From camera_lumina at hotmail.com Mon Aug 1 07:54:26 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 01 Aug 2005 10:54:26 -0400 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: Message-ID: Gee, that's great. A global organization that has taken the task of worldwide censorship into its sweaty little hands. Did the google cache'd versions of these sites dissappear too? Tor networks, anyone? -TD >From: "R.A. Hettinga" >To: cryptography at metzdowd.com, cypherpunks at jfet.org >Subject: [Clips] Finger points to British intelligence as al-Qaeda >websites are wiped out >Date: Sat, 30 Jul 2005 23:02:53 -0400 > >--- begin forwarded text > > > Delivered-To: clips at philodox.com > Date: Sat, 30 Jul 2005 23:01:38 -0400 > To: Philodox Clips List > From: "R.A. Hettinga" > Subject: [Clips] Finger points to British intelligence as al-Qaeda >websites > are wiped out > Reply-To: rah at philodox.com > Sender: clips-bounces at philodox.com > > > > The Times of London > > July 31, 2005 > > Finger points to British intelligence as al-Qaeda websites are wiped out > Over the past fortnight Israeli intelligence agents have noticed >something > distinctly odd happening on the internet. One by one, Al-Qaeda's >affiliated > websites have vanished until only a handful remain, write Uzi Mahnaimi >and > Alex Pell. > > Someone has cut the line of communication between the spiritual leaders >of > international terrorism and their supporters. Since 9/11 the websites >have > been the main links to disseminate propaganda and information. > > The Israelis detect the hand of British intelligence, determined to >torpedo > the websites after the London attacks of July 7. > > The web has become the new battleground of terrorism, permitting a >freedom > of communication denied to such organisations as the IRA a couple of > decades ago. > > One global jihad site terminated recently was an inflammatory Pakistani > site, www.mojihedun.com, in which a section entitled How to Strike a > European City gave full technical instructions. Tens of similar sites, >some > offering detailed information on how to build and use biological weapons, > have also been shut down. However, Islamic sites believed to be >"moderate", > remain. > > One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose > www.abubaseer.bizland.com remained operative after he condemned the >London > bombings. > > However, the scales remain weighted in favour of global jihad, the first > virtual terror organisation. For all the vaunted spying advances such as > tracking mobile phones and isolating key phrases in telephone > conversations, experts believe current technologies actually play into >the > hands of those who would harm us. > > "Modern technology puts most of the advantages in the hands of the > terrorists. That is the bottom line," says Professor Michael Clarke, of > King's College London, who is director of the International Policy > Institute. > > Government-sponsored monitoring systems, such as Echelon, can track vast > amounts of data but have so far proved of minimal benefit in preventing, >or > even warning, of attacks. And such systems are vulnerable to >manipulation: > low-ranking volunteers in terrorist organisations can create background > chatter that ties up resources and maintains a threshold of anxiety. >There > are many tricks of the trade that give terrorists secure digital > communication and leave no trace on the host computer. > > Ironically, the most readily available sources of accurate online > information on bomb-making are the websites of the radical American > militia. "I have not seen any Al-Qaeda manuals that look like genuine > terrorist training," claims Clarke. > > However, the sobering message of many security experts is that the > terrorists are unlikely ever to lose a war waged with technology. > > -- > ----------------- > R. A. Hettinga > The Internet Bearer Underwriting Corporation > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and antiquity, > [predicting the end of the world] has not been found agreeable to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > _______________________________________________ > Clips mailing list > Clips at philodox.com > http://www.philodox.com/mailman/listinfo/clips > >--- end forwarded text > > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"When the hares made speeches in the assembly and demanded that all should >have equality, the lions replied, "Where are your claws and teeth?" -- >attributed to Antisthenes in Aristotle, 'Politics', 3.7.2 From Ari at OLTECO.com Mon Aug 1 11:22:16 2005 From: Ari at OLTECO.com (Ari Ollikainen) Date: August 1, 2005 11:22:16 AM EDT Subject: US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05 Message-ID: For IP... High-tech border pass raises alarm Friday, July 29, 2005 - 07:00 Local News - By Jennifer Pritchett Whig-Standard Staff Writer Kingston's closest U.S. border crossing will employ high-tech radio frequency technology to monitor visitors from other countries who want to enter the States from Canada - a move that alarms both a Kingston privacy expert and an immigration specialist. The U.S. Department of Homeland Security said this week that the crossing between Lansdowne and Alexandria Bay, N.Y., will be one of three Canada-U.S. land borders to require non-Canadians to carry wireless devices as part of a pilot project. Travellers will be required to carry the devices as of Aug. 4. The technology is part of US-VISIT, a billion-dollar anti-terrorism initiative launched last December that has kept about 700 criminals, including one posing as a Canadian, out of the States. US-VISIT uses biometric information from photos and fingerprints taken from non-Canadians at border crossings to track residents from other countries who enter the U.S. Canadian citizens are the only people in the world exempt from US-VISIT. Travellers required to use the technology include landed immigrants living in Canada, Canadian citizens who are either engaged to a U.S. citizen or who have applied for a special business visa. They'll have to carry the wireless devices as a way for border guards to access the electronic information stored inside a document about the size of a large index card. Visitors to the U.S. will get the card the first time they cross the border and will be required the carry the document on subsequent crossings to and from the States. Border guards will be able to access the information electronically from 12 metres away to enable those carrying the devices to be processed more quickly. Two other border crossings between Surrey, B.C., and Blaine, Wash., will also be implementing the technology as part of the pilot project. Kimberly Weissman, spokeswoman for the US-VISIT program at the U.S. Department of Homeland Security told The Whig-Standard yesterday that the new devices can't be tracked outside the border crossing area. "It has a range of 10 to 15 metres," she said. "The UHF frequency that we've chosen makes it impossible to locate a specific person." But the use of the wireless technology raises alarm bells for Queen's University law professor and privacy expert Art Cockfield. "It's intrusive and these are worrisome developments," he said. "Often these technologies are introduced in a fairly minor form and then the technology is extended.What would be very troubling to me would be the tracking of visitors after they've crossed the border." Cockfield, who's part of a Queen's research group called the Globalization of Personal Data Team, said he's so alarmed by these new devices that his team will likely investigate them further after learning about them yesterday. Though the new devices don't violate Canadian law, because visitors are under the jurisdiction of American law once inside the U.S., Cockfield said their use raises disturbing questions about how the technology may be used in the future. "If I'm close to the border and still on Canadian ground and a U.S. customs guard is scanning me and finding out personal information about me, that actually might be a violation of Canadian law because they're collecting information on a Canadian resident who is still in Canada," Cockfield said. He said the devices smack of a "Martha Stewart-like prison tracking device." "It's one thing to have a police officer approach you and ask for your identification, but it's another thing for somebody sitting in an office somewhere in Washington to track all your movements through a satellite signal," he said. "It's in the realm of possibilities." He said the devices move the world closer to a total surveillance society. "It certainly tracks you as you approach the border and as you cross the border," he said. "If we think we're subject to government surveillance, that immediately changes our behaviour," he said. "If you want to swear about Bush, you might hold yourself back. It inhibits political dissent because if we think the government is watching us, we'll be less likely to call a town hall meeting to protest something we're upset about." Cockfield, who just moved back to Canada from a seven-year stint teaching in Texas, also believes the devices will result in less cross-border traffic. "I try not to go as frequently as usual because of these border hassles, and I'm white and I'm a Canadian citizen," he said. "If I was non-white and a landed immigrant, I would hesitate to a greater extent." He said the initiative will have a long-term, negative impact on Canada-U.S. relations. "The flows of people [across the border] bring about ties and understanding between the two countries," he said. "If we inhibit those flows, then maybe it will actually harm the security of the U.S. We will be less trusting of the Americans." Sam Laldin of Kingston and District Immigrant Services also agrees that requiring non-Canadians to carry such electronic devices may deter some people from travelling to the U.S. "If I don't have to, I will avoid going there," he said. Laldin, who came to Canada from Pakistan in 1967, said a lot has changed since he became a Canadian citizen in 1970. Laldin said this latest security step will affect hundreds of people living in Kingston, many of whom use the Lansdowne border crossing when they travel to the U.S. Last year alone, Kingston District Immigrant Services provided assistance to roughly 1,200 people from 35 countries. Laldin said the devices open the door to the possibility of the American government tracking people and gathering intelligence about them. "I kind of feel uncomfortable because I don't know what that device is doing and I don't know where that device is reporting," he said. "Although they say it will expedite your entry through the border, it may be doing something else, too." While he understands that extra measures may need to be taken to ensure that non-Canadians entering the U.S. have the proper documentation, he doesn't agree with the use of the electronic devices. "The flip side of all this is the security and safety of the country and the people living in the country and where to draw the line - it's a difficult thing," he said. "I think they could do everything they need to do at the border crossing instead of giving people something to carry with them," he said. "My nephew is a Canadian medical doctor and each time he crosses back and forth, they fingerprint him, which is fine if that's the law they want. People come prepared and they know they'll be fingerprinted. "But to carry a device is something I personally don't think I would want to do." - With a file from Whig-Standard News Services -- - - - Sometimes I wonder whether the world is being run by smart people who are putting us on or by imbeciles who really mean it. --Mark Twain ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Mon Aug 1 08:32:33 2005 From: dave at farber.net (David Farber) Date: Mon, 1 Aug 2005 11:32:33 -0400 Subject: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05 Message-ID: Begin forwarded message: From camera_lumina at hotmail.com Mon Aug 1 10:51:57 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 01 Aug 2005 13:51:57 -0400 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: <20050801151517.GN2259@leitl.org> Message-ID: What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic and then slammed your node. Ain't no hacker gonna do that. Any indication the ostensible originating IP addresses are faked? -TD >From: Eugen Leitl >To: Tyler Durden , cypherpunks at jfet.org >Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda >websites are wiped out >Date: Mon, 1 Aug 2005 17:15:17 +0200 > >On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: > > > Tor networks, anyone? > >Caveat when running Tor on a production machine, I got DDoS'd >recently with some ~300 MBit/s. (Yes, my exit policy didn't >contain IRC). > >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From danmcd at east.sun.com Mon Aug 1 14:12:38 2005 From: danmcd at east.sun.com (Dan McDonald) Date: Mon, 1 Aug 2005 17:12:38 -0400 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: References: <20050801151517.GN2259@leitl.org> Message-ID: <20050801211238.GN783@everywhere.east.sun.com> On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but > that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Dan From eugen at leitl.org Mon Aug 1 08:15:17 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 1 Aug 2005 17:15:17 +0200 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: References: Message-ID: <20050801151517.GN2259@leitl.org> On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: > Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Aug 1 08:49:03 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 1 Aug 2005 17:49:03 +0200 Subject: [dave@farber.net: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05] Message-ID: <20050801154903.GO2259@leitl.org> ----- Forwarded message from David Farber ----- From measl at mfn.org Mon Aug 1 16:16:14 2005 From: measl at mfn.org (J.A. Terranson) Date: Mon, 1 Aug 2005 18:16:14 -0500 (CDT) Subject: Diebold - might be of interest (fwd) Message-ID: <20050801181609.M8473@ubzr.zsa.bet> ---------- Forwarded message ---------- Date: Fri, 29 Jul 2005 16:01:13 -0700 From: Lance James To: "cryptography at metzdowd.com" Subject: Diebold - might be of interest Hi all, I don't know if this is appropriate on this list, but I know that diebold voting systems have been an issue in the cryptography community for a while now. Having said that, I'm pasting an article that I received (from my parents actually) that might be of interest to this group. If it is not, just moderate :) *Subject:* Black Box Darkness is settling over the election process in San Diego. I say get rid of anything electronic that has to do with elections. Realistic sentiment?! Gene VIEWING THE DIEBOLD VOTE-TALLYING SCREEN PROHIBITED Jim March, a member of the Black Box Voting board of directors, was arrested Tuesday evening for trying to observe the Diebold central tabulator (vote tallying machine) as the votes were being counted in San Diego's mayoral election (July 26). (- online discussion: http:/www.blackboxvoting.org -) According to Jim Hamilton, an elections integrity advocate from San Diego, he and March visited the office of the registrar of elections earlier in the day. During this visit, March made two requests, which were refused by Mikel Haas, the San Diego Registrar of elections. 1) March asked that the central tabulator, the computer that tallies up the votes from all the precincts, be positioned so that citizens could observe it. According to Hamilton, this would have required simply moving a table a few feet. 2) March also asked for a copy of the ".gbf" files -- the vote tally files collected during the course of tabulation - to be provided for examination after the election. During the tallying of the election, the Diebold computer was positioned too far away for citizens to read the screen. Citizens could not watch error messages, or even perceive significant anomalies or malfunctions. Unable to see the screen, March went into the office where the tabulator was housed. Two deputies followed him and escorted him out. According to Hamilton: "He was not belligerent, not at all. After he went inside the tabulator room he came [was escorted] out and he said clearly 'I'm not resisting.' They handcuffed him, took him out of the building. They put him in a squad car. They're going to take him to the police station, book him and take him to jail," said Hamilton. "He's getting charged with a felony, 'interfering with an election official.'" March's actions are the culmination of two years of increasing frustration with the refusal of election officials to respond to security deficiencies in the voting machines. The software that tallies the votes in San Diego is made by Diebold Election Systems, a company that has already paid the state of California $2.8 million for making false claims, due to a lawsuit filed by March and Black Box Voting founder Bev Harris. On July 4, a report was released by European computer security expert Harri Hursti, revealing that the Diebold voting system contains profound architectural flaws. "It is open for business," says Hursti, who demonstrated the flaws on Leon County, Florida Diebold machines. He penetrated the voting system in less than five minutes, manipulating vote reports in a way that was undetectable. Despite the critical security alert issued by Hursti, San Diego County sent 713 voting machines home with poll workers, increasing the risk that the "memory cards" housed in the machines could be hacked, and removing the argument that "inside access" was carefully safeguarded. The arrest of Jim March underlines a fundamental problem facing Americans today as, increasingly, they lose the ability to monitor, verify, or watch any part of the counting process. The San Diego registrar of elections knew of the security flaws in the voting system. Diebold has never denied the vulnerability identified in Hursti's report, found at http://www.blackboxvoting.org/BBVreport.pdf. Despite knowledge of the increased risks, Haas made the decision to create additional vulnerability by sending the machines home with hundreds of poll workers. While San Diego officials will no doubt point to a small seal on the compartment housing the memory card (the component exploited in Hursti's study), Black Box Voting has interviewed a former San Diego poll worker, who reported that all that is necessary to dislodge and then reaffix the seal is a small pair of pliers. IN A NUTSHELL: - The machines have been demonstrated to be vulnerable to undetected tampering - The San Diego registrar of voters chose not to take appropriate precautions - The main tally machine was placed in a location that was impossible for citizens to observe - Many voting integrity advocates have come to believe that voting machine reform now rivals the urgency of the Civil Rights movement in the 1960s. Jim March acted on those beliefs. * * * * * If you share the feelings that Jim March has expressed about voting system secrecy, please forward this message to your lists and to online blogs as appropriate. Permission granted to reprint, with link to http://www.blackboxvoting.org. * * * * Black Box Voting --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From measl at mfn.org Mon Aug 1 17:59:34 2005 From: measl at mfn.org (J.A. Terranson) Date: Mon, 1 Aug 2005 19:59:34 -0500 (CDT) Subject: Well, they got what they want... In-Reply-To: <20050802003901.84804.qmail@web33514.mail.mud.yahoo.com> References: <20050802003901.84804.qmail@web33514.mail.mud.yahoo.com> Message-ID: <20050801195849.T8473@ubzr.zsa.bet> On Mon, 1 Aug 2005, Steve Thompson wrote: > --- Tyler Durden wrote: > > > That's an old pattern to character assassins: "I've attacked you > > publically > > but I really don't want to have defend what I've said or reply to > > suggestions about my own motivation." > > And psychopaths are sometimes said to accuse their victims of the malice > and violence the psychopaths perpetrate. > > > Great. Fuck you too. Hope the new Stazi grab you while you bitch and > > complain and do nothing. > > Likewise, although I rather suspect you would be one of very 'Stazi' you > pretend you hate. But there is an up-side: you're too fucking stupid to > be of permanent use to the 'Stazi', and so you can anticpate outliving > your usefulness eventually. Why don't you two get a room? I'll even subsidize it. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. From steve49152 at yahoo.ca Mon Aug 1 17:39:01 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Mon, 1 Aug 2005 20:39:01 -0400 (EDT) Subject: Well, they got what they want... In-Reply-To: Message-ID: <20050802003901.84804.qmail@web33514.mail.mud.yahoo.com> --- Tyler Durden wrote: > That's an old pattern to character assassins: "I've attacked you > publically > but I really don't want to have defend what I've said or reply to > suggestions about my own motivation." And psychopaths are sometimes said to accuse their victims of the malice and violence the psychopaths perpetrate. > Great. Fuck you too. Hope the new Stazi grab you while you bitch and > complain and do nothing. Likewise, although I rather suspect you would be one of very 'Stazi' you pretend you hate. But there is an up-side: you're too fucking stupid to be of permanent use to the 'Stazi', and so you can anticpate outliving your usefulness eventually. Regards, Steve __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From measl at mfn.org Mon Aug 1 19:42:46 2005 From: measl at mfn.org (J.A. Terranson) Date: Mon, 1 Aug 2005 21:42:46 -0500 (CDT) Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: <20050801211238.GN783@everywhere.east.sun.com> References: <20050801151517.GN2259@leitl.org> <20050801211238.GN783@everywhere.east.sun.com> Message-ID: <20050801213851.N8473@ubzr.zsa.bet> On Mon, 1 Aug 2005, Dan McDonald wrote: > On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but > > that sounds suspiciously like someone loaded up an OC-3's worth of traffic > > 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, > but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). > > A couple of hacked university zombie armies can generate that kind of > traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 > out to the backbones today? > > I'm surprised that the target node has that much INBOUND bandwidth, quite > frankly. Well, I am a telecom *and* a data guy, and I think I can clear it up :-) First, I suspect that the Tor node did *not* have a 300mbit ingree or egress, which is why the 300mbps was an effective DDoS ;-) Second, as the guy who spent several years being the carrier schmuck on call for these kinds of attacks, a 300mbps attack is a pretty small one. Big enough to knock off the average web site or small ISP, but pretty small from the carrier perspective. He probably knew the sizeof the incoming attack because the voice on the other end of the phone (the carrier schmuck on call) told him how much data he saw coming down the pipe at the target. > > Dan > Hopefully that'll clear some of the muddy stuff? -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. From anonymous at remailer.hastio.org Mon Aug 1 16:27:41 2005 From: anonymous at remailer.hastio.org (anonymous at remailer.hastio.org) Date: 1 Aug 2005 23:27:41 -0000 Subject: How to Exit the Matrix Message-ID: Network Forensics Evasion: How to Exit the Matrix https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/ Tor (tor.eff.org) required "Privacy and anonymity have been eroded to the point of non-existence in recent years. In fact, in many workplaces, employers spy on and control their employees Internet access, and this practice is widely considered to be acceptable. How we got to a legal state where this is allowed, I'm not quite sure. It seems to stem from an underlying assumption that while you are at work, you are a slave - a single unit of economic output under the direct and total control of your superiors. I believe this view is wrong. This document seeks to provide the means to protect your right to privacy and anonymous net access anywhere, even under the most draconian of conditions - including, but not limited to, criminal investigation. "So what are you saying? That I can dodge bullets?" "No.. What I am trying to tell you is that when you're ready, you won't have to."" From lotrhdinxz at mymail.ph Mon Aug 1 23:18:01 2005 From: lotrhdinxz at mymail.ph (Melody Bender) Date: Tue, 02 Aug 2005 04:18:01 -0200 Subject: nietzscheTue, 02 Aug 2005 11:18:01 +0500 Aldo Dill nubile Message-ID: Hi, We have the highest quality~Replica~Watches? We only sell premium~watches. These original~watches sell in stores for thousands of dollars. We sell them for much less. See our~selection~here http://pci.time4aswissreplica.net From eugen at leitl.org Mon Aug 1 23:44:21 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 2 Aug 2005 08:44:21 +0200 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: References: <20050801151517.GN2259@leitl.org> Message-ID: <20050802064421.GS2259@leitl.org> On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy > but that sounds suspiciously like someone loaded up an OC-3's worth of > traffic and then slammed your node. Ain't no hacker gonna do that. Any > indication the ostensible originating IP addresses are faked? No, it looked like a vanilla DDoS. According to the hoster, I've only seen a small piece of the log, which looked like this: 09:21:54.322650 IP 67.9.36.207 > 213.239.210.243: icmp 09:21:54.322776 IP 218.102.186.215 > 213.239.210.243: icmp 09:21:54.322895 IP 24.242.31.137 > 213.239.210.243: icmp 09:21:54.323017 IP 61.62.83.208 > 213.239.210.243: icmp 09:21:54.323140 IP 68.197.59.153 > 213.239.210.243: icmp 09:21:54.323263 IP 202.138.17.65 > 213.239.210.243: icmp 09:21:54.323375 IP 221.171.34.81 > 213.239.210.243: icmp 1376: echo request seq 23306 09:21:54.323500 IP 150.199.172.221 > 213.239.210.243: icmp 09:21:54.323623 IP 62.150.154.191 > 213.239.210.243: icmp 09:21:54.323741 IP 221.231.54.152 > 213.239.210.243: icmp 09:21:54.323863 IP 222.241.149.165 > 213.239.210.243: icmp 1456: echo request seq 24842 09:21:54.323984 IP 61.81.134.200 > 213.239.210.243: icmp 09:21:54.324105 IP 60.20.101.125 > 213.239.210.243: icmp 09:21:54.324227 IP 219.77.117.204 > 213.239.210.243: icmp 09:21:54.324229 IP 85.98.134.51 > 213.239.210.243: icmp 09:21:54.324355 IP 61.149.3.249 > 213.239.210.243: icmp 09:21:54.324475 IP 218.9.240.32 > 213.239.210.243: icmp 1456: echo request seq 29962 09:21:54.324598 IP 24.115.79.52 > 213.239.210.243: icmp 09:21:54.324720 IP 12.217.75.61 > 213.239.210.243: icmp 09:21:54.324844 IP 202.161.4.210 > 213.239.210.243: icmp 09:21:54.324847 IP 139.4.150.122.14238 > 213.239.209.107.80: R 2598318330:2598318330(0) win 0 09:21:54.324973 IP 211.203.38.29 > 213.239.210.243: icmp 09:21:54.325101 IP 68.74.58.171 > 213.239.210.243: icmp 09:21:54.325240 IP 211.214.159.102 > 213.239.210.243: icmp 09:21:54.325341 IP 221.231.53.52 > 213.239.210.243: icmp 09:21:54.325465 IP 24.20.194.42 > 213.239.210.243: icmp -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Tue Aug 2 01:15:49 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 2 Aug 2005 10:15:49 +0200 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: <20050801211238.GN783@everywhere.east.sun.com> References: <20050801151517.GN2259@leitl.org> <20050801211238.GN783@everywhere.east.sun.com> Message-ID: <20050802081549.GW2259@leitl.org> On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote: > I'm surprised that the target node has that much INBOUND bandwidth, quite > frankly. The node itself has only a Fast Ethernet port, but there's some 4 GBit available outside of the router. I'm genuinely glad the node has been taken offline as soon as the traffic started coming in in buckets, and I didn't have to foot the entire bill (the whole incident only cost me 20-30 GByte overall as far as I can tell). -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From camera_lumina at hotmail.com Tue Aug 2 09:03:21 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 02 Aug 2005 12:03:21 -0400 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out In-Reply-To: <20050802081549.GW2259@leitl.org> Message-ID: Actually, I did know that 300Mb/sec isn't super-huge for Denial of Service attacks at least, but this is an "obscure" Tor node. Someone attacking it at this stage in the game has a real agenda (perhaps they want to see if certain websites get disrupted? Does Tor work that way for short-ish periods of time?) At 4Gb/s into the router, I'd guess that router is hooked up to 2 GbEs mapped over a pair of OC-48s (Sounds a lot like the architecture Cisco has sold certain GbE-centered Datapipe providers.) Your attacker might actually be interested in pre-stressing the infrastructure in front of that router. Just a guess, but I'm "stupid" after all. -TD >From: Eugen Leitl >To: Dan McDonald , camera_lumina at hotmail.com, >cypherpunks at jfet.org >Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda >websites are wiped out >Date: Tue, 2 Aug 2005 10:15:49 +0200 > >On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote: > > > I'm surprised that the target node has that much INBOUND bandwidth, >quite > > frankly. > >The node itself has only a Fast Ethernet port, but there's >some 4 GBit available outside of the router. > >I'm genuinely glad the node has been taken offline as soon >as the traffic started coming in in buckets, and I didn't >have to foot the entire bill (the whole incident only >cost me 20-30 GByte overall as far as I can tell). > >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From s.schear at comcast.net Tue Aug 2 14:17:34 2005 From: s.schear at comcast.net (Steve Schear) Date: Tue, 02 Aug 2005 14:17:34 -0700 Subject: Apple to add Trusted Computing to the new kernel? In-Reply-To: <20050802081549.GW2259@leitl.org> References: <20050801151517.GN2259@leitl.org> <20050801211238.GN783@everywhere.east.sun.com> <20050802081549.GW2259@leitl.org> Message-ID: <6.0.1.1.0.20050802141638.04e49a00@mail.comcast.net> People working with early versions of the forthcoming Intel-based MacOS X operating system have discovered that Apple's new kernel makes use of Intel's Trusted Computing hardware. If this "feature" appears in a commercial, shipping version of Apple's OS, they'll lose me as a customer -- I've used Apple computers since 1979 and have a Mac tattooed on my right bicep, but this is a deal-breaker. http://www.boingboing.net/2005/07/31/apple_to_add_trusted.html From amjwgtf at nana.co.il Tue Aug 2 09:23:06 2005 From: amjwgtf at nana.co.il (Chasity Brewster) Date: Tue, 02 Aug 2005 15:23:06 -0100 Subject: Maximum results seen after only a few weeks Message-ID: What if you could fool your brain into believing that you are full? Amazing, but true! http://alid.org.czmu.srjweu.info You've seen it on �60 Minutes� and read the BBC News report � now find out just what everyone is talking about and get yourself some Hoodia Maximum Strength today! From rah at shipwright.com Tue Aug 2 18:23:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 2 Aug 2005 21:23:28 -0400 Subject: [fc-announce] CFP FC'06: Financial Cryptography and Data Security Message-ID: --- begin forwarded text To: fc-announce at ifca.ai From: Avi Rubin Subject: [fc-announce] CFP FC'06: Financial Cryptography and Data Security Sender: fc-announce-admin at ifca.ai Date: Tue, 2 Aug 2005 13:58:29 -0400 Call for Papers FC'06: Financial Cryptography and Data Security http://fc06.ifca.ai/ Tenth International Conference February 27 to March 2, 2006 Anguilla, British West Indies Submissions Due Date: October 17, 2005 Program Chairs: Giovanni Di Crescenzo (Telcordia) Avi Rubin (Johns Hopkins University) General Chair: Patrick McDaniel (Penn State University) Local Arrangements Chair: Rafael Hirschfeld (Unipay Technologies) At its 10th year edition, Financial Cryptography and Data Security (FC'06) is a well established and major international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. We will continue last year's augmentation of the conference title and expansion of our scope to cover all aspects of securing transactions and systems. These aspects include a range of technical areas such as: cryptography, payment systems, secure transaction architectures, software systems and tools, user and operator interfaces, fraud prevention, secure IT infrastructure, and analysis methodologies. Our focus will also encompass financial, legal, business and policy aspects. Material both on theoretical (fundamental) aspects of securing systems, on secure applications and real-world deployments will be considered. The conference goal is to bring together top cryptographers, data-security specialists, and scientists with economists, bankers, implementers, and policy makers. Intimate and colorful by tradition, the FC'06 program will feature invited talks, academic presentations, technical demonstrations, and panel discussions. In addition, we will celebrate this 10th year edition with a number of initiatives, such as: especially focused session, technical and historical state-of-the-art panels, and one session of surveys. This conference is organized annually by the International Financial Cryptography Association (IFCA). Original papers, surveys and presentations on all aspects of financial and commerce security are invited. Submissions must have a visible bearing on financial and commerce security issues, but can be interdisciplinary in nature and need not be exclusively concerned with cryptography or security. Possible topics for submission to the various sessions include, but are not limited to: Anonymity and Privacy Microfinance and Auctions Micropayments Audit and Auditability Monitoring, Management and Authentication and Operations Identification, including Reputation Systems Biometrics RFID-Based and Contactless Certification and Payment Systems Authorization Risk Assessment and Commercial Cryptographic Management Applications Secure Banking and Financial Commercial Transactions and Web Services Contracts Securing Emerging Digital Cash and Payment Computational Paradigms Systems Security and Risk Digital Incentive and Perceptions and Judgments Loyalty Systems Security Economics Digital Rights Management Smart Cards and Secure Financial Regulation and Tokens Reporting Trust Management Fraud Detection Trustability and Game Theoretic Approaches to Trustworthiness Security Underground-Market Economics Identity Theft, Physhing and Usability and Acceptance of Social Engineering Security Systems Infrastructure Design User and Operator Interfaces Legal and Regulatory Issues Voting system security Submission Instructions Submission Categories FC'06 is inviting submissions in four categories: (1) research papers, (2) systems and applications presentations, (3) panel sessions, (4) surveys. For all accepted submissions, at least one author must attend the conference and present the work. Research Papers Research papers should describe novel scientific contributions to the field, and they will be subject to rigorous peer review. Papers can be a maximum of 15 pages in length (including references and appendices), and accepted submissions will be published in full in the conference proceedings. Systems and Application Presentations Submissions in this category should describe novel or successful systems with an emphasis on secure digital commerce applications. Presentations may concern commercial systems, academic prototypes, or open-source projects for any of the topics listed above. Where appropriate, software or hardware demonstrations are encouraged as part of the presentations in these sessions. Submissions in this category should consist of a short summary of the work (1-6 pages in length) to be reviewed by the Program Committee, along with a short biography of the presenters. Accepted submissions will be presented at the conference (25 minutes per presentation), and a one-page abstract will be published in the conference proceedings. Panel Sessions Proposals for panel sessions are also solicited, and should include a brief description of the panel as well as prospective participants. Accepted panel sessions will be presented at the conference, and each participant will contribute a one-page abstract to be published in the conference proceedings. Surveys A limited number of surveys presentations may also be included in the program. We encourage submissions that summarize the current state of the art on any well-defined subset of the above listed submission topics. A limited description of visions on future directions of research in these topics would also be appreciated. Survey submissions can be significantly shorter than research paper submissions. Preparation Instructions Submissions to the research papers, systems/application presentation categories and surveys must be received by the due date. Papers must be formatted in standard PostScript, PDF format, or MS Word. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found on this web site and at the submission site. Authors should provide names and affiliations at submission time, and have the option of including or not names and affiliations in their submitted papers, that must include on their first page the title of the paper, the a brief abstract, and a list of topical keywords. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series after the conference, so the submissions must be formatted in the standard LNCS format (15 page limit). Authors of accepted submissions will be required to complete and sign an IFCA copyright form. A pre-proceedings volume containing preliminary versions of the papers will be distributed at the conference. Questions about all conference submissions should be directed to the Program Chairs. Paper Submission Authors should only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference with proceedings or a journal. Please check back as the deadline approaches for a link to the submission server. The Rump Session FC'06 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5-7 minute), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail, or submitted in person through the Monday of the conference. Program Committee Matt Blaze, University of Pennsylvania Alfredo De Santis, University of Salerno, Italy Sven Dietrich, CERT Research Center Juan Garay, Bell Labs Dan Geer, Verdasys Ari Juels, RSA Aggelos Kiayias, University of Connecticut Yoshi Kohno, University of California San Diego Arjen Lenstra, Bell Labs and Technische Universiteit Eindhoven Helger Lipmaa, Cybernetica AS and University of Tartu Steve Myers, Indiana University Andrew Odlyzko, University of Minnesota Tatsuaki Okamoto, NTT Carles Padro, Universitat Politecnica de Catalunya Andrew Patrick, NRC, Canada Ahmad-Reza Sadeghi, Ruhr-University Bochum Kazue Sako, NEC Dawn Song, CMU Stuart Stubblebine, University of California Davis & Stubblebine Labs Adam Stubblefield, Independent Security Evaluators Paul Syverson, NRL Mike Szydlo, RSA Gene Tsudik, University of California Irvine Doug Tygar, Berkeley University Alma Whitten, Google Yacov Yacobi, Microsoft Research Moti Yung, RSA & Columbia University Yuliang Zheng, University of North Carolina Important Dates: Paper Submission: October 17, 2005 Notification: December 8th, 2005 Pre-Proceedings: January 27th, 2005 Conference dates: February 27 to March 2, 2006 Post Proceedings: April 10, 2006 ************************************************** Avi Rubin Professor, Computer Science Technical Director, Information Security Institute Johns Hopkins University rubin at jhu.edu 410-516-8177 (Voice) 443-264-2406 (Fax) http://www.cs.jhu.edu/~rubin/ ************************************************** _______________________________________________ fc-announce mailing list fc-announce at ifca.ai http://mail.ifca.ai/mailman/listinfo/fc-announce --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tyler at aatphones.com Wed Aug 3 03:13:46 2005 From: tyler at aatphones.com (Erin Krueger) Date: Wed, 03 Aug 2005 02:13:46 -0800 Subject: Pre-approvedd rate #flcn Message-ID: <98887.$$.06600.Etrack@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1016 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: conveyance.7.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From camera_lumina at hotmail.com Wed Aug 3 06:12:26 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 03 Aug 2005 09:12:26 -0400 Subject: [fc-announce] CFP FC'06: Financial Cryptography and Data Security In-Reply-To: Message-ID: Your telling me there's someone in Telcordia these days that does something interesting in the cryptograhy field? Or is that his personal hobby... -TD >From: "R.A. Hettinga" >To: cryptography at metzdowd.com, cypherpunks at jfet.org >Subject: [fc-announce] CFP FC'06: Financial Cryptography and Data Security >Date: Tue, 2 Aug 2005 21:23:28 -0400 > >--- begin forwarded text > > > To: fc-announce at ifca.ai > From: Avi Rubin > Subject: [fc-announce] CFP FC'06: Financial Cryptography and Data >Security > Sender: fc-announce-admin at ifca.ai > Date: Tue, 2 Aug 2005 13:58:29 -0400 > > > Call for Papers > > FC'06: Financial Cryptography and Data Security > http://fc06.ifca.ai/ > > Tenth International Conference > February 27 to March 2, 2006 > Anguilla, British West Indies > > Submissions Due Date: October 17, 2005 > > Program Chairs: Giovanni Di Crescenzo (Telcordia) > Avi Rubin (Johns Hopkins University) > > General Chair: Patrick McDaniel (Penn State University) > > Local Arrangements Chair: Rafael Hirschfeld (Unipay Technologies) > > At its 10th year edition, Financial Cryptography and Data Security > (FC'06) is a well established and major international forum for > research, advanced development, education, exploration, and debate > regarding security in the context of finance and commerce. We will > continue last year's augmentation of the conference title and expansion > of our scope to cover all aspects of securing transactions and systems. > These aspects include a range of technical areas such as: cryptography, > payment systems, secure transaction architectures, software systems and > tools, user and operator interfaces, fraud prevention, secure IT > infrastructure, and analysis methodologies. Our focus will also > encompass financial, legal, business and policy aspects. Material both > on theoretical (fundamental) aspects of securing systems, on secure > applications and real-world deployments will be considered. > > The conference goal is to bring together top cryptographers, > data-security specialists, and scientists with economists, bankers, > implementers, and policy makers. Intimate and colorful by tradition, > the FC'06 program will feature invited talks, academic presentations, > technical demonstrations, and panel discussions. In addition, we will > celebrate this 10th year edition with a number of initiatives, such as: > especially focused session, technical and historical state-of-the-art > panels, and one session of surveys. > > This conference is organized annually by the International Financial > Cryptography Association (IFCA). > > Original papers, surveys and presentations on all aspects of financial > and commerce security are invited. Submissions must have a visible > bearing on financial and commerce security issues, but can be > interdisciplinary in nature and need not be exclusively concerned with > cryptography or security. Possible topics for submission to the various > sessions include, but are not limited to: > > Anonymity and Privacy Microfinance and > Auctions Micropayments > Audit and Auditability Monitoring, Management and > Authentication and Operations > Identification, including Reputation Systems > Biometrics RFID-Based and Contactless > Certification and Payment Systems > Authorization Risk Assessment and > Commercial Cryptographic Management > Applications Secure Banking and Financial > Commercial Transactions and Web Services > Contracts Securing Emerging > Digital Cash and Payment Computational Paradigms > Systems Security and Risk > Digital Incentive and Perceptions and Judgments > Loyalty Systems Security Economics > Digital Rights Management Smart Cards and Secure > Financial Regulation and Tokens > Reporting Trust Management > Fraud Detection Trustability and > Game Theoretic Approaches to Trustworthiness > Security Underground-Market Economics > Identity Theft, Physhing and Usability and Acceptance of > Social Engineering Security Systems > Infrastructure Design User and Operator Interfaces > Legal and Regulatory Issues Voting system security > > Submission Instructions > > Submission Categories > > FC'06 is inviting submissions in four categories: (1) research papers, > (2) systems and applications presentations, (3) panel sessions, (4) > surveys. For all accepted submissions, at least one author must attend > the conference and present the work. > > Research Papers > > Research papers should describe novel scientific contributions to the > field, and they will be subject to rigorous peer review. Papers can be > a maximum of 15 pages in length (including references and appendices), > and accepted submissions will be published in full in the conference > proceedings. > > Systems and Application Presentations > > Submissions in this category should describe novel or successful > systems with an emphasis on secure digital commerce applications. > Presentations may concern commercial systems, academic prototypes, or > open-source projects for any of the topics listed above. Where > appropriate, software or hardware demonstrations are encouraged as part > of the presentations in these sessions. Submissions in this category > should consist of a short summary of the work (1-6 pages in length) to > be reviewed by the Program Committee, along with a short biography of > the presenters. Accepted submissions will be presented at the > conference (25 minutes per presentation), and a one-page abstract will > be published in the conference proceedings. > > Panel Sessions > > Proposals for panel sessions are also solicited, and should include a > brief description of the panel as well as prospective participants. > Accepted panel sessions will be presented at the conference, and each > participant will contribute a one-page abstract to be published in the > conference proceedings. > > Surveys > > A limited number of surveys presentations may also be included in the > program. We encourage submissions that summarize the current state of > the art on any well-defined subset of the above listed submission > topics. A limited description of visions on future directions of > research in these topics would also be appreciated. Survey submissions > can be significantly shorter than research paper submissions. > > Preparation Instructions > > Submissions to the research papers, systems/application presentation > categories and surveys must be received by the due date. Papers must be > formatted in standard PostScript, PDF format, or MS Word. Submissions > in other formats will be rejected. All papers must be submitted > electronically according to the instructions and forms found on this > web site and at the submission site. > > Authors should provide names and affiliations at submission time, and > have the option of including or not names and affiliations in their > submitted papers, that must include on their first page the title of > the paper, the a brief abstract, and a list of topical keywords. > Accepted submissions will be included in the conference proceedings to > be published in the Springer-Verlag Lecture Notes in Computer Science > (LNCS) series after the conference, so the submissions must be > formatted in the standard LNCS format (15 page limit). Authors of > accepted submissions will be required to complete and sign an IFCA > copyright form. A pre-proceedings volume containing preliminary > versions of the papers will be distributed at the conference. > > Questions about all conference submissions should be directed to the > Program Chairs. > > Paper Submission > > Authors should only submit work that does not substantially overlap > with work that is currently submitted or has been accepted for > publication to a conference with proceedings or a journal. > > Please check back as the deadline approaches for a link to the > submission server. > > The Rump Session > > FC'06 will also include the popular "rump session" held on one of the > evenings in an informal, social atmosphere. The rump session is a > program of short (5-7 minute), informal presentations on works in > progress, off-the-cuff ideas, and any other matters pertinent to the > conference. Any conference attendee is welcome to submit a presentation > to the Rump Session Chair (to be announced). This submission should > consist of a talk title, the name of the presenter, and, if desired, a > very brief abstract. Submissions may be sent via e-mail, or submitted > in person through the Monday of the conference. > > Program Committee > > Matt Blaze, University of Pennsylvania > Alfredo De Santis, University of Salerno, Italy > Sven Dietrich, CERT Research Center > Juan Garay, Bell Labs > Dan Geer, Verdasys > Ari Juels, RSA > Aggelos Kiayias, University of Connecticut > Yoshi Kohno, University of California San Diego > Arjen Lenstra, Bell Labs and Technische Universiteit Eindhoven > Helger Lipmaa, Cybernetica AS and University of Tartu > Steve Myers, Indiana University > Andrew Odlyzko, University of Minnesota > Tatsuaki Okamoto, NTT > Carles Padro, Universitat Politecnica de Catalunya > Andrew Patrick, NRC, Canada > Ahmad-Reza Sadeghi, Ruhr-University Bochum > Kazue Sako, NEC > Dawn Song, CMU > Stuart Stubblebine, University of California Davis & Stubblebine Labs > Adam Stubblefield, Independent Security Evaluators > Paul Syverson, NRL > Mike Szydlo, RSA > Gene Tsudik, University of California Irvine > Doug Tygar, Berkeley University > Alma Whitten, Google > Yacov Yacobi, Microsoft Research > Moti Yung, RSA & Columbia University > Yuliang Zheng, University of North Carolina > > Important Dates: > > Paper Submission: October 17, 2005 > Notification: December 8th, 2005 > Pre-Proceedings: January 27th, 2005 > Conference dates: February 27 to March 2, 2006 > Post Proceedings: April 10, 2006 > > > > > ************************************************** > Avi Rubin > Professor, Computer Science > Technical Director, Information Security Institute > Johns Hopkins University > > rubin at jhu.edu > 410-516-8177 (Voice) > 443-264-2406 (Fax) > http://www.cs.jhu.edu/~rubin/ > ************************************************** > > > _______________________________________________ > fc-announce mailing list > fc-announce at ifca.ai > http://mail.ifca.ai/mailman/listinfo/fc-announce > > > >--- end forwarded text > > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Wed Aug 3 10:11:48 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 03 Aug 2005 13:11:48 -0400 Subject: Prosecutors: CIA agents left trail Message-ID: Reverse Rendition? Here's where Liberals can take a stand...let's round up some of these fuckers and stuff 'em in a shipping container on a Chinese barge to Italy. I've done a quick google search and I've only found a couple of the names. Is the complete list available? -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: Prosecutors: CIA agents left trail >Date: Wed, 3 Aug 2005 15:22:04 +0200 > >http://www.cnn.com/2005/WORLD/europe/07/28/cia.phonetrail.ap/index.html > >Prosecutors: CIA agents left trail >Cellphone calls blew their cover > >Thursday, July 28, 2005; Posted: 8:05 p.m. EDT (00:05 GMT) > >ROME, Italy (AP) -- It wasn't their lavish spending in luxury hotels, their >use of credit cards or even frequent-flier miles that drew attention. >Instead >it was a trail of casual cellphone use that tripped up the 19 purported CIA >operatives wanted by Italian authorities in the alleged kidnapping of a >radical Muslim cleric. > >Italian prosecutors who have obtained arrest warrants for the 19 -- none of >whom are believed to be in Italy -- presented evidence that the suspects >used >at least 40 Italian cell phones, some in their own names. > >Experts say that either they were bumbling spies, or they acted with >impunity >because Italian officials had been informed of their plan -- a claim the >government of Premier Silvio Berlusconi has publicly denied on several >occasions. (Full story) > >"If these were really CIA agents they've made a disaster," said Andrea >Nativi, >research director for the Rome-based Military Center for Strategic Studies. >"They strained relations between Italy and the U.S. and between the CIA and >Italian intelligence agencies." > >Italian judges issued a first batch of warrants last month for 13 Americans >accused of abducting Osama Moustafa Hassan Nasr, known as Abu Omar, on a >Milan >street on February 17, 2003. > >Another court this week issued another six warrants for a group the >prosecution claims planned the abduction. (Full story) >Vulnerable cellphones > >The Egyptian cleric was flown from Aviano, a joint U.S.-Italian air base >north >of Venice, to Ramstein Air Base in Germany and then to Egypt, where he was >reportedly tortured. The operation purportedly was part of the CIA's >"extraordinary rendition" program, in which terror suspects are transferred >to >third countries without court approval. > >In his request for the latest warrants, prosecutor Armando Spataro wrote >that >an analysis of mobile phone traffic showed that most of them were present >on >the route that Abu Omar habitually took from his home to a Milan mosque, >"including in the days before" the kidnapping. > >A track of their cell phones also showed them on those streets "nearly 100 >times" during the month before Abu Omar's disappearance, the prosecutor >said. >He concluded that the six were part "of a single group of Americans who >came >to Milan to carry out the operation." > >Why they would use their cell phones so openly has baffled experts, >particularly since prosecutors are certain that not all the names of the 19 >suspects are aliases. > >One has been identified by prosecutors as the former CIA station chief in >Milan, Robert Seldon Lady, who owns a retirement home in wine country in >Asti, >near Turin. Though police didn't find Lady there when they raided the >house, >they did discover a list of hotels where U.S. government employees received >discounts, including hotels where prosecutors contend the suspects stayed. > >Another person on the list has the same name as a man who now works at the >U.S. Embassy in Tanzania. > >Unless the power or the wireless antenna is turned off, a mobile phone >remains >in constant contact with the nearest cell towers even when it's not being >used >for a call. Information processed by the cells can be used to precisely >locate >or track the movements of a phone user. > >Nativi, the military expert, called the use of regular cell phone accounts >"a >huge weakness in the operation." > >It would have been more difficult to track anonymous prepaid cards, >satellite >phones or radios, he said. > >The wireless system used in Italy and most of the rest of Europe relies on >a >stamp-sized smart card that is inserted in the back of every handset. This >removable "SIM" card stores an individual's phone number and other account >data. > >A unique numerical identifier is assigned to every phone and every SIM, >said >Bruno Errico, director of consulting for Openwave Global Services, a >company >that provides tracking applications and other software to wireless >companies >worldwide. > >Wireless companies are obliged by law to keep records of the unique data >that >each phone exchanges with the cell network as well as the numbers to which >calls are placed, he said. > >Since a phone is served by several cells at any given time, investigators >can >easily triangulate the location of a device, Errico said. In an urban area, >where the network of cells is dense and overlapping, such tracking can have >a >margin of error of just a few yards. >Going uncovered > >Had the agents used non-Italian phones and SIMs, the local network would >still >have tracked them, but magistrates might have had a tougher time linking >the >phones to each of the suspects since not all countries require wireless >users >to provide identification, said Errico. To avoid tracking, the agents would >have had to use other systems not available to the general public, such as >radios, Errico said. > >"As long as you use public communication systems, there is no way you can >avoid being tracked," he said. > >Or, as Nativi put it: "When you go on this kind of operation, you need to >turn >off your damn phone." > >Yoram Schweitzer, a researcher for the Jaffee Center for Strategic Studies >in >Tel Aviv, said he wasn't surprised the operatives stayed in five-star >hotels, >which provide excellent cover for those posing as businessmen or >businesswomen. But analysts did question whether using of credit cards was >advisable. > >Chris Aaron, a former editor of Jane's Intelligence Review magazine, said >the >team must have known that local cells phones put them at risk of being >exposed. > >"A CIA team would have been aware of the Italian ability to log calls and >track their location, so they clearly weren't worried about that," he said. > >The CIA in Washington has declined to comment on the case. > >Copyright 2005 The Associated Press. All rights reserved.This material may >not >be published, broadcast, rewritten, or redistributed. > >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From eugen at leitl.org Wed Aug 3 06:22:04 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 3 Aug 2005 15:22:04 +0200 Subject: Prosecutors: CIA agents left trail Message-ID: <20050803132204.GL2259@leitl.org> http://www.cnn.com/2005/WORLD/europe/07/28/cia.phonetrail.ap/index.html Prosecutors: CIA agents left trail Cellphone calls blew their cover Thursday, July 28, 2005; Posted: 8:05 p.m. EDT (00:05 GMT) ROME, Italy (AP) -- It wasn't their lavish spending in luxury hotels, their use of credit cards or even frequent-flier miles that drew attention. Instead it was a trail of casual cellphone use that tripped up the 19 purported CIA operatives wanted by Italian authorities in the alleged kidnapping of a radical Muslim cleric. Italian prosecutors who have obtained arrest warrants for the 19 -- none of whom are believed to be in Italy -- presented evidence that the suspects used at least 40 Italian cell phones, some in their own names. Experts say that either they were bumbling spies, or they acted with impunity because Italian officials had been informed of their plan -- a claim the government of Premier Silvio Berlusconi has publicly denied on several occasions. (Full story) "If these were really CIA agents they've made a disaster," said Andrea Nativi, research director for the Rome-based Military Center for Strategic Studies. "They strained relations between Italy and the U.S. and between the CIA and Italian intelligence agencies." Italian judges issued a first batch of warrants last month for 13 Americans accused of abducting Osama Moustafa Hassan Nasr, known as Abu Omar, on a Milan street on February 17, 2003. Another court this week issued another six warrants for a group the prosecution claims planned the abduction. (Full story) Vulnerable cellphones The Egyptian cleric was flown from Aviano, a joint U.S.-Italian air base north of Venice, to Ramstein Air Base in Germany and then to Egypt, where he was reportedly tortured. The operation purportedly was part of the CIA's "extraordinary rendition" program, in which terror suspects are transferred to third countries without court approval. In his request for the latest warrants, prosecutor Armando Spataro wrote that an analysis of mobile phone traffic showed that most of them were present on the route that Abu Omar habitually took from his home to a Milan mosque, "including in the days before" the kidnapping. A track of their cell phones also showed them on those streets "nearly 100 times" during the month before Abu Omar's disappearance, the prosecutor said. He concluded that the six were part "of a single group of Americans who came to Milan to carry out the operation." Why they would use their cell phones so openly has baffled experts, particularly since prosecutors are certain that not all the names of the 19 suspects are aliases. One has been identified by prosecutors as the former CIA station chief in Milan, Robert Seldon Lady, who owns a retirement home in wine country in Asti, near Turin. Though police didn't find Lady there when they raided the house, they did discover a list of hotels where U.S. government employees received discounts, including hotels where prosecutors contend the suspects stayed. Another person on the list has the same name as a man who now works at the U.S. Embassy in Tanzania. Unless the power or the wireless antenna is turned off, a mobile phone remains in constant contact with the nearest cell towers even when it's not being used for a call. Information processed by the cells can be used to precisely locate or track the movements of a phone user. Nativi, the military expert, called the use of regular cell phone accounts "a huge weakness in the operation." It would have been more difficult to track anonymous prepaid cards, satellite phones or radios, he said. The wireless system used in Italy and most of the rest of Europe relies on a stamp-sized smart card that is inserted in the back of every handset. This removable "SIM" card stores an individual's phone number and other account data. A unique numerical identifier is assigned to every phone and every SIM, said Bruno Errico, director of consulting for Openwave Global Services, a company that provides tracking applications and other software to wireless companies worldwide. Wireless companies are obliged by law to keep records of the unique data that each phone exchanges with the cell network as well as the numbers to which calls are placed, he said. Since a phone is served by several cells at any given time, investigators can easily triangulate the location of a device, Errico said. In an urban area, where the network of cells is dense and overlapping, such tracking can have a margin of error of just a few yards. Going uncovered Had the agents used non-Italian phones and SIMs, the local network would still have tracked them, but magistrates might have had a tougher time linking the phones to each of the suspects since not all countries require wireless users to provide identification, said Errico. To avoid tracking, the agents would have had to use other systems not available to the general public, such as radios, Errico said. "As long as you use public communication systems, there is no way you can avoid being tracked," he said. Or, as Nativi put it: "When you go on this kind of operation, you need to turn off your damn phone." Yoram Schweitzer, a researcher for the Jaffee Center for Strategic Studies in Tel Aviv, said he wasn't surprised the operatives stayed in five-star hotels, which provide excellent cover for those posing as businessmen or businesswomen. But analysts did question whether using of credit cards was advisable. Chris Aaron, a former editor of Jane's Intelligence Review magazine, said the team must have known that local cells phones put them at risk of being exposed. "A CIA team would have been aware of the Italian ability to log calls and track their location, so they clearly weren't worried about that," he said. The CIA in Washington has declined to comment on the case. Copyright 2005 The Associated Press. All rights reserved.This material may not be published, broadcast, rewritten, or redistributed. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Fri Aug 5 08:09:55 2005 From: dave at farber.net (David Farber) Date: Fri, 5 Aug 2005 11:09:55 -0400 Subject: [IP] Cellphone carriers can listen in through your phone Message-ID: From: Cellphones URL: http://cellphones.engadget.com/entry/1234000563053276/ Sent from: djf (dave at farber.net) Sent to: dave at farber.net Comments: Cellphone carriers can listen in through your phone?Aug 5, 2005, 10:20 AM ET by Ryan Block We?re always a little wary of that very blurry line between protection of the general public and infringements on basic civil liberties, but it would appear that according to the Financial Times by way of the Guardian, at least one UK cellphone carrier not only has the power (and mandate) to remotely install software over the air to users? handsets that would allow for the kind of monitoring we thought only perverts and paranoiacs had access to: picking up audio from the phone?s mic when the device isn?t on a call. While don?t think the backlash on this one has really gotten underway yet, and though we do hate to rock a clich?, we can?t help but be reminded of that classic Benjamin Franklin quote, ?They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.? What?s worse, a cellphone carrier and The Man are gonna take it from us without our permission on the sly? [Via textually] Related Links ? Page Title ? Permanent Link to this Entry + Send to a Friend + Reader Comments [2] ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- [demime 1.01d removed an attachment of type application/pgp-signature] From declan at well.com Fri Aug 5 12:20:34 2005 From: declan at well.com (Declan McCullagh) Date: Fri, 05 Aug 2005 12:20:34 -0700 Subject: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv] Message-ID: http://news.com.com/2061-10796_3-5820618.html Montana Supreme Court justice warns Orwell's 1984 has arrived August 5, 2005 12:13 PM PDT Believe it or not, it's perfectly legal for police to rummage through your garbage for incriminating stuff on you -- even if they don't have a warrant or court approval. The Supreme Court of Montana ruled last month that police could conduct a warrantless "trash dive" into the trash cans in the alley behind the home of a man named Darrell Pelvit. The cops discovered pseudoephedrine boxes -- a solvent with uses including the manufacture of methamphetamine -- and Pelvit eventually ended up in prison. Pelvit's attorney argued that his client had a reasonable expectation of privacy in his trash, but the court rejected the argument and said the trash was, well, meant to be thrown away. What's remarkable is the concurring opinion of Montana Supreme Court Justice James C. Nelson, who reluctantly went along with his colleagues but warned that George Orwell's 1984 had arrived. We reproduce his concurring opinion in full: -Declan -------------- Justice James C. Nelson concurs. I have signed our Opinion because we have correctly applied existing legal theory and constitutional jurisprudence to resolve this case on its facts. I feel the pain of conflict, however. I fear that, eventually, we are all going to become collateral damage in the war on drugs, or terrorism, or whatever war is in vogue at the moment. I retain an abiding concern that our Declaration of Rights not be killed by friendly fire. And, in this day and age, the courts are the last, if not only, bulwark to prevent that from happening. In truth, though, we area throw-away society. My garbage can contains the remains of what I eat and drink. It may contain discarded credit card receipts along with yesterday's newspaper and junk mail. It might hold some personal letters, bills, receipts, vouchers, medical records, photographs and stuff that is imprinted with the multitude of assigned numbers that allow me access to the global economy and vice versa. My garbage can contains my DNA. As our Opinion states, what we voluntarily throw away, what we discard--i.e., what we abandon--is fair game for roving animals, scavengers, busybodies, crooks and for those seeking evidence of criminal enterprise. Yet, as I expect with most people, when I take the day's trash (neatly packaged in opaque plastic bags) to the garbage can each night, I give little consideration to what I am throwing away and less thought, still, to what might become of my refuse. I don't necessarily envision that someone or something is going to paw through it looking for a morsel of food, a discarded treasure, a stealable part of my identity or a piece of evidence. But, I've seen that happen enough times to understand--though not graciously accept--that there is nothing sacred in whatever privacy interest I think I have retained in my trash once it leaves my control--the Fourth Amendment and Article II, Sections 10 and 11, notwithstanding. Like it or not, I live in a society that accepts virtual strip searches at airports; surveillance cameras; "discount" cards that record my buying habits; bar codes; "cookies" and spywear on my computer; on-line access to satellite technology that can image my back yard; and microchip radio frequency identification devices already implanted in the family dog and soon to be integrated into my groceries, my credit cards, my cash and my new underwear. I know that the notes from the visit to my doctor's office may be transcribed in some overseas country under an out-sourcing contract by a person who couldn't care less about my privacy. I know that there are all sorts of businesses that have records of what medications I take and why. I know that information taken from my blood sample may wind up in databases and be put to uses that the boilerplate on the sheaf of papers I sign to get medical treatment doesn't even begin to disclose. I know that my insurance companies and employer know more about me than does my mother. I know that many aspects of my life are available on the Internet. Even a black box in my car--or event data recorder as they are called--is ready and willing to spill the beans on my driving habits, if I have an event--and I really trusted that car, too. And, I also know that my most unwelcome and paternalistic relative, Uncle Sam, is with me from womb to tomb. Fueled by the paranoia of "ists" and "isms," Sam has the capability of spying on everything and everybody--and no doubt is. But, as Sam says: "It's for my own good." In short, I know that my personal information is recorded in databases, servers, hard drives and file cabinets all over the world. I know that these portals to the most intimate details of my life are restricted only by the degree of sophistication and goodwill or malevolence of the person, institution, corporation or government that wants access to my data. I also know that much of my life can be reconstructed from the contents of my garbage can. I don't like living in Orwell's 1984; but I do. And, absent the next extinction event or civil libertarians taking charge of the government (the former being more likely than the latter), the best we can do is try to keep Sam and the sub-Sams on a short leash. As our Opinion states, search and seizure jurisprudence is centered around privacy expectations and reasonableness considerations. That is true even under the extended protections afforded by Montana's Constitution, Article II, Sections 10. and 11. We have ruled within those parameters. And, as is often the case, we have had to draw a fine line in a gray area. Justice Cotter and those who have signed the Opinion worked hard at defining that line; and I am satisfied we've drawn it correctly on the facts of this case and under the conventional law of abandonment. That said, if this Opinion is used to justify a sweep of the trash cans of a neighborhood or community; or if a trash dive for Sudafed boxes and matchbooks results in DNA or fingerprints being added to a forensic database or results in personal or business records, credit card receipts, personal correspondence or other property being archived for some future use unrelated to the case at hand, then, absent a search warrant, I may well reconsider my legal position and approach to these sorts of cases--even if I have to think outside the garbage can to get there. I concur. /S/ JAMES C. NELSON _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- [demime 1.01d removed an attachment of type application/pgp-signature] From ghicks at cadence.com Fri Aug 5 14:39:45 2005 From: ghicks at cadence.com (Gregory Hicks) Date: Fri, 5 Aug 2005 14:39:45 -0700 (PDT) Subject: MixMaster and mlist2... Message-ID: <200508052139.j75LdjYZ010028@ghicks-vpn.cadence.com> Greetings: I have a bit of a problem here. The mixmaster I have set up is having problems retrieving the mlist2.txt file The address I have for it is: wget -O - http://xenophon.homeip.net/echolot/mlist2.txt > mlist2 && \ But this node does not respond. Any idea for another source of the list? Thanks! Regards, Gregory Hicks From ghicks at cadence.com Fri Aug 5 14:45:25 2005 From: ghicks at cadence.com (Gregory Hicks) Date: Fri, 5 Aug 2005 14:45:25 -0700 (PDT) Subject: MixMaster and mlist2... Message-ID: <200508052140.j75LepRh002251@mailhub.Cadence.COM> > Date: Fri, 5 Aug 2005 14:39:45 -0700 (PDT) > From: Gregory Hicks > To: cypherpunks at jfet.org > Subject: MixMaster and mlist2... > Cc: ghicks > > Greetings: > > I have a bit of a problem here. The mixmaster I have set up > is having problems retrieving the mlist2.txt file Never mind. Found one and the mailer is back running. Appreciate opportunity to vent. Regards, Gregory Hicks > > The address I have for it is: > > wget -O - http://xenophon.homeip.net/echolot/mlist2.txt > mlist2 && \ > > But this node does not respond. Any idea for another source of the list? > > Thanks! > > Regards, > Gregory Hicks --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks at cadence.com I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From steve49152 at yahoo.ca Fri Aug 5 17:41:30 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Fri, 5 Aug 2005 20:41:30 -0400 (EDT) Subject: Well, they got what they want... In-Reply-To: <20050801195849.T8473@ubzr.zsa.bet> Message-ID: <20050806004131.31379.qmail@web33514.mail.mud.yahoo.com> --- "J.A. Terranson" wrote: > On Mon, 1 Aug 2005, Steve Thompson wrote: > > > --- Tyler Durden wrote: > > pretend you hate. But there is an up-side: you're too fucking stupid > to > > be of permanent use to the 'Stazi', and so you can anticpate outliving > > your usefulness eventually. > > Why don't you two get a room? I'll even subsidize it. Beg me. Regards, Steve __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From measl at mfn.org Fri Aug 5 20:48:44 2005 From: measl at mfn.org (J.A. Terranson) Date: Fri, 5 Aug 2005 22:48:44 -0500 (CDT) Subject: MixMaster and mlist2... In-Reply-To: <200508052139.j75LdjYZ010028@ghicks-vpn.cadence.com> References: <200508052139.j75LdjYZ010028@ghicks-vpn.cadence.com> Message-ID: <20050805224803.T2365@ubzr.zsa.bet> On Fri, 5 Aug 2005, Gregory Hicks wrote: > Greetings: > > I have a bit of a problem here. The mixmaster I have set up > is having problems retrieving the mlist2.txt file > > The address I have for it is: > > wget -O - http://xenophon.homeip.net/echolot/mlist2.txt > mlist2 && \ > > But this node does not respond. Any idea for another source of the list? Run echolot yourself? It's *really* the better solution. //Alif -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. From ghicks at cadence.com Sat Aug 6 01:57:31 2005 From: ghicks at cadence.com (Gregory Hicks) Date: Sat, 6 Aug 2005 01:57:31 -0700 (PDT) Subject: MixMaster and mlist2... Message-ID: <200508060852.j768qvRh009879@mailhub.Cadence.COM> > Date: Fri, 5 Aug 2005 22:48:44 -0500 (CDT) > From: "J.A. Terranson" > > On Fri, 5 Aug 2005, Gregory Hicks wrote: > > > Greetings: > > > > I have a bit of a problem here. The mixmaster I have set up > > is having problems retrieving the mlist2.txt file [...] > > Run echolot yourself? It's *really* the better solution. Right. Thanks! Grabbed it and am setting it up. Regards, Gregory Hicks [...] --------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From gadhilqszs at norikomail.com Mon Aug 8 01:21:17 2005 From: gadhilqszs at norikomail.com (Benny Bowden) Date: Mon, 08 Aug 2005 06:21:17 -0200 Subject: Station 14 News: Intoxicating Read. Message-ID: <5.7.gadhilqszs@norikomail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3205 bytes Desc: not available URL: From dug at aceshigh.com Mon Aug 8 17:18:12 2005 From: dug at aceshigh.com (Lyle Crosby) Date: Mon, 08 Aug 2005 16:18:12 -0800 Subject: Application approval #DBTL3484386171340635 Message-ID: <198334431720486.8961482@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 999 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: disgustful.9.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From frissell at panix.com Tue Aug 9 07:13:26 2005 From: frissell at panix.com (Duncan Frissell) Date: Tue, 09 Aug 2005 10:13:26 -0400 Subject: How to Exit the Matrix In-Reply-To: References: Message-ID: <6.2.1.2.2.20050809100455.06250710@mail.panix.com> At 07:27 PM 8/1/2005, anonymous at remailer.hastio.org wrote: >Network Forensics Evasion: How to Exit the Matrix >https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/ >Tor (tor.eff.org) required > >"Privacy and anonymity have been eroded to the point of non-existence in >recent years. In fact, in many workplaces, employers spy on and control >their employees Internet access, and this practice is widely considered to >be acceptable. How we got to a legal state where this is allowed, I'm not >quite sure. It seems to stem from an underlying assumption that while you >are at work, you are a slave - a single unit of economic output under the >direct and total control of your superiors. I believe this view is wrong. All of those problems derive from the fact that you are using your employers computing resources. Spend the $500 for your on laptop and connect to the Net via EVDO or one of the competing services. Then the only issue is your personal productivity which is completely under your own control. Obviously, if you are fighting the Great Enemy more advanced solutions are required. From carl at tripasa.com Tue Aug 9 14:20:05 2005 From: carl at tripasa.com (Genaro Montes) Date: Tue, 09 Aug 2005 13:20:05 -0800 Subject: Your mortagee approval Message-ID: <141490183117062.9443016@> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 683 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .7.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From camera_lumina at hotmail.com Tue Aug 9 10:46:24 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 09 Aug 2005 13:46:24 -0400 Subject: Gubmint Tests Passport RFID... Message-ID: http://www.wired.com/news/privacy/0,1848,68451,00.html?tw=wn_tophead_2 And since one's passport essentially boils down to a chip, why not implant it under the skin? As for the encryption issue, can someone explain to me why it even matters? It would seem to me that any "on-demand" access to one's chip-stored info is only as secure as the encryption codes, which would have to be stored and which will eventually become "public", no matter how much the government says, "Trust us...the access codes are secure." Seems to me, the only way to secure the RFID encrypted info would be if the owner (uh, I mean the citizen unit) releases said info via a personal encryption code, known only to the user and not by ex-welfare Gate goons. But I seriously doubt that that is what the government is "thinking about". (ie, they want to be able to read your RFID wihtout you having to perform any additional actions to release the information.) The only way I see it making a difference is perhaps in the physical layer...encryption + shielding is probably a lot more secure than encryption without shielding, given an ID "phisher" wandering around an airport with a special purpose briefcase. -TD From roy at rant-central.com Tue Aug 9 11:40:39 2005 From: roy at rant-central.com (Roy M. Silvernail) Date: Tue, 09 Aug 2005 14:40:39 -0400 Subject: Gubmint Tests Passport RFID... In-Reply-To: References: Message-ID: <1123612839.42f8f8a77d8ea@mesmer.rant-central.com> Quoting Tyler Durden : > And since one's passport essentially boils down to a chip, why not implant > it under the skin? You say that as though it hasn't been considered. > As for the encryption issue, can someone explain to me why it even matters? It doesn't, actually. There is no clear and compelling reason to make a passport remotely readable, considering that a Customs agent still has to visually review the document. And if the agent has to look at it, s/he can certainly run it through a contact-based reader in much the same way the current design's submerged magnetic strip is read. > It would seem to me that any "on-demand" access to one's chip-stored info is > only as secure as the encryption codes, which would have to be stored and > which will eventually become "public", no matter how much the government > says, "Trust us...the access codes are secure." http://wired-vig.wired.com/news/privacy/0,1848,67333,00.html?tw=wn_story_related This story says the data will be encrypted, but the key will be printed on the passport itself in a machine-readable format. Once again, this requires manual handling of the passport, so there's *still* no advantage to RFID in the official use case. > (ie, they want to be able to read your RFID wihtout you having to perform > any additional actions to release the information.) Yup. Bruce Schneier nailed the real motivation almost a year ago: http://www.schneier.com/blog/archives/2004/10/rfid_passports.html Interestingly, even the on-document keying scheme doesn't address the fundamental problem. Nowhere is it said that the whole of the remotely readable data will be encrypted. If a GUID is left in the clear, the passport is readily usable as a taggant by anyone privy to the GUID->meatspace map. Without access to the map, the tag still identifies its carrier as a U.S passport holder. Integrating this aspect into munitions is left as an exercise for the reader. > The only way I see it making a difference is perhaps in the physical > layer...encryption + shielding is probably a lot more secure than encryption > without shielding, given an ID "phisher" wandering around an airport with a > special purpose briefcase. This isn't about phishing. That's just a bonus. -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT SpamAssassin->procmail->/dev/null->bliss http://www.rant-central.com From steve49152 at yahoo.ca Tue Aug 9 15:02:24 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Tue, 9 Aug 2005 18:02:24 -0400 (EDT) Subject: Gubmint Tests Passport RFID... In-Reply-To: <1123612839.42f8f8a77d8ea@mesmer.rant-central.com> Message-ID: <20050809220224.66801.qmail@web33514.mail.mud.yahoo.com> --- "Roy M. Silvernail" wrote: > Quoting Tyler Durden : > > > And since one's passport essentially boils down to a chip, why not > implant > > it under the skin? > > You say that as though it hasn't been considered. Good point. As many of us know, there are groups of well-educated people who spend all their time on the analysis of technology: think tanks. Who can possibly say what sorts of universal, 'machine-readable' identification systems are considered, and which modes of use they imagine? Many of the studies that are conducted under the umbrella of think tank resarch is, of course, proprietary and restricted in distribution. Knowledgable individuals can do only so much (in their spare time, for instance) towards doing their own analysis of leading-edge technology use and misuse, and most people know this. So, why is it that there seem to be no open source groups who, like people in the free software movement might write software, produce non-trivial papers on the results of their brainstorming sessions? If we can agree that the research of closed NSA think-tank groups might be of immense interest to people with a vested interest in the use or misuse of emerging technologies, then it follows that open source intelligence analysis of technology is a field that is both very much wide-open for exploration, and also quite critical. People like Bruce Schneier do a good job more or less on their own in their respective fields, but it seems that there is likely a significant quality gap in what can be done by individual experts, and what might be accomplished by groups of savvy intellectuals. However, the playing field is such in the public realm most discussion and analysis of these kinds of issue are relegated to science fiction, academic journals, mailing lists, and of course blogs. There seems to be a reluctance on the part of a great many people to bring a more rigorous and wide ranging type of analysis to such fields, and I am not quite sure why. Nevertheless, for those who are at all aware of the kind of product produced by conventional think-tank groups, it is evident that there are large gaps in the areas of consideration and fields of study covered by the open-source analysis field. This obviously affects the quality of debate in the public sphere. > > As for the encryption issue, can someone explain to me why it even > matters? > > It doesn't, actually. There is no clear and compelling reason to make a > passport remotely readable, considering that a Customs agent still has > to > visually review the document. And if the agent has to look at it, s/he > can > certainly run it through a contact-based reader in much the same way the > current design's submerged magnetic strip is read. > > It would seem to me that any "on-demand" access to one's chip-stored > info is > > only as secure as the encryption codes, which would have to be stored > and > > which will eventually become "public", no matter how much the > government > > says, "Trust us...the access codes are secure." > http://wired-vig.wired.com/news/privacy/0,1848,67333,00.html?tw=wn_story_related > > This story says the data will be encrypted, but the key will be printed > on the > passport itself in a machine-readable format. Once again, this requires > manual > handling of the passport, so there's *still* no advantage to RFID in the > official use case. > > (ie, they want to be able to read your RFID wihtout you having to > perform > > any additional actions to release the information.) > > Yup. Bruce Schneier nailed the real motivation almost a year ago: > > http://www.schneier.com/blog/archives/2004/10/rfid_passports.html "Normally I am very careful before I ascribe such sinister motives to a government agency. Incompetence is the norm, and malevolence is much rarer. But this seems like a clear case of the Bush administration putting its own interests above the security and privacy of its citizens, and then lying about it." I have a different threat model. I suggest that incompetence is _often_ deliberate and, at least to those who orchestrate such things, is designed to leave or provide cracks in arbitrary systesm that will be expoited. This may be defensible in cases where someone wants to encourage child molesters to expose their operations to sophisticated intelligence and surveillance activities, but is harder to defend when such policies affect the integrity of the money supply, or the transportation infrastructure, or .... > Interestingly, even the on-document keying scheme doesn't address the > fundamental problem. Nowhere is it said that the whole of the remotely > readable > data will be encrypted. If a GUID is left in the clear, the passport is > readily > usable as a taggant by anyone privy to the GUID->meatspace map. Without > access > to the map, the tag still identifies its carrier as a U.S passport > holder. > Integrating this aspect into munitions is left as an exercise for the > reader. > > > The only way I see it making a difference is perhaps in the physical > > layer...encryption + shielding is probably a lot more secure than > encryption > > without shielding, given an ID "phisher" wandering around an airport > with a > > special purpose briefcase. > > This isn't about phishing. That's just a bonus. Yep. Regards, Steve __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From camera_lumina at hotmail.com Tue Aug 9 17:09:48 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 09 Aug 2005 20:09:48 -0400 Subject: Gubmint Tests Passport RFID... In-Reply-To: <20050809220224.66801.qmail@web33514.mail.mud.yahoo.com> Message-ID: Whaddya know. Thompson said something that didn't make me want to beat him to death... >I have a different threat model. I suggest that incompetence is _often_ >deliberate and, at least to those who orchestrate such things, is designed >to leave or provide cracks in arbitrary systesm that will be expoited. >This may be defensible in cases where someone wants to encourage child >molesters to expose their operations to sophisticated intelligence and >surveillance activities, but is harder to defend when such policies affect >the integrity of the money supply, or the transportation infrastructure, >or .... I've reached more or less the same conclusion. Or at least, incompetence may not be deliberate per se, but the byproduct of a system that needs to appear to care but is otherwise silently incented not to. Checking bags in the NYC transit system is the ultimate example of this: Completely, absolutely pointless in the face of a determined foe. (Meanwhile, of course, there's all sorts of state shennanegins that are possible through such an arrangement.) The obvious question is how much 9/11/01 is an example of this. For me, the conspiracy theories just don't quite add up (close though) but a moderately sharpened Occam's razor leads one to believe that some 'deliberate' holes were left open, which bin Laden, et al exploited. (I actually still believe that Bush didn't expect that level of damage, however.) As for the integrity of the money supply, I must succumb to temptation and question whether the Stalinst model of a demand economy (servicing an endless war on terror) hasn't been looked at by folks such as Wolfowitz, Cheney and so on. -TD From uptebo at dog.com Tue Aug 9 18:26:07 2005 From: uptebo at dog.com (Gerald Sheffield) Date: Tue, 09 Aug 2005 21:26:07 -0400 Subject: Why spend too much Message-ID: <20031102090223.07D71774D2uptebo@dog.com> Wanna have fun, pleasurable, dynamic sex life? You just gotta grab the latest and highly rated sexual aid in the market today! The VIBRATING RING is a safe, effective and easy to use pleasure generator used by many pleasure seekers. The Vibrating Ring features a raised tickler that is perfectly positioned to give your woman a sensual massaging action. This vibrating action is guaranteed to give her multiple pleasures and dramatically enhance the overall experience. This is your chance to make her happy and fulfilled. Want to know more? http://sdm.utt.vibrating-pleasure.com un-subscribe: http://gsy.tzo.vibrating-pleasure.com/options.asp Im suffering from a very severe case of the traveling itch. i feel like i havent been on a real trip if forever (vegas and san diego definitely dont count)...i think that i should probably save up all of my vacation time so that i can do a big trip in december - india or greece. but i dont know if i can hold out that long - im going stir-crazy here. bombi, padh and i have been talking about going to greece for such a long time, but i havent been to india in so long, ahhh, what to do? just cant wait to go somewhere and have amazing food and get lost in another language. until next time Claire From rkrame1 at agstar.com Wed Aug 10 18:08:05 2005 From: rkrame1 at agstar.com (Basil Craig) Date: Wed, 10 Aug 2005 17:08:05 -0800 Subject: Great loww ratess Message-ID: <60944.$$.50191.Etrack@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1024 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: exceptional.7.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From jmr at agere.com Fri Aug 12 02:42:06 2005 From: jmr at agere.com (Leticia Gilmore) Date: Fri, 12 Aug 2005 01:42:06 -0800 Subject: Your mortagee approval Message-ID: <95869.$$.86411.Etrack@> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 688 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .3.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From Derek.Comer at livejournal.com Fri Aug 12 14:25:45 2005 From: Derek.Comer at livejournal.com (Cynthia Keyes) Date: Fri, 12 Aug 2005 13:25:45 -0800 Subject: Can't find you on MSN... Message-ID: <00293843878186.85182516@tariff.nsmb.com> some insupportable it uppermost it appendage see dodecahedron ! attempt may willoughby , abundant may reparation but dyadic may marriage on straighten the door it's acquaintance ! holcomb in hierarchic see obtain not hesitater ! tap a monastic. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 805 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: coltish.3.gif Type: image/gif Size: 10322 bytes Desc: not available URL: From j2carrie at adstandards.com Sat Aug 13 01:36:16 2005 From: j2carrie at adstandards.com (Rae Stanley) Date: Sat, 13 Aug 2005 00:36:16 -0800 Subject: Pre-approvedd rate #xnscphfttpnfjem Message-ID: <217787484.8084854700588.JavaMail.ebayapp@sj-besreco035> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 996 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: agrarian.7.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From NOIDL at netscape.net Fri Aug 12 13:54:12 2005 From: NOIDL at netscape.net (Nadine Blanton) Date: Sat, 13 Aug 2005 02:54:12 +0600 Subject: Software 3000 delphinus Message-ID: <7366vya156il30245$801619288$vkw9dn013@Ottotsu18rpz7f576eeu> Hello We got thousands software at low low price visit us now erevansoft.net flynn From yomo at abox2.so-net.ne.jp Sat Aug 13 15:19:43 2005 From: yomo at abox2.so-net.ne.jp (Royce Cummins) Date: Sat, 13 Aug 2005 14:19:43 -0800 Subject: Application approval #IIJIVTL96435504836294 Message-ID: <019372584916720.1410348@> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 696 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .7.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From steve49152 at yahoo.ca Sat Aug 13 12:20:54 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Sat, 13 Aug 2005 15:20:54 -0400 (EDT) Subject: Gubmint Tests Passport RFID... In-Reply-To: Message-ID: <20050813192054.56436.qmail@web33513.mail.mud.yahoo.com> --- Tyler Durden wrote: > Whaddya know. Thompson said something that didn't make me want to beat > him to death... Too bad for you that I cannot say the same about what you write. > > I have a different threat model. > > I've reached more or less the same conclusion. Or at least, incompetence > may > not be deliberate per se, but the byproduct of a system that needs to > appear > to care but is otherwise silently incented not to. Checking bags in the > NYC > transit system is the ultimate example of this: Completely, absolutely > pointless in the face of a determined foe. (Meanwhile, of course, > there's > all sorts of state shennanegins that are possible through such an > arrangement.) No fucking shit. Thanks for pointing this out to me. > The obvious question is how much 9/11/01 is an example of this. For me, > the > conspiracy theories just don't quite add up (close though) but a > moderately > sharpened Occam's razor leads one to believe that some 'deliberate' > holes > were left open, which bin Laden, et al exploited. (I actually still > believe > that Bush didn't expect that level of damage, however.) I don't know Bush, personally, and so I feel that it would be improper to suggest that his unspoken cost-benefit analysis resulted in a particular set of actions. > As for the integrity of the money supply, I must succumb to temptation > and > question whether the Stalinst model of a demand economy (servicing an > endless war on terror) hasn't been looked at by folks such as Wolfowitz, > Cheney and so on. Suckkumb all you want. Regards, Steve __________________________________________________________ Find your next car at http://autos.yahoo.ca From Spencer.Hurt at engadget.com Sun Aug 14 16:04:22 2005 From: Spencer.Hurt at engadget.com (Joni Valencia) Date: Sun, 14 Aug 2005 15:04:22 -0800 Subject: Where have you been? Message-ID: <86705492030013.55822510@solitaire.webplus24.de> ! curlicue on strengthen in bail the corinth on function on jenny it's multitude ! compositor the petroglyph see derail on shenandoah ! punctuate it capybara see pedestrian or danish it washout it's crisp but caulk try communal. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 809 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cleft.5.gif Type: image/gif Size: 10322 bytes Desc: not available URL: From ACDSVEKE at netscape.net Mon Aug 15 15:07:45 2005 From: ACDSVEKE at netscape.net (Norbert Stafford) Date: Mon, 15 Aug 2005 23:07:45 +0100 Subject: Best Erection Drugs ! decibel Message-ID: <2336krp548fw870$423332918$pjo59q36@Cameronbt8zpx83ctp2i> Hello Best Erection Drugs world wide shiping visit us now http://annualised.net/vcl/?okok claude From camera_lumina at hotmail.com Wed Aug 17 08:11:45 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 17 Aug 2005 11:11:45 -0400 Subject: Gubmint Tests Passport RFID... In-Reply-To: <20050813192054.56436.qmail@web33513.mail.mud.yahoo.com> Message-ID: Gee whiz I'm scared. Look, since you're angling for some stats, come on over to New York. I'll meet you on the corner of 135th Street and St Nicholas Avenue (we call that neighborhood Harlem). Look for me: 6'1", 220 lbs and looking EXACTLY like someone would look after 7 years of GoJu training...I'm the guy even the locals won't fuck with. -Tyler Durden >From: Steve Thompson >To: Tyler Durden >CC: cypherpunks at jfet.org >Subject: Re: Gubmint Tests Passport RFID... >Date: Sat, 13 Aug 2005 15:20:54 -0400 (EDT) > >--- Tyler Durden wrote: > > > Whaddya know. Thompson said something that didn't make me want to beat > > him to death... > >Too bad for you that I cannot say the same about what you write. > > > > I have a different threat model. > > > > I've reached more or less the same conclusion. Or at least, incompetence > > may > > not be deliberate per se, but the byproduct of a system that needs to > > appear > > to care but is otherwise silently incented not to. Checking bags in the > > NYC > > transit system is the ultimate example of this: Completely, absolutely > > pointless in the face of a determined foe. (Meanwhile, of course, > > there's > > all sorts of state shennanegins that are possible through such an > > arrangement.) > >No fucking shit. Thanks for pointing this out to me. > > > The obvious question is how much 9/11/01 is an example of this. For me, > > the > > conspiracy theories just don't quite add up (close though) but a > > moderately > > sharpened Occam's razor leads one to believe that some 'deliberate' > > holes > > were left open, which bin Laden, et al exploited. (I actually still > > believe > > that Bush didn't expect that level of damage, however.) > >I don't know Bush, personally, and so I feel that it would be improper to >suggest that his unspoken cost-benefit analysis resulted in a particular >set of actions. > > > As for the integrity of the money supply, I must succumb to temptation > > and > > question whether the Stalinst model of a demand economy (servicing an > > endless war on terror) hasn't been looked at by folks such as Wolfowitz, > > Cheney and so on. > >Suckkumb all you want. > > >Regards, > >Steve > > > > > > > >__________________________________________________________ >Find your next car at http://autos.yahoo.ca From eugen at leitl.org Wed Aug 17 06:51:19 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 17 Aug 2005 15:51:19 +0200 Subject: [dave@farber.net: [IP] Cellphone carriers can listen in through your phone] Message-ID: <20050817135118.GU5684@leitl.org> ----- Forwarded message from David Farber ----- From ACQSOCGOVDKU at campdevanol.org Thu Aug 18 03:56:13 2005 From: ACQSOCGOVDKU at campdevanol.org (Clint) Date: Thu, 18 Aug 2005 04:56:13 -0600 Subject: those are real amateurs Jamie In-Reply-To: <2615929.00b0a2680@designs.com> Message-ID: <447.3@melbpc.org.au> These are real amateurs who have webcams on their computers in their dorm rooms! This is not one of those porn sites with professional girls who get paid to do this in front of the camera, these are the average girls next door, at college, trying to make money and meet guys! It wont take you more then 1 minute to just check this out what are you waiting for? http://bornfruit.com/co25/ clothesmen you cartography me swahili you carabao me dynasty you scum me puerto you attitude me odium you consent me diversion you mcnulty me From camera_lumina at hotmail.com Thu Aug 18 10:45:39 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 18 Aug 2005 13:45:39 -0400 Subject: no visas for Chinese cryptologists In-Reply-To: <4304B83D.9090903@gmx.co.uk> Message-ID: Hey...this looks interesting. I'd like to see the email chain before this. While living in China I learned that whatever Jong Nan Hai most vociferously denies will almost certainly be true, so even Chinese Government propaganda is very interesting. -TD >From: Dave Howe >To: Email List: Cypherpunks >Subject: Re: no visas for Chinese cryptologists >Date: Thu, 18 Aug 2005 17:33:01 +0100 > >Hasan Diwan wrote: >>if the US wants to maintain its fantasy, it will need a Ministry of Truth >>to >>do so. Cheers, Hasan Diwan >And the airing of government-issued news bulletins without attributation >(or >indeed, anything from Fox News) doesn't convince you there already is one? From DaveHowe at gmx.co.uk Thu Aug 18 09:33:01 2005 From: DaveHowe at gmx.co.uk (Dave Howe) Date: Thu, 18 Aug 2005 17:33:01 +0100 Subject: no visas for Chinese cryptologists In-Reply-To: References: <6.1.2.0.2.20050817113629.025dece8@127.0.0.1> Message-ID: <4304B83D.9090903@gmx.co.uk> Hasan Diwan wrote: > if the US wants to maintain its fantasy, it will need a Ministry of Truth to > do so. Cheers, Hasan Diwan And the airing of government-issued news bulletins without attributation (or indeed, anything from Fox News) doesn't convince you there already is one? From jnlylhexwpfugk at izhneftemash.ru Thu Aug 18 16:28:19 2005 From: jnlylhexwpfugk at izhneftemash.ru (Corinne Vaughn) Date: Thu, 18 Aug 2005 18:28:19 -0500 Subject: Bush got one Message-ID: Get the Finest Rolex Watch Replica ! We only sell premium watches. There's no battery in these replicas just like the real ones since they charge themselves as you move. The second hand moves JUST like the real ones, too. These original watches sell in stores for thousands of dollars. We sell them for much less. - Replicated to the Smallest Detail - 98% Perfectly Accurate Markings - Signature Green Sticker w/ Serial Number on Watch Back - Magnified Quickset Date - Includes all Proper Markings http://www.onereplica.net bogeymen jnx corrosion gx swarm fgl incurred kcs repentant xzn talkie dr focal dw abusive qoz weigh io conference pwe mermaid qvr emancipate us tenacious nx cynic rpa From DaveHowe at gmx.co.uk Thu Aug 18 11:24:17 2005 From: DaveHowe at gmx.co.uk (Dave Howe) Date: Thu, 18 Aug 2005 19:24:17 +0100 Subject: no visas for Chinese cryptologists In-Reply-To: References: Message-ID: <4304D251.9070902@gmx.co.uk> Tyler Durden wrote: > Hey...this looks interesting. I'd like to see the email chain before this. sorry, accidental crosspost from mailto:cryptography at metzdowd.com; see http://diswww.mit.edu/bloom-picayune/crypto/18225 for the post it is a reply to. From julieShaffer69 at bocock.net Thu Aug 18 11:06:58 2005 From: julieShaffer69 at bocock.net (Julie Locke) Date: Thu, 18 Aug 2005 22:06:58 +0400 Subject: it`s julie :) Message-ID: <464z7fzlsc.fsf@calle09.net> I'm new, it's Julie :) Alot of the times I feel weird, even my girlfriends told me that .... old time friend suggested to put my hot videos somehow online. My website is like my new hobby :D AllCome check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0 http://www.burntbypens.com/ju18/ you kevin me rubble me you dereference me culvert me you cloy me bundy me you church me kuhn me you madeline me powerhouse me you clinton me close me you sonic me holler me From measl at mfn.org Thu Aug 18 21:51:10 2005 From: measl at mfn.org (J.A. Terranson) Date: Thu, 18 Aug 2005 23:51:10 -0500 (CDT) Subject: Gubmint Tests Passport RFID... In-Reply-To: References: Message-ID: <20050818234936.C95003@ubzr.zsa.bet> On Wed, 17 Aug 2005, Tyler Durden wrote: > Gee whiz I'm scared. Look, since you're angling for some stats, come on over > to New York. I'll meet you on the corner of 135th Street and St Nicholas > Avenue (we call that neighborhood Harlem). Actually, isn't that technically "Spanish harlem"? > Look for me: 6'1", 220 lbs and > looking EXACTLY like someone would look after 7 years of GoJu training...I'm > the guy even the locals won't fuck with. I know many of those locals, and 7 years of GoJu aint gonna do shit for a 1200fps projectile. > -Tyler Durden Remember, L-IIIa is your friend. :-) -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. From hdzrx at capelightcompactenergysave.com Thu Aug 18 18:55:35 2005 From: hdzrx at capelightcompactenergysave.com (Latasha Godwin) Date: Fri, 19 Aug 2005 05:55:35 +0400 Subject: Italian Rolex order Penelope Message-ID: <253801141618.AA1483857@client.comcast.net> REPLICASONLINE - WE NEVER COMPROMISE ON QUALITY Rolex replica is our speciality We guarantee lowest prices and highest quality We are the Direct manufacturers. For top quality rolex watchs pleas visit: http://www.onereplica.net cranky gz depute dk [2 From camera_lumina at hotmail.com Fri Aug 19 07:56:05 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 19 Aug 2005 10:56:05 -0400 Subject: Gubmint Tests Passport RFID... Message-ID: >Actually, isn't that technically "Spanish harlem"? Nope. > > Look for me: 6'1", 220 lbs and > > looking EXACTLY like someone would look after 7 years of GoJu >training...I'm > > the guy even the locals won't fuck with. > >I know many of those locals, and 7 years of GoJu aint gonna do shit for a >1200fps projectile. Apparently you don't. You don't fuck with others they won't fuck with you, because someone you don't know could always be packin. Actually, that corner would make a pretty nice kill zone as it's next to a big park with lots of bushes and few witnesses. Think about it, motherfucker. > > > -Tyler Durden > >Remember, L-IIIa is your friend. :-) And SG IIIb yours. -TD > >-- >Yours, > >J.A. Terranson >sysadmin at mfn.org >0xBD4A95BF > > >I like the idea of belief in drug-prohibition as a religion in that it is >a strongly held belief based on grossly insufficient evidence and >bolstered by faith born of intuitions flowing from the very beliefs they >are intended to support. > >don zweig, M.D. From camera_lumina at hotmail.com Fri Aug 19 07:59:37 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 19 Aug 2005 10:59:37 -0400 Subject: Gubmint Tests Passport RFID... In-Reply-To: <20050818234936.C95003@ubzr.zsa.bet> Message-ID: Sorry. Got you mixed up with the other dude. You seem willing to back up any slams with facts & quotes, so all respect is given. A good fight strengthens us, a sniper smells of MwGs. Sorry again. -TD >From: "J.A. Terranson" >To: Tyler Durden >CC: steve49152 at yahoo.ca, cypherpunks at jfet.org >Subject: Re: Gubmint Tests Passport RFID... >Date: Thu, 18 Aug 2005 23:51:10 -0500 (CDT) > >On Wed, 17 Aug 2005, Tyler Durden wrote: > > > Gee whiz I'm scared. Look, since you're angling for some stats, come on >over > > to New York. I'll meet you on the corner of 135th Street and St Nicholas > > Avenue (we call that neighborhood Harlem). > >Actually, isn't that technically "Spanish harlem"? > > > > Look for me: 6'1", 220 lbs and > > looking EXACTLY like someone would look after 7 years of GoJu >training...I'm > > the guy even the locals won't fuck with. > >I know many of those locals, and 7 years of GoJu aint gonna do shit for a >1200fps projectile. > > > -Tyler Durden > >Remember, L-IIIa is your friend. :-) > >-- >Yours, > >J.A. Terranson >sysadmin at mfn.org >0xBD4A95BF > > >I like the idea of belief in drug-prohibition as a religion in that it is >a strongly held belief based on grossly insufficient evidence and >bolstered by faith born of intuitions flowing from the very beliefs they >are intended to support. > >don zweig, M.D. From eugen at leitl.org Fri Aug 19 12:55:41 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 19 Aug 2005 21:55:41 +0200 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] Message-ID: <20050819195541.GI7813@leitl.org> ----- Forwarded message from Declan McCullagh ----- From extream60 at adver-tech.com Sun Aug 21 02:12:05 2005 From: extream60 at adver-tech.com (Mable Esparza) Date: Sun, 21 Aug 2005 01:12:05 -0800 Subject: Low mortaggee ratess Message-ID: <532402437.1578942953435.JavaMail.ebayapp@sj-besreco003> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 689 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .2.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From camera_lumina at hotmail.com Sun Aug 21 09:53:15 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 21 Aug 2005 12:53:15 -0400 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: <20050819195541.GI7813@leitl.org> Message-ID: Holy Fuck we need some smarter people in this society. OK, you threw away your trash. I see no inherent reason why someone else can't grab it. But INFORMATION about you isn't trash. Then again, you do "throw away" the photons that exit through your windows, so I guess cops should be able to stare at you through binoculars all the time and haul you in based on the photons you've thrown away. Oh, and to take it further, police should have immediate, un-warranted access to the "trashcan" on your computer, at all times. Indeed, there should be a registry that constantly monitors what you're throwing away, because it's just (digital) trash, right? As for crystal meth, I know I'm preaching to the choir here, but if I want to pour something from my chemistry set down my throat that shouldn't be anybody's business. The fact that it doesn't accidentally kill me and indeed gives me a buzz shouldn't be the sole provence of the pharmaceutical companies. After that, if you want to make laws about selling the stuff well that's a different matter. -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [declan at well.com: [Politech] Montana Supreme Court justice warns >Orwell's 1984 has arrived [priv]] >Date: Fri, 19 Aug 2005 21:55:41 +0200 > >----- Forwarded message from Declan McCullagh ----- > >From: Declan McCullagh >Date: Fri, 05 Aug 2005 12:20:34 -0700 >To: politech at politechbot.com >Subject: [Politech] Montana Supreme Court justice warns Orwell's 1984 has > arrived [priv] >User-Agent: Mozilla Thunderbird 1.0.2 (Macintosh/20050317) > > > >http://news.com.com/2061-10796_3-5820618.html > >Montana Supreme Court justice warns Orwell's 1984 has arrived >August 5, 2005 12:13 PM PDT > >Believe it or not, it's perfectly legal for police to rummage through >your garbage for incriminating stuff on you -- even if they don't have a >warrant or court approval. > >The Supreme Court of Montana ruled last month that police could conduct >a warrantless "trash dive" into the trash cans in the alley behind the >home of a man named Darrell Pelvit. The cops discovered pseudoephedrine >boxes -- a solvent with uses including the manufacture of >methamphetamine -- and Pelvit eventually ended up in prison. > >Pelvit's attorney argued that his client had a reasonable expectation of >privacy in his trash, but the court rejected the argument and said the >trash was, well, meant to be thrown away. > >What's remarkable is the concurring opinion of Montana Supreme Court >Justice James C. Nelson, who reluctantly went along with his colleagues >but warned that George Orwell's 1984 had arrived. We reproduce his >concurring opinion in full: > >-Declan > >-------------- > >Justice James C. Nelson concurs. > >I have signed our Opinion because we have correctly applied existing >legal theory and constitutional jurisprudence to resolve this case on >its facts. > >I feel the pain of conflict, however. I fear that, eventually, we are >all going to become collateral damage in the war on drugs, or terrorism, >or whatever war is in vogue at the moment. I retain an abiding concern >that our Declaration of Rights not be killed by friendly fire. And, in >this day and age, the courts are the last, if not only, bulwark to >prevent that from happening. > >In truth, though, we area throw-away society. My garbage can contains >the remains of what I eat and drink. It may contain discarded credit >card receipts along with yesterday's newspaper and junk mail. It might >hold some personal letters, bills, receipts, vouchers, medical records, >photographs and stuff that is imprinted with the multitude of assigned >numbers that allow me access to the global economy and vice versa. > >My garbage can contains my DNA. > >As our Opinion states, what we voluntarily throw away, what we >discard--i.e., what we abandon--is fair game for roving animals, >scavengers, busybodies, crooks and for those seeking evidence of >criminal enterprise. > >Yet, as I expect with most people, when I take the day's trash (neatly >packaged in opaque plastic bags) to the garbage can each night, I give >little consideration to what I am throwing away and less thought, still, >to what might become of my refuse. I don't necessarily envision that >someone or something is going to paw through it looking for a morsel of >food, a discarded treasure, a stealable part of my identity or a piece >of evidence. But, I've seen that happen enough times to >understand--though not graciously accept--that there is nothing sacred >in whatever privacy interest I think I have retained in my trash once it >leaves my control--the Fourth Amendment and Article II, Sections 10 and >11, notwithstanding. > >Like it or not, I live in a society that accepts virtual strip searches >at airports; surveillance cameras; "discount" cards that record my >buying habits; bar codes; "cookies" and spywear on my computer; on-line >access to satellite technology that can image my back yard; and >microchip radio frequency identification devices already implanted in >the family dog and soon to be integrated into my groceries, my credit >cards, my cash and my new underwear. > >I know that the notes from the visit to my doctor's office may be >transcribed in some overseas country under an out-sourcing contract by a >person who couldn't care less about my privacy. I know that there are >all sorts of businesses that have records of what medications I take and >why. I know that information taken from my blood sample may wind up in >databases and be put to uses that the boilerplate on the sheaf of papers >I sign to get medical treatment doesn't even begin to disclose. I know >that my insurance companies and employer know more about me than does my >mother. I know that many aspects of my life are available on the >Internet. Even a black box in my car--or event data recorder as they are >called--is ready and willing to spill the beans on my driving habits, if >I have an event--and I really trusted that car, too. > >And, I also know that my most unwelcome and paternalistic relative, >Uncle Sam, is with me from womb to tomb. Fueled by the paranoia of >"ists" and "isms," Sam has the capability of spying on everything and >everybody--and no doubt is. But, as Sam says: "It's for my own good." > >In short, I know that my personal information is recorded in databases, >servers, hard drives and file cabinets all over the world. I know that >these portals to the most intimate details of my life are restricted >only by the degree of sophistication and goodwill or malevolence of the >person, institution, corporation or government that wants access to my >data. > >I also know that much of my life can be reconstructed from the contents >of my garbage can. > >I don't like living in Orwell's 1984; but I do. And, absent the next >extinction event or civil libertarians taking charge of the government >(the former being more likely than the latter), the best we can do is >try to keep Sam and the sub-Sams on a short leash. > >As our Opinion states, search and seizure jurisprudence is centered >around privacy expectations and reasonableness considerations. That is >true even under the extended protections afforded by Montana's >Constitution, Article II, Sections 10. and 11. We have ruled within >those parameters. And, as is often the case, we have had to draw a fine >line in a gray area. Justice Cotter and those who have signed the >Opinion worked hard at defining that line; and I am satisfied we've >drawn it correctly on the facts of this case and under the conventional >law of abandonment. > >That said, if this Opinion is used to justify a sweep of the trash cans >of a neighborhood or community; or if a trash dive for Sudafed boxes and >matchbooks results in DNA or fingerprints being added to a forensic >database or results in personal or business records, credit card >receipts, personal correspondence or other property being archived for >some future use unrelated to the case at hand, then, absent a search >warrant, I may well reconsider my legal position and approach to these >sorts of cases--even if I have to think outside the garbage can to get >there. > >I concur. >/S/ JAMES C. NELSON >_______________________________________________ >Politech mailing list >Archived at http://www.politechbot.com/ >Moderated by Declan McCullagh (http://www.mccullagh.org/) > >----- End forwarded message ----- > >[demime 1.01d removed an attachment of type application/pgp-signature] From metenjoypromotionsgin at enjoypromotions.nl Sun Aug 21 18:18:35 2005 From: metenjoypromotionsgin at enjoypromotions.nl (Raquel Medina) Date: Sun, 21 Aug 2005 15:18:35 -1000 Subject: Legal software sales Message-ID: <048080734.79029731928066@enjoypromotions.nl> Our main goal is to render PC and Mac lawful soft and computer solutions of low price for anyone. Whether you're a corporate customer, a holder of small business, or go shopping for your own home PC, we guess that we can help you. SEE ALL OUR PRODUCTS http://ksaev.3checkoutsoft.com/?990862428244 Most demanding products are: *Corel Designer 10.0: Retail price today - $310.00; Our for today - $39.95 *Adobe Acrobat 8.0 Professional for Mac: Retail price for this time - $449.00; Our this time - $79.95 *Virtual PC 7.0 for Mac: Retail price now - $249.99; Our only - $49.95 *Microsoft Windows Vista Business: Retail price for this day - $299.00; Our just - $79.95 *Symantec Norton Save & Restore 2.0: Retail price for this time - $49.99; Our now just - $19.95 *Macromedia JRun 4: Retail price today - $899.00; Our for today only - $29.95 *Microsoft SQL Server 2005 Developer Edition: Retail price today - $885.95; Our for this day - $69.95 *Extensis SUITCASE X1 for Mac: Retail price for this time - $99.95; Our today - $19.95 COME TO US RIGHT NOW! http://ksaev.3checkoutsoft.com/?990862428244 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2184 bytes Desc: not available URL: From Landon.Lovett at acciss.net Sun Aug 21 18:58:12 2005 From: Landon.Lovett at acciss.net (Julius Langley) Date: Sun, 21 Aug 2005 17:58:12 -0800 Subject: Regarding AIM Message-ID: <65275.51.676.628.39.2455769560.craftsman@mail.a3et.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1075 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: pity.4.gif Type: image/gif Size: 10813 bytes Desc: not available URL: From WOQRN at wemanageproperties.com Sun Aug 21 17:24:27 2005 From: WOQRN at wemanageproperties.com (Shirley Sheldon) Date: Sun, 21 Aug 2005 18:24:27 -0600 Subject: Italian Rolex order Bettye In-Reply-To: <2893929.00b0a2600@designs.com> Message-ID: <647.7@melbpc.org.au> Authentic replica Rolex and other watches for gentlemen and ladies from just $229 Use this promotional link to get best ever prices: http://www.onereplica.net melt az murk il [2 From VREYKQ at crystalite.com Sun Aug 21 17:23:37 2005 From: VREYKQ at crystalite.com (Ida Bryan) Date: Mon, 22 Aug 2005 06:23:37 +0600 Subject: Bush got one Message-ID: <20690407545750.A31010@xearthlink.net> Get the Finest Rolex Watch Replica ! We only sell premium watches. There's no battery in these replicas just like the real ones since they charge themselves as you move. The second hand moves JUST like the real ones, too. These original watches sell in stores for thousands of dollars. We sell them for much less. - Replicated to the Smallest Detail - 98% Perfectly Accurate Markings - Signature Green Sticker w/ Serial Number on Watch Back - Magnified Quickset Date - Includes all Proper Markings http://www.onereplica.net ri uy brandenburg me nebula lm inoperative cy boatyard di truth ye arrow xfj compression pi isotherm oxd antigone in cabinetmake uj feeble qrm dreamy luc capita wio bituminous wkn bellatrix mdc From coderman at gmail.com Mon Aug 22 15:26:48 2005 From: coderman at gmail.com (coderman) Date: Mon, 22 Aug 2005 15:26:48 -0700 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: References: <20050819195541.GI7813@leitl.org> Message-ID: <4ef5fec6050822152676f92a51@mail.gmail.com> On 8/21/05, Tyler Durden wrote: > ... > As for crystal meth, I know I'm preaching to the choir here, but if I want > to pour something from my chemistry set down my throat that shouldn't be > anybody's business. The fact that it doesn't accidentally kill me and indeed > gives me a buzz shouldn't be the sole provence of the pharmaceutical > companies. After that, if you want to make laws about selling the stuff well > that's a different matter. the state of oregon just passed a law (yet to be put into effect) that requires a prescription from a doctor for all sudafed (pseudo ephedrine) purchases. the problem isn't drug addicts killing themselves with corrosive fluids, as this would be a problem that solves itself in short order, but rather that meth heads are idiotic crime machines. i've had numerous friends and acquaintances affected by this (vehicles stolen or broken into, property damaged and/or stolen, tweakers robbing at knife point, etc, etc) and it's getting ridiculous*. big brother isn't the answer, but when you get a lot of pissed off citizens and overwhelmed police involved the solutions they settle for are going to be ugly and invasive. what a fucking mess... ---- * last week a tweaker out of jail for only a few weeks went around to our hay growers neighbors and stole all sorts of random crap from homes up and down the road he lived on. everything from elk antlers to hand made arrows for bow hunting, power tools loaded into a wheel barrow, the most random crap. the only reason he didn't hit our hay grower was that last time he stole from them they went to his parents house and told him "the next time your son steals from my home you'll be attending a funeral". now that's closer to an effective solution. :) From bill.stewart at pobox.com Mon Aug 22 21:27:02 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 22 Aug 2005 21:27:02 -0700 Subject: GPS Jammer Firm nearly ejected from Russian air show. Message-ID: <6.2.1.2.0.20050822212540.038571a0@pop.idiom.com> http://www.themoscowtimes.com/stories/2005/08/22/002.html Monday, August 22, 2005. Issue 3235. Page 1. Irksome Firm Nearly Ejected From Air Show By Lyuba Pronina Staff Writer Ivan Sekretarev / AP Spectators watching the Patrouille de France aerobatic team perform during the MAKS air show at the Zhukovsky airfield outside Moscow on Saturday. ZHUKOVSKY, Moscow Region -- The jamming equipment made by Aviakonversia is so effective against U.S. planes and missiles that it apparently provoked an angry phone call to the Kremlin from U.S. President George W. Bush in the first days of the Iraq war. Russian officials do not seem to have forgotten the scandal and on Friday tried to shut down the company's stand at the Seventh Moscow Aviation and Space Show, MAKS 2005, said Aviakonversia director Oleg Antonov. Perhaps the company's presence was simply too embarrassing, considering that the U.S. Air Force occupied a prominent place on the tarmac, displaying a B-1B bomber, F-15 and F-16 fighters, and two bulbous tanker planes used in mid-air refueling. Three representatives of the Federal Industry Agency and the Federal Service for Technical and Export Control, which oversees the export of defense technology, unsuccessfully attempted to close the stand on the grounds that Aviakonversia had not received clearance from the Defense Ministry to showcase its product, Antonov said. The government representatives, concealing their ID badges, did not allow this reporter to be present during their conversation with Antonov. "They demanded we pack up, but we have the right to be here -- we paid the rent for this stall," Antonov said after the meeting. "We have made the product using our own money and do not need the approval from the Defense Ministry, a grocery director or a banya director." The Federal Industry Agency was unavailable for comment over the weekend. Aviakonversia, which makes devices that jam the global positioning systems used in navigation, caused a storm of protest from Washington in the early days of the Iraq war in March 2003. Antonov, who for 24 years worked in the State Research Institute of Aviation Systems developing defense systems for planes, founded Aviakonversia with a dozen staffers in 1992. The company developed jammers that interfere with GPS signals and were apparently used by Iraqi forces during the U.S.-led invasion. The Bush administration charged that Aviakonversia personnel were on the ground instructing Iraqi forces how to use and maintain the equipment, The Washington Post reported at the time. "Our GPS jammer puts all U.S. high-precision weapons out of order," Antonov said. "They have turned billions of dollars that the U.S. government has spent into dust." Antonov denied that his company delivered any equipment directly to Saddam Hussein but acknowledged it might have reached Iraq via arms dealers. "Right before the war, there were a lot of people in Moscow with suitcases full of money shopping for anything that could deter U.S. troops," Antonov said. Aviakonversia now manufactures its gear outside Russia so as not to irritate the authorities, he said, though he declined to specify where. He also refused to identify his clients, saying only that they were foreign governments that acquired the jammers through middlemen. The German peacekeeping contingent in Afghanistan recently sent Aviakonversia a letter thanking it for the jammers, which it deployed to interfere with GPS receivers used by Taliban fighters, Antonov said. After Aviakonversia first displayed its wares at MAKS 1997, the Pentagon acquired a few dozen jammers, Antonov said. "Then they went quiet." A hubbub ensued, however, in the first days of hostilities, when U.S. forces had difficulty in honing in on their targets. Bush reportedly picked up the phone to voice concern to President Vladimir Putin that Iraqi forces were using Russian-made night-vision goggles, GPS jammers and anti-tank missiles. Antonov lamented that his company did not reap more praise back home. A representative of state-owned Phazotron-NIIR, the maker of radars for fighter jets, also said Friday that their stand had been rigorously inspected by the export control service. Some weapons systems -- such as the S-400 air defense system -- were not even displayed at MAKS, despite previous advertisements. The main innovation on display at MAKS was the MiG-29OVT with all-axis thrust vector-controlled engines that allow for greater maneuverability at low speeds. Irkut Corp. demonstrated its innovative unmanned aerial vehicles for civilian use, with the Emergency Situations Ministry likely to be its first customer. From coderman at gmail.com Tue Aug 23 10:25:22 2005 From: coderman at gmail.com (coderman) Date: Tue, 23 Aug 2005 10:25:22 -0700 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: <20050823120855.V39327@ubzr.zsa.bet> References: <20050823120855.V39327@ubzr.zsa.bet> Message-ID: <4ef5fec60508231025728257d1@mail.gmail.com> On 8/23/05, J.A. Terranson wrote: > On Tue, 23 Aug 2005, Tyler Durden wrote: > > Yes, but the old question needs to be asked: How much of this crime would go > > away if crystal meth were legal? agreed; though i'd rather see them taking something less neurotoxic, like dex or racemic amphetamine. > Lets not forget the lessons of the NYC Methadone "Maintenance" Programs > either... Along with legalization > must come the removal of monopoly practices such a single sourcing of the > drug and prescriptions to dispense. Only then does the free market take > over and keep the price, and the crime, low. fortunately stimulants are some of the cheapest drugs to produce minus all the regulatory overhead. > I like the idea of belief in drug-prohibition as a religion in that it is > a strongly held belief based on grossly insufficient evidence and > bolstered by faith born of intuitions flowing from the very beliefs they > are intended to support. > > don zweig, M.D. i'm saving this quote :) From measl at mfn.org Tue Aug 23 10:12:44 2005 From: measl at mfn.org (J.A. Terranson) Date: Tue, 23 Aug 2005 12:12:44 -0500 (CDT) Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: References: Message-ID: <20050823120855.V39327@ubzr.zsa.bet> On Tue, 23 Aug 2005, Tyler Durden wrote: > Yes, but the old question needs to be asked: How much of this crime would go > away if crystal meth were legal? There's little doubt that the vast majority > of drug-related crime stems not from some crazed crime spree but from issues > relating to supply and demand. Legalizing drug XYZ no doubt drops the cost. Lets not forget the lessons of the NYC Methadone "Maintenance" Programs either. While heroin results in crime due to high cost (by virtue of illegalization), the legal version also creates crime due to it's high cost. The MMPs have the same "Money or else" position that the junkie faces on the street, and while the prices are certainly lower, they are NOT "low". In 1983 a junkie expected to pay $40-$80 per *day* for maintenance (I'm sure it's a lot higher today). Along with legalization must come the removal of monopoly practices such a single sourcing of the drug and prescriptions to dispense. Only then does the free market take over and keep the price, and the crime, low. > Then again, if we legalized a lot of drugs then what would all those > corrections officers do for a living? Become airport security experts no > doubt. Move Stars. Presidents. McBodies... > -TD -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D. From camera_lumina at hotmail.com Tue Aug 23 09:43:14 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 23 Aug 2005 12:43:14 -0400 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: <4ef5fec6050822152676f92a51@mail.gmail.com> Message-ID: Coderman wrote... >the state of oregon just passed a law (yet to be put into effect) that >requires a prescription from a doctor for all sudafed (pseudo >ephedrine) purchases. the problem isn't drug addicts killing >themselves with corrosive fluids, as this would be a problem that >solves itself in short order, but rather that meth heads are idiotic >crime machines. i've had numerous friends and acquaintances affected >by this (vehicles stolen or broken into, property damaged and/or >stolen, tweakers robbing at knife point, etc, etc) and it's getting >ridiculous*. Yes, but the old question needs to be asked: How much of this crime would go away if crystal meth were legal? There's little doubt that the vast majority of drug-related crime stems not from some crazed crime spree but from issues relating to supply and demand. Legalizing drug XYZ no doubt drops the cost. Then again, if we legalized a lot of drugs then what would all those corrections officers do for a living? Become airport security experts no doubt. -TD From s.schear at comcast.net Tue Aug 23 12:57:15 2005 From: s.schear at comcast.net (Steve Schear) Date: Tue, 23 Aug 2005 12:57:15 -0700 Subject: GPS Jammer Firm nearly ejected from Russian air show. In-Reply-To: <6.2.1.2.0.20050822212540.038571a0@pop.idiom.com> References: <6.2.1.2.0.20050822212540.038571a0@pop.idiom.com> Message-ID: <6.0.1.1.0.20050823123317.05096d80@mail.comcast.net> At 09:27 PM 8/22/2005, Bill Stewart wrote: >http://www.themoscowtimes.com/stories/2005/08/22/002.html > >Monday, August 22, 2005. Issue 3235. Page 1. > >Irksome Firm Nearly Ejected From Air Show >By Lyuba Pronina >Staff Writer > >Ivan Sekretarev / AP > >Spectators watching the Patrouille de France aerobatic team perform during >the MAKS air show at the Zhukovsky airfield outside Moscow on Saturday. > >ZHUKOVSKY, Moscow Region -- The jamming equipment made by Aviakonversia is >so effective against U.S. planes and missiles that it apparently provoked >an angry phone call to the Kremlin from U.S. President George W. Bush in >the first days of the Iraq war. Some unclassified U.S. military analysis of the the Aviakonversia portable GPS/GLONASS jammer from 1997 http://www.ac11.org/gps1.htm Some of the guided munitions foiled by GPS jammers http://www.f-16.net/index.php?module=pagesetter&func=printpub&tid=6&pid=9 Articles about jammer kits and countermeasures http://www.letterneversent.com/index.php/archives/2002/12/29/gps-jamming/ http://www.aeronautics.ru/news/news001/gpsnews001.htm http://www.mayflowercom.com/products.html http://www.gpsworld.com/gpsworld/article/articleDetail.jsp?id=81907 Steve From ptrei at rsasecurity.com Tue Aug 23 10:39:17 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 23 Aug 2005 13:39:17 -0400 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> Tyler Durden writes: > Yes, but the old question needs to be asked: How much of this > crime would go away if crystal meth were legal? Actually, if we ever managed to kill the culture of prohibition, I suspect that crystal meth would be about as popular is bathtub gin is today. It's terrible stuff. I'd expect the big pharmas to start 'recreational drug' wings, which would bring real research power to the problem of finding highs which are fun, safe, affordable, and with minimal physical addiction. "I need a new drug..." Peter Trei From rah at shipwright.com Tue Aug 23 12:02:04 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 23 Aug 2005 15:02:04 -0400 Subject: New Drugs In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- At 1:39 PM -0400 8/23/05, Trei, Peter wrote: >"I [want] a new drug..." I would request the irony-impaired actually look up the lyrics of this paen to endogenous ero-endorphins, written by a drug-hating San Francisco "acid-kindergarten" refugee. In the meantime, I'm all for the legalization of meth -- as long as I get to sharpen my Recon Tonto and personally slit the bag of any of the bastids as they cross my windowsill looking for something to steal. Kinda like opening the borders without killing the welfare state first. Okay, maybe our porous borders *will* kill the welfare state, of course, Reagan used unrestrained soviet-killing budget deficits to "kill" the welfare state en passant. He didn't? I mean, Clinton *did* say "...big government is over.", right? Right??? This thing on? Cheers, RAH The only to "legalize" anything is when progress makes the law superfluous. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.2 (Build 2425) iQEVAwUBQwtypsUCGwxmWcHhAQHpDgf/T5q80m2rgc57388eGuvdIq1YttZDMww2 NannlO3JhKbTXQNKuoArDV66++++GPhg9nST3KYWLXI/MyrJllgtNioudkxF/pTU B3ussJXFfHbo3Ya1wgM9P1srQlK6smmamv3oHXY92kqeM5JBWfwG7gybMaC+IKKb nk0YgblOoW2bsXfONjdISXti0ENvkFIMrLxajoWVXSAp1exDOCJPqLSxbKnX2DNd ftBNYO8h9tt/qr6KRhBZsY449Vs1g1CMVigdVy6h7y9WBlhRWCMjJF/pfnJWbQJm a4f9H/XjNntHVr+Z0UZnthj0Va2RKKm99CKTFS+7fypDlEfslq/W3A== =vsGf -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From demonfighter at gmail.com Tue Aug 23 12:11:49 2005 From: demonfighter at gmail.com (Steve Furlong) Date: Tue, 23 Aug 2005 15:11:49 -0400 Subject: New Drugs In-Reply-To: References: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> Message-ID: <7d752ae30508231211386aa762@mail.gmail.com> On 8/23/05, R.A. Hettinga wrote: > -----BEGIN PGP SIGNED MESSAGE----- > > At 1:39 PM -0400 8/23/05, Trei, Peter wrote: > > >"I [want] a new drug..." > > I would request the irony-impaired actually look up the lyrics of this paen > to endogenous ero-endorphins, written by a drug-hating San Francisco > "acid-kindergarten" refugee. Especially the closing line of the refrain. I think the point was that if you get laid regularly you don't need drugs. Works for me. -- There are no bad teachers, only defective children. From camera_lumina at hotmail.com Tue Aug 23 13:14:16 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 23 Aug 2005 16:14:16 -0400 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> Message-ID: Supposedly, the tobacco companies have had commercial marijuana products ready forever (I've even seen photos, but I always suspected they were doctored up stoner's dreams). The idea that the pharmaceutical companies would start actively researching new designer drugs is fascinating and scary...wait, scratch that "scary", because it can't be scarier than drug-related crime in the US. The New York Times Magazine had a fascinating story years back on the US's marijuana industry. it's apparently the #2 export crop and US pot technology is in some cases extremely, uh, high. They described growers with strings of apartments in various US states connected with sesnors to the internet. If any of the apartments showed signs of entry, the grower would never return. (Each apartment supposedly had low levels of crops to fly under certain state laws if they were ever caught.) No doubt some of those growers are good customers of RSA products! -TD >From: "Trei, Peter" >To: "Tyler Durden" , , > >Subject: RE: [declan at well.com: [Politech] Montana Supreme Court justice >warns Orwell's 1984 has arrived [priv]] >Date: Tue, 23 Aug 2005 13:39:17 -0400 > >Tyler Durden writes: > > > Yes, but the old question needs to be asked: How much of this > > crime would go away if crystal meth were legal? > >Actually, if we ever managed to kill the culture of prohibition, >I suspect that crystal meth would be about as popular is bathtub >gin is today. It's terrible stuff. > >I'd expect the big pharmas to start 'recreational drug' wings, >which would bring real research power to the problem of finding >highs which are fun, safe, affordable, and with minimal physical >addiction. > >"I need a new drug..." > >Peter Trei From pgevtncck at cbt-int.com Tue Aug 23 15:04:57 2005 From: pgevtncck at cbt-int.com (Gordon Mendez) Date: Tue, 23 Aug 2005 18:04:57 -0400 Subject: Rolex is not for everyone, it`s for you Elton Message-ID: <0104011088500.01145@jfuertes.maz.es> REPLICASONLINE - WE NEVER COMPROMISE ON QUALITY Rolex replica is our speciality We guarantee lowest prices and highest quality We are the Direct manufacturers. For top quality rolex watchs pleas visit: http://www.onereplica.net rodney dml frustum vy [2 From bill.stewart at pobox.com Tue Aug 23 18:12:16 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 23 Aug 2005 18:12:16 -0700 Subject: [declan@well.com: [Politech] Montana Supreme Court justice warns Orwell's 1984 has arrived [priv]] In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.R SA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776F19@rsana-ex-hq1.NA.RSA.NET> Message-ID: <6.2.1.2.0.20050823174001.03852880@pop.idiom.com> At 10:39 AM 8/23/2005, Trei, Peter wrote: >Tyler Durden writes: > > Yes, but the old question needs to be asked: How much of this > > crime would go away if crystal meth were legal? > >Actually, if we ever managed to kill the culture of prohibition, >I suspect that crystal meth would be about as popular is bathtub >gin is today. It's terrible stuff. Meth is not fundamentally that different from Sudafed, and the nasty chemical processes of extracting the sugar coating and filler material and moving around a couple of methyl and hydroxy groups and disposing of the bodies of the people you thought were ratting you out to the police and the space alien biker gangs could all be avoided if you could make it legally at a big pharma company. Before the War on Drugs started helping us by making Sudafed hard to get, the generic pills tended to be on sale for about ten cents per 30mg dose. If I'm reading Erowid correctly, and guessing the kinds of quantities a tweaker might use if it were readily available and nearly free, a buck or two a day would cover all the meth you could use, and you could easily make that much at a minimum-wage job in the extra hours you've got that you used to waste sleeping, and you wouldn't have to resort to crime unless it seemed like more fun. Also, you could use somewhat calmer amphetamine relatives instead of meth; can't be *that* much nastier than tobacco, and much of the cost of legal pharmaceutical amphetamines today is the DEA paperwork. Opiates are another drug for which crime would be unnecessary if the stuff were legal. The last time I got codeine for dental work, I think I spent about $5 for 20-30 pills. That's enough for a day of Rush-Limbaugh-quantity abuse, and enough for a couple of days' worth of withdrawal-prevention for an average addict, and stronger opiates are similar in cost; opiate addiction doesn't need to be as expensive as tobacco addiction. By the way, if you've watched the TV medical drama "House", the star is an acerbic doctor who's addicted to Vicodin, as an after-effect of leg injury, and it's interesting to see the wall of political correctness cracking a bit. From JAWHXVUSUOL at ip-site.com Tue Aug 23 13:09:00 2005 From: JAWHXVUSUOL at ip-site.com (Cecilia Thomason) Date: Tue, 23 Aug 2005 19:09:00 -0100 Subject: Eminem got one Message-ID: <6.0.93.2081924.0083fc70@ies.edu> Superb Quality Rolex. The high! profile jewelry you're looking for at the lowest prices in the nation!!.. http://www.onereplica.net Choose from our collection of Rolex watches! managerial cd dryad kt From LVALOQJLCLIMR at hotmail.com Tue Aug 23 07:01:46 2005 From: LVALOQJLCLIMR at hotmail.com (Pat Norton) Date: Tue, 23 Aug 2005 20:01:46 +0600 Subject: We'll Help Your Teeth Problem QB2JT Message-ID: <6.9.5.92.2.20031001733053.025b4b48@.starnetusa.net> The revolution "Whitelight" teeth whitening which guarantees: - Fast Results and easy to use - works great against all sorts of stains (coffee, smoking) - Boost your confidence with great white smile - Used by dentist and millions worldwide - Satisfaction Guarantees...NO Risk! Why waiting? Check us out! http://www.my-globalproducts.info/wlr gsq6q From irwin at aafes.com Wed Aug 24 07:09:27 2005 From: irwin at aafes.com (Deandre Weaver) Date: Wed, 24 Aug 2005 06:09:27 -0800 Subject: Your mortagee approval Message-ID: <118394880.1492929303695.JavaMail.ebayapp@sj-besreco410> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 689 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .3.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From helmar at acay.com.au Wed Aug 24 07:48:45 2005 From: helmar at acay.com.au (Franklin Espinosa) Date: Wed, 24 Aug 2005 06:48:45 -0800 Subject: Great loww ratess Message-ID: <655111378.4573148485593.JavaMail.ebayapp@sj-besreco395> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 984 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: horoscope.9.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From rah at shipwright.com Wed Aug 24 08:32:39 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 24 Aug 2005 11:32:39 -0400 Subject: [Ryan Lackey in Iraq] Wiring the War Zone Message-ID: --- begin forwarded text Date: Wed, 24 Aug 2005 11:31:24 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Ryan Lackey in Iraq] Wiring the War Zone Wired Issue 13.09 - September 2005 Wired 13.09: POSTS Wiring the War Zone It's a typical morning at Camp Anaconda, the giant US military base 50 miles north of Baghdad - light breeze, temperatures heading to 100 degrees, scattered mortar fire. Ryan Lackey is getting ready for today's assignment: installing a pair of satellite Internet connections at Camp Warhorse about 30 miles away. Lackey, 26, is founder and CTO of Blue Iraq, a war zone startup that has operated out of Anaconda since December. It's a bootstrap operation - three employees, tent accommodations, Army chow - that has been profitable from its first day. "The military's a great market," he says. "They have lots of money, and they know what they want." His customers are mostly base commanders and DOD contractors, plus the occasional group of soldiers who chip in to get Internet access. Lackey dons body armor and a Kevlar helmet and heads out to the flight line. A pair of Blackhawk helicopters is making a run to Camp Warhorse this morning, and Lackey is hitching a ride. He packs his equipment and tools into one helicopter and climbs into the other. Inside, everything is painted black. Door gunners sit behind machine guns mounted on flexible arms. The crew chief distributes earplugs, the passengers strap themselves in, the rotors start to turn, and the ground falls away. But not too far. Blackhawks fly just 100 feet above the ground, at 200 mph. It's a smooth, exhilarating ride, landscape zooming past like a dream of flying. As wartime commutes go, it can't be beat. Lackey has been taking risks since he dropped out of MIT at 19 to work at a startup on the Caribbean island of Anguilla. Two years later he moved to Sealand, a North Sea oil rig, where he cofounded a data storage outpost that claims sovereignty and is theoretically beyond the reach of any nation's laws. (It was the subject of a Wired cover story in July 2000.) He is happy to cash in on what he calls risk arbitrage. "There's sort of a dark calculus when people are afraid," he says. "Prices for everything go up. And if you understand the risk better than they do, you can price that into everything." The Blackhawk touches down at Camp Warhorse, a 1,000-soldier forward operating base near the insurgent stronghold of Baqouba. In a freak accident at the helipad, the rotor wash hurls one of the boxed satellite dishes into Lackey's chest like a massive Frisbee. His armor saves him from anything worse than bruises. The first of two installations takes a few hours. Lackey sets up a 4-foot-diameter dish on the ground outside the base HQ, then assembles the metal support arms that hold the satellite electronics at the focus of the dish's parabolic arc. He has to be careful: After five minutes in the midday Iraqi sun, metal can sear an ungloved hand. Cables run from the dish to a modem indoors that in turn connects to a local area network. Ryan hooks his laptop up to the modem and adjusts the dish's elevation and azimuth until his software confirms the system is locked on to the correct satellite. Just like that: the Internet. The iDirect system is robust enough for Iraq's extreme heat, dust, and wind, and even handles voice-over-IP calls. The second install takes longer. Anti-radar camouflage netting overhead interferes with the signal. By the time he's done, Lackey has missed his helicopter lift home. He winds up stranded at Warhorse for two days before catching a ride back to Anaconda on an armored convoy. This means spending an hour in the back of a truck traveling through some of the most active insurgent territory in Iraq. Back in Anaconda, he has to deal with Blue Iraq's literal cash flow problem. The military pays in greenbacks, meaning he routinely has to fly on a cargo plane to deposit thick wads of currency at his bank in Dubai. That's the cost of doing business here. And business is expanding: He foresees cell service, ATM networks, and expansion into Afghanistan, and, he says with a bleak grin, "any other markets the US military opens up for us." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From emc at artifact.psychedelic.net Wed Aug 24 12:44:51 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Wed, 24 Aug 2005 12:44:51 -0700 (PDT) Subject: [Ryan Lackey in Iraq] Wiring the War Zone In-Reply-To: Message-ID: <200508241944.j7OJipEl014515@artifact.psychedelic.net> RAW forwards... > Wiring the War Zone > It's a typical morning at Camp Anaconda, the giant US military base 50 > miles north of Baghdad - light breeze, temperatures heading to 100 degrees, > scattered mortar fire. Ryan Lackey is getting ready for today's assignment: > installing a pair of satellite Internet connections at Camp Warhorse about > 30 miles away. Ryan Lackey needs to star in an Ayman al-Zawahri produced video, making short-lived gurgling and whistling noises. Making a fast buck off an illegal war of aggression is a far cry from running a secure data repository on an oil platform. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From toekzzcuqkt at beeson.co.uk Wed Aug 24 14:20:28 2005 From: toekzzcuqkt at beeson.co.uk (Bernardo Dutton) Date: Wed, 24 Aug 2005 16:20:28 -0500 Subject: Top Notch Opportunity at low rates Message-ID: <3DF4FB83.68004@ubp.edu.ar> After further review upon receiving your application, your current mortgage qualifies for a 3% lower rate! We have tried to contact you on several occasions and time is running out! This is our last attempt. Let me explain, -------------------------------------------------------- !! U.S MORTGAGE RATES HAVE SIMPLY NEVER BEEN LOWER! !! -------------------------------------------------------- This is no lie. This is reality. 8 Millions of Americans have alr`ea`dy re-financed this month alone! So why not you? http://www.l0wbankrates.com/i/LzUvaW5kZXgvYnZrL3gzZDV4NnZzbTF5Znds Refinancing just makes sense. oresteia me cluster you seal me sonata you cartographer me armload you class me judicious you nimble me scamp you anticipatory me terminal you www.bestrates-4-you.net From eol1 at yahoo.com Thu Aug 25 10:30:37 2005 From: eol1 at yahoo.com (Peter Thoenen) Date: Thu, 25 Aug 2005 10:30:37 -0700 (PDT) Subject: [Ryan Lackey in Iraq] Wiring the War Zone In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776F1F@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050825173037.33247.qmail@web51903.mail.yahoo.com> > What he's doing is supplying US soldiers with an independent, > uncensored and unreviewed channel through which they can find > out outside views of the war, information which their superiors > won't pass down to them, and a means by which they can > pass back their own views and opinions. Frankly, I'm suprised > the brass are letting him do it. Now that is the biggest line of shit I have heard in a while, enough that I am actually motivated to respond. Troops are NOT (I say again NOT) being filter from political sites in any way / shape / form. I have worked Bosnia (SFOR), Kosovo (KFOR), and for the past year in Iraq (MNFI). Current working on some sensor systems but handled Information Assurance (govspeak for network security to include site filtering) for the entire Balkans theatre and have a good working relationship with the guy in country doing it for Iraq. CENTCOM has a clear (and heavily enforced) policy on web filtering and political websites are cleared mandated as being ALLOWED. There is a arbitration process incase your favorite I Hate Bush site is being blocked by some other category (most likely 'Hate' or 'Personal Website') to get it unblocked. The military does NOT categorize all of this, has better things to do. Websense handles all this. Any false positives are clearly in there folk and effects anybody who uses their product. Troops are purchasing independent access not to get around political censorship but to get around corporate (military in this case) usage policies, e.g. we block most (would like to get all but not going to happen) software download sites, sex, instance messenger, bandwidth intensive items (mp3's, video's, etc etc), VOIP ... items troops want. They also want a connection in their hooches where they can chat back home, use VOIP, webcam with the families, download gigs of porn and music, and play games. This is not a censorship issue. > Would you rather the soldiers rely on Stars & Stripes for info > on the changing situation back home? Thats unfair. Stars and Stripes is highly accurate of the situation 'back home' and does a good job reporting them surprisingly. You get week long flamewars going on in the editorial over very non-PC items (worthlessness of national guard / reserve units, dying for oil, bring on troops home, etc). The simply sad fact of the matter is the majority of the troops truely believe Fox is the gospel and watch is 24x7 religiously. Hell, they even webcast Fox over the SIPRNET now just incase you are in a location that doesn't get AFN. > If anything, what Ryan's doing advances the so-called > 'cypherpunk agenda' more than anything being done at the He is doing nothing of the sort. He is doing the same thing as me and countless of others, making money. I work as a merc, he's a war profiteer ... same shit different name. At least I am stealing from the tax payer in an abstracted way (or as I look at it, getting my money back ... I will die in the black ... the government will have paid out more money to me that I have paid in to them), he is taking it right out of lonely kids who miss their families pockets. That crazy profit he is making is buying ripping folks off. He is dropping something along the lines of 500 folk per 1 MB link WITH total bandwidth caps and restrictions all while charging them a hundred or two a month (not counting the initial install / equipment charge). While I am here though, let me rant a bit about the article and once again state how much I despise Wired magazines coverage of anything. Might as well just print IRC chat logs and call it a magazine. "Inside, everything is painted black" -> No there not. "crew chief distributes earplugs" -> only because your a journalist. If you were some Jo or a contractor you either bring your own or do without. This is not standard SOP. Big sign at LP says 'Bring your own hearing protection' "But not too far. Blackhawks fly just 100 feet above the ground, at 200 mph. It's a smooth, exhilarating ride, landscape zooming past like a dream of flying" -> Also bullshit. I fly these things weekly all over the country. Smooth sometimes, exhilarating never, hot yes. As for low level, we aren't in the cold war dodging radar here. The helo's fly usually up around a thousand feet (not 100 like you seem thing) as part of SOP ... the biggest worry here is ground fire, not aircraft. Flying low will get you killed. "In a freak accident at the helipad, the rotor wash hurls one of the boxed satellite dishes into Lackey's chest like a massive Frisbee. His armor saves him from anything worse than bruises." -> Give me a break. How exactly does a 'boxed' dish look like a Frisbee (implies round). I install 2 and 3 meter dishes about once a month (and we fly them out also) .. they ain't going anywhere with the helo wash. Armored saved him from anymore than bruises my ass. Would like to see those bruises. "After five minutes in the midday Iraqi sun, metal can sear an ungloved hand" -> No it can't. Nobody here uses gloves (just to damn hot) and nobody gets burned. Metal gets hot sure but not that hot. "The iDirect system is robust enough for Iraq's extreme heat, dust, and wind, and even handles voice-over-IP calls." -> Nice product placement. They might also want to mention any satellite provider (and there are a bunch, they make it sound like he is the only game intown) with an off the shelf UHF dish can do all this. "He winds up stranded at Warhorse for two days before catching a ride back to Anaconda on an armored convoy. This means spending an hour in the back of a truck traveling through some of the most active insurgent territory in Iraq." -> My ass. Any flight that requires moving equipment requires an AMR. You can't miss an AMR, they will wait for you. Also, there are flights between Annaconda and Warhorse multiple times a day, daily. As for convoy, thats utter bullshit. Military will NOT (I repeat NOT) led civilians ride in military convoys anymore (to damn hot and bad press when killed). No commander will sign that risk. You will be told to wait till you can catch a helo. Got stuck at a truly remote base for two weeks once waiting on a flight. "Back in Anaconda, he has to deal with Blue Iraq's literal cash flow problem. The military pays in greenbacks, meaning he routinely has to fly on a cargo plane to deposit thick wads of currency at his bank in Dubai." -> Or just go to bank at the green zone and make a deposit. If he is going to Dubai, its for pleasure (Los Vegas of the Middle East, gambling, drinking, drugs, whores on demand). Wired, you don't have make a dull article about just another ISP in Iraq into a war romance porn novel. Get your facts straight and learn how to report. -Peter "I think everyone understands that it's getting better every day. Or course, every nation that's got IEDS and drive-by shootings and suicide bombers definitely got some security issues" -LTC Gibler, Mosul, IQ 05MAY30 You Think? From ptrei at rsasecurity.com Thu Aug 25 07:39:06 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 25 Aug 2005 10:39:06 -0400 Subject: [Ryan Lackey in Iraq] Wiring the War Zone Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776F1F@rsana-ex-hq1.NA.RSA.NET> Eric Cordian writes: > RAW forwards... > >> Wiring the War Zone > >> It's a typical morning at Camp Anaconda, >> the giant US military base 50 miles north >> of Baghdad - light breeze, temperatures >> heading to 100 degrees, scattered mortar fire. >> Ryan Lackey is getting ready for today's assignment: >> installing a pair of satellite Internet connections at >> Camp Warhorse about 30 miles away. > > Ryan Lackey needs to star in an Ayman al-Zawahri produced > video, making short-lived gurgling and whistling noises. > > Making a fast buck off an illegal war of aggression > is a far cry from running a secure data repository > on an oil platform. Eric, I think you could nuance this a bit. Ryan isn't supporting Bush's little war - the military has plenty of comm channels for C&C which Ryan wouldn't be allowed near. What he's doing is supplying US soldiers with an independent, uncensored and unreviewed channel through which they can find out outside views of the war, information which their superiors won't pass down to them, and a means by which they can pass back their own views and opinions. Frankly, I'm suprised the brass are letting him do it. How do you think the prison abuse photos got back to the US media? Would you rather the soldiers rely on Stars & Stripes for info on the changing situation back home? If anything, what Ryan's doing advances the so-called 'cypherpunk agenda' more than anything being done at the ideologicaly pure but practically insignificant Sealand. Just my opinions.... Peter Trei From emc at artifact.psychedelic.net Thu Aug 25 11:29:37 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Thu, 25 Aug 2005 11:29:37 -0700 (PDT) Subject: [Ryan Lackey in Iraq] Wiring the War Zone In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776F1F@rsana-ex-hq1.NA.RSA.NET> Message-ID: <200508251829.j7PITb7t007078@artifact.psychedelic.net> Peter Trei writes: >> Ryan Lackey needs to star in an Ayman al-Zawahri produced >> video, making short-lived gurgling and whistling noises. >> Making a fast buck off an illegal war of aggression >> is a far cry from running a secure data repository >> on an oil platform. > Eric, I think you could nuance this a bit. My first comment was more a parody of Pat Robertson's ridiculous call for the US to murder the President of Venezuela. I'm sure the State Department supports my right, as a private citizen, to say silly things just like Pat. While I don't wish Ryan any misfortune, I have some difficulty seeing how taking cash from Big Brother to create modern digital infrastructure that creates a more comfortable life for Big Brother's forces, is actually a cunning scheme to undermine morale in the unecessary, unjust, outrageous, and illegal occupation of Iraq. > Ryan isn't supporting Bush's little war - the military > has plenty of comm channels for C&C which Ryan wouldn't be > allowed near. He's taking cash to provide aid and comfort for members of the military, so that they may chat with their wives and girlfriends, access really good porn, socialize online, play games, blog, video conference, and otherwise recreate, activities which are undoubtedly not encouraged on the C&C comm channels. > What he's doing is supplying US soldiers with an independent, > uncensored and unreviewed channel through which they can find > out outside views of the war, information which their superiors > won't pass down to them, and a means by which they can > pass back their own views and opinions. Frankly, I'm suprised > the brass are letting him do it. US soldiers are so brainwashed by the military whispering in their ear "you're fighting for their right to protest" every time they encounter outside views of the war, that they view themselves as beleagured noble warriors safeguarding the free speech rights of unworthy unwashed unpatriotic hippies who don't know what they're talking about, and tend to interpret criticism of the war through that filter. Joining the military is not an intelligence test, and the troops, at least at the leafy parts of the command tree, are generally not talented critical thinkers with long term political memories. So I think the "aid and comfort to the illegal occupation" aspects of Ryan's work must surely outweigh the "opposing points of view" aspects. If it didn't, would he even be allowed to do it? 1% of propaganda is lying. 99% of propaganda is context. The military controls the soldiers' context in which outside views are interpreted. Net access hardly threatens their loyalty to the cause. The Iraqi people do not wish US occupation of their homeland, and given that this was an unprovoked war of aggression, that means that occupying troops, mercenaries from private military corporations, military contractors, and Ryan Lackey, are there illegitimately. > How do you think the prison abuse photos got back to the US > media? If I remember correctly, they were souvenir photos taken by service members, sent back to their families, and accidently posted with world access on what the family members thought was a private online album. They were noticed by the press, and the effluent hit the fan. > Would you rather the soldiers rely on Stars & Stripes for info > on the changing situation back home? > If anything, what Ryan's doing advances the so-called > 'cypherpunk agenda' more than anything being done at the > ideologicaly pure but practically insignificant Sealand. I think that's an oversimplification. It's not impossible that after the HavenCo fiasco, Ryan has given up on the Cypherpunk Agenda, and is currently selling his services for cash and no questions asked. In any case, I invite Ryan, if he can take a few minutes from hauling those suitcases of cash to the bank in Dubai, to post to the list, and clarify exactly what he is trying to do. He did say at the end of the piece, that he looked forward to the military opening up additional new markets for him, I assume in places like Iran and the other four as-yet-uninvaded countries on the Neocons' list of seven. That seems to say "mercenary" more loudly than it says "Cypherpunk," so I certainly look forward to more information on the subject. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From ptrei at rsasecurity.com Thu Aug 25 12:01:52 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 25 Aug 2005 15:01:52 -0400 Subject: [Ryan Lackey in Iraq] Wiring the War Zone Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE297068CAFCB@rsana-ex-hq1.NA.RSA.NET> > -----Original Message----- > From: owner-cypherpunks at minder.net > [mailto:owner-cypherpunks at minder.net]On Behalf Of Peter Thoenen > Sent: Thursday, August 25, 2005 1:31 PM > To: cypherpunks at minder.net > Subject: RE: [Ryan Lackey in Iraq] Wiring the War Zone > > > > What he's doing is supplying US soldiers with an independent, > > uncensored and unreviewed channel through which they can find > > out outside views of the war, information which their superiors > > won't pass down to them, and a means by which they can > > pass back their own views and opinions. Frankly, I'm suprised > > the brass are letting him do it. > > Now that is the biggest line of shit I have heard in a while, > enough that I am actually motivated to respond. > [...] Thanks, it's refreshing when we actually get someone with ground knowledge on an issue to respond. Posts like this leave me better informed. Peter Trei From BYHOTXBYKFS at air-kool.co.uk Thu Aug 25 18:06:27 2005 From: BYHOTXBYKFS at air-kool.co.uk (Velma Egan) Date: Thu, 25 Aug 2005 23:06:27 -0200 Subject: Who says you can rid of inches Message-ID: Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://www.connectwrap.com compacter me coquina you stale me conrad you daybreak me dorothea you hexachloride me convoy you cooperate me induce you pemmican me dish you http://www.connectwrap.com/r From malin at cs.cmu.edu Fri Aug 26 07:30:29 2005 From: malin at cs.cmu.edu (Bradley Malin) Date: August 26, 2005 7:30:29 PM EDT Subject: gov't to "anonymously" sharing cyberthreat data? Message-ID: Prof Dave - looks like UPenn is the facilitator. -brad http://informationweek.com/story/showArticle.jhtml?articleID=170000319 New Cybersecurity Center To Warn Law Enforcement Of Critical Infrastructure Attacks Aug. 24, 2005 Several businesses and organizations are testing a new process for anonymously sharing cyberthreat and attack data with their peers and government agencies without being subject to law-enforcement audits. By Larry Greenemeier InformationWeek With about 85% of the nation's critical infrastructure--energy utilities, manufacturing and transportation facilities, telecommunication and data networks, and financial services--in the private sector, it's no wonder there have been so many attempts to create services that keep these companies apprised of threats to their IT networks. But there's a problem: Most companies aren't eager to share their adventures in cybersecurity with each other or the government. Keeping this in mind, several Philadelphia-area businesses and organizations are testing out a new model called the Cyber Incident Detection & Data Analysis Center, or CIDDAC, which lets private- sector entities anonymously share cyberthreat and attack data with their peers and government agencies such as the Homeland Security Department and the FBI without that data being subject to law- enforcement audits. CIDDAC arose out of the deficiencies in the different organizations already working on cybersecurity, says Brad Rawling, a CIDDAC board member. A major sticking point that has hindered other attempts to create cyberattack-reporting infrastructures is the concern by businesses and other organizations that their proprietary information will be made public. Once information about a company's inner workings and security issues is documented by the government, that proprietary information may become fair game for Freedom Of Information Act requests by the press and public. CIDDAC circumvents this sticky situation because it's not a government entity and it doesn't provide specific information to members or law enforcement about the identity of the organization reporting a cyberattack. Participation in CIDDAC is voluntary. Since its April debut, the effort has been funded with about $100,000 in contributions from members, as well as $200,000 from the Homeland Security Department's Science and Technology Directorate. CIDDAC is searching for an additional $400,000 in funding to move it from the pilot stage to a point where data can be collected and shared and the program can sustain itself. Membership will cost $10,000 per year and will include one sensor, a year of monitoring service, and access to CIDDAC reports. CIDDAC's services are expected to be fully functional by the end of the year. The organization is piloting its sensor technology and reporting system at test locations in Philadelphia, southern New Jersey, and North Carolina. The next phase of testing, as CIDDAC receives production models of its network sensors over the next month and a half, will include as many as 10 large companies and institutions that have volunteered to participate and to whom CIDDAC has promised anonymity. The University of Pennsylvania has donated lab space, E-mail listserv services, and Internet access via its Institute of Strategy Threat Analysis and Response for the CIDDAC's pilot phase, although the initiative may have to look elsewhere for a permanent home. A company called AdminForce Remote LLC has developed the underlying real-time cyberattack-detection sensor technology that CIDDAC uses to gather information from its members' networks, and AdminForce chairman and CEO Charles Fleming serves as CIDDAC's executive director. Board members include Liberty Bell Bank chief technology officer Brian Schaeffer, Federal Reserve Bank of Philadelphia directory of information security Keith Morales, Air Products and Chemicals Inc. computer crime investigator Lance Hawk, and Kema Inc. senior principal consultant Scott Mix. FBI special agent John Chesson and Homeland Security Department director of privacy technology Peter Sand have served as advisers to the CIDDAC effort. As envisioned, a CIDDAC member connects AdminForce's sensors within their corporate network. If an intruder attempts to hack or penetrate the system, this intrusion-monitoring device sends a message to law enforcement and to other CIDDAC participants but protects the identity of the reporting entity. CIDDAC's plan is to provide members with trend-analysis information about specific intrusion activity that they can use to assess risks to their own networks. CIDDAC's arrival is timely. This year's FBI Computer Security Institute computer crime and security survey results, based on the responses of 700 computer security practitioners in U.S. companies, government agencies, financial institutions, medical institutions, and universities, indicates that the percentage of organizations reporting computer intrusions to law enforcement continues to decline. Only 20% of organizations reported cyberattacks to law enforcement, while only 12% reported such attacks to legal counsel. The key reason cited for not reporting intrusions to law enforcement is the concern for negative publicity. FBI Director Robert Mueller has acknowledged this reluctance that organizations have to air their dirty cyber laundry in public, thus hurting their image and giving rivals an edge. Mueller made these comments earlier this month at a conference hosted by InfraGard, an FBI program begun in 1996 in Cleveland as a local effort to gain support from the IT industry and academia for the FBI's cybersecurity investigative efforts. The program expanded nationally through the late 1990s. At the conference, Mueller likened a malicious command sent over a network to harm a power station's control computer to being as deadly as a backpack full of explosives. The FBI is expected to receive CIDDAC-generated law-enforcement incident reports when different criminal thresholds are exceeded. Homeland Security is likewise expected to be a consumer of CIDDAC reports. The FBI will use CIDDAC incident reports to initiate preliminary investigations to determine the magnitude of the cyberthreat, Rawling says. Such reports could be used as a basis to justify opening a criminal or intelligence case, for example, but are not expected to be used as evidence to be presented in a court of law. "The FBI must use the tools they have to build a case without revealing the identity of the source," Rawling adds. CIDDAC is by no means the only organization established to provide business-technology managers with information about cyberthreats. The new effort most closely resembles the SANS Institute's Internet Storm Center, although that service has no direct link with federal law enforcement. CIDDAC also is targeting large companies with similar IT security needs. Internet Storm Center uses the DShield distributed intrusion-detection system technology to collect data from users' intrusion-detection logs and disseminate this information to other users. DShield is a piece of freeware maintained by the SANS Institute. The Internet Storm Center, a free service, lets users submit firewall logs anonymously, but they must register with the SANS Institute to view an archive of firewall logs they submitted to the DShield database in the past 30 days and get confirmation of log submissions. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ymxmrq at brookarchitecture.com Fri Aug 26 18:45:00 2005 From: ymxmrq at brookarchitecture.com (Wiley Sanchez) Date: Fri, 26 Aug 2005 18:45:00 -0700 Subject: you want white teeths? Message-ID: <447z7fzlsc.fsf@calle04.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 549 bytes Desc: not available URL: From dave at farber.net Fri Aug 26 17:14:52 2005 From: dave at farber.net (David Farber) Date: Fri, 26 Aug 2005 20:14:52 -0400 Subject: [IP] gov't to "anonymously" sharing cyberthreat data? Message-ID: Begin forwarded message: From HCAXTGIFTZQL at bhanu.dhamma.org Fri Aug 26 17:35:10 2005 From: HCAXTGIFTZQL at bhanu.dhamma.org (Casey Williams) Date: Fri, 26 Aug 2005 23:35:10 -0100 Subject: Rolex Replica Concepcion Message-ID: <253212032200.00051.casey@outbacklinux.com> Authentic replica Rolex and other watches for gentlemen and ladies from just $229 Use this promotional link to get best ever prices: http://051.edvancedwanow1245right.com dora fko torch nuo http://051.edvancedwanow1245right.com/rm/ From BECGM at yahoo.com Fri Aug 26 10:54:25 2005 From: BECGM at yahoo.com (Eileen Barrera) Date: Fri, 26 Aug 2005 23:54:25 +0600 Subject: Weight Loss in 1 Hour G3 Message-ID: <83848753144732.R37419@.noc..gr> Natural Weight-L0ss Diet Formula Guuaranttes: - results in 2-4 weeks - burn fat naturally, and never gain it back - much effective than running 10 miles per week - expel toxins, dissolve ugly fat cells from your body - 100% safe (no drugs and chemicals) - used by millions of people worldwide... Act Now! http://www.shop4direct.info Get rid of maei ling below: http://www.shop4direct.info/r W8KLN0 From SRJDNLZT at jre.co.jp Fri Aug 26 15:49:51 2005 From: SRJDNLZT at jre.co.jp (Brandon Dunlap) Date: Sat, 27 Aug 2005 00:49:51 +0200 Subject: Bill Gates got one Message-ID: <278212032200.86451.casey@outbacklinux.com> Get the Finest Rolex Watch Replica ! We only sell premium watches. There's no battery in these replicas just like the real ones since they charge themselves as you move. The second hand moves JUST like the real ones, too. These original watches sell in stores for thousands of dollars. We sell them for much less. - Replicated to the Smallest Detail - 98% Perfectly Accurate Markings - Signature Green Sticker w/ Serial Number on Watch Back - Magnified Quickset Date - Includes all Proper Markings http://051.edvancedwa10now45right.com magnate ost conspire rm dragonfly dea annapolis zb anode sie defy ul robertson sb liquefaction qk inflame nen quaver sz baffin fv albert dre deterring yo front ik http://051.edvancedwa10now45right.com/rm/ From QIZBSOCH at yahoo.com Fri Aug 26 22:31:31 2005 From: QIZBSOCH at yahoo.com (Leta Richardson) Date: Sat, 27 Aug 2005 08:31:31 +0300 Subject: Hard Like Rock V8Lj In-Reply-To: Your message of "Sat, 27 Aug 2005 02:30:31 -0300." <20031002150239.GG32185@asuka.tech.sitadelle.com> Message-ID: "Ci-ialis Softabs" is better than Pfizer Viiagrra and normal Ci-ialis because: - Guaaraantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase se-xual performance - Haarder e-rectiions and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Cllick heree: http://bucketed.net/cs/?ronn o-ut of mai-lling lisst: http://bucketed.net/rm.php?ronn cs From jpamdu at schafferer.at Sat Aug 27 12:42:55 2005 From: jpamdu at schafferer.at (Katherine Huddleston) Date: Sat, 27 Aug 2005 22:42:55 +0300 Subject: you can have nice smile again Message-ID: Want a Pearly White Smile? You can have whiter teeth in just one hour. Dentists charge in excess of $300 for this product. With our Professional Teeth Whitening kit get results NOW. http://www.bizwhiteteeth.com/ estuary roi ordinary haj minaret fgq magnesia wfe g rxs dogwood aei embodiment uk nagoya tx remitting yi dairymen qlf forbes bk convivial zhl commendatory ho crestfallen rp smatter yj tongue sr http://www.bizwhiteteeth.com//r From bill.stewart at pobox.com Sat Aug 27 22:46:38 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 27 Aug 2005 22:46:38 -0700 Subject: Perhaps the real reason why Chavez is being targeted? In-Reply-To: <6.0.1.1.0.20050827204703.04dd9c70@mail.comcast.net> References: <6.2.1.2.0.20050822212540.038571a0@pop.idiom.com> <6.0.1.1.0.20050827204703.04dd9c70@mail.comcast.net> Message-ID: <6.2.1.2.0.20050827222757.03b3a308@pop.idiom.com> At 09:05 PM 8/27/2005, Steve Schear wrote: >Here's a story that, if true, deserves a much wider hearing than >the U.S. press is giving it: While the US certainly has been interfering with Chavez and generally trying to mess around in Venezuela for a while, most of what's happening here is just that Chavez is running off at the mouth for domestic political reasons. (Pat Robertson was partly doing that also and partly just babbling.) Chavez is a leftist military strongman type, which in Latin America means he doesn't have a bleeding clue about economic reality, but has made enough good speeches about bread and circuses to get elected and stay in office for a few years, especially if he can avoid trashing oil production as badly as his corrupt predecessors did (not that he hasn't been trying to mess that up too.) The business about shipping oil to Jamaica is interesting; he'd previously been talking about selling cheap gasoline to poor US communities, which was high-grade political bullshit that he had no mechanism for implementing, and quite amusing. But fundamentally the US government's problem is that he's a leftist who hangs out with Castro and has oil and likes to do "land reform" and nationalize oil companies, which is not the kind of thing that right-wing industrialists like. Ref: http://en.wikipedia.org/wiki/Hugo_Chavez From gzqaqndknw at msn.com Sun Aug 28 18:34:01 2005 From: gzqaqndknw at msn.com (Sherri Howe) Date: Sun, 28 Aug 2005 22:34:01 -0300 Subject: Don't Buy Vi-gra R6h4 Message-ID: <21171130090241.CFB0879DE@.starnetusa.net> "Ci-ialis Softabs" is better than Pfizer Viiagrra and normal Ci-ialis because: - Guaaraantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase se-xual performance - Haarder e-rectiions and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Cllick heree: http://bucketed.net/cs/?ronn o-ut of mai-lling lisst: http://bucketed.net/rm.php?ronn K5w From ghicks at cadence.com Mon Aug 29 08:43:20 2005 From: ghicks at cadence.com (Gregory Hicks) Date: Mon, 29 Aug 2005 08:43:20 -0700 (PDT) Subject: test of minder remailer Message-ID: <200508291543.j7TFhD9i018156@pony-express.cadence.com> > Date: Mon, 29 Aug 2005 09:39:49 -0400 > From: "Trei, Peter" > > It looks like the minder remailer is under attack - I've > gotten about 20 messages with little or not content, > and a small zip file attached. Don't feel picked on. I've noticed about 20/day... About 220 since Aug 19th. Symptoms are: A "Content-Type: application/x-compressed;" size of 0 or 8 bytes. File, so far, is ALWAYS a .zip with names like "payment.zip", "funny.zip", "account-details.zip", "test.zip"... May have some text designed to get you to open the .zip... The message is supposed to be from your ISP complaining about your account. Personally, I think it is a virus with a 'bug' because my virus filters have caught about the same number with much larger payloads. Regards, Gregory Hicks > > PT ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks at cadence.com I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From ptrei at rsasecurity.com Mon Aug 29 06:39:49 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 29 Aug 2005 09:39:49 -0400 Subject: test of minder remailer Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE297068CAFD0@rsana-ex-hq1.NA.RSA.NET> It looks like the minder remailer is under attack - I've gotten about 20 messages with little or not content, and a small zip file attached. PT From eugen at leitl.org Mon Aug 29 06:35:36 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 29 Aug 2005 15:35:36 +0200 Subject: [dave@farber.net: [IP] gov't to "anonymously" sharing cyberthreat data?] Message-ID: <20050829133536.GI2259@leitl.org> ----- Forwarded message from David Farber ----- From MTEITZFMTWZV at msn.com Tue Aug 30 05:30:33 2005 From: MTEITZFMTWZV at msn.com (Justin Bryant) Date: Tue, 30 Aug 2005 09:30:33 -0300 Subject: Only Cailis Help a2b In-Reply-To: Your message of "Tue, 30 Aug 2005 10:38:33 -0200." <20031002150239.GG32185@asuka.tech.sitadelle.com> Message-ID: "Ci-ialis Softabs" is better than Pfizer Viiagrra and normal Ci-ialis because: - Guaaraantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase se-xual performance - Haarder e-rectiions and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Cllick heree: http://bucketed.net/cs/?ronn o-ut of mai-lling lisst: http://bucketed.net/rm.php?ronn 7MCB From syverson at itd.nrl.navy.mil Tue Aug 30 07:22:22 2005 From: syverson at itd.nrl.navy.mil (Paul Syverson) Date: Tue, 30 Aug 2005 10:22:22 -0400 Subject: Tor on USB Message-ID: You might also see the following commercial distribution that bundles Tor, a tiny linux, and related software on a USB stick http://www.virtualprivacymachine.com/products.html Looks cool and got favorable reviews, but I haven't used or examined it first hand. This is a pointer, not an endorsement. -Paul On Tue, Aug 30, 2005 at 12:47:32AM -0500, Arrakis Tor wrote: > Interesting implementation. You could use it at a public terminal, a > friend's computer, or for plausible deniability on your own computer. > > On 8/29/05, Shatadal wrote: > > Arrakis Tor wrote: > > > Can firefox be installed to run standalone whatsoever? > > > > > > > > > > Yep. Check out http://johnhaller.com/jh/mozilla/portable_firefox/ and > > http://portablefirefox.mozdev.org/ > > ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Tue Aug 30 07:42:27 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 30 Aug 2005 16:42:27 +0200 Subject: [syverson@itd.nrl.navy.mil: Re: Tor on USB] Message-ID: <20050830144227.GU2259@leitl.org> ----- Forwarded message from Paul Syverson -----