ad.com Wed Sep 25 18:29:20 2002 From: qiye at ad.com (qiye at ad.com) Date: Thu, 26 Sep 2002 09:29:20 +0800 Subject: =?GB2312?B?tefE1MXkvP65qdOmILv1tb24tr/u?= Message-ID: <200209260129.g8Q1T7o89427@locust.minder.net> �𾴵�Ůʿ.����:����! �ҹ�˾ϵ̨�������ҵ����,���ڴ��¹���ó��,Ϊ�ھ��г�DZ��������Ӫ��ģ, ���ڹ��Ѱ�����״���,�ؽ��˼�ͬ��ʹ�λ�ο�.��˾��֤��ƷΪȫ��ԭװ����, ��������.�������˿��������紹ѯ! ̨�������Ƽ� ��������ֱ�����磬��½���Ͳ��绰��0139-59732536 ��ϵ�ˣ�����ǿ һ.�������(RMB.Ԫ): A:��ʾ�� SONY CPD-G420:19"\���:0.25mm\��Ƶ����:230MHz 1800 CPD-E230:17"\���:0.25mm 1000 CPD-G220:17"\���:0.25mm\��Ƶ����:203MHz 1100 CPD-G520:21"\���:0.24mm\��Ƶ����:341MHz 2650 ������ 107P:17"\���:0.25mm\��Ƶ����:203MHz 700 107E:17"\���:0.27mm\��Ƶ����:108MHz 500 105S:15"\���:0.28mm\��Ƶ����:79MHZ 350 201B:21"\���:0.25mm\��Ƶ����:261MHz 2200 109B:19"\���:0.25mm\��Ƶ����:234MHz 1200 109P:19"\���:0.24mm\��Ƶ����:261MHz 1500 109S:19"\���:0.27mm\��Ƶ����:203MHz 900 201P:21"\���:0.24mm\��Ƶ����:320MHz 2700 105E:15"\���:0.28mm\��Ƶ����:65MHz 300 107B3:17"\���:0.25mm\��Ƶ����:176MHz 620 107G:17"\���:0.24mm\��Ƶ����:108MHz 550 107T:17"\���:0.25mm\��Ƶ����:108MHz 560 ���� 551S/15"\���:0.24mm\��Ƶ����:65MHz 300 753DF:17"\���:0.20mm\��Ƶ����:110MHz 450 753S/17"\���:0.23mm\��Ƶ����:110MHz 480 1100P/21"\���:0.22mm\��Ƶ����:230MHz 1900 755DF/17"\���:0.20mm\��Ƶ����:135MHz 560 743DF/ 17"\���:0.20mm\��Ƶ����:110MHz 440 753DFX/17"\���:0.20mm\��Ƶ����:110MHz 510 755DFX/17"\���:0.20mm\��Ƶ����:185MHz 520 757DFX/17"\���:0.20mm\��Ƶ����:250MHz 780 1200NF:22"\���:0.24mm\��Ƶ����:340MHz 2600 550S/15"\���:0.24mm\��Ƶ����:80MHz 360 955DF:19"\���:0.20mm\��Ƶ����:185MHz 1000 750S/17"\���:0.24mm\��Ƶ����:110MHz 540 EMC DX787:17"\���:0.25mm\��Ƶ����:150MHz 510 PF797:17"\���:0.25mm\��Ƶ����:202.5MHz 560 DX997N:19"\���:0.25mm\��Ƶ����:202.5MHz 900 PX558/15"\���:0.28mm 300 FX772N/17"\���:0.27mm\��Ƶ����:120MHz 500 DZ777NS:17"\���:0.20mm\��Ƶ����:110MHz 500 LT541/15"\Һ������:0.297mm 600 HG562/15"\Һ������:0.297mm 690 BM468/14.1"\Һ������:0.279mm\����:180cd/m2\�Աȶ�:200:1 500 568 II/15"\Һ������:0.279mm\����:200cd/m2\�Աȶ�:400:1 730 BM568/15"\Һ������:0.3mm\����:200cd/m2\�Աȶ�:350:1 1500 ���� 151S/15"\Һ������:0.297mm\����:250cd/m2\�Աȶ�:330:1 780 171S/17"\Һ������:0.264mm\����:250cd/m2\�Աȶ�:350:1 1820 151MP/15"\Һ������:0.297mm\����:250cd/m2\�Աȶ�:330:1 1600 171MP/17"\Һ������:0.264mm\����:240cd/m2\�Աȶ�:400:1 2500 210T/21.3"\Һ������:0.270mm\����:230cd/m2\�Աȶ�:400:1 4300 151BM/15"\Һ������:0.297mm\����:250cd/m2\�Աȶ�:330:1 900 240T/ 24.06"\Һ������:0.270mm\����:230cd/m2\�Աȶ�:500:1 5900 151B/15"\Һ������:0.297mm\����:250cd/m2\�Աȶ�:330:1 1000 SONY SMD-M51/15.1"\Һ������:0.3mm\����:200 cd/m2\�Աȶ�:300:1 980 SMD-M81/18.1"\Һ������:0.3mm\����:200 cd/m2\�Աȶ�:300:1 2900 SDM-N50/15"\Һ������:0.297mm\����:200cd/m2\�Աȶ�:300:1 1800 B:CPU P4 1.7G��Socket 478/�У�500 1.6G��Socket 478/ɢ�� 500 1.6G��Socket 478/�У� 510 1.5G��Socket 478/ɢ�� 450 1.7G��Socket 478/ɢ�� 490 1.5G��Socket 478/�У� 480 1.8GA��Socket 478/NORTHWOOD/�У� 550 2.0GA��Socket 478/NORTHWOOD/�У� 600 1.8G��Socket 478/ɢ��590 1.6GA��Socket 478/NORTHWOOD/ɢ�� 510 1.8GA��Socket 478/NORTHWOOD/ɢ�� 580 2.0GA��Socket 478/NORTHWOOD/ɢ�� 620 1.6G��Socket 423/ɢ�� 500 1.8G��Socket 478/�У� 620 1.6GA��Socket 478/NORTHWOOD/�У� 540 2.0G��Socket 478/�У�700 1.5G��Socket 423/�У� 430 1.5G��Socket 423/ɢ�� 460 1.7G��Socket 423/ɢ��535 2.2GA��Socket 478/NORTHWOOD/�У� 1000 1.7G��Socket 423/�У�480 1.6G��Socket 478/NORTHWOOD/�У�550 2.2GA��Socket 478/NORTHWOOD/ɢ��900 1.6G��Socket 423/�У�660 1.9G��Socket 478/�У�700 Celeron 1.0G��ɢ��230 P III 1.0G��ɢ��420 Celeron 866��ɢ��390 Celeron 1.0G��256K/ɢ��220 Celeron 1.7G��Willamette/ɢ��330 P III 733��ɢ��310 Celeron 900��ɢ��170 P III 866���У�400 PIII 933EB��ɢ��400 P III 800EB��ɢ��380 Celeron 1.2G��ɢ��250 P III 850E��ɢ��400 Celeron 1.2G��TUALATIN/ɢ��230 Celeron 1.3G��TUALATIN/ɢ��250 Celeron 1.1G��ɢ��220 P III 1.0G���У�450 Celeron 1.1G��TUALATIN/ɢ��200 Celeron 733��ɢ��120 P III XEON 700��������ר��/1MB��7000 PIII XEON 700��������ר��/2MB��10000 Celeron 850��ɢ��160 Celeron 533��Socket 370/ɢ��100 Celeron 800��ɢ��150 Celeron 566��ɢ��120 Celeron 633��ɢ��130 Celeron 950��ɢ��168 Celeron 766��ɢ��150 P III 800EB���У�3700 P III 700E��ɢ��330 P III 933EB���У�450 P III 1.0G��������ר�ã�2200 P III 667��ɢ��310 XEON 700��COMPAQ������ר��/1MB��7800 XEON 933��COMPAQ������ר�ã�3800 XEON 1.0GB��COMPAQ������ר�ã�6500 600��COMPAQ������ר�ã�2000 667��COMPAQ������ר�ã� 2000 866��COMPAQ������ר�ã� 2400 800��COMPAQ������ר�ã� 4500 Celeron 600��ɢ�� 135 667��ɢ��135 1.7G��Willamette/�У�340 Celeron 1.2G���У�240 Celeron 700��ɢ��150 AMD AthlonXP 1600+��ɢ��270 AthlonXP 1700+��ɢ��310 AthlonXP 1800+��ɢ��370 AthlonXP 1500+��ɢ��250 Duron 850��ɢ��100 Duron 900��ɢ��110 Duron 1.0G��ɢ��140 AthlonXP 1900+��ɢ��480 Athlon ThunderBird 1.33G��266��Ƶ/ɢ��200 Duron 950��ɢ��130 AthlonXP 2000+��ɢ��560 Athlon ThunderBird 900��ɢ��120 Athlon ThunderBird 1.0G��200��Ƶ/ɢ��190 Athlon ThunderBird 1.1G��200��Ƶ/ɢ��180 Athlon ThunderBird 1.2G��266��Ƶ/ɢ��220 Athlon ThunderBird 1.0G��266��Ƶ/ɢ��200 Duron 700��ɢ��100 Athlon ThunderBird 950��ɢ��210 Athlon ThunderBird 1.4G��266��Ƶ/ɢ��400 C:Ӳ�� Maxtor 40GB�� Plus 60/ɢ��7200ת 230 40.9GB�� VL40/ɢ��5400ת 200 160GB�� D540X/ɢ��5400ת 700 120GB��D540X/ɢ��5400ת 450 20GB�� Plus 60/ɢ�� 7200ת 190 30GB�� Plus 60/ɢ��7200ת 220 81.9GB�� 80/ɢ��5400ת 330 20GB�� Plus D740X/ɢ��7200ת 220 40GB�� Plus D740X/ɢ��7200ת 230 20GB�� 541DX/ɢ��5400ת 210 60GB�� D540X/ɢ��5400ת 270 20GB�� 541DX/�У�5400ת 200 60GB�� Plus D740X/ɢ��7200ת 300 80GB�� Plus D740X/ɢ��7200ת 400 40GB�� D540X/ɢ��5400ת 200 20.4GB�� VL40/ɢ��5400ת 190 40GB�� Plus D740X/�У�7200ת 260 60GB��Plus D740X/�У�7200ת 310 80GB�� Plus D740X/�У�7200ת 460 40GB�� D540X/�У�5400ת 250 80GB�� D540X/�У�5400ת 390 20GB�� Plus D740X/�У�7200ת 210 40GB�� 536DX/�У�5400ת 250 80GB�� 536DX/�У�5400ת 390 60GB�� Plus 60/�У�7200ת 350 120GB��D540X/�У�5400ת 540 81.9GB�� 80/�У�5400ת 380 60GB�� 536DX/�У�5400ת 320 100GB�� 536DX/�У�5400ת 1000 60GB�� D540X/�У�5400ת 380 160GB�� D540X/�У�5400ת 1100 30.7GB�� VL40/ɢ��5400 ת 300 61.4GB�� 80/ɢ��5400ת 370 40GB�� 536DX/ɢ��5400ת 230 15GB��531DX/ɢ��5400ת 200 20GB��Plus 60/�У�7200ת 210 ϣ�� 40.8GB��U Series 6��5400ת 200 40GB��Barracuda ATA IV��7200ת 220 60GB��Barracuda ATA IV��7200ת 280 20..4GB��U Series 6��5400ת 200 80GB��Barracuda ATA IV��7200ת 350 20GB��Barracuda ATA IV��7200ת 200 30GB��Barracuda ATA III��7200ת 220 20GB��U Series 5��5400ת 170 40GB��U Series 5��5400ת 210 20GB��Barracuda ATA III��7200ת 210 40GB��Barracuda ATA III��7200ת 220 10.2GB��Barracuda ATA III��7200ת 180 10GB��U Series 5��5400ת 120 15.3GB��Barracuda ATA III��7200ת 220 30GB��U Series 5��5400ת 270 15.3GB��U Series 5��5400ת 240 ST39236/LW 10000ת 450 ST39236/LCV 7200ת 500 IBM 60GB��Deskstar 60GXP��7200ת 250 10GB��Travelstar 20GN��4200ת 190 40GB��Deskstar 60GXP��7200ת 220 40GB��Deskstar 120GXP��7200ת 220 80GB��Deskstar 120GXP��7200ת 310 18.3GB��Ultrastar 36LZX/68�� ������Ӳ��\ת��:10000ת\����:4MB 580 18.3GB��Ultrastar 36LZX/80�� ������Ӳ��\ת��:10000ת\����:4MB 180 36.9GB��Ultrastar 36LZX/80�� ������Ӳ��\ת��:10000ת\����:4MB 900 36.9GB��Ultrastar 36LZX/68�� ������Ӳ��\ת��:10000ת\����:4MB$~900 40GB��Deskstar 40GV��5400ת 220 20GB��Deskstar 60GXP��7200ת 260 20GB��Deskstar 40GV��5400ת 200 30GB��Deskstar 75GXP��7200ת 310 75GB��Deskstar 75GXP��7200ת 820 15GB��Travelstar 20GN�� �ʼDZ�Ӳ��\ת��:4200ת\����:512KB 250 D:����: ΢�� 845Pro2-LE(Socket,i845,SDRAM,AC97����) 500 845Pro (Socket,i845,SDRAM,AC97����) 530 850Pro5 (Socket,i850,8738����) 700 645UITRA (Socket478,SiS645оƬ 3DDR AC97) 440 K7T266Pro (SocketA,KT266,3DDR,AC97) 420 K7T266Pro2-LE(SocketA,AC97,ATA100) 380 K7t266Pro2(SocketA,֧��XP,3DDR,AC97) 410 815EPT Pro-NL(Socket370,i815EP,֧����PIII,AC97,ATA100) 360 815EP Pro-R (Socket370,i850EP,IDE RAID) 370 815EP-NL (Socket370,i815EP,AC97) 330 815ET Pro (Socket370,i815E,��PIII,i752,AC97) 450 694D Pro2-IR (Socket370,VIA694X/686B,RAID) 410 6309NL100 (Socket370,VIA694X/686B,AC97) 200 6309NL/-A (Socket370,VIA694X/686B,AC97,����5880 230 ���� KT133B (SocketA,KT133/686B,ATA100,AC97) 200 6VA694XB (Socket370,VIA694x/686B,AC97,ATA100) 180 ���� VP266+128M DDR 400 VP266 (Socket370,VIA/APOLLO/PRO266/AC97) 280 VK266 (SocketA,KT133A/686B/AC97/ATA100) 250 VT-133PLUS(SocketA,KT133/686B/AC97/ATA100) 250 ID815E (Socket370,i815E/i752/AC97/ATA100) 255 ID815EP (Socket370,i815EP/AC97/ATA100) 260 ID810 (Socket370,i810/ATA66/i752�Կ�/AC97����) 190 VP4-133PLUS(Socket370,VIA694x/686B/AC97/ATA100) 210 Vp4-133/M (Socket370,VIA694/596B/CMI8738����/ATA66) 180 VP-133 (Socket370,VIA693A/596B/CMI8738����/ATA66) 200 SIS730S (SocketA,SiS300/AC97/10/100M����) 205 SIS630E (Socket370,SIS630E/SiS300�Կ�/AC97) 225 E:�ڴ�IBM 128MB/ 256MB��PC-133/144Pin��90/150 256MB��PC-133/E/33L3322��1000 512MB��PC-133/E/33L3324��500 128MB��PC-133/E/33L3113��500 512MB��PC-133/E/33L3117��2800 128MB/ 256MB/512MB��PC-133/E��120/240/560 128MB��PC-133/E/33L3320��520 512MB��PC-133/E/33L3146��3000 256MB��PC-133/E/20L0247��1300 512MB��PC-133/E/20L0249��2680 Kinghorse 128MB/256MB��PC-133/144Pin��75/190 128MB��PC-133/SDRAM��70 128MB��PC-100/144Pin��70 512MB��PC-133/144Pin��1100 64MB��PC-133/144Pin��58 128MB/256MB��PC-133/E-R��150/300 512MB/1GB��PC-133/E-R��920/2500 256MB/512MB��PC-266/DDR SDRAM��200/500 256MB/512MB��PC-266/DDR SDRAM/E��260/680 128MB/256MB��PC-800/RDRAM��220/400 256MB512MB��PC-800/RDRAM/E��520/2000 64MB/256MB��PC-133/SDRAM��80/180 64MB��PC-100/144Pin��90 KINGMAX 256MB/128MB��PC-150/SDRAM��160/85 128MB��PC-133/SDRAM��70 256MB��PC-333/DDR��140 128MB��PC-100/144Pin��100 256MB��PC-2100/DDR��170 256MB��PC-133/SDRAM��162 256MB��PC-133/144Pin��300 KINGSTON 128MB/256MB��PC-133/SDRAM��80/110 256MB��PC-2100/DDR��105 128MB��PC-133/144Pin��96 512MB��PC-2100/DDR SDRAM��390 512MB��PC-133/SDRAM��410 128MB��PC-2100/DDR��78 128MB��PC-100/144Pin��100 128MB/256MB��PC-800/RDRAM��148/320 256MB��PC-100/144Pin��300 256MB��PC-133/E-R��310 256MB/512MB��PC-2100/DDR SDRAM/E-R��290/680 512MB��PC-133/E-R��700 ���� 128MB/256MB��PC-800/RDRAM��180/320 128MB/256MB��PC-133/SDRAM��60/170 64MB/128MB/256MB��PC-133/E��50/110/230 64MB��PC-133/SDRAM��48 64MB128MB/256MB��PC-133/E-R��68/175/298 �ִ�(HY) 64MB/128MB/256MB��PC-133/SDRAM��62/95/30 64MB/128MB��PC-100/144Pin��33/68 128MB/256MB��PC-266/DDR SDRAM��66/105 256MB��PC-133/144Pin��168 64MB��PC-100/SDRAM��35 F:���� BenQ ���� 650A/652P/656A--120/150/162Ԫ ΢�� 52X/16X DVD--150/220Ԫ Aopen 50X/52X--130/140Ԫ �ȷ� 116/106S/����12X DVD--270/350/200Ԫ ̨��12X DVD/16X DVD /�ھ���--180/230/220Ԫ G:�Կ� ̫����Ӱ8800/S8000PRO--480/420Ԫ ̫����Ӱ S8000/S6000---350/300Ԫ ΢�� 8808/8817--210/350Ԫ ��˶AGP-7100Magic/AGP-V7700T1--200/430Ԫ СӰ��С��G9700/����7700/7000--450/400/360Ԫ �߲ʺ� �ط�VE DDR/VE SDR--280/210Ԫ ����ɯ Ӱ���� GTS PRO--400Ԫ ����ɯ Ӱ���� 311/32M--220Ԫ ��̨ WinFast GeForce 256--370Ԫ ӯͨ����G3000/G9000--200/450Ԫ H: ����( ԭ���ʺа�װ���������£�����һ�� ) CMI 8738 PCI ������ 20 ESS 1989 PCI ������ 17 MODEN ��( ԭ���ʺа�װ���������£�����һ�� ) AG 5628 56K AG 5628 56K 40 ESS 2838 56K ESS 2838 56K 35 ��:�ʼDZ�����(��������) A . IBM R30--32C(6000Ԫ) PIII1GB/128M/15GB/13.3"TFT/24XCD/56K+10/100M/WIN98 R30--62C(6100Ԫ) PIII1GB/128M/30GB/14.1"TFT/8XDVD/56K+10/100M/WIN98 R30-3BC(8100Ԫ) PIII1GB/128M/30GB/15.1"TFT/8XDVD/56K+10/100M/ȫ���� R30--4BC(9000Ԫ) PIII1.13GB/128M/30GB/15.1"TFT/8XDVD/56K+10/100M/ȫ���� R30--4CC(8600Ԫ) PIII1.13GB/128M/30GB/15.1"TFT/8XDVD/56K/ȫ����/�������� R30--64C(9000Ԫ) PIII1.2GB/128M/48GB/15.1"TFT/DVD+CDRW/56K+10/100M/ȫ���� A22P-URC(8600Ԫ) PIII1GB/128M/32GB/15.1"TFT/CDRW/56K/ȫ���� T23- 2TC(6500Ԫ) PIII1GB/128M/20GB/14.1"TFT/DVD/56K+10/100M T23- 4NC(8600Ԫ) PIII1.13GB/128M/30GB/14.1"TFT/8XDVD/56K+10/100M/����� ��/WIN2000/�������� T23- 5DC(8500Ԫ) PIII1.2GB/128M/48GB/14..1"TFT/8XDVD/56K+10/100M/W2000 T23- 5FC(9000Ԫ) PIII1.2GB/128M/48GB/14.1"TFT/8XDVD/56K/W2000/�������� T23- 6UC(9200Ԫ) PIII1GB/128M/20GB/14.1"TFT/8XDVD/56K+10/100M/XP T23- 4MC(9100Ԫ) PIII1.13GB/128M/30GB/14.1"TFT/8XDVD/56K+10/100M T23- 9TC(9200Ԫ) PIII1.2GB/256M/60GB/14.1"TFT/8XDVD/56K/��������/XP X22- QJC(8300Ԫ) PIII800/128M/20GB/12.1"TFT/DVD+����/56K+10/100M/�������� X22- QHC(7600Ԫ) PIII800/128M/20GB/12.1"TFT/DVD+����/56K+10/100M B . ���� SONY SR/27K(4500Ԫ) PIII750/128M/30GB/10.4��TFT/CDROM/56K/NO FDD SR/X77(5500Ԫ) PIII800/128M/20GB/10.4��TFT/��������/CDROM/56K/NO FDD R-505JE(5200Ԫ) PIII850/128M/20GB/12.1"TFT/56K+10/100M/DVD���� R-505JS (6200Ԫ) PIII850/256M/30GB/12.1"TFT/56K+10/100M/DVD+CDRW���� GR370(5800Ԫ) PIII1.13GB/256M/30GB/15.1"TFT/CDRW+DVD/56K+10/100M/ȫ���� GR390(6000Ԫ) PIII1.2GB/512M/30GB/15.1"TFT/CDRW+DVD/56K+10/100M/ȫ���� FX340(4800Ԫ) PIII900/128M/15GB/14.1"TFT/CDRW+DVD/56K+10/100M/ȫ���� C1MR-BP(5000Ԫ) Crouse667/128M/20GB/8.9TFT/56K/��������ͷ/CD+FDD C.��ʿͨ FUJITSU C6651 PIII1.13G/256M/20G/8XDVD/14.1"TFT/56K/100M/TV-OUT/֧������/3K��6200 P1030 Cruse700/128M/20G/8.9"tft/56K/100M/0.88Kg��4180 C7631 PIII1.13G/256M/30G/8XDVD/15.1"TFT/56K/100M/TV-OUT/֧������/3K��6800 D. ��֥ TOSHIBA 3440CT PIII500/64M/6G/11.3"XGA/100M/8M�Դ�/FDD��5800 �� 3490CT PIII 700/128M/20G/11.3"XGA/56K/100M/FDD��7800 �� 3480CT PIII 600/64M/12G/11.3XGA/56K/100M/FDD��5000 �� �� 4000DVD PIII 750/128M/20G/12.1"XGA/56K/100M/8XDVD/������6800 �� 2000 PIII750/256M/20G/12.1��TFT/56K/100M/�޹�����/1.18Kg��12000 �� �� S31CDT PIII700/128M/20G/24XCD/12.1"TFT/56K/100M/1394��8500 ���� S31DVD PIII700/128M/20G/12.1"XGA/8XDVD/56K/100M/1394��6000 �� �� 1800CTD C800/64M/15G/13.1"TFT/24XCD/56K/100M/1394��9988 1800XDVD C1100/256M/20G/14.1��TFT/8XDVDCDRW/56K/100M/ȫ���ã�4500 �� �� 1800XDVD C1066/256M/15G/14��TFT/8XDVD/56K/�������4000 ���� 1810XCDT PIII 1G/128M/20G/13.3''''TFT/24XCD/56K/100M��7000 �� �� 1800XCDT PIII 1G/128M/20G/13.3''TFT/CDRW/56K/100M��6000 �� �� 1810XDVD PIII 1G/256M/20G/14.1"TFT/8XDVD/56K/100M��7000 �� �� 1810XDVD PIII 1G/128M/20G/14.1"TFT/8XDVDRW/56K/100M��8000 �� �� 1810XDVD PIII 1.1G/128M/20G/14.1"TFT/8XDVD/56K/100M��6800 �� �� 2800XDVD PIII 800/128M/20G/14.1"TFT/8XDVD/56K/100M/8M�Դ棤5800 �� �� 2800ZDVD PIII 900/128M/30G/15"TFT/DVD CDRW/56K/100M/ GFII 16M��10000 �� �� 3000XDVD PIII 850/128M/20G/DVD CDRW/14.1"TFT/56K/100M/1394/GFII 16M ��7600 �� 3000XDVD PIII 1G/128M/20G/8XDVD/14.1"TFT/56K/100M/1394/GFII 16M��8600 �� �� �� 4600xDVD PIII 850/128M/20G/DVD/14.1"TFT/56K/100M/16M �Դ�/Ԥ��������9000 �� 4600 PIII 800/64M/15G/24XCD/13.3"TFG/56K/100M/16M �Դ�/Ԥ��������6600 �� �� 4600ZDVD PIII 900/128M/30G/DVD/14.1"TFT/56K/100M/16M �Դ�/Ԥ��������9600 �� �� 4600ZDVD PIII 800/128M/20G/8XDVD/15"TFT/56K/100M/16M �Դ�/Ԥ��������8800 ���� 6000XDVD PIII1G/128M/20G/8XDVD/14.1��TFT/56K/100M /16M �Դ�/��������7400 ���� 6000ZDVD PIII1.33G/256M/30G/8XDVD3/15��TFT/56K/100M /16M �Դ�/��������10000 �� 2000 PIII1G/256M/20G/8XDVD/14.1��TFT/56K/100M/������ң�9000 �� 8200J PIII 900/256M/20G/14.1"TFT/8XDVD/16M �Դ�/������10800 �� �� 8200L PIII 1G/256M/20G/SXGA 14.1"TFT/CDRW+DVD/16MB�Դ�/������10000 �� �� 9000 PIII 1G/256M/20G/8XDVD/14.1"TFT/56K/100M��11800 E.���� COMPAQ 1714SC(6200Ԫ) PIII1.06GB/256M/30GB/14.1"TFT/DVD/56K+10/100M/1394/XP/�������� �� 1715SC(7600Ԫ) PIII1.06GB/256M/30GB/14.1"TFT/DVD+CDRW/56K+10/100M/1394/XP/�������� �� 2700SC(8600Ԫ) PIII1.13GB/256M/30GB/15.1"TFT/DVD+CDRW/56K+10/100M/16M/XP/ȫ���� �� N400c(6300Ԫ) PIII850/128M/20GB/12.1"TFT/56K+10/100M/���ᳬ�� �� E500(4300Ԫ) PIII900/128M/20GB/14.1"TFT/24XCD/56K+10/100M/ȫ���� �� E500(6000Ԫ) PIII1GB/128M/30GB/15.1"TFT/8DVD/56K+10/100M/ȫ���� �� �������������(ȫ��������) ���ְ�˹��OLYMPUS�� C-2020 1600��1200/211������ ��1900 C-2100 UltraZoom 1600��1200/130��CCD���� ��3200 C-1400XL CCD����1410000/�ֱ���1280/��ѧ�佹����3 ��2400 C-200ZOOM CCD����2110000/�ֱ���1600/��ѧ�佹����3 ��1150 C2020Z CCD����2110000/�ֱ���1600/��ѧ�佹����2.5 ��1680 C2100UZ CCD����2110000/�ֱ���1600/��ѧ�佹����10 ��2880 C2500l CCD����2500000/�ֱ���1712/��ѧ�佹����3 ��2700 C-3000Z CCD����3340000/�ֱ���2048/��ѧ�佹����3 ��2200 C-4040ZOOM CCD����4130000/�ֱ���2272/��ѧ�佹����3 ��2850 C-700UZ CCD����2110000/�ֱ���1600/��ѧ�佹����10 ��2300 C-830L CCD����1310000/�ֱ���1280/��ѧ�佹����2 ��1200 C-920ZOOM CCD����1300000/�ֱ���1280/��ѧ�佹����3 ��2100 C-960Z CCD����1310000/�ֱ���1280/��ѧ�佹����3 ��1400 C-990ZOOM CCD����1300000/�ֱ���1600/��ѧ�佹����3 ��1680 E-10 CCD����4000000/�ֱ���2240/��ѧ�佹����4 ��4800 C-2040Z 211������/1600��1200 ��1900 C-3040Z 334������/2048��1536 ��2980 ���ܣ�CANON) Digital Ixus 1600��1200/211������ ��1780 EOS D30 1600��1200/325������ ��11000 Power Shot S10 1600��1200/211������ ��1900 PowerShot G1 2048��1536/334������ ��3100 PowerShot Pro70 1280��1024/168������ ��4400 PowerShot S100 1600��1200/211������ ��1880 PowerShot S20 1600��1200/334������ ��2800 DIGITAL IXUS 300 CCD����2110000/�ֱ���1688/��ѧ�佹����3 ��2000 POWER SHOT A10 CCD����1320000/�ֱ���1363/��ѧ�佹����2 ��1100 POWER SHOT A20 CCD����2110000/�ֱ���1688/��ѧ�佹����2 ��1200 POWER SHOT G2 CCD����4130000/�ֱ���2272/��ѧ�佹����3 ��2980 �´KODAK) DC215 100������/1152*864/8MB/2����ѧ ��1080 DC240 130������/1280*960/8MB/2����ѧ/3������ ��1800 DC280�佹������� 1760 x 1168 ����/30 �� 60 ���׵�Ч���� ��2380 DC290 230������/2240*1500/16MB/3����ѧ/2������ ��3000 DC3400 1760��1168/230������ ��2000 DC3800 1792��1200/210������ ��1900 DC4800 �´��������/330������/2160*1400/16MB/3����ѧ/2������ ��2800 DX3600 220�����أ�2����ѧ��3�����룬����8M CF ��1250 mc3 ������� ���뾲̬���,24λɫ ��1100 DC290 CCD����2304012/�ֱ���2204/��ѧ�佹����3 ��2500 DX3500 220�����أ�3������佹,����8MCF ��1000 ��⣨RICOH�� RDC-7 334������CCD/3����ѧ�佹/3.2������佹 ��3100 RDC 4200 CCD����1320000/�ֱ���1280/��ѧ�佹����3 ��3000 RDC 5300 CCD����2300000/�ֱ���1792/��ѧ�佹����3 ��3400 ���ǣ�SAMSUNG���� SDC-80 85������CCD/4MB����ý�忨/﮵�� ��1150 SDC-007 CCD����1080000/�ֱ���1152/��ѧ�佹����2 ��1800 SDC-80 CCD����870400/�ֱ���1024/��ѧ�佹����6 ��1100 ���ᣨSONY�� DSC-F505V CCD����3340000/�ֱ���2240/��ѧ�佹����5 ��3300 DSC-F55V CCD����3300000/�ֱ���2240 ��2900 DSC-F707 CCD����5240000/�ֱ���2560/��ѧ�佹����5 ��3500 DSC-P1 CCD����3340000/�ֱ���2048/��ѧ�佹����3 ��2600 DSC-P20 CCD����1300000/�ֱ���1216 ��800 DSC-P3 CCD����3338000/�ֱ���1280 ��1800 DSC-P30 CCD����1300000/�ֱ���1280/��ѧ�佹����3 ��900 DSC-P5 CCD����3338000/�ֱ���2048/��ѧ�佹����3 ��2000 DSC-P50 CCD����2100000/�ֱ���1600/��ѧ�佹����3 ��1150 DSC-S70 CCD����3340000/�ֱ���2048/��ѧ�佹����3 ��2300 MVC-CD1000 CCD����2110000/�ֱ���1600/��ѧ�佹����10 ��6500 MVC-CD200 CCD����2100000/�ֱ���1600/��ѧ�佹����3 ��2500 MVC-CD300 CCD����3340000/�ֱ���2048 ��3100 MVC-FD95 CCD����2110000/�ֱ���1280/��ѧ�佹����10 ��4000 �ģ����������(ȫ��������) SONY DSR-PD150P/DCR-PC115E/TRV-330E/TRV-130E 12000Ԫ /5000 Ԫ / 2800 Ԫ /2200Ԫ PANASONIC DVC15---6000Ԫ/VZ10---1800Ԫ JVC DR-DV2000---5800Ԫ/GR-DVL9300---3000Ԫ SAMSUNG VP-D60---2300Ԫ/VP-M50---1300Ԫ SHARP VL-PD6E---5000Ԫ CANON DM-XLIS---13000Ԫ/MV400i---3000Ԫ ��:�ƶ��绰(RMB):(ȫ������) ŵ����:8850/8250/8310/8210/6210/8855/5210 1100/700/1500/500/400/1600/400Ԫ Ħ������:V60/V6288/V66/A6188/V8088/V70/388 1400/800/1000/600/600/1500/1600Ԫ ����:SGH-A400/A288/SGH-A288/M188/N288/A388/T108 1400/1000/1100/800/700/900/1700Ԫ ������:6688--1500 ��. ���ϵ���(PDA) 1. ����ͨE938���ϵ���&�ֻ�(1200Ԫ) 2. ����ͨ������8836���ϵ��� (450 Ԫ) 3. ����ͨV98���ϵ��� (820Ԫ) 4. Palm-M105���ϵ��� (730Ԫ) 5. Palm-M500���ϵ��� (1600Ԫ) 6. ����iPAQH3630���ϵ��ԣ����ģ�(2100Ԫ) 7. ����CliePEG-S300���ϵ���(900Ԫ) 8.Palm-M505���ϵ���(1700Ԫ) 9. ���gͨMD800���Ӵǵ�(400Ԫ) *****�������ߵ�����------------(500Ԫ) ̨�������Ƽ� ��������ֱ�����磬��½���Ͳ��绰��0139-59732536 ��ϵ�ˣ�����ǿ From ptrei at rsasecurity.com Thu Sep 26 07:26:24 2002 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 26 Sep 2002 10:26:24 -0400 Subject: RSA's RC5-64 Secret Key Challenge has been solved. Message-ID: First, the official PR release: --------------------------------------------------- Distributed Team Collaborates to Solve Secret-Key Challenge Contest designed to keep the cryptographic community updated on new achievements and help organizations maintain highest levels of security Bedford, MA, Thursday, September 26, 2002 - RSA Laboratories, the research center of RSA Security Inc. (Nasdaq: RSAS), the most trusted name in e-security(r), today announced that a coordinated team of computer programmers and enthusiasts, known as distributed.net, has solved the RC5-64 Secret-Key Challenge. The distributed.net team solved the challenge in approximately four years, using 331,252 volunteers and their machines. Distributed.net receives a cash prize of $10,000 for solving the challenge. Established in 1997, RSA Laboratories' Secret-Key Challenge is offered to quantify the strength of symmetric encryption algorithms such as DES and the RC5(r) algorithm with various key sizes. By sponsoring an actual contest, RSA Laboratories helps the industry confirm theoretical estimates, and through this constant evaluation, vendors are motivated to continue to improve their security solutions. The distributed.net consortium utilized the idle time of computers throughout the world to search through the list of all possible 64-bit keys for RSA Security's RC5 algorithm to find the one secret key selected at random by RSA Laboratories that decrypts a given message correctly. RSA Laboratories sponsors a series of cryptographic challenges that allow individuals or groups to attempt to solve various encryption "puzzles" for cash prizes. The RC5-64 Challenge is one of a series of contests held to determine the difficulty of finding a symmetric encryption key by exhaustive search (trial-and-error). Previous contests include the DES Challenge, the RC5-40 Challenge and the RC5-56 Challenge. "We're very appreciative of all the volunteers who offered their time and computer's idle processing time to help solve this challenge," said David McNett, distributed.net co-founder and president. "We have once again shown how collective computing power can be applied to security technology with ordinary PCs. We look forward to future RSA Laboratories-sponsored challenges that will assist in helping the cryptographic community gauge the strength of an algorithm or application against exhaustive key search." "RSA Security congratulates the distributed.net team in solving the RC5-64 Secret-Key Challenge," said Burt Kaliski, chief scientist at RSA Laboratories. "We appreciate the persistence of distributed.net and the many individuals involved in completing the search for this one key. Their work helps the industry confirm how much work is involved to search exhaustively for a key - and how a huge volume of computing time can be harnessed. The various challenges we sponsor are very useful for tracking the state of cryptographic achievements and helping ensure that organizations are maintaining the highest levels of security to protect their most critical data assets." ---- About RSA Security Inc. RSA Security Inc., the most trusted name in e-security, helps organizations build trusted e-business processes through its RSA SecurID(r) two-factor authentication, RSA ClearTrust(r) Web access management, RSA BSAFE(r) encryption and RSA Keon(r) digital certificate management product families. With approximately one billion RSA BSAFE-enabled applications in use worldwide, more than 12 million RSA SecurID authentication users and almost 20 years of industry experience, RSA Security has the proven leadership and innovative technology to address the changing security needs of e-business and bring trust to the online economy. RSA Security can be reached at www.rsasecurity.com. RSA, RC5, BSAFE, ClearTrust, Keon, SecurID and The Most Trusted Name in e-Security are registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. All other products and services mentioned are trademarks of their respective companies. --------------------------------- A personal note: In case people are wondering, the key turned out to be 63 DE 7D C1 54 F4 D0 39 and the encrypted message was > "The unknown message is: Some things are better left unread." > I'm really happy with this - I wrote to Jim Bidzos proposing the contests way back in the fall of 1996, long before I came to work at RSA. At the time, I was aimed at killing DES, and creating pressure to ease the export limits on key size (they had just been raised from a ludicrous 40 up to 56. I didn't think this was good enough). I feel that I entirely suceeded. So I was in at the start of the contests, and at the end of this one (I was one of the two people at RSA who independently confirmed the decryption). I expect that this will be the last one attacked for a while - the next keylength is 72 bits, and at d.net's current rate, that would take them several centuries. Peter Trei --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From handy_stitch at freegasdaily.com Thu Sep 26 10:41:42 2002 From: handy_stitch at freegasdaily.com (Handy Stitch) Date: Thu, 26 Sep 10:41:42 2002 -0700 Subject: Portable Handheld Sewing Machine - On Sale Message-ID: <54336838.1517347@mailhost> The Handy Stitch mini sewing machine is so compact, you can hold it in the palm of your hand, and so portable you can store it in a drawer. Even if you've never sewed a stitch, you can sew like a pro with this machine. Included with the Handy Stitch is 4 Steel Bobbins, 3 Sewing Needles, 1 Needle Threader and 1 Extra Spool pin for regular sized thread. It comes complete and ready to use. With the Handy Stitch's compact design and the power of larger machines, You can sew like a pro, even if you never have before. To find out more or to order your Handy Stitch, please click on the link below: http://store.yahoo.com/cgi-bin/clink?youcansave+LyfwxX+handystitch.html ================================================================== This is brought to you by FreeGasDaily. You are receiving this because of your participation in the FREE GAS FOR LIFE sweepstakes. If you feel this has reached you in error or if you would no longer like to be eligible and would like to stop receiving offers from us, please visit http://www.freegasdaily.com and click on unsubscribe. Thank you. c&y&p&h&e&r&p&u&n&k&s&%m&i&n&d&e&r&~n&e&t& -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3501 bytes Desc: not available URL: From lttxwdtvm at canismajor.demon.co.uk Thu Sep 26 07:45:40 2002 From: lttxwdtvm at canismajor.demon.co.uk (lttxwdtvm at canismajor.demon.co.uk) Date: Thu, 26 Sep 2002 10:45:40 -0400 Subject: Are You Gay? Wanna Be ;) lcxxu Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1123 bytes Desc: not available URL: From mv at cdc.gov Thu Sep 26 11:14:15 2002 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 26 Sep 2002 11:14:15 -0700 Subject: thinkofthechildren.co.uk censored Message-ID: <3D934E77.7D287616@cdc.gov> http://www.TheRegUS.com/content/6/26426.html Host pulls satire site after police 'incitement' claim By Tim Richardson Posted: 09/25/2002 at 05:51 EST A satirical Web site that attempted to parody concerns over child safety has been shut down following the intervention of police. Thinkofthechildren.co.uk was pulled on Monday after officers from the Metropolitan Police Service's Obscene Publications and Internet Unit contacted the site's hosts alleging that that it could incite others to violence. Police said they approached Host Europe after they received a number of complaints about the site from concerned members of the public. Host Europe shut down the site after they failed to contact the site's owner. However, the incident has sparked a strongly worded response from those running the site. A message reads: "Sorry, Thinkofthechildren.co.uk has been torched by an angry mob." "There was no warrant issued. No form of official order at all. Just a polite request - which was immediately complied with," it says. For those of who didn't see the site before it was pulled, the first paragraph read: "We are concerned parents, many of whom have children of our own and who want the law changed to protect them. Every day in Britain happy, popular children who do well at school are being murdered by evil paedophile scum. Well enough's enough! Its time the law got tough on child murderers." However, the site's owners claim this was all part of the satire and explain that it should be interpreted as follows: "This is a work of satire. It might not be very funny satire, but it is satire. It is in no way an incitement to commit mob violence. It is quite obvious to anyone who reads any of the words on the site that it is a piece of comment on Britain's tabloid-fuelled, pig-ignorant mob culture." Those behind the site say they are seeking legal advice before deciding what to do next. They conclude: "I'll leave you to ponder the irony of a site parodying mob culture being removed on the basis of complaints from a tiny group of very stupid - but very loud - members of the public." No one from Thinkofthechildren.co.uk was available for comment at the time of writing. . From profitking at yahoo.com Thu Sep 26 11:11:19 2002 From: profitking at yahoo.com (profitking at yahoo.com) Date: Thu, 26 Sep 2002 14:11:19 -0400 Subject: Collect $20,000 CASH yiour first month doing this!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Message-ID: <200209261811.g8QIBJv17914@waste.minder.net> charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII"; charset="US-ASCII" Reply-To: profitking at yahoo.com Date: Thu, 26 Sep 2002 14:11:19 -0400 X-Priority: 3 X-Library: Indy 9.00.10 X-Mailer: Foxmail ..If you're sick of scams, then read this, and do what it says. I WILL MAKE YOU A PROMISE. Read this email to the end, follow the instructions, and you won't have to worry about funding your retirement, having money to play, or making ends meet... EVER. I know what you are thinking. I never responded to one of these before either. Then one day I realized that I throw away $25 going to a movie for 2 hours with my wife, why not try investing this same $25 in a system that just might work. I don't know why that day I decided to take a chance, but I can't even come close to imagining if I hadn't - I guess I'd still be poor. Read on. It's true. Every word of it. It's legal, and it's ethical. Not only are you making money from your own business, you're helping other people achieve their goals and fulfill their dreams. Give it a shot, you'll see there is absolutely no way you won't get AT LEAST a modest return on your start up capital. Okay - here's the scoop on CashByNet (CBN): ================================================== Due to the popularity of this particular email business, and the business potential of the Internet, a national weekly news program recently devoted an entire show to the investigation of this program to see if it's legal, and if it really can make people money. Their findings proved that there are "absolutely NO LAWS prohibiting the participation in the program, and if people can follow a few simple instructions they are bound to make amazing returns with only $25 in startup costs." DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. THE MORE PEOPLE WHO PARTICIPATE, THE BETTER OFF YOU BECOME, AND THE MORE INCOME YOU WILL MAKE. This is what one had to say: "I was approached many times before to participate in Cash By Net, but each time I passed on it. One day I decided that instead of going out that night, I would take the money I would have spent - invest it in this business, and see if it was as lucrative as everyone claimed. Two weeks went by . . . . nothing. Three weeks . . . . $50 dollars rolled in. At this point I was just relieved to get my money back. Then it happened - One week after this, I opened my mailbox to find $580 in $5 bills waiting for me. Its been about 8 months now, and I just bought a new Mercedes . . . black :) The startup costs are so small, and the time involved is less than 5 hours per week. Give it a shot - what do you have to lose?" Pam Hedland, South Bound Brook, New Jersey. ================================================== Another said: "Programs like this have been around for a long time but I never believed in them. But this year I won a $50 bet on the Patriots to win the Super Bowl. I got this email the following morning, and I felt like gambling. I spent $25 ordering the reports, and the other $25 paying a parking ticket. I followed the instructions meticulously - I thought I would at least get my original $25 back. As soon as I got the email out, not One week went by before I quadrupled my $25. I'd take that over the Patriots any day. I got excited, and that's when it started to explode. In less than 6 weeks I was already up $9500 bucks. It's been almost 4 months, and the flow hasn't stopped. On an average day, I get anwhere from $500 - $1500 in the mail. I always say that everything happens for a reason, and I feel that this was meant to be, maybe it is for you too. Just stick to the steps, do everything it says - and all of your hopes and dreams will be real - I promise." Greg Moran, Boston, MA. For more success stories and photos, go to http://www.cashbynet.net $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED. BE SURE TO SAVE A COPY OF THIS EMAIL AS A TEXT DOCUMENT FOR REFERENCE!!!! INSTRUCTIONS: =====Order all 5 reports from your personal CBN money list below ===== For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. === MAKE SURE YOU ORDER EACH OF THE 5 REPORTS === You will need all 5 reports so that you can save them on your computer and redistribute them. YOUR TOTAL START UP INVESTMENT: $5 X 5 = $25.00. Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happens to your computer. IMPORTANT - DO NOT ALTER THE NAMES OR SEQUENCE OF THE PEOPLE WHO ARE LISTED NEXT TO EACH REPORT. FOLLOW THE INSTRUCTIONS 1-6 VERY CLOSELY OR YOU WILL LOSE OUT ON THE MAJORITY OF THE PROFIT WHICH IS DUE TO YOU!! Once you understand the way this works, you will also see how it does not work if you alter it. Remember, this method has been tested, and proved and if you alter it, it will NOT work !!! This is a legitimate BUSINESS. You are offering a product for sale and getting paid for it. Treat it as such and you will be VERY profitable in a short period of time, and have something many people can't - a profitable business enterprise (and more money to do WHATEVER YOU COULD POSSIBLY WANT). For more information go to http://www.cashbynet.net ================================================== HERE IS YOUR PERSONAL CBN MONEY LIST : ================================================== REPORT# 1: 'The Insider's Guide To Advertising for Free On The Net Order Report #1 from: SPS 258 Harvard Street #306 Brookline, MA 02446 USA _______________________________________________________ REPORT # 2: The Insider's Guide To Sending Bulk Email On The Net Order Report # 2 from: Matt Colley 304 Twain Circle Bluff City, TN 37618 _______________________________________________________ REPORT # 3: Secret To Multilevel Marketing On The Net Order Report # 3 from : Greg Ferris 264 S. La Cienega Blvd. #1066 Beverly Hills, CA 90211 USA _______________________________________________________ REPORT # 4: How To Become A Millionaire Using MLM & The Net Order Report # 4 from: Tami C. Ickes 1667 Cumberland Road Bedford, PA 15522 USA _______________________________________________________ REPORT #5: How To Send Out One Million Emails For Free Order Report # 5 From: B. Turner 60 McKerrell Way SE Calgary, Alberta, Canada T2Z 1R7 _______________________________________________________ ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 USD cash for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper. On one of those sheets of paper, Write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS, your name AND postal address. _______________________________________________________ PLEASE READ ON . . . ======================= IMPORTANT!! STEPS 1-6 ======================= 1.. After you have ordered all 5 reports from your CBN money list, take this original saved email and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. 2.. Move the name & address in REPORT # 4 down TO REPORT # 5. 3.. Move the name & address in REPORT # 3 down TO REPORT # 4. 4.. Move the name & address in REPORT # 2 down TO REPORT # 3. 5.. Move the name & address in REPORT # 1 down TO REPORT # 2 6.. Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY! This is critical to YOUR success. ================================================== **** SAVE THE NEW MODIFIED EMAIL, AS THIS WILL BE THE OFFICIAL DOCUMENT WHICH YOU WILL SEND TO PROSPECTIVE CUSTOMERS. BE SURE TO HAVE YOUR NAME IN THE #1 POSITION AND THAT YOU DO NOT MAKE ANY OTHER CHANGES TO THIS DOCUMENT. THIS IS CRITICAL TO THE PERFORMANCE OF YOUR BUSINESS AND SUBSEQUENTLY THE SIZE OF YOUR PROFITS.**** As soon as you receive all 5 reports via email SAVE A COPY OF THEM! These are the products that your customers are paying for. Not only do these reports hold the secrets and instructions for your new venture, you will be redistributing them to customers when you receive payment. To assist you with marketing your business on the internet, the 5 reports will provide you with valuable marketing information on how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods you will use to get this venture going: METHOD # 1: BY SENDING BULK E-MAIL LEGALLY ================================================== Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receive only a 0.2% (2/10 of 1%) response (the response could be much better but lets just say it is only 0.2%). Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's=100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send 5,000 e-mail each for a total of 5 million e-mail sent out. The 0.2% response is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report # 5. THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half a million dollars). Your total income in this example is: 1..... $50 + 2..... $500 + 3..... $5,000 + 4..... $50,000 + 5.... $500,000 .... Grand Total=$555,550.00 REMEMBER, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone or half or even one 4th of those people mailed 100,000 e-mails each or more? THE NUMBERS DON'T LIE. VISIT CBN AT http://www.cashbynet.net/Calculator/ to plug in your own numbers and see the results. METHOD # 2: BY PLACING FREE ADS ON THE INTERNET ================================================== Advertising on the net is extremely inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response than just emails alone. We strongly suggest you start with Method # 1 and add METHOD #2 as you begin to become more knowledgeable about the business and study the 5 reports. Remember to always provide same day service on all orders to ensure proper return on the back end - this means quicker profits for you. $$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$ Follow these guidelines to guarantee your success: === If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. === After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT # 2. If you did not, continue advertising or sending e-mails until you do. **ONCE YOU HAVE RECEIVED 100 OR MORE ORDERS FOR REPORT # 2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in ! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business !!! ================================================= FOLLOWING IS A NOTE FROM THE ORIGINATOR OF CASH BY NET: Cash By Net has become a very popular business for many sole proprietors. However, this program will only work if you are willing to put in the time and effort to make it work. This is not a program for everybody. If you are just a passer by, and don't have a personal vision of success, delete this now. Life all comes down to a few opportunities - this is one of them. Have the courage to be free, and have the drive to reach your goals. Before you start working with us, take 10 minutes and write down your personal goals. What do you want in 5 years? 1 year? 6 months? Be realistic - set your goals high enough so you will work hard to reach them. Remember: You are the owner of your own destiny, make these goals become reality - only you know what needs to be done. You now possess the ideas, information, materials, and opportunity to become financially independent and reach your highest dreams. I hope you come along for the ride, it's a wonderful world ahead. From scribe at exmosis.net Thu Sep 26 09:42:07 2002 From: scribe at exmosis.net (Graham Lally) Date: Thu, 26 Sep 2002 17:42:07 +0100 Subject: RC5-64 solved Message-ID: <3D9338DF.2060303@exmosis.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Just noticed on /. that distributed.net wound up 4 years of intense CPU cycles, by getting the key to RSA's RC5-64 challenge. Distributed.net release: http://www.distributed.net/pressroom/news-20020926.html "On 14-Jul-2002, a relatively characterless PIII-450 in Tokyo returned the winning key to the distributed.net keyservers. The key 0x63DE7DC154F4D03 produces the plaintext output: ~ The unknown message is: some things are better left unread Unfortunately, due to breakage in scripts (dbaker's fault, naturally) on the keymaster, this successful submission was not automatically detected. It sat undiscovered until 12-Aug-2002. The key was immediately submitted to RSA Labs and was verified as the winning key." .g - -- "I look at your tanks, at the snipers, at the whole army, and feel joy. Because I know that these two rooms, in which we are huddled together, are stronger than all this might." - Tawfiq Tirawi -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.0 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQE9kzjcwT+AXPPRTIgRAp0DAKCFFkATGFsZeGZBwH45LTjz7tsmbgCfRWtG /9JbYOtw5OAcGQOL9AZyh4I= =X9e5 -----END PGP SIGNATURE----- From bill.stewart at pobox.com Thu Sep 26 22:50:36 2002 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 26 Sep 2002 22:50:36 -0700 Subject: Satirewire: HACKERS BEG BORING PEOPLE TO STOP ENCRYPTING EMAI Message-ID: <5.1.1.6.2.20020926224715.02ae6080@idiom.com> http://www.satirewire.com/news/aug02/encryption.shtml HACKERS BEG BORING PEOPLE TO STOP ENCRYPTING EMAIL Security Experts Concur Most of You Have Nothing Worth Encrypting Anyway San Jose, Calif. (SatireWire.com)  In an unusual worldwide appeal, the International Brotherhood of Computer Hackers today asked particularly boring people to please stop encrypting their emails. Please think of others when you encrypt [pictures of messages] Cracking messages like this are a waste of valuable hacker time, say hackers. According to IBCH President Bjvrn Haxor, hackers spend thousands of hours intercepting and cracking open encrypted emails  believing it to be "the good stuff"  only to find most contain little more than "Two priests walk into a bar," or "Hi Bob, here's my new email address." "Maybe you think hacking coded messages is simple, but it's not  well, except for the Microsoft Outlook ones," said Haxor. "The rest of it is a pain in the backdoor. So here's a tip: if you encrypt just because you want to keep your personal information 'secret,' but all you're encrypting is blather about your stupid promotion or a recipe for fruit salad, guess what? Your secret's already out. You're dull." ..............[more] From ben at algroup.co.uk Thu Sep 26 15:01:54 2002 From: ben at algroup.co.uk (Ben Laurie) Date: Thu, 26 Sep 2002 23:01:54 +0100 Subject: What good are smartcard readers for PCs References: Message-ID: <3D9383D2.3090508@algroup.co.uk> Lisa wrote: > They are also actively used to modify DirecTV & Dish Network access cards > to steal service. Damn. We'd better ban them then. I've heard this Interweb thingy is used to steal content - should we ban that, too? -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff From adam at homeport.org Fri Sep 27 06:38:40 2002 From: adam at homeport.org (Adam Shostack) Date: Fri, 27 Sep 2002 09:38:40 -0400 Subject: Anyone can get a clearance these days... Message-ID: <20020927133840.GB33162@lightship.internal.homeport.org> "The US Government has mistakenly given secret documents to the only man charged so far in connection with the 11 September attacks, Zacarias Moussaoui." http://news.bbc.co.uk/2/hi/americas/2284325.stm -- "It is seldom that liberty of any kind is lost all at once." -Hume From DaveHowe at gmx.co.uk Fri Sep 27 01:57:55 2002 From: DaveHowe at gmx.co.uk (David Howe) Date: Fri, 27 Sep 2002 09:57:55 +0100 Subject: thinkofthechildren.co.uk censored References: <3D934E77.7D287616@cdc.gov> Message-ID: <00d601c26604$0de4dc80$c71121c2@sharpuk.co.uk> at Thursday, September 26, 2002 7:14 PM, Major Variola (ret) was seen to say: The original fax from the Met is now online http://www.thinkofthechildren.co.uk/metfaxbig.shtml From ptrei at rsasecurity.com Fri Sep 27 08:27:00 2002 From: ptrei at rsasecurity.com (Trei, Peter) Date: Fri, 27 Sep 2002 11:27:00 -0400 Subject: RSA's RC5-64 Secret Key Challenge has been solved. Message-ID: > Ralf-P. Weinmann[SMTP:weinmann at cdc.informatik.tu-darmstadt.de] wrote: > > > On Thu, Sep 26, 2002 at 02:45:12PM -0700, John Gilmore wrote: > > [...] > > > > After getting that getting started, though, I suggest beginning a > > brute-force attack on the GSM cellphone encryption algorithm. That's > > in use in hundreds of millions of devices worldwide, protecting (or > > failing to protect) the privacy of billions of phone calls a day. > > Is A5/3 deployed yet? If not, a brute force attack is not needed, for A5/1 > and > A5/2 more efficient tools exist to cryptanalyse it. Even in real-time, > although > you might need to invest in some hard disk space before being able to > eavesdrop > and intercept. See the following paper for more information: > > "A. Biryukov, A. Shamir and D. Wagner, Real Time Cryptanalysis of A5/1 on > a PC" > > As for A5/3, I'm not really sure what key length network operators > are/will be > using, 64-128 bits are allowed in the design requirements documentation. > The > specification should be available on the 3GPP website. A5/3 is based on > Kasumi. > > Cheers, > Ralf > I spoke to David McNett (nugget at distributed.net) yesterday. He told me that they intend to fire up a the RC5-72 challenge, hoping to get lucky and find the key near the beginning. I think they're open to other suggestions, however. Factoring may or may not be reasonable. While RC5, DES, etc require minimal memory and storage, and can so run unobtrusively in the spare cycles of almost any machine, factoring, - even the seiving step - has large memory and storage requirements. The matrix reduction step at the end does not have any efficient distributed implementation I'm aware of. I think the lower RSA factoring challenges *may* be possible - RSA-576 is still standing, with a $10k prize. Other factoring challenges have up to $200k prizes. Challenges need to be carefully set up. It must be legal - hacking a deployed system in the face of the objections of the owner won't fly. It must be credible, in that there must be no reason to suspect collaboration between the challenger and the attacker. It must be realistic - it should model a real-world use closely enough to show that changes need to be made (the RSA secret key challenges where designed with IPSEC headers in mind - the single DES option was deprecated as soon as we showed that to be weak). This is an exciting time. With RC5-64 fallen, there are a lot of options for what to do next. The most interesting thing may not involve cryptanalysis. Peter Trei --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From declan at well.com Fri Sep 27 10:13:12 2002 From: declan at well.com (Declan McCullagh) Date: Fri, 27 Sep 2002 13:13:12 -0400 Subject: House will be busy next week fighting terrorism Message-ID: <5.1.1.6.0.20020927131245.023a7b30@mail.well.com> -- S. 2690, the Pledge of Allegiance Reaffirmation Act. Sponsored by Senator Tim Hutchinson, this bill reaffirms the motto "In God we trust" and the language of the Pledge of Allegiance in its entirety, including the phrase "one Nation under God." The Senate passed this bill on June 27, 2002 by a vote of 99-0. The bill was approved by the House Judiciary Committee on September 10, 2002 by a voice vote. From bmail at sds-usa.com Fri Sep 27 12:19:01 2002 From: bmail at sds-usa.com (bmail at sds-usa.com) Date: Fri, 27 Sep 2002 14:19:01 -0500 Subject: For: Data Capture, Data Conversion, Document Scanning, OCR, Marketing List Maintenance for Mailings, Rebate Programs, Fulfillment and Forms Processing Services NATIONWIDE please visit us at: www.sds-usa.com. Message-ID: <021a01c2665b$1e602630$7a00a8c0@sds202a> Hello ; For: Data Capture, Data Conversion, Document Scanning, OCR, Marketing List Maintenance for Mailings, Rebate Programs, Fulfillment and Forms Processing Services NATIONWIDE please visit us at: www.sds-usa.com. Please let us know if we can help you save time and money on your Forms Processing, Data Capture, Data Conversion and any Marketing Projects for Mailing List Maintenance, Rebate Programs and Fufillment. Thanks, Debra Rowan Solution Data Systems, Inc. Email: drowan at sds-usa.com Phone: (888) 519-1956 or (314) 842-5555 ____________________________________________________________________________ ___________________________ To Opt-out or be removed from future emails DO NOT RESPOND TO THIS EMAIL and we will automatically remove from our list. If you have an interest in continuing to receive emails in the future or are interested in our services please email us. Thank You. Send to: bmail at sds-usa.com ____________________________________________________________________________ ___________________________ From pete at flatline.org.uk Fri Sep 27 09:06:16 2002 From: pete at flatline.org.uk (Peter Clay) Date: Fri, 27 Sep 2002 17:06:16 +0100 (BST) Subject: RSA's RC5-64 Secret Key Challenge has been solved. In-Reply-To: <002b01c265e2$4c5db8a0$6501a8c0@VAIO650> Message-ID: On Thu, 26 Sep 2002, Lucky Green wrote: > Software defined radios would be well-suited to task, but those who > expended the effort of writing software-defined cellular telephony > modules so far understandably chose to sell the fruits of their labor to > paying customers rather than releasing the code as Open Source. The GNU project has a SDR implementation, which claims to implement at least a plain FM receiver, and has GSM as a "future direction": http://www.gnu.org/software/gnuradio/gnuradio.html Of course, as soon as someone implements a satellite PPV decoder on top of it the entire technology will probably be banned :( Pete -- Peter Clay | Campaign for _ _| .__ | Digital / / | | | Rights! \_ \_| | | http://uk.eurorights.org --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From sfurlong at acmenet.net Fri Sep 27 16:27:36 2002 From: sfurlong at acmenet.net (Steve Furlong) Date: Fri, 27 Sep 2002 19:27:36 -0400 Subject: What good are smartcard readers for PCs In-Reply-To: <3D94E169.39033952@cdc.gov> References: <3D94E169.39033952@cdc.gov> Message-ID: <200209271927.36954.sfurlong@acmenet.net> On Friday 27 September 2002 18:53, Major Variola (ret) wrote: > Besides, its computers we have to ban, then the internet problem goes > away too, see... No, that won't do it. People could still spread their dissentious ideas by telephone, and photocopy the intellectual property of content providers. We need to ban electricity, then the problem goes away... -- Steve Furlong Computer Condottiere Have GNU, Will Travel Vote Idiotarian --- it's easier than thinking From hdtrade at joins.com Fri Sep 27 04:01:20 2002 From: hdtrade at joins.com (buyer) Date: Fri, 27 Sep 2002 20:01:20 +0900 Subject: New product alerts Message-ID: <200209271056.g8RAudo79351@locust.minder.net> Date: Home Fingerprint door lock BFD-200 The BFD-200 can be opened with the touch of a user's fingertip without any risk of it being stolen or copied like cards or keys can and designed to comply with the global Fire and Safety Regulations.... FS-500D Great efficiency and fast verification time (within 0.3sec) User Registration : 30 Persons(incl. 2 main operator) Verification Rate : 99.99% Access Method : Fingerprint, Passwords, Key... Car security systme PG-3000 *Remote arming, disarming and panic *Up to 3000FT remote control range (FM modulation) *User EEPROM storage different code *Multi-function 4 button remote transmitter & pager ... ALPHA-2000 *Remote engine start *Remote door lock/unlock *Remote trunk release *Emegency panic alarm *Vehicle finding *Mute chirp sound mode .... Personal Breath alcohol detector CA-2000 CA2000TM uses same sophisticated oxide-semiconductor sensor 1)Sensor : Highly selective oxide-semiconductor sensor 2)Size : 120 x 60 x 25 mm 3)Weight : 200 grams.... Safe-Mate 1.Advanced MEMS Gas Sensor with high accuracy 2.Battery Life: Can use more than 800 times. 3. Display: 20 stages LCD. 4. Dimensions : 89.5×30×16.5mm(3 .5"×1.25"×.5")... Car 5.6" & 6" LCD TV OBT-828 with TV 5.6" Thin monitor design.Built-in 5.6"TFT-LCD Module.High resolution LCD display.Wide viewing angle.Low power consumption... OBT-868 with TV 6" Thin monitor design.Built-in 5.6"TFT-LCD Module.High resolution LCD display.Wide viewing angle.Low power consumption... Learn more about Buyers Service. If you are a buyer or importer, please Feel free to contact us. This message is coming to you as a result of an Opt-in Relationship our Clients have had with you. If you simply wish to be Removed from all future Messages, Please enter your full email address then CLICK "removed " botton HYUNDAI ORG INC. Tel : 02-459-3123 Fax : 02-3411-3118 Copyright @ 1995~2002 hyundai org Inc -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14012 bytes Desc: not available URL: From subscriptions at streetindex.com Fri Sep 27 19:02:38 2002 From: subscriptions at streetindex.com (Sweets Offer) Date: Fri, 27 Sep 2002 22:02:38 -0400 Subject: Free Indian Tasty Sweets. This week only. Message-ID: <200209280202.g8S1xlw2009044@md009.com> > Love Sweets? Forward to your friends! > ============================================ > > As a thank you gift, you may claim a free gift. This is part of your newsletter subscription. Free thank you gift when you signup. ------------------------------------------------------------ Simple signup, no shipping. Receive a Hamper of tasty sweets. (until Sep 30 only) http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 Tasty Indian Sweets give away ------------------------------------------------------------ Grab one of the tasty Indian sweets when you signup for our f.r.e.e service. http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 --- Indian Sweets and Gifts. Ends Sep 30. --- ------------------------------------------------------------ Tasty traditional Indian cookies give away. F.r.e.e signup and receive special Indian Sweets gift. Simple signup, f.r.e.e shipping. http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 Susan C. Telio Streetindex.com Support Team ============================================ This is a tell-a-friend service provided by StreetIndex, the ultimate business offer newsletter. If you no longer wish to be a member and receive our emails, send a remove email to: unsubscribe at streetindex.com To contact our customer support, email: custsupport at streetindex.com ============================================ Street Index http://www.StreetIndex.com (c) 1999-2001 From tightteengifdqncg at poczta.fm Fri Sep 27 20:03:26 2002 From: tightteengifdqncg at poczta.fm (tightteengifdqncg at poczta.fm) Date: Fri, 27 Sep 2002 22:03:26 -0500 Subject: I cannot believe a 18 year old girl can handle a Giant horse Cock? pdesemwc Message-ID: <1033178606.591584@mail175.registrymails.com> SEE THE LIVE ANIMAL ON TEEN ACTION FREE!! You think you have seen some pretty crazy porn on the internet? YOU HAVEN'T SEEN SHIT! I saw the most unbelievable movie clip ever to grace the internet! These guys put up a clip of a beautiful teen farm girl who actually fucks her horse!NO BULLSHIT,SHE ACTUALLY FUCKS A HORSE WITH A 31 INCH COCK! http://www.tnt-hosting.com/put/ THE MOVIE QUALITY IS GREAT AND HAS SOUND TOO! IT IS UNBELIEVABLE! THIS LITTLE SLUT CAN REALLY HANDLE A GIANT HORSE COCK IN HER TIGHT LITTLE TEEN PUSSY LIKE YOU WOULD NOT BELIEVE! YOU HAV TO WATCH THIS CLIP BEFORE SOMEONE FINDS IT AND TAKE IT OFF. http://www.tnt-hosting.com/put/ HERES THE GOOD PART. THESE GUYS AREN'T A NORMAL PORN SITE SO THEY DON'T WANT MONEY TO LET US WATCH SO ITS FREE. BUT WHAT THEY DO IS MAKE YOU TAKE THIS TEST THAT ASKS HOW BIG A HORSE DICK IS. THAT'S SOMETHING THAT ONLY PEOPLE INTO ANIMAL SEX WOULD KNOW. SO I THINK THEY ARE JUST TRYING TO MAKE SURE YOU ARE SOMEONE WHOS INTO THIS STUFF..NOT SOMEONE WHO WANTS TO BUST THEM. SO IF YOU'RE LIKE ME AND DON'T KNOW ANYTHING ABOUT ANIMALS JUST GUESS THE SIZE. THERE ARE ONLY 3 CHOICES AND IF YOU GET IT RIGHT YOU'RE IN. YOU GET TO WATCH THE WHOLE CLIP..AND HEY DO NOT FORGET TO SAVE IT CUZ YOU'LL WANT TO WATCH IT AGAIN OR SHOW IT TO YOUR FRIENDS LATER!CLICK ON THE LINK BELOW TO WATCH THIS LITTLE SLUT FUCK HER HORSE FOR 8 MINUTES! DO NOT FORGET TO SAVE IT SO YOU CAN WATCH IT AGAIN LATER! http://www.tnt-hosting.com/put/ plcurechaxf^nytroen(pbz From subscriptions at streetindex.com Fri Sep 27 19:55:32 2002 From: subscriptions at streetindex.com (Sweets Offer) Date: Fri, 27 Sep 2002 22:55:32 -0400 Subject: About your free Indian Tasty Sweets gift Message-ID: <200209280255.g8S2rLvp023987@md009.com> > Love Sweets? Forward to your friends! > ============================================ > > As a thank you gift, you may claim a free gift. Grab one of the special offer this week. Good luck! Free thank you gift when you signup. ------------------------------------------------------------ Simple signup, no shipping. Receive a Hamper of tasty sweets. (until Sep 30 only) http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 Special Indian Sweets For You. All for free! ------------------------------------------------------------ Like tasty sweets? We are giving you a Hamper of tasty sweets. (until Sep 30 only) http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 Tasty Indian Sweets give away ------------------------------------------------------------ Grab one of the tasty Indian sweets when you signup for our f.r.e.e service. http://www.streetindex.com/cgi-bin/offer.cgi?affid=1027 Susan C. Telio Streetindex.com Support Team ============================================ This is a tell-a-friend service provided by StreetIndex, the ultimate business offer newsletter. If you no longer wish to be a member and receive our emails, send a remove email to: unsubscribe at streetindex.com To contact our customer support, email: custsupport at streetindex.com ============================================ Street Index http://www.StreetIndex.com (c) 1999-2001 From relist at moversusa.com Sat Sep 28 01:08:36 2002 From: relist at moversusa.com (relist at moversusa.com) Date: Sat, 28 Sep 2002 04:08:36 -0400 Subject: MOVING LEADS YOU CAN'T RESIST Message-ID: <200209280808.g8S88kv09779@waste.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12511 bytes Desc: not available URL: From bill.stewart at pobox.com Sat Sep 28 09:47:09 2002 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 28 Sep 2002 09:47:09 -0700 Subject: What good are smartcard readers for PCs In-Reply-To: <20020928005315.GC12055@cybershamanix.com> References: <200209271927.36954.sfurlong@acmenet.net> Message-ID: <5.1.1.6.2.20020928094529.031e7320@idiom.com> At 07:53 PM 09/27/2002 -0500, Harmon Seaver wrote: > Forget the pencils and pens, just ban paper. Or perhaps a step in the right >direction would be to ban all paper except that made from hemp, thereby >solving >numerous problems at the stroke of a (gasp) pen. You don't need to do that - just require that all the possible copyright-infringement media, such as paper and cdroms, have a stamp on them as a receipt for the copyright tax. Oh, wait, I suppose that's been done before.... From kiwibingo at pickyourflick.com Sat Sep 28 16:58:03 2002 From: kiwibingo at pickyourflick.com (Bingo Bucks) Date: Sat, 28 Sep 16:58:03 2002 -0700 Subject: Get $100 Free!! Message-ID: <22961041.4870997@mailhost> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5565 bytes Desc: not available URL: From smesmith7026j61 at hotmail.com Sat Sep 28 10:45:24 2002 From: smesmith7026j61 at hotmail.com (smesmith7026j61 at hotmail.com) Date: Sat, 28 Sep 2002 17:45:24 -0000 Subject: Life Insurance Price Wars 7721afBk4-065UAKH585-19 Message-ID: <028b68e42e4d$5148a3a6$3dc84ca7@jnkvql> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1763 bytes Desc: not available URL: From ericm at lne.com Sun Sep 29 15:32:44 2002 From: ericm at lne.com (Eric Murray) Date: Sun, 29 Sep 2002 15:32:44 -0700 Subject: smartcards Message-ID: <20020929153244.A1177@slack.lne.com> Someone who's sending from a mailer that lne.com blocks because of spam said: ----- Forwarded message from r00t-cypherpunks at lne.com ----- ------------------------------------------------------------ [...] > When Chaumian money comes into wide use, I think that for most > end users we will have to stash all unused tokens inside > smartcards. However, because of the critical mass problem, > initial deployment for small payments cannot rely on such > means, though initial deployment for large payments could. Here in Hong Kong, contactless "Octopus" smartcards (based on the Sony FeliCa device) are well established for paying fares on buses, ferries and subways, and also for small transactions with vending machines, convenience stores and supermarkets. The implementation is definitely non-Chaumian (it's based on symmetric encryption using shared secrets for both mutual authentication and secure transfer of value) but the cards can be purchased and reloaded with cash. Alas, the system does not allow uploads of value to banks or peer-to-peer transfers, as Mondex did. For those who may be interested, the standard is ISO/IEC 14443: http://makeashorterlink.com/?O1B042DE1 The card's specs are at: http://www.sony.net/Products/felica/pdf/833e.pdf Reader: http://www.sony.net/Products/felica/pdf/441e.pdf General info: http://www.sony.net/Products/felica/index.html Second source: http://www.mitsubishi.co.jp/iccard/main/3_smart/smart.html Enzo ----- End forwarded message ----- From hoteqtnooxu at jubiipost.dk Sun Sep 29 18:27:18 2002 From: hoteqtnooxu at jubiipost.dk (hoteqtnooxu at jubiipost.dk) Date: Sun, 29 Sep 2002 20:27:18 -0500 Subject: Free Teen De-virginization Clip..Only 7 minutes long but its free and won't be around long! thscavbd Message-ID: <1033345638.3193@mail.streetcarnameddesire.com> THINK YOU'VE SEEN SOME HARDCORE PORN ON THE NET? YOU HAVEN'T SEEN SHIT! YOU DON'T EVEN UNDERSTAND THE WORD HARDCORE UNTIL YOU SEE WHAT I SAW LAST NIGHT! I'M NOT EVEN SURE ITS SANE! http://www.tnt-hosting.com/roz/ You think you have seen some pretty crazy porn on the internet? I saw the most unbelievable movie clip ever to grace the internet! This is borderline crazy! These guys put up a clip of a HOT BUT INNOCENT LITTLE TEEN. SHE SAID SHE WAS A VIRGIN AND SO ON...THEN THEY GOT DOWN TO IT AND SHE GETS FUCKED BY SOME GUY..SHE ACTUALLY FUCKIN BLEEDS! SHE WAS ACTUALLY A VIRGIN..ITS UN FUCKIN BELIEVABLE. THEY PAID HER 50K TO WAIT TILL AFTER HER 18TH BIRTHDAY AND LOSE HER VIRGINITY ON CAMERA! THIS IS THE NEWEST MOST HARDCORE THING TO DATE! http://www.tnt-hosting.com/roz/ THE MOVIE QUALITY IS GREAT AND HAS SOUND TOO! IT IS UNBELIEVABLE! I REALLY CAN'T GET OVER IT! AT FIRST SHE ACTS ALL SLUTY BUT WHEN HE PUTS HIS COCK IN HER YOU CAN SEE HOW IT HURTS HER! YOU HAVE TO WATCH THIS CLIP BEFORE SOMEONE FINDS IT AND TAKE IT OFF. HERES THE GOOD PART. THESE GUYS AREN'T A NORMAL PORN SITE SO THEY DON'T WANT MONEY TO LET US WATCH SO ITS FREE. BUT THEY ONLY LET YOU IN IF YOU'RE ONE OF THEM..IF YOU LIKE THE TEEN STUFF. BUT WHAT THEY DO IS MAKE YOU TAKE THIS TEST THAT ASKS HOW BIG HER TITTS ARE . THAT'S SOMETHING THAT ONLY PEOPLE INTO YOUNG GIRLS WOULD KNOW. SO I THINK THEY ARE JUST TRYING TO MAKE SURE YOU ARE SOMEONE WHOS INTO THIS STUFF..NOT SOMEONE WHO WANTS TO BUST THEM. SO IF YOU'RE LIKE ME AND DON'T KNOW ANYTHING ABOUT IT JUST GUESS THE SIZE. THERE ARE ONLY 3 CHOICES AND IF YOU GET IT RIGHT YOU'RE IN. YOU GET TO WATCH THE WHOLE CLIP..AND HEY DO NOT FORGET TO SAVE IT CUZ YOU'LL WANT TO WATCH IT AGAIN OR SHOW IT TO YOUR FRIENDS LATER! http://www.tnt-hosting.com/roz/ CLICK HERE TO WATCH THIS LITTLE SLUT GET FUCKED FOR THE FIRST TIME OF HER LIFE! DO NOT FORGET TO SAVE IT SO YOU CAN WATCH IT AGAIN LATER! plcurechaxf^nytroen(pbz From kaupdates at PopCorn.net Sun Sep 29 20:45:56 2002 From: kaupdates at PopCorn.net (lugDenise) Date: Sun, 29 Sep 2002 20:45:56 -0700 Subject: xrb Message-ID: <200209300344.g8U3ido70958@locust.minder.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1601 bytes Desc: not available URL: From subscriptions at themoviesociety.com Mon Sep 30 02:37:21 2002 From: subscriptions at themoviesociety.com (Disney Fans) Date: Mon, 30 Sep 2002 05:37:21 -0400 Subject: This week only. Get 3 Disney Movies for F-R.E-E. Message-ID: <200209300937.g8U9ZWvT003620@qq76.mcmorg.com> > Love Disney Movies? Forward to your friends! > ============================================ > > > This message is part of the tell-a-friend offer news-letter. Join and grab one of the special offer this week or tell your friends to get theirs. Good luck! -- TheMovieSociety 5 Anniv sweep-stake -- -------------------------------------------------------------------- Join now and enter our sweep-stake. http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 (once joined, also check out the movie offers!) Disney Movies give away -------------------------------------------------------------------- Grab one of the hottest Disney Movie. First 3 order is f.r.e.e! Click Here: http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 Send yourself or your friend 3 Disney movies -------------------------------------------------------------------- Get 3 FREE Disney Movies. Video, VCD or DVD. Choose your favorite titles today! Click Here -- http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 Robert Filio Event support - The Movie Society ============================================ This is a tell-a-friend service provided by TheMovieSociety, the movie fans opt in news-letter. If you are sub-scribed but no longer wish to be a member and receive our emails, send a remove email to: un-sub-scribe-now at themoviesociety.com To contact our club support, email: opt-in-support at themoviesociety.com ============================================ MAIL OPEN - IP VIEW LOG - MACHINE LOG - ISP LOG The Movie Society - 1998, 1999, 2000, 2001, 2002 - From jamesd at echeque.com Mon Sep 30 13:05:14 2002 From: jamesd at echeque.com (James A. Donald) Date: Mon, 30 Sep 2002 13:05:14 -0700 Subject: smartcards In-Reply-To: References: <"from jamesd"@echeque.com> Message-ID: <3D984C0A.29416.11E2F8C@localhost> -- On 30 Jan 2050 at 32:210, Steve Thompson wrote: > I'm surprised that nobody has mentioned cell-phones as a > digital cash platform.[....] > > The problem is that phone software is (to my knowledge) all > closed-source and running on proprietary hardware. What's > the liklihood of manufacturers opening up their phones for > third-party code? An open platform would be a combined cell phone and palm top computer. Lots of people are trying to move this -- so far without wide acceptance. Paypal's original vision was that people would use palm pilots with IR. If phones developed palm pilot capabilities, this vision would become more useful. I think combining the palm pilot with the cell phone is more feasible once we develop a good voice controlled computer, after the fashion of startrek, which may be some time off. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG z0mctqiLain3vlXnFZTOy5PEVJIwCeg0x7zxl4RQ 4DWhd8THkIxyeHtI7sSA5O1d9IKi7WwGZVh6roOOb From ptrei at rsasecurity.com Mon Sep 30 13:21:26 2002 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 30 Sep 2002 16:21:26 -0400 Subject: smartcards Message-ID: > Steve Thompson[SMTP:stevet010 at yahoo.com] wrote: > > I'm surprised that nobody has mentioned cell-phones as a digital cash > platform. > Perhaps this belabours the obvious, but I'll spell it out anyways: > > o They are ubiquitous. > > o Most of them have an IR port and many contain enough storage and > horsepower to keep and play small MP3 collections. Chaumian digital > cash > code should fit easily. Hell, some companies are already making > noises > about full-motion video. How long before the damn things have a > digital > camera built in? > > o Peer-to-peer transactions will obviously work via IR. Central > clearing > mechanisms will work through the phone net. Thus they embody the > basic > infrastructure for both worlds. The entire thing could be done over > SMS, > of course, but IR for peer-to-peer, day-to-day transactions is best > from a > privacy and usability standpoint. > > o PC-based software is in use for the synchronisation of calendar data, > etc. > Many people are already familiar with using their phones for these > kinds > of purposes so what's one more application to the user? > > The problem is that phone software is (to my knowledge) all closed-source > and > running on proprietary hardware. What's the liklihood of manufacturers > opening up their phones for third-party code? A Java VM might do it, as > might > something lean like an Inferno VM. More informed list members could > probably > suggest other virtual machines which would suit our purposes. > [...] > Regards, > Steve > The phone SW world is nowhere near as closed as you think. * Thousands of developers are writing Java applets for Japanese iMode phones. * Hundreds are developing applets for the Blackberry 5810 and 5820 phones (free Java-based IDS from RIM). * Similarly, the high end Pocket PC and Palm phones both have free or inexpensive development environments (C/C++) * Finally, Qualcomm phones support BREW (free SDK, expensive training). My take on the situation is that the platform vendors are so anxious to get developer mindshare, and new apps, that they are for the most part giving away the development environments and specs. Peter Trei From tstwxcwg at yahoo.com Mon Sep 30 15:41:27 2002 From: tstwxcwg at yahoo.com (M Deki) Date: Mon, 30 Sep 2002 18:41:27 -0400 Subject: Hepsi xrds Message-ID: Ensest siteler - En son videolar - Y�ksek kalite resimler S�n�rs�z porno ar�ivi yenilendi: Onlarca film ve foto�raf Normal internet ba�lant�n�zdan 10 kat h�zl� bir ba�lant�yla, videolar� kendi bilgisayar�n�zdan izledi�iniz gibi izlemek veya akl�n�za gelebilecek her kategoride binlerce y�ksek kaliteli resim e ula�mak i�in http://www.jetseks.com adresini ziyaret ediniz. Sitemiz t�m isteklerinizi kar��layacak kadar geni�tir. Sadece hayal edin ve izlemeye ba�lay�n. �yi e�lenceler http://www.jetseks.com From pwk at acm.org Mon Sep 30 19:31:19 2002 From: pwk at acm.org (Paul Krumviede) Date: Mon, 30 Sep 2002 19:31:19 -0700 Subject: Real-world steganography In-Reply-To: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> References: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> Message-ID: <252545881.1033414279@localhost> --On Tuesday, 01 October, 2002 13:54 +1200 Peter Gutmann wrote: > I recently came across a real-world use of steganography which hides extra > data in the LSB of CD audio tracks to allow (according to the vendor) the > equivalent of 20-bit samples instead of 16-bit and assorted other > features. According to the vendors, "HDCD has been used in the recording > of more than 5,000 CD titles, which include more than 250 Billboard Top > 200 recordings and more than 175 GRAMMY nominations", so it's already > fairly widely deployed. maybe. i'm not sure how many players support it (my spectral D/A convertor does, but then some of the people at spectral seem to have invented HDCD). while the CDs i have that use it sound pretty good, i don't have any good way to compare them when played back over a non-HDCD capable convertor (i could hook up one of my computer CD drives, but that doesn't seem fair compared to the spectral transport-D/A combination). but when i do play such CDs on other gear, i don't notice any audible degradation, so it isn't obviously harmful. i've seen comments in reviews of professional CD mastering gear that there are other, seemingly preferred, technologies, although i've never found details of them. -paul --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From xxxDerrickxxx at hotmail.com Mon Sep 30 18:19:49 2002 From: xxxDerrickxxx at hotmail.com (xxxDerrickxxx at hotmail.com) Date: Mon, 30 Sep 2002 20:19:49 -0500 Subject: Howdy Message-ID: <4119-22002102111949470@D2T6LG11> Want to make a million bucks this year? Make a million!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ME TOO BUT IT'S probably NOT GOING TO HAPPEN!!!!! However if your looking for the opportunity to make a couple thousand a week, working form home, with your pc, we need to talk. If you're over 18 and a US resident, Just Click REPLY Send me your Name, State, Complete telephone number, and the best time to contact you. From pwk at acm.org Mon Sep 30 20:30:20 2002 From: pwk at acm.org (Paul Krumviede) Date: Mon, 30 Sep 2002 20:30:20 -0700 Subject: Real-world steganography In-Reply-To: <3D991349.5050903@rot26.com> References: <3D991349.5050903@rot26.com> Message-ID: <256087474.1033417820@localhost> <<< No Message Collected >>> From bram at gawth.com Mon Sep 30 21:38:53 2002 From: bram at gawth.com (Bram Cohen) Date: Mon, 30 Sep 2002 21:38:53 -0700 (PDT) Subject: Real-world steganography In-Reply-To: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> Message-ID: Peter Gutmann wrote: > I recently came across a real-world use of steganography which hides extra > data in the LSB of CD audio tracks to allow (according to the vendor) the > equivalent of 20-bit samples instead of 16-bit and assorted other features. I don't think that's really 'steganography' per se, since no attempt is made to hide the fact that the information is in there. The quasi-stego used is just to prevent bad audio artifacts from happening. -Bram Cohen "Markets can remain irrational longer than you can remain solvent" -- John Maynard Keynes --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From jeremey at rot26.com Mon Sep 30 20:15:21 2002 From: jeremey at rot26.com (Jeremey Barrett) Date: Mon, 30 Sep 2002 22:15:21 -0500 Subject: Real-world steganography References: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> <252545881.1033414279@localhost> Message-ID: <3D991349.5050903@rot26.com> Paul Krumviede wrote: | --On Tuesday, 01 October, 2002 13:54 +1200 Peter Gutmann | | maybe. i'm not sure how many players support it (my spectral D/A | convertor does, but then some of the people at spectral seem to | have invented HDCD). while the CDs i have that use it sound | pretty good, i don't have any good way to compare them when | played back over a non-HDCD capable convertor (i could hook | up one of my computer CD drives, but that doesn't seem fair | compared to the spectral transport-D/A combination). | The extra 4 bits add quite a bit, subjectively. I've compared the same CD on the same system with an HDCD player and non-HDCD player. | but when i do play such CDs on other gear, i don't notice any | audible degradation, so it isn't obviously harmful. | | i've seen comments in reviews of professional CD mastering | gear that there are other, seemingly preferred, technologies, | although i've never found details of them. | The other formats of note are probably SACD and then DVD-Audio. SACD is multichannel 16-bit/44.1kHz... so multichannel CD without additional sample resolution (if I recall). SACD is not "backwards compatible" though, whereas HDCD is. DVD-Audio is really the way to go, though... 24-bit/96kHz multichannel or up to 192kHz two-channel. Lots more bits, lots more samples. It makes a huge difference on "pretty good or better" gear. Regards, Jeremey. -- Jeremey Barrett [jeremey at rot26.com] Key: http://rot26.com/gpg.asc GnuPG fingerprint: 716E C811 C6D9 2B31 685D 008F F715 EB88 52F6 3860 --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From adam at homeport.org Mon Sep 30 19:45:00 2002 From: adam at homeport.org (Adam Shostack) Date: Mon, 30 Sep 2002 22:45:00 -0400 Subject: Real-world steganography In-Reply-To: <252545881.1033414279@localhost> References: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> <252545881.1033414279@localhost> Message-ID: <20021001024500.GA81925@lightship.internal.homeport.org> On Mon, Sep 30, 2002 at 07:31:19PM -0700, Paul Krumviede wrote: | --On Tuesday, 01 October, 2002 13:54 +1200 Peter Gutmann | wrote: | | >I recently came across a real-world use of steganography which hides extra | >data in the LSB of CD audio tracks to allow (according to the vendor) the | >equivalent of 20-bit samples instead of 16-bit and assorted other | >features. According to the vendors, "HDCD has been used in the recording | >of more than 5,000 CD titles, which include more than 250 Billboard Top | >200 recordings and more than 175 GRAMMY nominations", so it's already | >fairly widely deployed. ... | i've seen comments in reviews of professional CD mastering | gear that there are other, seemingly preferred, technologies, | although i've never found details of them. The two that spring to mind are HDCD and XRCD. I'd never dug into how they're recorded, being much more interested in playing with things closer to the output stage, like speaker resonance control and electrical hum elimination... Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From stevet010 at yahoo.com Mon Sep 30 19:03:20 2002 From: stevet010 at yahoo.com (Steve Thompson) Date: Tue, 1 Oct 2002 02:03:20 +0000 Subject: smartcards In-Reply-To: Message-ID: Quoting Trei, Peter (ptrei at rsasecurity.com): > The phone SW world is nowhere near as closed as you think. > > * Thousands of developers are writing Java applets for Japanese iMode > phones. > * Hundreds are developing applets for the Blackberry 5810 and 5820 phones > (free Java-based IDS from RIM). > * Similarly, the high end Pocket PC and Palm phones both have free or > inexpensive > development environments (C/C++) > * Finally, Qualcomm phones support BREW (free SDK, expensive training). I stand corrected. I'm even reading a short bit about Nokia's new 3g phone: http://www.theregister.co.uk/content/54/27310.html "The device, known as the Nokia 6650, is also notable for allowing users to record up to 20 seconds of video (128x96 pixels) with sound using a built in VGA camera employing 4096 colours, the first Nokia phone to offer the facility...." "Other features include a multimedia messaging service (MMS) client, a WAP 1.2.1-compatible browser, integrated Bluetooth, a "wallet" application for mobile transactions, and a Java 2 Micro Edition (J2ME) virtual machine based on the mobile information device profile (MIDP)." Includes infrared and USB as well. Not much quickly available describing the wallet app, but it probably isn't peer-to-peer. > My take on the situation is that the platform vendors are so anxious to get > developer mindshare, and new apps, that they are for the most part giving > away the development environments and specs. IOW, a decent number of platforms are ready to go. Cool. Regards, Steve From pgut001 at cs.auckland.ac.nz Mon Sep 30 18:54:30 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 1 Oct 2002 13:54:30 +1200 (NZST) Subject: Real-world steganography Message-ID: <200210010154.NAA93137@ruru.cs.auckland.ac.nz> I recently came across a real-world use of steganography which hides extra data in the LSB of CD audio tracks to allow (according to the vendor) the equivalent of 20-bit samples instead of 16-bit and assorted other features. According to the vendors, "HDCD has been used in the recording of more than 5,000 CD titles, which include more than 250 Billboard Top 200 recordings and more than 175 GRAMMY nominations", so it's already fairly widely deployed. >From http://www.hdcd.com/partners/proaudio/overview.html: [...] Hidden Code Addition/Output Dither/Quantization The final step in the reduction to 16 bits is to add high-frequency weighted dither and round the signal to 16-bit precision. The dither increases in amplitude in the frequency range of 16 to 22.05 kHz, leaving the noise floor flat below 16 kHz where the critical bands of hearing associated with tonality occur. As part of the final quantization, a pseudo-random noise hidden code is inserted as needed into the least significant bit (LSB) of the audio data. The hidden code carries the decimation filter selection and Peak Extend and Low Level Range Extend parameters. Inserted only 2?5 percent of the time, the hidden code is completely inaudible-effectively producing full 16-bit undecoded playback resolution. The result is an industry-standard 44.1-kHz, 16-bit recording compatible with all CD replication equipment and consumer CD players. [...] The paper describing the process is available under the somewhat misleading name http://www.hdcd.com/partners/proaudio/AES_Paper.pdf. The description of the stego en/decoding process is on p.15 (it's a rather long excerpt, but it's interesting stuff): As part of the final quantization, a hidden code side channel is inserted into the LSB when it is necessary for the encoder to inform the decoder of any change in the encoding algorithm. It takes the form of a pseudo-random noise encoded bit stream which occupies the least significant bit temporarily, leaving the full 16 bits for the program material most of the time. Normally, the LSB is used for the command function less than five percent of the time, typically only one to two percent for most music. Because the hidden code is present for a small fraction of the time and because it is used as dither for the remaining 15 bits when it is inserted, it is inaudible. This was confirmed experimentally with insertion at several times the normal fraction of time. [...] The mechanism which allows insertion of commands only when needed consists of encapsulating the command word and parameter data in a "packet". A synchronizing pattern is prepended to the data and a checksum is appended. The resulting packet is then scrambled using a feedback shift register with a maximal length sequence and inserted serially, one bit per sample, into the LSB of the audio data. The decoder sends the LSB's of the audio data to a complementary shift register to unscramble the command data. A pattern matching circuit looks for the synchronizing pattern in the output of the descrambler, and when it finds it, it attempts to recover a command. If the command has a legal format and the checksum matches, it is registered as a valid packet for that channel. The arrival of a valid packet for a channel resets a code detect timer for that channel. If both channels have active timers, then code is deemed to be present and the filter select data is considered valid immediately. However, any command data which would effect the level of the signal must match between the two channels in order to take effect. The primary reason for this is to handle the case where an error on one channel destroys the code. In such a case, the decoder will mistrack for a short time until the next command comes along, which is much less audible than a change in gain on only one channel, causing a shift in balance and lateral image movement. If either of the code detect timers times out, then code is deemed not to be present, and all commands are canceled, returning the decode system to its default state. If the conditions on the encoder side are not changing, then command packets are inserted on a regular basis to keep the code detect timers in the decoder active and to update the decoder if one starts playing a selection in the middle of a continuous recording. Since the decoder is constantly scanning the output of the de-scrambler shift register for valid command packets even when none are present, the possibility exists that there may be a false trigger. For audio generated by the encoder, this possibility is eliminated in the absence of storage and transmission errors by having the encoder scan the LSB of the audio data looking for a match. If a match to the synchronizing pattern is found, the encoder inverts one LSB to destroy it. Modern digital storage and transmission media incorporate fairly sophisticated error detection and correction systems. Therefore, we felt that only moderate precautions were necessary in this system. The most likely result of an error in the signal is a missed command, which can result in a temporary mis- tracking of the decoding, as mentioned above. Given the low density of command data, and the small changes to the signal which the process uses, these errors are seldom more audible than the error would be in the absence of the process. The chances of a storage error being falsely interpreted as a command are extremely small. For material not recorded using the encoder, a small probability for a false trigger does exist. Given a moderate length for the scrambling shift register so that its mapping behaves in a noise-like fashion and a choice of synchronizing pattern which avoids patterns likely to appear in audio data with a higher than average probability, susceptibility to false triggers can be made arbitrarily small by increasing the length of the part of the packet requiring a match. In the case of the current system, the combination of the synchronizing pattern with the bit equivalence for all valid commands plus check sum results in a required match equivalent to 39 sequential bits. For a stereo signal, in which a match must occur in both channels within a one second interval and the commands in both channels must specify the same gains, this amounts to an expectation of one event in approximately 150 million years of audio. The scrambling operation uses a feedback shift register designed for a maximal length sequence in which data taken from taps in the register are added using modulo two arithmetic, equivalent to an 'exclusive or' operation, and fed back to the input of the register. For a given register length there are certain configurations of taps which will produce a sequence of one and zero values at the output that does not repeat until 2N-1 values have emerged, where N is the length of the shift register. This corresponds to the number of possible states of the shift register minus one illegal state, and is called a maximal length sequence. Such an output sequence has very noise-like properties and, in fact, is the basis of some noise generators. We use the noise-like behavior of the generator to scramble the command signals by adding them modulo two to the input of the shift register, as for example in Figure 7a. This has the advantage that a second similar shift register with taps in the same places but with only feed forward addition modulo two (Figure 7b) will reproduce the original input sequence when fed with the output of the first one. The fact that the decode side has no feedback means that the initialization requirements are limited to having N input samples prior to the beginning of decoding, which means that the decoder will "lock up" very quickly. In this scheme, the presence of a bit error anywhere in the length of a packet plus initialization sequence will completely scramble the data, preventing recovery. However, in practice, this has not been a problem for reasons described above. Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com