From njohnsn at njohnsn.com Sat Jan 1 07:37:18 2005 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sat, 01 Jan 2005 09:37:18 -0600 Subject: Talking Back to Power: China's 'Haves' Stir the 'Have Nots' to Violence Message-ID: <1104593838.23571.6.camel@njohnsn.com> I'm not really RAH, but I play him on cypherpunks ;-) http://www.nytimes.com/2004/12/31/international/asia/31china.html? ex=1105532792&ei=1&en=61c003ece2c2eadb The Great Divide | Talking Back to Power: China's 'Haves' Stir the 'Have Nots' to Violence December 31, 2004 By JOSEPH KAHN WANZHOU, China, Dec. 24 - The encounter, at first, seemed purely pedestrian. A man carrying a bag passed a husband and wife on a sidewalk. The man's bag brushed the woman's pants leg, leaving a trace of mud. Words were exchanged. A scuffle ensued. Easily forgettable, except that one of the men, Yu Jikui, was a lowly porter. The other, Hu Quanzong, boasted that he was a ranking government official. Mr. Hu beat Mr. Yu using the porter's own carrying stick, then threatened to have him killed. For Wanzhou, a Yangtze River port city, the script was incendiary. Onlookers spread word that a senior official had abused a helpless porter. By nightfall, tens of thousands of people had swarmed Wanzhou's central square, where they tipped over government vehicles, pummeled policemen and set fire to city hall. Minor street quarrel provokes mass riot. The Communist Party, obsessed with enforcing social stability, has few worse fears. Yet the Wanzhou uprising, which occurred on Oct. 18, is one of nearly a dozen such incidents in the past three months, many touched off by government corruption, police abuse and the inequality of the riches accruing to the powerful and well connected. "People can see how corrupt the government is while they barely have enough to eat," said Mr. Yu, reflecting on the uprising that made him an instant proletarian hero - and later forced him into seclusion. "Our society has a short fuse, just waiting for a spark." Though it is experiencing one of the most spectacular economic expansions in history, China is having more trouble maintaining social order than at any time since the Tiananmen Square democracy movement in 1989. Police statistics show the number of public protests reached nearly 60,000 in 2003, an increase of nearly 15 percent from 2002 and eight times the number a decade ago. Martial law and paramilitary troops are commonly needed to restore order when the police lose control. China does not have a Polish-style Solidarity labor movement. Protests may be so numerous in part because they are small, local expressions of discontent over layoffs, land seizures, use of natural resources, ethnic tensions, misspent state funds, forced immigration, unpaid wages or police killings. Yet several mass protests, like the one in Wanzhou, show how people with different causes can seize an opportunity to press their grievances together. The police recently arrested several advocates of peasant rights suspected of helping to coordinate protest activities nationally. Those are worrying signs for the one-party state, reflexively wary of even the hint of organized opposition. Wang Jian, a researcher at the Communist Party's training academy in Changchun, in northeast China, said the number and scale of protests had been rising because of "frictions and even violent conflicts between different interest groups" in China's quasi market economy. "These mass incidents have seriously harmed the country's social order and weakened government authority, with destructive consequences domestically and abroad," Mr. Wang wrote in a recent study. China's top leaders said after their annual planning session in September that the "life and death of the party" rests on "improving governance," which they define as making party officials less corrupt and more responsive to public concerns. But the only accessible outlet for farmers and workers to complain is the network of petition and appeals offices, a legacy of imperial rule. A new survey by Yu Jianrong, a leading sociologist at the Chinese Academy of Social Sciences in Beijing, found that petitions to the central government had increased 46 percent in 2003 from the year before, but that only two-hundredths of 1 percent of those who used the system said it worked. Last month, as many as 100,000 farmers in Sichuan Province, frustrated by months of fruitless appeals against a dam project that claimed their land, took matters into their own hands. They seized Hanyuan County government offices and barred work on the dam site for days. It took 10,000 paramilitary troops to quell the unrest. Also in November, in Wanrong County, Shanxi Province, in central China, two policemen were killed when enraged construction workers attacked a police station after a traffic dispute. Days later, in Guangdong Province, in the far south, riots erupted and a toll booth was burned down after a woman claimed she had been overcharged to use a bridge. In mid-December, a village filled with migrant workers in Guangdong erupted into a frenzy of violence after the police caught a 15-year-old migrant stealing a bicycle and beat him to death. Up to 50,000 migrants rioted there, Hong Kong newspapers reported. Wanzhou officials initially treated their riot in October as a fluke. They ordered Mr. Hu to declare on television that he is a fruit vendor, not a public official, and that his confrontation with Mr. Yu was a mistake. The police arrested a dozen people and declared social order restored. But the uprising alarmed Beijing, which told local officials they would be sacked if they failed to prevent recurrences, according to Chinese journalists briefed on the matter. Luo Gan, the member of the Politburo Standing Committee who is in charge of law and order, issued national guidelines warning that "sudden mass incidents" were increasing and calling for tighter police measures. More than a dozen people interviewed in Wanzhou, part of Chongqing Municipality, described the city as tense. All said that they still believed that Mr. Hu was indeed an official and that the government concocted a cover story to calm things down. They say the anger excited by the riot awaits only a new affront. The Chance Encounter Like many farmers in the steeply graded hills along the Yangtze, Mr. Yu, 57, supplements his income hauling loads up and down city roads - grain, fertilizer, air conditioners, anything that he can balance on a bamboo pole and hoist on his slender shoulder. Sweaty and dirty, porters put their low-paying profession on parade. They are often referred to simply as bian dan, or pole men. Mr. Yu's lot is better than some others. He has another sideline collecting hair cuttings off the floors of beauty salons and barber shops, packing them in big burlap bags and selling them to wig-makers down south. On Oct. 18, he spent several hours collecting hair from upscale salons along Baiyan Road, a busy shopping street that runs near the government square downtown. His load was light - two bags of loose locks - and he scurried down the sidewalk to lunch. "Hey, pole man, you got dirt all over my pants!" he heard a woman shout. When he turned to face her, the man by her side, Mr. Hu, was glaring at him. "What are you looking at, bumpkin?" Mr. Yu recalls Mr. Hu saying. Mr. Yu is mild mannered, with a slightly raffish grin stained yellow from chain smoking. Mr. Hu, wearing a coat and tie and leather shoes, looked like he might be important. Mr. Yu said he should have let the moment pass. He did not. "I work like this so that my daughter and son can dress better than I do, so don't look down on me," he recalled saying. Then he added, "I sell my strength just as a prostitute sells her body." Mr. Yu said he was drawing a general comparison. Mr. Hu and his young wife, Zeng Qingrong, apparently thought he had insinuated something else. She jerked his shirt collar and slapped his ear. Mr. Hu picked up Mr. Yu's fallen pole and struck him in the legs and back repeatedly. Perhaps for the benefit of the crowd, Mr. Hu shouted that it was Mr. Yu, sprawled on the pavement, who was in big trouble. "I'm a public official," Mr. Hu said, according to Mr. Yu and other eyewitnesses. "If this guy causes me more problems, I'll pay 20,000 kuai" - about $2,500 - "and have him knocked off." Those words never appeared in the state-controlled media. But is difficult to find anyone in Wanzhou today who has not heard some version of Mr. Hu's bluster: The putative official - he has been identified in the rumor mill as the deputy chief of the local land bureau - had boasted that he could have a porter killed for $2,500. It was a call to arms. Mr. Hu's threat, spread by mobile phones, text messages and the swelling crowd, encapsulated a thousand bitter grievances. "I heard him say those exact words," said Wen Jiabao, another porter who says he witnessed the confrontation. "It proves that it's better to be rich than poor, but that being an official is even better than being rich." Xiang Lin, a 18-year-old auto mechanic, had seen China's rising wealth when he worked near Shanghai. But when he returned home to Wanzhou, he felt frustrated that his plan to open a repair shop foundered. He was drawn downtown by the excitement. "Don't officials realize that we would not have any economic development in Wanzhou without the porters?" Mr. Xiang asked. Cai Shizhong, a taxi driver, was angered when the authorities created a company to control taxi licenses, which he says cost him thousands of dollars but brought no benefits. The police also fine taxi drivers left and right, he said. "If you drive a private car, they leave you alone because you might be important," Mr. Cai said. "If you drive a taxi, they find any excuse to take your money." Peng Daosheng's home was flooded by the rising reservoir of the Three Gorges Dam. He was supposed to receive $4,000 in compensation as well as a new home. But his new apartment is smaller and less well located, and the cash never arrived. "The officials take all the money for themselves," said Mr. Peng, who spent eight hours protesting that night. "I guess that's why that guy had $2,500 to kill someone." It took the police more than four hours to remove Mr. Hu and Mr. Yu from the scene. The crowd surrounded police cars and refused to budge, afraid the police would cover up the beating, and even punish Mr. Yu. "People knew the matter would never be resolved fairly behind closed doors," Mr. Yu said. Even after the police formed a cordon around two cars - one for Mr. Hu and his wife, another for Mr. Yu - the crowd smashed the windows of the car carrying the couple. It was nearly 5 p.m. before the vehicles crawled through the assembled masses. A Loss of Control The police may have hoped that removing the main actors from the scene would defuse the tension. Instead, the crowd rampaged. At 6 p.m., a police van was surrounded and the policeman inside was beaten with bricks. Seven or eight people tipped the car over, stuffed toilet paper into the gas tank and set it ablaze, according to witnesses and a police report. When a fire truck arrived, the fire fighters were forced out and their truck commandeered. A driver smashed it into brick wall, then backed up and repeated the move to render the truck immobile. "They lost control at once," recalled Mr. Cai, the taxi driver, who wandered through the crowd that day. "Suddenly the police were nobody and the people were in charge." The local government never published an estimate of how many people took part in the protest. But unofficial estimates by Chinese journalists on the scene ranged from 30,000 to 70,000, enough to stop all traffic downtown and fill the government square. By 8 p.m., the rally focused on the 20-story headquarters of the Wanzhou District Government, with its blue-tinted windows and imposing terrace facing the square. The crowd chanted, "Hand over the assassin!" Riot-police officers in full protective gear - but carrying no guns - held the terrace. Officials with loudspeakers urged the crowd to disperse, promising that the incident would be handed according to law. But the mob now followed its own law. An assembly line formed from a nearby construction site. Concrete building slabs were ferried along the line, then shattered with sledgehammers to make projectiles. Front-line rioters hurled the rocks at the police - tentatively at first, then in volleys. Under the barrage, the police retreated. Protesters charged the terrace, shattered the windows and doors of government headquarters and surged inside. Official documents were scattered. Protesters dumped computers and office furniture off the terrace. Soon, a raging fire illuminated the square with its flickering orange glow. Li Jian, 22, took part in the plunder. A young peasant, he had found a city job as a short-order cook. But he longed to study computers, said his father, Li Wanfa. The family bought an old computer keyboard so the young man could learn typing. "He wanted to go to high school but the school said his cultural level was not high enough," Mr. Li said. "They said a country boy like him should be a cook." The police arrested young Mr. Li scurrying through the melee with a Legend-brand computer that belonged to the government, according to an arrest notice. Yet even at the height of the incident, rioters set limits. They did not attack any of the restaurants or department stores along the government square, focusing their wrath on symbols of official power. By midnight, the crowd dwindled on its own. When paramilitary troops finally arrived on the scene after 3 a.m., there were only a few thousand hard-core protesters left. "Most people went home," said Mr. Peng, the man whose home had been flooded by the dam. "But the armed police were fierce. They beat you even if you kneeled down before them." The Tensions Persist The local government praised its own handling of the riot. An assessment published three days afterward in The Three Gorges City News, the daily paper of the Wanzhou Communist Party, also declared the uprising had no lasting ramifications. "The district government displayed its strong governing ability at a crucial moment," the report said. "This incident was caused by a handful of agitators with ulterior motives who whipped up a street-side dispute into a mass riot." The uprising did dissipate as quickly as it emerged. Baiyan Road now bustles with afternoon shoppers. After work, dancers bundled against the damp chill use government square as an outdoor ballroom, a synthesized two-step beat filling the night air. Yet the underlying tensions did not disappear. When the Wan Min Cotton Textile Factory declared bankruptcy in mid-December, scores of policemen occupied the factory grounds to prevent a riot. The next day, a handful of workers from the factor went to city hall to protest. Several hundred uniformed police surrounded them. Mr. Xiang, the auto mechanic, was arrested for throwing stones and taken into custody. One day, returning from the cold showers inmates were required to take in the unheated jail, guards told him to kneel. One elbowed him in the back and several others kicked him in the gut. As he lay prostrate, a prison supervisor said: "Nothing happened to you here, did it? You're a smart kid." He could not eat for two days. "We were all brothers inside," he said of his fellow detainees. "The officials despise the ordinary people and are not afraid to bully them." Then there's Mr. Yu. He missed the riot that occurred in his name, but has been under pressure ever since. The government kept him isolated in a hospital for nearly two weeks, even though bruises on his legs and the stitches he needed above his eye had healed. His daughter and son were told to take a vacation, paid by the government, to avoid contact with the news media. "They told us not to talk or it would hurt the city," Mr. Yu said in his first interview. Yet he said what really shook him was the reaction to the statement he made to Wanzhou television on Oct. 20, two days after the riot. The government told him to appear - he was still under guard - and had prepared questions in advance. "They told me to emphasize the importance of law and order," he said. "I was told just to answer the questions and not to say anything else." What he said on the evening news sounded innocuous enough. "Let this be handled by law," Mr. Yu told viewers. "Everyone should stay at home." So he was unprepared for the backlash. Relatives of those arrested criticized him for propagandizing for the government, saying their kin felt betrayed. Neighbors warned him not to plant rice this year because his enemies would just rip it out. His wife says she wants to move because she has heard too many threats. Mr. Yu is understandably confused. "First an official tries to break my legs because I am a dirty porter," he said. "Now the common people want to break my legs because I spoke for the government." Chris Buckley contributed reporting for this article. From eugen at leitl.org Sat Jan 1 05:09:42 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 1 Jan 2005 14:09:42 +0100 Subject: Single Government ID Moves Closer to Reality Message-ID: <20050101130942.GD9221@leitl.org> Link: http://slashdot.org/article.pl?sid=04/12/30/239240 Posted by: samzenpus, on 2004-12-31 01:38:00 from the papers-please dept. [1]NewbieV writes "The Washington Post [2]is reporting that "federal officials are developing government-wide identification card standards for federal employees and contractors to prevent terrorists, criminals and other unauthorized people from getting into government buildings and computer systems." The project is known as the [3]Personal Identity Verification Project, and is being managed by the National Institute of Standards and Technology (NIST)." [4]Click Here References 1. http://victorabrahamsen&gmail,com/ 2. http://www.washingtonpost.com/ac2/wp-dyn/A35071-2004Dec29?language=printer 3. http://csrc.nist.gov/piv-project/ 4. http://ads.osdn.com/?ad_id=5717&alloc_id=12468&site_id=1&request_id=5751521&o p=click&page=%2farticle%2epl ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Sat Jan 1 05:11:53 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 1 Jan 2005 14:11:53 +0100 Subject: [p2p-hackers] Common interest, finding trading partners (fwd from mllist@vaste.mine.nu) Message-ID: <20050101131153.GE9221@leitl.org> ----- Forwarded message from Vaste ----- From rah at shipwright.com Sat Jan 1 15:02:38 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 1 Jan 2005 18:02:38 -0500 Subject: Talking Back to Power: China's 'Haves' Stir the 'Have Nots' to Violence In-Reply-To: <1104593838.23571.6.camel@njohnsn.com> References: <1104593838.23571.6.camel@njohnsn.com> Message-ID: At 9:37 AM -0600 1/1/05, Neil Johnson wrote: >I'm not really RAH, but I play him on cypherpunks ;-) Except that he doesn't post cryptosocialist luddite leveller blather, except in jest, and at least he puts angle brackets around his links so they don't break, viz, >http://www.nytimes.com/2004/12/31/international/asia/31china.html? >ex=1105532792&ei=1&en=61c003ece2c2eadb :-) Cheers, RAH ------- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jamesd at echeque.com Sat Jan 1 18:26:09 2005 From: jamesd at echeque.com (James A. Donald) Date: Sat, 01 Jan 2005 18:26:09 -0800 Subject: Talking Back to Power: China's 'Haves' Stir the 'Have Nots' to Violence In-Reply-To: <1104593838.23571.6.camel@njohnsn.com> Message-ID: <41D6EB41.27013.8AE506D@localhost> The title of this post is misleading: The protest is anti government, and pro property rights. For example: > [...] "People can see how corrupt the government is while they > barely have enough to eat," said Mr. Yu, reflecting on the > uprising that made him an instant proletarian hero If he was a "proletarian" hero, he would say "the capitalists". Instead he said "the government". > [...] > > Last month, as many as 100,000 farmers in Sichuan Province, > frustrated by months of fruitless appeals against a dam > project that claimed their land, took matters into their own > hands. [...] Gee. They took the defense of their own property rights into their own hands. > "I work like this so that my daughter and son can dress > better than I do, so don't look down on me," They are rioting for economic mobility, not for a classless society, but for a society where classes are not hereditary. > "I heard him say those exact words," said Wen Jiabao, > another porter who says he witnessed the confrontation. "It > proves that it's better to be rich than poor, but that being > an official is even better than being rich." The bad guys are not the rich, but those who obtain wealth through poliical power. > Cai Shizhong, a taxi driver, was angered when the > authorities created a company to control taxi licenses, > which he says cost him thousands of dollars but brought no > benefits. The bad deeds of the bad guys are economic regulation > Peng Daosheng's home was flooded by the rising reservoir of > the Three Gorges Dam. He was supposed to receive $4,000 in > compensation as well as a new home. But his new apartment is > smaller and less well located, and the cash never arrived. The bad deeds of the bad guys are violation of property rights without fair compensation. > Li Jian, 22, took part in the plunder. A young peasant, he > had found a city job as a short-order cook. But he longed to > study computers, said his father, Li Wanfa. The family > bought an old computer keyboard so the young man could learn > typing. > > "He wanted to go to high school but the school said his > cultural level was not high enough," Mr. Li said. "They said > a country boy like him should be a cook." Again, the call for social mobility, equality of opportunity, not equality. > They did not attack any of the restaurants or department > stores along the government square, focusing their wrath on > symbols of official power. A riot against the state, not against the rich. From jya at pipeline.com Sun Jan 2 15:43:56 2005 From: jya at pipeline.com (John Young) Date: Sun, 02 Jan 2005 15:43:56 -0800 Subject: SIGINT and COMSEC Discussion Group Message-ID: A. writes: I have just launched a new discussion group related to hardware discussion for signal analysis and communications security systems: http://groups-beta.google.com/group/sigint/ From eugen at leitl.org Sun Jan 2 14:48:30 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 2 Jan 2005 23:48:30 +0100 Subject: Coast Guard to Track Ships Using Buoys Message-ID: <20050102224830.GX9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/01/182224 Posted by: michael, on 2005-01-01 20:19:00 from the feeling-safer-already dept. [1]nomrniceguy writes "The Coast Guard plans to use dozens of [2]buoys off the U.S. coast to extend the reach of a security system that monitors large vessels heading in and out of ports. The buoys are intended to extend the network's reach -- the Guard now receives the automated data only when a vessel is within about 25 miles of a port. The floating transmitters will relay the information from hundreds of miles off shore, from the middle of Lake Superior and off coastlines from Alaska to Maine." [3]Click Here References 1. http://www.igc.org/jobs.html 2. http://www.cnn.com/2004/US/12/30/port.security.ap/index.html 3. http://ads.osdn.com/?ad_id=5717&alloc_id=12468&site_id=1&request_id=4003996&o p=click&page=%2farticle%2epl ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From nobody at dizum.com Sun Jan 2 17:20:04 2005 From: nobody at dizum.com (Nomen Nescio) Date: Mon, 3 Jan 2005 02:20:04 +0100 (CET) Subject: SIGINT and COMSEC Discussion Group Message-ID: <0d335916ac756fbc9ffab544cf3b70de@dizum.com> On 2 Jan 2005 at 15:43, John Young wrote: > A. writes: > > I have just launched a new discussion group related to hardware > discussion for signal analysis and communications security systems: > > > http://groups-beta.google.com/group/sigint/ Why would we use a "groups beta" at google's when there's a big and proven yahoogroups that's been around for ages (under various names)? From rah at shipwright.com Mon Jan 3 07:01:01 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 3 Jan 2005 10:01:01 -0500 Subject: How to Build a Global Internet Tsunami Warning System in a Month Message-ID: PBS: I, Cringely -- The Pulpit How to Build a Global Internet Tsunami Warning System in a Month By Robert X. Cringely A friend of mine is missing in southern Asia. She isn't missing in the sense that anyone saw her swept away by this week's horrible tsunami, but she and her entire family haven't been heard from, either so of course, I am worried. That worry makes real for me a disaster of such horrific proportions that without a personal connection, it simply can't be real to most of us. By the time all the bodies have been counted and estimated, probably 100,000 people will have died. If cholera follows, as it tends to in that part of the world, another 40,000 or more could follow. That's a lot of people, 140,000 -- enough people that we ought to do something to make sure it doesn't happen again. So of course, there is lots of talk about tsunami warning systems and global cooperation, but I think that's just going about solving the problem the wrong way. We don't need governments and huge sensor arrays to warn people on the beach about the next huge wave approaching at 400 miles-per-hour. Thanks to the Internet, we can probably do it by ourselves. Here's the problem with big multi-government warning systems. First, we have a disaster. Then, we have a conference on the disaster, then plans are proposed, money is appropriated, and three to five years later, a test system is ready. It isn't the final system, of course, but it still involves vast sensor arrays both above and below the surface of the ocean, satellite communication, and a big honking computer down in the bowels of the Department of Commerce or maybe at NASA. That's just the detection part. The warning part involves multilateral discussions with a dozen nations, a treaty, more satellite communication, several computer networks, several television and radio networks, and possibly a system of emergency transmitters. Ten years, a few million dollars and we're ready. We can't rely on governments to do this kind of work anymore. They just take too darned long and spend too much money for what you get. Besides, since governments are almost totally reactive, what they'll build is a warning system for precisely the tsunami we just had -- a tsunami bigger than any in that region since the eruption of Krakatoa in 1883. One could argue (and some experts probably will) that it might even be a waste of money to build a warning system for a disaster that might not happen for another 121 years. What we need is a tsunami warning system not just for parts of Asia, but for anywhere in the world that might be subject to such conditions. And that decision about what beaches to protect ought to come not from Washington, D.C., or Jakarta, or any other capital city, but from the beach people, themselves. If you are concerned about a giant tidal wave taking out your village, it might be a good idea to build your own warning system, you retired engineer, you Radio Shack manager, you harbor master, you radio amateur, you nerd with a suntan. It can be done. The Tsunami Warning System (TWS) in the Pacific Ocean shows us how such a warning system can be run with the cooperation of 26 countries. Maybe we can do the same thing, just without all that cooperation. TWS is based on crunching two kinds of data -- seismic activity and changes in sea level measured by tide gauges. Most tsunamis begin with an earthquake, the severity and epicenter of which can tell a lot about whether a tsunami is likely, how strong it will be, and in what direction it is likely to go. >From the TWS, the first warning is based purely on such seismic data. But once the big wave starts rolling it will have an effect on the level of the sea, itself, which is routinely monitored by weather stations of many types. This additional data gives a better idea of how bad the wave is really going to be, so in the TWS system, it is used to justify expanding the warning to other communities beyond those warned purely on the basis of seismic data. Depending on where the originating earthquake is, the tsunami can be minutes or hours from crashing into a beach. This week's wave took about 90 minutes to reach Sri Lanka, just over 600 miles from the epicenter. That not only means the wave was traveling at over 400 miles-per-hour, it also means that had a warning system been in place, there would easily have been time to get the people who were affected in Sri Lanka to higher ground. So to start, we need raw seismic data. If you take a look at the fourth of this week's links, you'll see that plenty of such data are available. Thanks to the Pacific Northwest Seismograph Network, here is one place where you can find real time data from 199 seismographs around the world. There are also links to a dozen regional operations that consolidate such data. The data is available. Tide gauge data is available, too, though there is less of it, and aggregation will require more effort, so I say let's just stick to seismic data for our warning system. Here's where we need the help of a tsunami expert, someone who can help us calculate the size and direction of a likely tsunami based on the available seismic data. Fortunately, there has been quite a bit of work done in this area of study (see link #5), and appropriate computer codes that can be run on a personal computer either exist or can be derived, perhaps by reflexively evaluating seismic data from known tsunami events. But remember that what we care about here is not global tsunami warning but LOCAL tsunami warning (Is it going to hit MY beach?), so the required seismic data sources can pretty easily be limited to those with an uninterrupted aspect of the target beach, which means half a dozen seismographs, not 199. Since the basic question is fairly simple -- "Is my beach going to be hit by a destructive tsunami and when?" -- and the required data sources are limited, I figure we won't need a supercomputer. The seismographs are online, we gather the data using XML, continuously crunch it using the codes I am assuming already exist, then we need the warning, which I would flash on the screen of my PC down at the surf shop using a Javascript widget built with Konfabulator, the most beautiful widget generator of all. Looking just like a TV weather map, the widget would flash a warning and even include a countdown timer just like in the movies. You don't need an international consortium to build such a local tsunami warning system. You don't even need broadband. The data is available, processing power is abundant and cheap. With local effort, there is no reason why every populated beach on earth can't have a practical tsunami warning system up and running a month from now. That's Internet time for you, but in this case, its application can protect friends everywhere from senseless and easily avoidable death. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Mon Jan 3 13:45:47 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 03 Jan 2005 13:45:47 -0800 Subject: How to Build a Global Internet Tsunami Warning System in a Month Message-ID: <41D9BD0B.8CFEE899@cdc.gov> At 10:01 AM 1/3/05 -0500, R.A. Hettinga wrote: > > >PBS: I, Cringely -- The Pulpit > >How to Build a Global Internet Tsunami Warning System in a Month 1. 150 K asians is nothing. 2. You will see > 10,000 K dead worldwide from the next H5N1 flu coming from your friendly local chinese duck/pig farmer. In under 6 months, which BTW is the time it takes to make a vaccine. 3. Homebrew warning systems will face the same problems as eg pro volcano warning systems: too many false alarms and no one cares. You might do better educating the beachfolk that when the water recedes and they can see the coral, they ought to stop gawking and run. But, hey, its a cool project, have fun. From udhay at pobox.com Mon Jan 3 02:00:19 2005 From: udhay at pobox.com (Udhay Shankar N) Date: Mon, 03 Jan 2005 15:30:19 +0530 Subject: Conspiracy Theory O' The Day Message-ID: I just got a batch of spam: perfectly justified blocks of random-looking characters. Makes me wonder if somebody is trying to train Bayesian filters to reject PGP messages. Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dailyarticle at mises.org Tue Jan 4 06:19:54 2005 From: dailyarticle at mises.org (Mises Daily Article) Date: Tue, 4 Jan 2005 09:19:54 -0500 Subject: The Genius and Struggle of PayPal Message-ID: The Genius and Struggle of PayPal by William L. Anderson [Posted January 4, 2005] The PayPal Wars: Battles with eBay, the Media, and the Rest of Planet Earth. Eric M. Jackson, World Ahead Publishing, Los Angeles, California, 344 pages, $27.95. Almost five years have passed since the heady days of the dot.com boom, an era that began as the "New Economy" and ended in yet another recession and the collapse of stock prices that in 1999 seemed to have no upward limits. In hindsight, we can see that the "New Economy" was nothing more than the shotgun wedding of the obvious commercial possibilities of the Internet and the irresponsible, expansionary monetary policies of Alan Greenspan's Federal Reserve System, not a marvelous invention created by Bill Clinton through the magic of raising income tax rates. That the dot.com boom turned into a bust does not take away from many of the real success stories of that time, one of them being the emergence of PayPal, which helped revolutionize the way payments could be made using the Internet. The original vision that the creators of PayPal (Peter Thiel, a hedge fund manager, and Max Levchin, an engineer who originally was from the Ukraine) had in mind was a system that would permit people around the world not only to be able to pay each other via the Internet, but also to be able to protect themselves when their governments were inflating their currencies. "World Domination" was the theme of this venture, beginning in 1999, in Silicon Valley. Like so many other "high-tech" companies that bloomed in the San Francisco Bay Area during the 1990s, it had the famed "no collar" business culture that made these firms the darlings of an adoring media that later would turn against them en masse when the "New Economy" collapsed like the house of inflationary cards that it was. PayPal, unlike many of the others, like Pets.com, Webvan.com, and etoys.com, hung on, grew, and finally prospered, thanks in no small part to a refugee from the "Old Economy," Eric M. Jackson, who has authored this book. While Jackson's book is far from an exercise in megalomania (in fact, Jackson is one of the more humble authors I have read recently), he was the one who steered PayPal to its most famous moorings: the mechanism of payment choice for hundreds of thousands of people who use the on-line auction services of eBay. Before going on, let me say that The PayPal Wars is valuable not only because it gives the reader an inside view of the entrepreneurial madness that was Silicon Valley, but also because Jackson understands the larger picture of which PayPal was a part. He understands the nature of boom and bust (this despite the fact that he received an economics degree from the decidedly mainstream program of Stanford University), pointing out the role of the Federal Reserve System in this latest sorry economic episode. That alone is enough to make the book worth reading. Furthermore, Jackson understands the predatory nature of the regulatory system that nearly brought down the company after it successfully completed its initial public offering (IPO) in 2002, a feat notable in itself, given the hostile climate that developed after many of the dot.coms went bust. State and federal regulators, as clearly demonstrated in this book, contributed nothing to the quality and "safety" of the product, that being a relatively safe and secure mechanism for using the Internet to make payments. Before the regulators came the fierce competition from other companies wanting to duplicateor at least closely resemblethe PayPal system, as it should be. Such competition made PayPal more innovative and nimble, a trait that was enhanced by the innovative and nimble corporate culture that the company developed, something those interested in Austrian Economics would appreciate, given the primacy of the entrepreneur in the Austrian system. Yet, despite the challenges from competitors, the invasion of Russian organized crime rings that almost brought down the firm through fraudulent accounts, and the pack mentality of the news media, as Jackson points out, government ultimately slowed and nearly stopped the whole enterprise. The state-enforced roadblocks came through predatory regulators and politicians like Elliot Spitzer, the state attorney general of New York, who graciously took time from his shakedown of Wall Street firms to squeeze some "free" cash from PayPal. The second state-enforced barrier came from the trial lawyers acting through class action suits, a mechanism set up by government courts that enriches lawyers and ultimately impoverishes businesses and consumers. The story begins with Thiel recruiting Jackson, in November 1999, to his new firm using that "New Economy" incentive, the stock option. Jackson at that time was a young analyst locked in the bowels of the firm formerly known as Arthur Andersen. At the time, it must have seemed a foolish move, what with PayPal being an unknown startup and Andersen being one of the best-established firms in the world. (Who would have imagined that in five years hence, PayPal would be a world-wide name and Andersen eviscerated by John Ashcroft's Department of Justice on bogus criminal charges for the crime of being the unlucky firm to be handling the Enron account?) Jackson's arrival at PayPal proved to be something out of Silicon Valley stereotypes. He writes: I introduced myself to the receptionist, who had no idea that I was expected. . . . My concern grew. Three people in the company who should have known about my job offer seemed completely stumped. Could Peter (Thiel) have changed his mind? . . . I had no idea what was going on. (pp. 1718) Nor did the initial conditions he faced at Confinity (the official name of the company that gave us PayPal), where the environment was thoroughly unstructured, ease his anxiety: What have I gotten myself into? I pondered as I tested the password to my new Confinity e-mail account on a borrowed computer. I had no job description, my colleagues didn't know who I was, and there wasn't even a desk for me in the building! At least Andersen gave its new hires a place to sit. (p. 20) The company brass finally found a place for Jackson to sitin the "ping-pong room"and the young Stanford economics graduate soon found out he would be involved in marketing PayPal. The idea behind Confinity's signature product was disarmingly simple. While there were many ways for individuals to transfer money to each other, all had limitations. Wire transfers could be costly and required knowledge of both bank accounts, which is information that could easily find its way into the wrong hands. Credit cards are convenient, but few individuals have setups where they can handle the plastic, that being the purvey of businesses who deal in volume. But Thiel's inspiration was far more encompassing than just developing a convenient payment system for small merchants and traders. Jackson recalls a conversation during which Thiel explained his vision: The need PayPal answers is monumental. Everyone in the world needs moneyto get paid, to trade, to live. Paper money is an ancient technology and an inconvenient means of payment. You can run out of it. It wears out. It can get lost or stolen. In the twenty-first century, people need a form of money that's more convenient and secure, something that can be accessed from anywhere with a PDA (palm pilot) or an Internet connection. Of course, what we're calling "convenient" for American users will be revolutionary in the developing world. Many of these countries' governments play fast and loose with their currencies. . . . They use inflation and sometimes wholesale currency devaluations, like we saw in Russia and several Southeast Asian countries last year, to take wealth away from their citizens. Most of the ordinary people there never have an opportunity to open an offshore account or to get their hands on more than a few bills of a stable currency like U.S. dollars. The $64 question is this: How did this grand vision of an alternative way of holding and trading money ultimately become the mechanism of choice for traders using eBay? The credit there goes to Jackson, who while surfing the Internet came upon eBay and realized that most of the small traders and sellers using that site were limited to using the mail to transfer payments in the form of checks, since the average household is not set up to handle credit cards. It was not long before Jackson convinced his superiors to use eBay, and soon it accounted for about 70 percent of PayPal's transactions. However, there were two problems that soon followed. The first was finding a way to make the system profitable. PayPal did not charge for small users (the company did introduce transactions fees for "business" users), instead making its money through the "float" in which it was able to temporarily hold the money before the final transactions were completed. Dependence upon the "float," however, proved to be a loser and the company struggled with a mechanism that would enable it to collect fees yet not drive away its loyal customers. The second problem dealt with duplicate services. For example, eBay developed Billpoint, its own online payment mechanism, and other similar services soon popped up, most of them being backed up by large banks. Furthermore, eBay used a number of tactics in an attempt to steer its customers toward Billpoint and away from PayPal, only to find that the decentralized and nimble crew at Confinity always found a way around the private barriers. To deal with one competitor's threatcoming from X.comConfinity ultimately merged with the firm, creating a marriage that was made elsewhere than Heaven. While Confinity was loosely structured with an entrepreneurial spirit, X.com was more "top down" in structure, decision making dominated by Elon Musk, a capable but sometimes bull-headed CEO who imposed policies that seemed to come more from the comic strip "Dilbert" than the honest give-and-take of business analysis. For example, Musk was stuck on the "X" name to be given to PayPal (X-PayPal) despite its negative connotations. Writes Jackson: While compiling research to support the continued use of the PayPal name, I tracked down a videotape of several focus groups held by an X.com researcher hired the prior summer. The participants in the groups unsurprisingly disparaged the X brand. Women complained that it seemed pornographic, and middle-aged men remarked that it sounded too much like Generation X, comments similar to what we'd heard during the several focus groups held by Confinity. The tapes provided no rationale whatsoever for the use of the X brand. . . . The official write-up from the research answered the question. In almost Orwellian fashion, the summary claimed that the participants liked the X.com name and identified it with "brand X," which supposedly stood for the underdog or the sympathetic little guy. (p. 131) I include this passage not to disparage Musk but rather to point out that even in the profit-making world of business, reports sometimes are written to please the top brass, not deal with real consumer preferences. However, unlike government, where such reports are commonplace and the authors and originators of failed policies rarely must pay for telling half-truths or outright lies, Musk ultimately paid for his bad vision. He was removed from his CEO position by the company's board of directors almost immediately after he announced that X.com was going to discontinue PayPal. The commercial marketplacethat entity regularly denounced by the political classesrewards truth and punishes lying (or "spin," as politicians like to call it). The next challenge came from Russian mafiosos, who were tapping the PayPal accounts on a regular basis, creating large fraud losses. Again, the nimble corporate culture came to the rescue, as the PayPal teams found ways to circumvent the criminals without largely inconveniencing their customers. (Contrast this with the way the Transportation Security Administration largely inconveniences airline passengers to conduct what clearly are ineffectual methods to prevent terrorist hijackings. A gaggle of lawyers soon appeared to sue PayPal because some customers had trouble accessing their accounts; no one sues the TSA just like no one sued the FAA or other U.S. Government agencies after the 9/11 attacks. Only the airlines found themselves in court.) After suffering losses its first few years, PayPal finally began to show a small profit, and it was able to attract the investors who ultimately were willing to purchase its stock following the company's IPO in early 2002. Not surprisingly, the prospect of a new firm coming into the public arena drew not only media coverage, but "entrepreneurial" lawyers and government regulators. Lawyers found ways to bring class action suits while government officials like Elliot Spitzer found ways to demand payments from the company for nonexistent regulatory violations in order to gain permission to operate within their states. In the end, however, PayPal "won." That is, the idea survived and the company survived as well. However, soon after the IPO was completed, the principals decided to sell it to eBay, which quickly jettisoned its ineffective Billpoint and used PayPal as one of its payment mechanisms. Jackson and others who had thrived in the open culture of Confinity (and later X.com) found the "old economy" top-down, MBA-oriented culture of eBay too much to handle and left for other ventures. I have gone through the story, but have not commented on my opinion of this book. Is it worth reading? Absolutely. Does it have a useful and important story to tell? Yes, indeed it does. (I must admit that I liked it so much that I plan to make it required reading for my MBA students beginning in the fall of 2005.) The genius of The PayPal Wars is more than it's being an interesting business story. In the end, it is a wonderful exposition of Austrian Economics, even if that is not what the author intends. We see entrepreneurship, government regulation, and the boom-and-bust business cycles in action, presented in a manner in which the author not only sees the immediate "small" picture, but the larger picture at the same time. It definitely is worth taking the time to read, and those who do will better understand those madcap days in which people mistakenly believed that the laws of economics had been overthrown forever. _______________________ William Anderson, an adjunct scholar of the Mises Institute, teaches economics at Frostburg State University. Send him MAIL. See his Mises.org Articles Archive. Comment on the blog. In response to many requests, it is now possible to set your credit-card contribution to the Mises Institute to be recurring. You can easily set this up on-line with a donation starting at $10 per month. See the Membership Page. This is one way to ensure that your support for the Mises Institute is ongoing. [Print Friendly Page] Mises Email List Services Join the Mises Institute Mises.org Store Home | About | Email List | Search | Contact Us | Periodicals | Articles | Games & Fun FAQ | EBooks | Resources | Catalog | Contributions | Freedom Calendar You are subscribed as: rah at ibuc.com Manage your account. Unsubscribe here or send email to this address. --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 4 06:53:59 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 09:53:59 -0500 Subject: California Bans a Large-Caliber Gun, and the Battle Is On Message-ID: The New York Times January 4, 2005 California Bans a Large-Caliber Gun, and the Battle Is On By CAROLYN MARSHALL AN FRANCISCO, Jan. 3 - California has become the first state to ban a powerful .50-caliber long-range rifle that gun control advocates portray as a military firearm that could easily fall into the hands of terrorists bent on assassination or shooting down an airplane. Under the ban, which was signed into law by Gov. Arnold Schwarzenegger in September and took effect on Jan. 1, it is now illegal to manufacture, sell, distribute or import a weapon known as the .50-caliber BMG, or Browning machine gun rifle, a single-shot weapon widely used not only by law enforcement officers and the military but, more recently, by civilian sport shooters as well. The new law limits possession to those who already own the rifle; they have until April 30, 2006, to register it or face a misdemeanor charge. Gun rights advocates fear that the California legislation will prompt other states to follow - similar efforts have been undertaken in New York, Connecticut, Illinois, Massachusetts and Virginia, but have failed - and enthusiasts are already devising ways to alter the gun and so circumvent the law without breaking it. Another result of the law is that in the weeks before it took effect, people rushing to buy the limited supplies of .50 BMG's descended on gun shops throughout California. Now that it is in force, some of the gun's out-of-state makers and distributors have threatened not to sell any of their firearms or services here. "We all think it's the first step toward banning sniper rifles," said Michael Fournier, owner of the Gun Exchange, a shop in San Jose. "They keep chipping away a little at a time. Eventually they'll try to get them all." A lawyer for the California Rifle and Pistol Association, a lobby that fought the legislation, said that for the first time gun control advocates had managed "to demonize" a firearm that gun proponents and lawmaker allies say has never been used to commit a crime in the United States. The lawyer, Chuck Michel, said the .50 BMG, which weighs 30 pounds and can cost $2,000 to $8,000, was typically bought by collectors, shooting range enthusiasts and skilled competitors. "Criminals don't carry around very pricey, very heavy rifles," Mr. Michel said. "They want handguns they can conceal." The .50 BMG rifle, patented in 1987 by Barrett Firearms Manufacturing of Murfreesboro, Tenn., was designed as a sniper weapon for law enforcement and the military; it was widely used by American troops during the Persian Gulf war of 1991. Manufacturers say the rifle is accurate at a range of up to 2,000 yards, more than a mile. It fires bullets five and a half inches long described as powerful enough to rip through armor, much less the thin aluminum skin that covers commercial airliners. "They can pierce the skin of an aircraft," said Daniel R. Vice, a lawyer with the Brady Campaign to Prevent Gun Violence, a central supporter of the law. "It could be used to shoot down an airplane. And we certainly don't want to wait until a terrorist buys one before we ban it." The legislation's author, Assemblyman Paul Koretz, a Democrat from West Hollywood, concedes that street criminals would most likely view the .50 BMG as too much gun for the typical robbery or drive-by shooting. Rather, the law is intended to help keep the weapon out of the hands of "terrorists, general nut cases and survivalists," Mr. Koretz said, citing government reports suggesting that it had been used in assassinations overseas and that at least 25 had been bought by Osama bin Laden. Mr. Michel, the lawyer for the gun rights group, said that adopting the ban in the name of fighting terrorism was without merit. "The terrorist can get a nuclear dirty bomb or a shoulder-mounted rocket launcher," he said. "The .50-caliber is just a peashooter in comparison." But while there is no conclusive evidence that the .50 BMG rifle has ever been used in the United States to commit a felony, it has nonetheless been seized from American criminals' arsenals. A 1999 briefing paper from the General Accounting Office, predecessor of the Government Accountability Office, Congress's investigative arm, said, "We have established a nexus to terrorist groups, outlaw motorcycle gangs, international drug cartels, domestic drug dealers, religious cults, militia groups, potential assassins and violent criminals." A side effect of the new law is the ill will it has instilled toward Mr. Schwarzenegger among gun rights advocates. Many of them supported him for governor, and maintain that his signing the legislation was an act of betrayal. "You know what we call him?" said Jerry Sloan, assistant manager of Precision Arms, a shop in Escondido. "Benedict Arnold." Terri Carbaugh, a spokeswoman for the governor, said Mr. Schwarzenegger, a Republican, had made his position clear during his campaign. "It's a military-type weapon," Ms. Carbaugh said of the .50 BMG, "and he believes the gun presents a clear and present danger to the general public." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 4 07:19:46 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 10:19:46 -0500 Subject: The Genius and Struggle of PayPal Message-ID: --- begin forwarded text From jya at pipeline.com Tue Jan 4 10:30:31 2005 From: jya at pipeline.com (John Young) Date: Tue, 04 Jan 2005 10:30:31 -0800 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: Message-ID: A timely report. A documentary is due out shortly which includeds the likely assassination of officials with such army-of-one weapons. Sniping is the chink in VIP protection armor. Why? Because ego-driven assholes lust to be seen, and best, photographed outside the armoring of vehicles, aircraft and structures. The very targeting head shot snipers are trained to patiently wait for are the ones photographers are paid to arrange just so, Sergeant York turkey-calling, "over here sir." Who was the freedom fighter who smilingly welcomed death by public appearance. Archduke, Reagan, JFK, Masouf, or Abe himself. All those pissed off, well-tested snipers from Operation Iraqi Freedom on all sides. The Secret Service claims you cannot spot a serious assassin ahead of time, that braggarts and threateners are not the real thing -- sorry 'bout that outing Tim. More at US Secret Service National Threat Assessment Center: http://www.secretservice.gov/ntac.shtml From steve49152 at yahoo.ca Tue Jan 4 08:27:47 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Tue, 4 Jan 2005 11:27:47 -0500 (EST) Subject: [IP] Cell phones for eavesdropping Message-ID: <20050104162747.23442.qmail@web51810.mail.yahoo.com> --- "Major Variola (ret)" wrote: > >From: Gadi Evron > >Subject: Cell phones for eavesdropping - finally some public "chatter" > > Of course, the low-budget govt snoops go for the basestations > and landline links. Oh, I don't know about that. What would it cost a small to medium sized 'security firm' to hire a couple of decent EEs with decent RF expertise? Given five years and a decent budget, I bet that you could mock-up a system to capture cell-phone calls in progress so long as you were in range of the target's phone. I suspect that the protocols for setup and teardown of cell calls, not to mention the OOB handoff signals, aren't so complex that one couldn't intercept them in real-time with cheap off the shelf hardware. Hell, we all know that encryption, where it exists in the cell-net as a capability, has gone unused to this day. > The pending cell phone virus which calls 911 should be a real hoot. I bet that depends on whether the Java VM in modern phones is secure or not. > I wonder if cell virii can carry a voice payload which they can > inject as well. Or do we have to wait a few (viral) generations > for that? Depends on how much RAM you've got in your phone, I guess. The ABCs probably have the complete specifications for most phones, software and hardware, and so may be able to arbitrarily fuck with any given model to their heart's content -- given sufficient motivation, however you might characterise that... What's your threat model? Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From kelsey.j at ix.netcom.com Tue Jan 4 09:06:57 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 4 Jan 2005 12:06:57 -0500 (GMT-05:00) Subject: How to Build a Global Internet Tsunami Warning System in a Month Message-ID: <25224543.1104858417620.JavaMail.root@huey.psp.pas.earthlink.net> >From: "Major Variola (ret)" >Sent: Jan 3, 2005 4:45 PM >To: "cypherpunks at al-qaeda.net" >Subject: Re: How to Build a Global Internet Tsunami Warning System in a Month ... >3. Homebrew warning systems will face the same problems as eg pro >volcano warning systems: too many false alarms and no one cares. The best defense would seem to be a population with a lot of TVs and radios. At least after the first tsunami hit, the news would quickly spread, and there were several hours between when the waves arrived at different shores. (And a 9.0 earthquake on the seafloor, or even a 7.0 earthquake on the seafloor, is a rare enough event that it's not crazy to at least issue a "stay off the beach" kind of warning.) My first take on this is that it's an example of the many ways that it's better to be in a rich country than a poor one. Major natural disasters are a lot bloodier in poor countries, for lots of infrastructure reasons (good communications to get out the warning, good roads to evacuate on, resources available for disaster planning long before the disaster hits, building codes or best practices that require some resistance to known disasters, etc.). --John From kelsey.j at ix.netcom.com Tue Jan 4 09:16:06 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 4 Jan 2005 12:16:06 -0500 (GMT-05:00) Subject: California Bans a Large-Caliber Gun, and the Battle Is On Message-ID: <23364006.1104858966957.JavaMail.root@huey.psp.pas.earthlink.net> Interesting questions: How hard is it for someone to actually hit an airplane with a rifle bullet? How often do airplane maintenance people notice bulletholes? My understanding is that a single bullethole in a plane is not likely to do anything serious to its operation--the hole isn't big enough to depressurize the cabin of a big plane, and unless it hits some critical bits of the plane, it's not going to cause mechanical problems. I don't think the bigger .50 round would fundamentally change that. So this could be one of those things that just happens from time to time, without getting much press. (Most people have never heard of phantom controllers either, but they're a real phenomenon, and they seem at least as dangerous as some nut with a rifle taking potshots at landing planes.) --John From jrandom at i2p.net Tue Jan 4 12:54:48 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 4 Jan 2005 12:54:48 -0800 Subject: [i2p] weekly status notes [jan 4] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, time for our first weekly status notes of 2005 * Index 1) Net status 2) 0.4.2.6 3) 0.5 4) jabber @ chat.i2p 5) ??? * 1) Net status Over the last week, things have been pretty interesting on the net - on nye, there were some comments posted to a popular website talking about i2p-bt and we've had a small burst of new users. At the moment there are between 120-150 routers on the net, though that peaked at 160 a few days ago. The network held its own though, with high capacity peers picking up the excess load without much disruption to other peers. Some users running without bandwidth limits on really fast links have reported throughput of 2-300KBps, while those with less capacity use the usual low 1-5KBps. I think I remember Connelly mentioning that he was seeing 300+ different routers over the course of a few days after new years, so there has been significant churn. On the other hand, we now have a steady 120-150 users online, unlike the previous 80-90, which is a reasonable increase. We still do *not* want it to grow too much yet though, as there are known implementation issues that still need to be done. Specifically, until the 0.6 release [1], we're going to want to stay below 2-300 peers to keep the number of threads at a reasonable level. However, if someone wants to help out implementing the UDP transport, we can get there much faster. In the last week, I've watched the stats put out by the i2p-bt trackers and there have been gigs of large files transferred, with some reports of 80-120KBps. IRC has had more bumps than usual since those comments were posted on that website, but its still on the order of hours between disconnect. (from what I can tell, the router that irc.duck.i2p is on has been running pretty close to its bandwidth limit, which would explain things) [1] http://www.i2p.net/roadmap#0.6 * 2) 0.4.2.6 There have been some fixes and new features added to CVS since the 0.4.2.5 release that we're going to want to roll out soon, including reliability fixes for the streaming lib, improved resiliance to IP address change, and the bundling of ragnarok's addressbook implementation. If you haven't heard of the addressbook or haven't used it, the short story is that it will magically update your hosts.txt file by periodically fetching and merging changes from some anonymously hosted locations (default being http://dev.i2p/i2p/hosts.txt and http://duck.i2p/hosts.txt). You won't need to change any files, touch any configuration, or run any extra applications - it'll be deployed inside the I2P router as a standard .war file. Of course, if you *do* want to get down and dirty with the addressbook, you are more than welcome to - see Ragnarok's site [2] for the details. People who already have the addressbook deployed in their router will need to do a little tap dancing during the 0.4.2.6 upgrade, but it'll work with all your old config settings. [2] http://ragnarok.i2p/ * 3) 0.5 Numbers, numbers, numbers! Well, as I've said before, the 0.5 release will be revamping how the tunnel routing works, and progress is being made on that front. For the last few days I've been implementing the new encryption code (and unit tests), and once they're working I'll post up a doc describing my current thoughts on how, what, and why the new tunnel routing will operate. I'm getting the encryption implemented for it now instead of later so that people can review what it means in a concrete sense, as well as find problems areas and suggestions for improvement. I'm hoping to have the code working by the end of the week, so maybe there'll be more docs posted this weekend. No promises though. * 4) jabber @ chat.i2p jdot has started up a new jabber server, and it seems to work pretty well for both one on one conversations and group chat. check out the info on the forum [3]. the i2p dev discussion channel will still be the irc #i2p, but its always nice to have alternatives. [3] http://forum.i2p.net/viewtopic.php?t=229 * 5) ??? Ok, thats about all I have to mention at the moment - I'm sure there's lots more going on that other people want to bring up though, so swing on by the meeting in 15m @ the usual place [4] and tell us whats up! =jr [4] irc://irc.{duck,baffled}.i2p/#i2p irc://iip/#i2p irc://irc.freenode.net/#i2p -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB2wGXGnFL2th344YRAuAkAJwPh8frN6Caof0unduGzijXFyFDnwCfXD/8 ZQXQmqk6EIx184r2Zi7poZg= =+oCL -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ptrei at rsasecurity.com Tue Jan 4 10:41:15 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 4 Jan 2005 13:41:15 -0500 Subject: California Bans a Large-Caliber Gun, and the Battle Is On Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE4@rsana-ex-hq1.NA.RSA.NET> John Kelsey wrote > Interesting questions: How hard is it for someone to > actually hit an airplane with a rifle bullet? How often do > airplane maintenance people notice bulletholes? Damn hard. There's a reason winghunters use shotguns, and anti-aircraft guns are full auto. The only way an attacker would have a chance is to stand at the end of the runway, and fire while the plane passes overhead. I have heard of police choppers and ultra lights being fired on from the ground, but never a commercial flight in the US. The scenario the gun-grabbers posit is someone doing this with tracer rounds. Commercial aircraft do not have self-sealing tanks, and if the attacker is incredibly lucky he might be able to start a fire. 50 BMG can be effectively used in anti-material roles, but firing on planes in the air is not one of them. Barrett actually tried to make an shoulder-fired AA model at one point, but abandoned it as impractical. As has been pointed out, 50 BMG rifles have never been used in the commission of a felony. They are being demonized because they Look Scary (check out www.barrettrifles.com). Peter Trei From measl at mfn.org Tue Jan 4 12:17:57 2005 From: measl at mfn.org (J.A. Terranson) Date: Tue, 4 Jan 2005 14:17:57 -0600 (CST) Subject: =?X-UNKNOWN?Q?Re=3A_AOL_Help_=3A_About_AOL=AE_PassCode?= In-Reply-To: References: Message-ID: <20050104141549.X42460@ubzr.zsa.bet> Hey RAH, don't forget to include the 182000 hours free download image. Or the AOL user agreement. Or their logo. I mean, we wouldn't want to be *uninformed* or anything, right? Shit, you make a rotten Choate substitute. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner From ptrei at rsasecurity.com Tue Jan 4 12:24:56 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 4 Jan 2005 15:24:56 -0500 Subject: Banks Test ID Device for Online Security Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> R.A. Hettinga wrote: > Okay. So AOL and Banks are *selling* RSA keys??? > Could someone explain this to me? > No. Really. I'm serious... > > Cheers, > RAH > -------- The slashdot article title is really, really misleading. In both cases, this is SecurID. Peter From rah at shipwright.com Tue Jan 4 12:36:07 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 15:36:07 -0500 Subject: Conspiracy Theory O' The Day Message-ID: --- begin forwarded text From jsd at av8n.com Tue Jan 4 12:41:12 2005 From: jsd at av8n.com (John Denker) Date: Tue, 04 Jan 2005 15:41:12 -0500 Subject: No subject Message-ID: Gecko/20041007 Debian/1.7.3-5 To: Udhay Shankar N Cc: cryptography at metzdowd.com Subject: Re: Conspiracy Theory O' The Day Sender: owner-cryptography at metzdowd.com Udhay Shankar N wrote: > I just got a batch of spam: perfectly justified blocks of random-looking > characters. Makes me wonder if somebody is trying to train Bayesian > filters to reject PGP messages. Another hypothesis: Cover traffic, to defeat traffic analysis. The procedure: send N copies. N-M of them are spam, sent to uninterested parties. The other M parties are the intended recipients. Provided N>>M, and other mild restrictions, they achieve plausible deniability. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From adam at homeport.org Tue Jan 4 13:31:15 2005 From: adam at homeport.org (Adam Shostack) Date: Tue, 4 Jan 2005 16:31:15 -0500 Subject: AOL Help : About =?iso-8859-1?Q?AOL?= =?iso-8859-1?Q?=AE?= PassCode In-Reply-To: <41DB001B.2060308@systemics.com> References: <41DB001B.2060308@systemics.com> Message-ID: <20050104213114.GB48806@lightship.internal.homeport.org> On Tue, Jan 04, 2005 at 08:44:11PM +0000, Ian G wrote: | R.A. Hettinga wrote: | | > | >Have questions? Search AOL Help articles and tutorials: | >..... | >If you no longer want to use AOL PassCode, you must release your screen | >name from your AOL PassCode so that you will no longer need to enter a | >six-digit code when you sign on to any AOL service. | > | >To release your screen name from your AOL PassCode | > 1. Sign on to the AOL service with the screen name you want to | > release from your AOL PassCode. | > | | OK. So all I have to do is craft a good reason to | get people to reset their PassCode, craft it into | a phishing mail and send it out? Nope! All you have to do is exploit your attack and steal money in realtime. A securid has no way to authenticate its server, and what's really needed to stop phishing is server auth. Adam From rah at shipwright.com Tue Jan 4 13:33:31 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 16:33:31 -0500 Subject: Conspiracy Theory O' The Day Message-ID: --- begin forwarded text From rah at shipwright.com Tue Jan 4 14:04:22 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 17:04:22 -0500 Subject: E-mails can have 'explosive' impact in court cases Message-ID: Posted on Fri, Dec. 10, 2004 E-mails can have 'explosive' impact in court cases By TRICIA BISHOP The Baltimore Sun Brian L. Moffet said he saw the writing on the wall about three years ago. The attorney was arguing a national class-action suit with 50,000 pieces of paper entered into evidence when the judge asked, ''Where are the e-mails?'' That sent Moffet into scramble mode. ''It was the first time I realized it was something that was going to have to be addressed,'' he said. More than 90 percent of all new information is created and stored in electronic form, according to the University of California at Berkeley. And more than two-thirds of that is never printed. Not since the adoption of the Xerox machine 45 years ago has the centuries-old legal profession been so affected by new technology. A handful of law firms, including Moffet's -- Gordon, Feinblatt, Rothman, Hoffberger & Hollander LLC -- have created units specifically to mine for electronic information and help clients manage it. But experts say many lawyers aren't yet comfortable with hunting for electronic data and may be setting themselves up for claims of malpractice because of it. ''Think about it,'' said Ken Withers, an attorney at the Federal Judicial Center, the Washington-based research and education arm of the national court system. ''If 92 percent of the information is in electronic form, then they're only asking for 8 percent of the information. Obviously, they're not getting a full picture of what's going on.'' Recent court decisions have put attorneys and companies on notice by posing hefty fines against businesses and public institutions that don't properly handle -- or hand over -- electronic records. In July, Phillip Morris USA Inc. was sanctioned $2.75 million for failing to keep and produce such data in a case that claimed the company marketed cigarettes to minors. That same month, a New York court instructed a jury to infer that the absence of electronic records could be considered intentional and damaging to the defendants. And a year ago, Baltimore City defendants in a housing discrimination case produced 80,000 e-mails too late, causing U.S. District Court Judge Paul W. Grimm to refuse their admittance into evidence and preclude some witnesses from testifying. Electronic evidence ''is absolutely explosive in terms of the impact,'' Grimm said in a recent telephone interview. ''At first it was somewhat unusual. But in the late '90s and early 2000, we started seeing a drumbeat of cases'' submitting e-mail evidence in particular, which is often more salacious because of its casual nature. ''Discovery'' -- the technical term for the lawyer's process of collecting evidence and information to try a case -- once meant pawing through file cabinets in search of a paper trail. But the explosion of e-mail and other electronic data has turned the procedure on its head, making it more costly and cumbersome, but also critical. E-mail and data can be found on laptops, network servers, disks, hard drives, backup tapes, cell phones, and portable digital assistants -- making them all fair game when mining for dirt that could make or break a case. ''Now, we not only have to sweep files for relevant information. We have to sweep the computers that are relevant, too,'' said Thomas P. Vartanian, a Washington attorney and a member of the American Bar Association's technology committee. Without in-house electronic discovery teams, lawyers and companies typically turned to outside businesses for help. The first such companies began on the West Coast in the late 1980s. But it wasn't until a decade later that the new market began taking off, said George J. Socha, Jr., an attorney, market analyst and consultant in St. Paul, Minn. Today, about 160 companies concentrate on electronic discovery, whose total revenues grew to $430 million in 2003 from $40 million in 1999. Cases involving records mismanagement and accounting fraud -- such as those of Arthur Andersen LLP and Enron Corp. -- have heightened mistrust of corporations by juries, said Lori Ann Wagner, a partner at Faegre & Benson LLC in Minneapolis. Her firm, whose electronic discovery task force in 1999 is considered one of the pioneers among law firms, helps clients put policies in order to avoid the appearance of misconduct. But many companies still don't have well-defined or well-reasoned processes. Recently, a California software company filed a motion in U.S. District Court in Baltimore that claimed Microsoft Corp. purposely created policies to destroy evidence. The plaintiffs, Burst.Com Inc., contend Microsoft stole its intellectual property and destroyed the e-mails that would prove it. They've requested that the judge issue an ''adverse inference'' instruction to the jury, which permits members to infer that the destroyed evidence was harmful to Microsoft. Dealing with data is not easy for companies or their attorneys. The information is enormous in scope and costly to maintain and search. Word documents have multiple versions, e-mails have replaced telephone calls and they are sent to multiple recipients, embedded data are attached to files, and deleted data are not truly gone until it's overwritten, which could take years. All of it is discoverable, meaning millions of pieces of information might come into play. And right now, there are no universal rules governing the electronic discovery process, though various groups have offered guidelines. Some states -- Delaware, Wyoming, New Jersey, Kansas and Arkansas -- have implemented their own rules, but some experts complain of a lack of uniformity. ''The volume of electronic information is much higher than anything we ever imagined in the paper world,'' said Withers of the Federal Judicial Center. ''Computers generate far more than humans are capable of comprehending.'' The Judicial Conference of the United States -- the policy-making body for the country's court system -- has proposed amendments to the federal Rules of Civil Procedure that specifically address electronic discovery. The proposals have been presented for comment, which ends in February, and would not take effect until December 2006 at the earliest. The current proposals would require attorneys to lay ground rules for electronic discovery early on, help decide who pays for what, add options to pull back privileged communication mistakenly handed over, and ease the burden of production on some defendants by only asking for easily accessible documents. Among the possible changes is a new definition of what a ''document'' is: It could include an entire computer and everything on it. Law schools are trying to train the next generation of lawyers to think in such terms. But while most students are already familiar with the Internet and tech toys, ''trying to harness all of that recreational knowledge and turn it into professional expertise is a challenge for all law schools,'' said Theresa K. LaMaster, assistant dean for technology affairs at the University of Maryland School of Law. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dave at farber.net Tue Jan 4 14:10:04 2005 From: dave at farber.net (David Farber) Date: Tue, 04 Jan 2005 17:10:04 -0500 Subject: [IP] Jasper Green Lasers: useful tool or terrorist weapon? Message-ID: ------ Forwarded Message From: "Richard M. Smith" Date: Tue, 04 Jan 2005 16:46:02 -0500 To: Subject: Jasper Green Lasers: useful tool or terrorist weapon? Yikes! High-powered laser pointers do seem to present a problem to pilots. Richard http://www.bigha.com/blog/archives/000058.php?0 >From Saturday, January 1, 2005 Jasper Green Lasers: useful tool or terrorist weapon? posted by Noah , at 2:52 PM I'm sure we've all read stories like this one or this one or this one in the past week or so. The theme is consistent: some dorkus is shining a green laser into moving aircraft and temporarily blinding pilots. Not cool, obviously. On Thursday I was contacted by the FBI. They were investigating a new incident even scarier than the ones we've read about. The good news is they are coming up with ways to track and catch the culprits. The bad news is, we have reason to believe at least one of the culprits is using a Jasper. Wow. The theory is this: the dorkuses possibly modified their lasers (this is easy to do) to increase the power. and accessorizing it with a tripod and a scope to track and aim at aircraft. Even the unmodified Jasper is plainly visible at 10,000 feet. At 25,000 feet it is still visible, but it becomes fainter and obviously much more difficult to aim from the ground. Since there are so many reflective surfaces in the cockpit, it only takes the beam landing on one of the cockpit windows for 2-3 seconds before it bounces all around, and temporarily blinds the pilots. We have been asked if there are any suspicious persons have purchased from us, especially in areas like Colorado, New Jersey, Ohio and southern Oregon where instances have been reported. We are trying to cooperate with the authorities while at the same time respecting the privacy of our customers. If you own or are about to purchase a Jasper, please do not point it towards people or moving objects. It is dangerous. Please do not modify it to increase the power output. It will void your warranty, harm your laser and render it largely unuseful for serious pointing. And if you are amongst the one or two losers amongst thousands of responsible Jasper users, please be aware that you will soon be caught. The next time you point your Jasper towards a plane, you will see a police helicoptor or military aircraft flying around your area. They will see your beam, which points right back to you. Then they will come to arrest you, and hopefully put you in jail. Your Jasper will be confiscated, and you will not be issued a refund. Commenting is Closed For questions email us or to order by phone call (888) 258-8440. ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Tue Jan 4 09:00:07 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 4 Jan 2005 18:00:07 +0100 Subject: Budget Issues Force Spy Satellites Into The Open Message-ID: <20050104170005.GD9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/03/2343210 Posted by: timothy, on 2005-01-03 23:52:00 from the pretty-soon-we're-talking-real-money dept. Korsair25 points out this article about a [1]U.S. spy satellite program. "Quote: 'Over the decades, spying from space has always earned super-secret status. They are the black projects, fulfilling dark tasks and often bankrolled by blank check.' It also talks about some of the technology used to disguise or camouflage some of the operational satellites." [2]Click Here References 1. http://story.news.yahoo.com/news?tmpl=story&u=/space/20050103/sc_space/anatom yofaspysatellite&e=1 2. http://ads.osdn.com/?ad_id=5671&alloc_id=12342&site_id=1&request_id=3463626&o p=click&page=%2farticle%2epl ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Tue Jan 4 15:39:23 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 18:39:23 -0500 Subject: New computerized passport raises safety concerns Message-ID: Posted on Mon, Jan. 03, 2005 New computerized passport raises safety concerns By Kristi Heim Seattle Times When traveling abroad these days, most Americans probably wouldn't want the contents of their passports to be secretly read by strangers. But when a new high-tech passport system goes into effect as early as next spring, that's exactly what critics say could happen. Before the end of the year, the first U.S. biometric passport will be issued with a tiny computer chip and antenna embedded inside it. The chip will contain a digital image of the person's face, along with other information such as name, birth date and birthplace. The data on the chip can be picked up wirelessly using a radio signal. When the traveler enters the United States, border-control officials will snap a digital photo of the person, scan the data from the passport and run a facial-recognition software program to compare the two images. The system is designed to prevent forged passports by making sure the original passport holder and the person standing at the immigration counter are one and the same. The problem, security and privacy experts say, is that the technical standard chosen for the system leaves passport data unprotected. The technology allows data on the chip to be read remotely using radio frequency identification or RFID. That means the passport does not have to be opened or even come in contact with a scanning device. Its contents can be read remotely -- some estimates claim as far away as 30 feet -- without the passport holder knowing anything about it. Privacy advocates and the American Civil Liberties Union have sharply criticized the proposed system, saying it effectively creates `a global infrastructure of surveillance.` `The U.S.-backed standard means that all the information on American passports can be read by anyone with an RFID reader, whether they are an identity thief, a terrorist trying to spot the Americans in a room or a government agent looking to vacuum up the identities of everyone at a political rally, gun show or mosque,` said Laura Murphy, director of the ACLU's Washington, D.C., legislative office. The ACLU also questioned the use of facial-recognition technology, which can be used to track people but is not foolproof when it comes to matching identity. The U.S. government is already requiring 27 foreign countries to include biometrics in their passports in order for their citizens to continue to travel to the United States without a visa. The mandate was passed in 2002 as part of an effort to tighten border security after the Sept. 11, 2001, attacks. Most of those countries, including the United Kingdom, have had trouble implementing the system and requested the deadline be postponed. Congress voted during the summer to extend the deadline one year to October 2005. Now the State Department plans to expand that program to include U.S. passports, which were not part of the original legislation. But it may only be a matter of time before countries required by the United States to issue biometric passports demand the same kind of passports from American visitors. By the end of 2005, according to the plan, all American passports produced domestically will be biometric passports. The new technology is set to go into diplomatic and official passports first, and move to all new and renewed regular passports around the middle of next year, said Kelly Shannon, spokeswoman in the State Department's Bureau of Consular Affairs. The standard being used for U.S. passports was developed by the International Civil Aviation Organization, a United Nations-affiliated group based in Montreal. As the standard was being decided this year, privacy and security experts argued it should include features to protect the data, such as encryption or the addition of a printed bar code inside the passport to `unlock` the data. Such features would let passport holders know who was reading their data and when. But the State Department so far has rejected proposals for encryption and other security measures. Department officials said encryption would hinder interoperability of the system among the different countries using it and slow down already tedious border crossings. It should function like RFID technology that monitors the flow of cars from a distance through automatic toll roads, for example. Security expert Bruce Schneier, founder and chief technical officer of Counterpane Internet Security, said encryption would not solve security problems for the passport system. Instead, he recommends a system that requires direct contact with the chip. `The owner of the passport has to acquiesce to give the data to somebody,` Schneier said. If the passport has to touch the reader or be opened before it can be read, there is less chance for secret `skimming` of personal data. That is a growing concern as RFID technology becomes more widespread around the world, and readers can be produced inexpensively in devices as small as a mobile phone. `The question comes down to why the government is fixating on this technology,` Schneier said. `I cannot figure out a motive, unless they want to read it surreptitiously themselves.` Adding a computer chip to passports does not provide a means to track U.S. citizens, said State Department spokesman Kurtis Cooper. The information stored on the chip is the same as on the printed passport and will be used only to verify identity at ports of entry, he said. As the system is further tested and developed, Cooper said, the department is looking for ways to `reduce further any risk that would compromise the privacy of the data as citizens use their passport.` Meanwhile, the Department of Homeland Security has started a pilot program to test biometric technology for foreign visitors at a dozen airports around the country. The department awarded a multibillion-dollar contract in June to a consortium called the Smart Border Alliance to design and build the U.S. Visitor and Immigration Status Indicator Technology (US-VISIT) program, which makes use of biometrics. The Smart Border Alliance, led by Accenture, includes Bellevue, Wash.-based Saflink. Saflink provides software that replaces passwords with biometric identification such as fingerprints, voices or facial characteristics. It takes the unique points of a fingerprint or a face and transforms them into a series of ones and zeros -- a biometric `signature,` allowing the signature stored in a chip or database to be compared with the one presented live. `You're never going to have a perfect match between today and tomorrow,` said Saflink marketing director Thomas Doggett. But false identifications can be reduced to a manageable level. `With the paper-based system from the old world, it's too easy for intruders to manipulate documents,` he said. Smart-card identification technology has broader applications as a container to store information such as health records and access privileges, which Saflink is helping supply to the U.S. military. In the future, the government may decide to add new biometrics or different, expanded technologies to U.S. passports. The State Department requires the new passports to carry a 64-kilobyte chip, more capacity than is needed to hold current passport data. Other technology could be added, such as a second digital photo, a digital fingerprint or an iris scan, to improve the accuracy of matches. Travel guidebook author Edward Hasbrouck isn't waiting around for that. He's getting his passport renewed before the new system is in place and urging others to do the same. Passports are valid for 10 years. Without better security, the new passports `couldn't be better suited to facilitate both surveillance and identity theft if they were designed for the purpose,` he said. Hasbrouck believes the new passports will enable `undetectable tracking and the identification of travelers, as well as secret, remote collection of all the data needed to create perfect passport forgeries.` One simple but effective solution may deter unwanted snoops, says Schneier: Cover the passport with aluminum foil. Radio frequencies have a hard time penetrating metal. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Tue Jan 4 19:18:54 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 04 Jan 2005 19:18:54 -0800 Subject: Banks Test ID Device for Online Security In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.R SA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> Message-ID: <200501050331.j053VWf5022468@positron.jfet.org> >R.A. Hettinga wrote: > > Okay. So AOL and Banks are *selling* RSA keys??? > > Could someone explain this to me? At 12:24 PM 1/4/2005, Trei, Peter wrote: >The slashdot article title is really, really misleading. >In both cases, this is SecurID. Yup. It's the little keychain frob that gives you a string of numbers, updated every 30 seconds or so, which stays roughly in sync with a server, so you can use them as one-time passwords instead of storing a password that's good for a long term. So if the phisher cons you into handing over your information, they've got to rip you off in nearly-real-time with a MITM game instead of getting a password they can reuse, sell, etc. That's still a serious risk for a bank, since the scammer can use it to log in to the web site and then do a bunch of transactions quickly; it's less vulnerable if the bank insists on a new SecurID hit for every dangerous transaction, but that's too annoying for most customers. ---- Bill Stewart bill.stewart at pobox.com From bill.stewart at pobox.com Tue Jan 4 19:18:54 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 04 Jan 2005 19:18:54 -0800 Subject: Banks Test ID Device for Online Security In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.R SA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050105032142.7E8D4F2CB@red.metdow.com> >R.A. Hettinga wrote: > > Okay. So AOL and Banks are *selling* RSA keys??? > > Could someone explain this to me? At 12:24 PM 1/4/2005, Trei, Peter wrote: >The slashdot article title is really, really misleading. >In both cases, this is SecurID. Yup. It's the little keychain frob that gives you a string of numbers, updated every 30 seconds or so, which stays roughly in sync with a server, so you can use them as one-time passwords instead of storing a password that's good for a long term. So if the phisher cons you into handing over your information, they've got to rip you off in nearly-real-time with a MITM game instead of getting a password they can reuse, sell, etc. That's still a serious risk for a bank, since the scammer can use it to log in to the web site and then do a bunch of transactions quickly; it's less vulnerable if the bank insists on a new SecurID hit for every dangerous transaction, but that's too annoying for most customers. ---- Bill Stewart bill.stewart at pobox.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From iang at systemics.com Tue Jan 4 12:44:11 2005 From: iang at systemics.com (Ian G) Date: Tue, 04 Jan 2005 20:44:11 +0000 Subject: AOL Help : About =?ISO-8859-1?Q?AOL=AE_PassCode?= In-Reply-To: References: Message-ID: <41DB001B.2060308@systemics.com> R.A. Hettinga wrote: > >Have questions? Search AOL Help articles and tutorials: >..... >If you no longer want to use AOL PassCode, you must release your screen >name from your AOL PassCode so that you will no longer need to enter a >six-digit code when you sign on to any AOL service. > >To release your screen name from your AOL PassCode > 1. Sign on to the AOL service with the screen name you want to release from your AOL PassCode. > OK. So all I have to do is craft a good reason to get people to reset their PassCode, craft it into a phishing mail and send it out? -- News and views on what matters in finance+crypto: http://financialcryptography.com/ From eugen at leitl.org Tue Jan 4 13:27:58 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 4 Jan 2005 22:27:58 +0100 Subject: [i2p] weekly status notes [jan 4] (fwd from jrandom@i2p.net) Message-ID: <20050104212758.GK9221@leitl.org> ----- Forwarded message from jrandom ----- From fw at deneb.enyo.de Tue Jan 4 14:19:30 2005 From: fw at deneb.enyo.de (Florian Weimer) Date: Tue, 04 Jan 2005 23:19:30 +0100 Subject: AOL Help : About =?iso-8859-1?Q?AOL=AE?= PassCode In-Reply-To: <41DB001B.2060308@systemics.com> (Ian G.'s message of "Tue, 04 Jan 2005 20:44:11 +0000") References: <41DB001B.2060308@systemics.com> Message-ID: <87pt0k6dn1.fsf@deneb.enyo.de> * Ian G.: > R.A. Hettinga wrote: > >> >>Have questions? Search AOL Help articles and tutorials: >>..... >>If you no longer want to use AOL PassCode, you must release your screen >>name from your AOL PassCode so that you will no longer need to enter a >>six-digit code when you sign on to any AOL service. >> >>To release your screen name from your AOL PassCode >> 1. Sign on to the AOL service with the screen name you want to release from your AOL PassCode. >> > > OK. So all I have to do is craft a good reason to > get people to reset their PassCode, craft it into > a phishing mail and send it out? I think you can forward the PassCode to AOL once the victim has entered it on a phishing site. Tokens ` la SecurID can only help if the phishing schemes *require* delayed exploitation of obtained credentials, and I don't think we should make this assumption. Online MITM attacks are not prevented. (Traditional IPsec XAUTHis problematic for the very same reason, even with a SecurID token lookalike.) From eugen at leitl.org Tue Jan 4 14:46:41 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 4 Jan 2005 23:46:41 +0100 Subject: [IP] Jasper Green Lasers: useful tool or terrorist weapon? (fwd from dave@farber.net) Message-ID: <20050104224641.GM9221@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Tue Jan 4 20:57:08 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 4 Jan 2005 23:57:08 -0500 Subject: Why HDTV Hasn't Arrived In Many Homes Message-ID: The Wall Street Journal January 5, 2005 TELECOMMUNICATIONS Why HDTV Hasn't Arrived In Many Homes By SARAH MCBRIDE, PHRED DVORAK and DON CLARK Staff Reporters of THE WALL STREET JOURNAL January 5, 2005 Eric Olander has a new love, his Sony high-definition TV. But something is coming between them: High-definition television programming. Mr. Olander adores the picture quality on the high-definition channels he gets from EchoStar Satellite LLC, but there are at best only nine available to him. Whenever he switches back to a regular channel, "everything seems substandard," he says. Adding insult to injury, his TiVo doesn't record high-definition programs in high definition: When he plays them back, they look like ordinary TV. And some of the programs are simply conventional movies converted into a digital form, so they don't have the crisp quality he's grown addicted to. "It's just not enough," says Mr. Olander, a 34-year-old manager at a Los Angeles television station and a gadget freak. Gripes from demanding customers like Mr. Olander help explain why so many cool technologies -- from high-definition TV to home networking to interactive TV -- just aren't catching on yet. Besides shortcomings in existing products, battles over technical standards and fear of video piracy are slowing manufacturers' ability to deploy new stuff. Many potential customers, disappointed and confused, are walking out of stores empty-handed. The good news: Manufacturers are well aware of the problem. Progress in speeding the delivery of digital content and technology will be a major theme among industry giants converging at the Consumer Electronics Show in Las Vegas, which formally opens tonight. For example, Hewlett-Packard Co. and Matsushita Electric Industrial Co., better known as Panasonic, today are announcing a peace agreement in a long-running format war over recordable DVDs. Each company plans to adopt the other's formats, known by confusing acronyms that include +R and RAM. As a result, users will be able to more easily edit video on a Hewlett-Packard PC that was recorded on a Panasonic DVD recorder. "Seamless is a key word," says Naoto Noguchi, vice president of Panasonic's audio-visual business unit. (See related story1.) Now for the bad news. Despite some advances, companies are still moving pretty slowly, not least because they tend to delay progress that can help rivals. Take, for example, the issue of content compatibility. Imagine that a movie purchased from a Best Buy store could only be played on a DVD player that also was bought at Best Buy -- and not on a player from Circuit City or Radio Shack. That is, in essence, what is happening in online music, the first big digital-content battleground. The only major paid download service that works with Apple Computer Inc.'s iPod device is Apple's own iTunes, because of the copyright protection used by the computer maker. In July, a rival online music service, RealNetworks Inc., cracked the Apple system with a technology called Harmony so that customers who bought songs from RealNetworks could play them on an iPod. Apple has taken steps to modify its offerings to prevent iPods from working with Harmony. Such infighting is very common with emerging technology, where design incompatibilities "are a huge impediment to adoption," says Paul Kocher, president of Cryptography Research Inc., a digital security consultancy. Historically, consumer-electronics makers had little need to cooperate with rivals, because their TVs, stereos and other audio-visual gear were standalone products. Attempts at cooperation on common standards often erupted into format wars, such as the famous battle in the 1970s between Betamax videocassettes, backed by Sony Corp., and VHS, backed by Japan Victor Corp., or JVC. Today, getting high-definition TV is already something of a struggle. Viewers who don't receive a special set-top box from a cable or satellite provider must purchase a separate tuner to be able to see high-definition pictures. And people who use the words "digital" and "high def" interchangeably could be in for a nasty surprise when they get their TV home: Not all digital TVs show high-definition programming. Other battles are slowing high-definition content's arrival in homes. A high-capacity successor to the DVD, for example, is needed before consumers can buy or rent high-definition movies. Already two competing technologies, dubbed Blu-ray and HD DVD, have divided the nascent market into warring camps. Determined to make sure the new disks aren't copied as easily as today's CDs and DVDs, movie studios, electronics companies and others are pondering an array of content-protection technologies. Because movies are more difficult to transfer than songs, video piracy hasn't hurt the major studios as badly as music piracy has hurt major record groups. But it has contributed to delays. "The threat is still vaguely theoretical," says Talal Shamoon, chief executive officer of InterTrust Technologies Corp., Sunnyvale, Calif., a pioneer in copyright-protection technology. "The good news is there is still time; the bad news is there is still time." In home networking, electronics makers' tendency to go their own way has led to a muddle of competing standards that could mean a "networked" Sony TV, for instance, wouldn't talk to a PC from Toshiba Corp. Some Sony TVs came with software that let you access video or audio files on your PC -- as long as it was a Sony Vaio PC. Industry giants are slowly working out some of these challenges. One standard-setting group, the Digital Living Network Alliance, is working on standard specifications for connecting consumer-electronic devices and moving files between them. In content protection, industry giants such as IntelCorp. and Microsoft Corp. are backing a technology consortium known as AACS LA, for Advanced Access Content System Licensing Administrator. Another group, the Coral Consortium, favored by H-P, Philips NV and others, is trying to develop ways for different copyright-protection technologies to work together. "I think we are to the point where the forces are converging," says Steve Canepa, a vice president at International Business Machines Corp., which endorses the AACS LA effort. The sheer size of digital media files is another problem for consumers. Wireless networks haven't been fast and reliable enough to dependably move high-definition video around the house. A Silicon Valley start-up, Video54 Technologies Inc., is set to unveil a new antenna technology at the consumer-electronics show that can help steer wireless signals around obstacles in the home and deliver smooth video images. "We are ready to roll into production" with the technology, says Patrick Lo, chief executive officer of Netgear Inc., which makes wireless access devices. Interactive TV has faced similar obstacles. Television studios are working on prototypes of shows allowing fans to play games integrated into programming. But each satellite and cable operator has proprietary technology, based on remote controls or other devices users would use to interact with programs. So the studios must select one system to work with, or go through a laborious process of adapting their content for more than one. Cable companies are working on a single standard for interactive TV known as Open Cable Applications Platform. It would bring the five major cable companies onto the same page, but satellite systems still may develop their own programming, for competitive reasons. "This will be used as a very big corporate advantage among the operators, " says Scott Higgins, EchoStar's director of interactive programming. If proprietary interactive content is strong enough, "you will be stealing viewers from the competition." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jan 5 07:41:48 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 5 Jan 2005 10:41:48 -0500 Subject: Globalization and 'Contract Culture' Message-ID: Tech Central Station Globalization and 'Contract Culture' By Christopher Lingle Published 01/05/2005 It is obvious that the process of globalization inspires great disagreement concerning its nature and impact. Despite acts of terrorism and labor disputes that have marked this public discussion, one point of agreement is that this process is seemingly irresistible. A sober assessment of the merits of the arguments in this debate requires identifying some essential elements behind this momentum. One place to start is to discard an important misinterpretation. Globalization should not be confused with Westernization or Americanization of economies and cultures. Perhaps this muddled thinking arises from an observed sense of convergence towards certain norms or rules that are associated with Western cultures, especially concerning commercial considerations. Promoting this misconception adds to an unwelcome divisiveness. It also implicitly assigns a sense of domination or superiority of American or Western culture over others, itself a patently foolish assertion. The view offered here is that this convergence is a natural and evolutionary procedure. In this sense, global convergence arises from voluntary choices by citizens and their governments to engage in worldwide markets to achieve some individual and collective goals, including shared prosperity. Indeed, the overpowering nature that some observers find so troubling is actually the outcome of choices made by most other members of their own communities. In the end, the movement is towards the establishment of and guidance by the legal bounds that govern contracts. As will be argued, exposure to contracts has important impacts on cultures since it imposes greater accountability on businesses as well as governments. As such, globalization should not be viewed as the outcome of anonymous, outside and mysterious forces. Instead, an important source of globalizing influences in a local economy arises from choices made by most of ones' compatriots who prefer better or cheaper products that are imports rather than shoddy or higher priced ones produced locally. In this narrow interpretation, globalization can be seen as a universal application of democracy. Opposition to these results is tantamount to an elitist loathing of thy neighbor, or at least their choices. In all events, the spreading of the benefits of globalization depends upon how well markets function, because competitive markets are a force that empowers consumers and humbles producers. And well-functioning markets require and inspire a certain attitude towards agreements that can be identified as a "contract culture". A contract culture exists when all parties in an agreement are predictably treated as equals whenever there is a legal dispute or a need for interpretation of the conditions behind the pact. Markets both depend upon and set the stage for the emergence of a contract culture as well as providing an impetus for the emergence of a commercial morality and a wider application of trust. In turn, institutional frameworks evolve to reinforce and reward or punish actions in reference to the agreements and the legal institutions that support them. This convergence is inspired by globalization. While most may think that the discussion only involves private contracts concerning commercial transactions, it also covers social contracts like constitutions that specify duties and obligations of citizens and rulers. Markets inspire the development of a contract culture where the spirit of compromise becomes part of human interaction. In such a setting, equals are treated as equals just as unequals must also be treated as equals before the law. Governments or large corporations should not receive special treatment in the courts over individual citizens while domestic interests should not override those of foreign claimants. At the same time, interactions within a community where contracts are widely negotiated can bring about a greater appreciation for compromise and humility that might undermine future claims for authoritarian leadership. Viewed from this vantage point, capitalism and free markets are seen to provide a necessary underpinning for democracy's success rather than merely a sufficient one. It is through individualist-based institutions associated with and arising from markets that people exercise true self-ownership to pursue their own chosen goals. The importance of establishing a contract culture cuts deep. It is an intangible element in the measurement of growth factors, but it is certainly an essential element of the institutional framework for an active player in the global economy. Apart from promoting political stability due to greater fairness, the contract culture is also associated with "middle-class values" like the importance of education, thrift and moral values that promote hard work and honesty in contract fulfilment. Globalization can reduce some of the economic vagaries by eliminating some of the sources of recurrent crises. During periods of rapid economic growth, massive cash flows can compensate for some of the inconveniences arising from a weak adherence to contractual obligations. Once an economy reaches a certain level of maturity or begins to lose its comparative advantages, the importance of legal protections becomes clearer. It is the absence of such safety measures that induce investors to undertake reassessments that can lead to the sort of mass exoduses of capital like the one associated with the Asian crises that began in 1997. In many Asian countries, the dominance of autocratic rule led to an entrenchment of hierarchical power relations that retard the development of a local contract culture. Outside of some former British colonies, few Asian countries have an independent and competent judiciary that issue ruling based upon strict interpretations of a body of law concerning fulfilment of contracts that includes predictable bankruptcy proceedings. Yet the exposure to and pressures from the international marketplace will eventually pressure governments to adhere to the rule of law. Some opponents to globalization express legitimate concerns. Perhaps the most compelling objection is the fear of the dilution of local culture. Nonetheless, opening a community to global influences is most likely to reveal the strengths of those elements that are worth keeping and undercover weak points that might be given up. (It is worth noting that the Dutch have been deeply engaged in the globalization process for many centuries without losing their unique cultural identity.) An assessment of globalization should begin with the fact that it introduces a contract culture in association with the rule of law as the basis of a modern market-based economy. Although there will always be transition costs of such monumental changes, there are solid reasons to believe these will be exceeded by the benefits. Above all other benefits is the increased commercial and political accountability that offers greater protections to citizens and consumers. Christopher Lingle is Global Strategist for eConoLytics. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From alex at bofh.net.pl Wed Jan 5 03:23:26 2005 From: alex at bofh.net.pl (Janusz A. Urbanowicz) Date: Wed, 5 Jan 2005 12:23:26 +0100 Subject: Banks Test ID Device for Online Security In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050105112326.GI25156@syjon.fantastyka.net> On Tue, Jan 04, 2005 at 03:24:56PM -0500, Trei, Peter wrote: > R.A. Hettinga wrote: > > > Okay. So AOL and Banks are *selling* RSA keys??? > > Could someone explain this to me? > > No. Really. I'm serious... > > > > Cheers, > > RAH > > -------- > > The slashdot article title is really, really misleading. > In both cases, this is SecurID. In some cases this also may be VASCO DigiPass, which is system very similar to SecurID, only cheaper. This technology seems to be quite popular in Europe as couple banks in Poland routinely issue tokens, both VASCO and SecurID to their customers for online authorization, and the tokens are used both in password generation (as described in article) and challenge-response modes. Alex -- mors ab alto 0x46399138 From perry at piermont.com Wed Jan 5 15:08:31 2005 From: perry at piermont.com (Perry E. Metzger) Date: Wed, 05 Jan 2005 18:08:31 -0500 Subject: FreeBSD's urandom versus random Message-ID: Ian G writes: > While we're on the subject of /dev/[u]random, has anyone > looked at the new FreeBSD 5.3 version? Not the 5.3 version but I have looked a bit at earlier versions. I was pretty scared, frankly. The author gave a talk at a BSDCon where he displayed both a profound set of misunderstandings about what the papers he had read meant and an extremely strong amount of arrogance. Among other things, he claimed that Schneier and Co. had proven the security of Yarrow (which of course they never had claimed), and that his changes to Yarrow made it better (very dubious). He also obviously didn't understand crypto very well. I wouldn't have minded so much if he hadn't been extremely belligerent about defending his beliefs. Anyway, after the talk I took a look at the code, and I didn't feel very comfortable with it. It has been too many years now for me to remember specifics, and it may have been changed a lot in the interim -- in any case, you may want to examine it if you are contemplating using it in something where it would be dangerous not to have very solid random numbers available. FreeBSD has some other crypto toys that I'm dubious about. It now has a crypto file system widget that uses a bunch of odd ad hoc modes invented by the author. Some quick analysis shows that most of the complexity they add does not add actual cryptographic strength and does add possible attack vectors, which is worrisome. I'm always against attempting to be clever under such circumstances, but a lot of people don't seem to have the same fear of innovating in cryptography without very careful analysis that I do. It also doesn't protect very well against brute forcing of the file system passphrase, which is (in most cases) the likely way people will break such a thing. (Actually the author claims that you would have to do tremendous disk i/o to break the passphrase, but you can do a time/space tradeoff with RAM that bypasses his hack.) None of this should say that I'm entirely comfortable with the security of, say, NetBSD's /dev/random. Even though I should have, I've never properly audited the whole thing, which is more than mildly embarrassing. Shades of the shoemaker's children and such. For all I know, we've got big flaws, too. Perry --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jan 5 15:16:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 5 Jan 2005 18:16:51 -0500 Subject: FreeBSD's urandom versus random Message-ID: --- begin forwarded text From lynn at garlic.com Wed Jan 5 22:46:32 2005 From: lynn at garlic.com (Anne & Lynn Wheeler) Date: Wed, 05 Jan 2005 23:46:32 -0700 Subject: Banks Test ID Device for Online Security In-Reply-To: <20050105032142.7E8D4F2CB@red.metdow.com> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> <20050105032142.7E8D4F2CB@red.metdow.com> Message-ID: <41DCDEC8.4000902@garlic.com> Bill Stewart wrote: > Yup. It's the little keychain frob that gives you a string of numbers, > updated every 30 seconds or so, which stays roughly in sync with a server, > so you can use them as one-time passwords > instead of storing a password that's good for a long term. > > So if the phisher cons you into handing over your information, > they've got to rip you off in nearly-real-time with a MITM game > instead of getting a password they can reuse, sell, etc. > > That's still a serious risk for a bank, > since the scammer can use it to log in to the web site > and then do a bunch of transactions quickly; > it's less vulnerable if the bank insists on a new SecurID hit for > every dangerous transaction, but that's too annoying for most customers. in general, it is "something you have" authentication as opposed to the common shared-secret "something you know" authentication. while a window of vulnerability does exist (supposedly something that prooves you are in possession of "something you have"), it is orders of magnitude smaller than the shared-secret "something you know" authentication. there are two scenarios for shared-secret "something you know" authentication 1) a single shared-secret used across all security domains ... a compromise of the shared-secret has a very wide window of vulnerability plus a potentially very large scope of vulnerability 2) a unique shaerd-secret for each security domain ... which helps limit the scope of a shared-secret compromise. this potentially worked with one or two security domains ... but with the proliferation of the electronic world ... it is possible to have scores of security domains, resulting in scores of unique shared-secrets. scores of unique shared-secrets typically results exceeded human memory capacity with the result that all shared-secrets are recorded someplace; which in turn becomes a new exploit/vulnerability point. various financial shared-secret exploits are attactive because with modest effort it may be possible to harvest tens of thousands of shared-secrets. In one-at-a-time, real-time social engineering, may take compareable effort ... but only yields a single piece of authentication material with a very narrow time-window and the fraud ROI might be several orders of magnitude less. It may appear to still be large risk to individuals ... but for a financial institution, it may be relatively small risk to cover the situation ... compared to criminal being able to compromise 50,000 accounts with compareable effort. In some presentation there was the comment made that the only thing that they really needed to do is make it more attactive for the criminals to attack somebody else. It would be preferabale to have a "something you have" authentication resulting in a unique value ... every time the device was used. Then no amount of social engineering could result in getting the victim to give up information that results in compromise. However, even with relatively narrow window of vulnerability ... it still could reduce risk/fraud to financial institutions by several orders of magnitude (compared to existing prevalent shared-secret "something you know" authentication paradigms). old standby posting about security proportional to risk http://www.garlic.com/~lynn/2001h.html#61 From mv at cdc.gov Thu Jan 6 06:45:22 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 06 Jan 2005 06:45:22 -0800 Subject: California Bans a Large-Caliber Gun, and the Battle Is On Message-ID: <41DD4F02.4E22D74@cdc.gov> At 09:53 AM 1/4/05 -0500, R.A. Hettinga wrote: >Terri Carbaugh, a spokeswoman for the governor, said Mr. Schwarzenegger, a >Republican, had made his position clear during his campaign. > > "It's a military-type weapon," Ms. Carbaugh said of the .50 BMG, "and he >believes the gun presents a clear and present danger to the general public." Ms C has earned herself a few hundred footpounds, or a few meters of rope and tree-rental. The Constitution explicitly protects our right to bear military (not animal-hunting) arms. ------ An RPG a day keeps the occupiers away. From mv at cdc.gov Thu Jan 6 07:02:21 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 06 Jan 2005 07:02:21 -0800 Subject: Technology vs social solutions Message-ID: <41DD52FD.97C702E2@cdc.gov> At 12:06 PM 1/4/05 -0500, John Kelsey wrote: >>From: "Major Variola (ret)" >>3. Homebrew warning systems will face the same problems as eg pro >>volcano warning systems: too many false alarms and no one cares. > >The best defense would seem to be a population with a lot of TVs and radios. At least after the first tsunami hit, the news would quickly spread, and there were several hours between when the waves arrived at different shores. (And a 9.0 earthquake on the seafloor, or even a 7.0 earthquake on the seafloor, is a rare enough event that it's not crazy to at least issue a "stay off the beach" kind of warning.) Actually, people should know this as *background* in the same way that you know not to stand in open fields during lightening, play with downed powerlines, or walk into tail rotors. I think some places have signs pointing to higher elevations, with wave-glyphs. I know that FLA has signs like that for hurricane storm-surges, and there are tornado signs in the midwest. The rational explanation, I suppose, is that tsunami are so rare that the knowledge is not maintained. (How many 'Merkins would know how to construct a nukebomb shelter these days? How many SoCal'ians know how to drive on icy roads?) Of course, broadcast media are used to tell people the obvious, eg don't play in channellized rivers during storms, and the evolution of the species suffers slightly but not entirely from the caveats. From mv at cdc.gov Thu Jan 6 07:12:13 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 06 Jan 2005 07:12:13 -0800 Subject: sitting ducks Message-ID: <41DD554C.31B05332@cdc.gov> At 12:16 PM 1/4/05 -0500, John Kelsey wrote: >Interesting questions: How hard is it for someone to actually hit an airplane with a rifle bullet? How often do airplane maintenance people notice bulletholes? > >My understanding is that a single bullethole in a plane is not likely to do anything serious to its operation--the hole isn't big enough to depressurize the cabin of a big plane, and unless it hits some critical bits of the plane, it's not going to cause mechanical problems. FWIW Recall that a few 'copters have been taken down with AK fire, though the birds/round is likely low. And copters are more delicate than a multi-engined fixed wing. Hitting the cabin would be pretty effective though. And certain parts of big planes are vital, perhaps moreso on fly by wire Airbus planes. A homemade mortar through the roof of your van (IRA style) onto a stationary, taxiing plane would be pretty spectacular, sitting ducks... lots of cameras... easy getaway or repeat fire.. Of course the BMG crap is all about eroding rights, not reality. From jrandom at i2p.net Thu Jan 6 08:45:23 2005 From: jrandom at i2p.net (jrandom) Date: Thu, 6 Jan 2005 08:45:23 -0800 Subject: [i2p] 0.4.2.6 is available Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, time for a new update The 0.4.2.6 release has a whole slew of bug fixes, reliability improvements, and bundles Ragnarok's addressbook as a client application. The release is backwards compatible and should not be too disruptive, so upgrade when you get the chance. As mentioned in the weekly status notes [1], the addressbook essentially just automates the anonymous fetching and merging of hosts.txt files from locations of your choosing (defaults being http://duck.i2p/hosts.txt and http://dev.i2p/i2p/hosts.txt). More details can be found on Ragnarok's site [2], and the source is in cvs [3]. If you don't have the addressbook installed already, you have no additional work to do. However, if you previously installed the addressbook and manually wired it to run in your router (through the lines in clients.config and a reference to the .jar file in wrapper.config), you will need to remove those. Existing addressbook configuration and data files will be honored if they are located in the default addressbook/ directory. [1] http://dev.i2p.net/pipermail/i2p/2005-January/000541.html [2] http://ragnarok.i2p/ [3] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/apps/addressbook/ Anyway, thats that. The full list of updates in the release can be found in the usual place [4], and upgrading uses the same process as before [5]. [4] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/history.txt?rev=HEAD [5] http://www.i2p.net/download =jr jrandom at iggy:~/dev/i2p_0_4_2_6_dist$ openssl sha1 * SHA1(i2p-0.4.2.6.tar.bz2)= 2e66927bbcff6fbbedcd58d3a3382f20b98e8f79 SHA1(i2p.tar.bz2)= ddb2c45f2c52b266d6794d7e1ae7b4648e697ce7 SHA1(i2pupdate.zip)= 7a4547d391166d0886a3cee502889e568cf77677 SHA1(i2pinstall.jar)= a71dc5c64fb5a990d1893b8ae5dfd48ba2c9a3b6 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB3WoCGnFL2th344YRAmK9AJ0TumNsfz1llb2Te8nMNuvSdXShvACg996G KWe+IxvsPxG2zfVZcTxZTvQ= =GXbq -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From lindac at dimacs.rutgers.edu Thu Jan 6 08:11:50 2005 From: lindac at dimacs.rutgers.edu (Linda Casals) Date: Thu, 6 Jan 2005 11:11:50 -0500 (EST) Subject: DIMACS Workshop on Information Markets, NJ Feb 2-4 2005 Message-ID: Announcement and Call For Participation ********************************************************************* DIMACS Workshop on Information Markets February 2-4, 2005 DIMACS Center, Rutgers University, Piscataway, NJ http://dimacs.rutgers.edu/Workshops/Markets/ Organizers: Robin Hanson, George Mason University, rhanson -AA at TT- gmu.edu John Ledyard, California Institute of Technology, jledyard -AA at TT- hss.caltech.edu David Pennock, Yahoo! Research Labs, pennockd -AA at TT- yahoo-inc.com Presented under the auspices of the Special Focus on Computation and the Socio-Economic Sciences ********************************************************************* A market designed for information gathering and forecasting is called an information market. Information markets can be used to elicit a collective estimate of the expected value or probability of a random variable, reflecting information dispersed across a population of traders. The degree to which market forecasts approach optimality in practice, or at least surpass other known methods of forecasting, is remarkable. Supporting evidence can be found in empirical studies of options markets, commodity futures markets, political stock markets, sports betting markets, horse racing markets, market games, laboratory investigations of experimental markets, and field tests. In nearly all these cases, market prices reveal a reliable forecast about the likely unfolding of future events, often beating expert opinions or polls. Despite a growing theoretical and experimental literature, many questions remain regarding how best to design, deploy, analyze, and understand information markets, including both technical challenges and social challenges. This workshop will include talks on information markets by a number of distinguished invited speakers. Speakers will cover a range of topics including mechanism design, experiments, analysis, policy, and industry experience. Speakers will include representatives from academia, industry, and government. The workshop will feature research talks, opinions, reports of industry experience, and discussion of government policy from the perspective of a number of fields, including economics, business, finance, computer science, gambling/gaming, and policy. See the workshop program for more details: http://dimacs.rutgers.edu/Workshops/Markets/program.html The workshop will feature a tutorial session on Wednesday afternoon (Feb. 2, 2005) to help those new to the field get up to speed. The workshop will include a panel discussion on the Policy Analysis Market (a.k.a., "Terror Futures") and a "rump" session where anyone who requests time can have the floor for five minutes to speak on any relevant topic. To participate in the rump session, please email David Pennock: pennockd --AA at TT- yahoo-inc.com. ********************************************************************* Registration Fees: (Pre-registration deadline: January 26, 2005) Please see website for additional registration information. ********************************************************************* Information on participation, registration, accomodations, and travel can be found at: http://dimacs.rutgers.edu/Workshops/Markets/ **PLEASE BE SURE TO PRE-REGISTER EARLY** --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From js at joergschneider.com Thu Jan 6 02:44:02 2005 From: js at joergschneider.com (Joerg Schneider) Date: Thu, 06 Jan 2005 11:44:02 +0100 Subject: AOL Help : About =?ISO-8859-1?Q?AOL=AE_PassCode?= In-Reply-To: <87pt0k6dn1.fsf@deneb.enyo.de> References: <41DB001B.2060308@systemics.com> <87pt0k6dn1.fsf@deneb.enyo.de> Message-ID: <41DD1672.2070207@joergschneider.com> Florian Weimer wrote: > I think you can forward the PassCode to AOL once the victim has > entered it on a phishing site. Tokens ` la SecurID can only help if Indeed. > the phishing schemes *require* delayed exploitation of obtained > credentials, and I don't think we should make this assumption. Online > MITM attacks are not prevented. So, PassCode and similar forms of authentication help against the current crop of phishing attacks, but that is likely to change if PassCode gets used more widely and/or protects something of interest to phishers. Actually I have been waiting for phishing with MITM to appear for some time (I haven't any yet - if somebody has, I'd be interested to hear about), because it has some advantages for the attacker: * he doesn't have to bother to (partially) copy the target web site * easy to implement - plug an off-the-shelf mod_perl module for reverse proxy into your apache and add 10 minutes for configuration. You'll find the passwords in the log file. Add some simple filters to attack PassCode. * more stealthy, because users see exactly, what they are used to, e.g. for online banking they see account balance etc. To attack money transfers protected by PassCode, the attacker could substitute account and amount and manipulate the server response to show what was entered by user. Assuming that MITM phishing will begin to show up and agreeing that PassCode over SSL is not the solution - what can be done to counter those attacks? Mutual authentication + establishment of a secure channel should do the trick. SSL with client authentication comes to my mind... From rah at shipwright.com Thu Jan 6 08:47:57 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 6 Jan 2005 11:47:57 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: Ah... Book-entry to the trigger. The ganglia, as the man said, twitch. Whole new meaning to digital "rights" management. Cheers, RAH ------- The New York Times January 6, 2005 WHAT'S NEXT Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire By ANNE EISENBERG HE computer circuits that control hand-held music players, cellphones and organizers may soon be in a new location: inside electronically controlled guns. Researchers at the New Jersey Institute of Technology in Newark are building a handgun designed to fire only when its circuitry and software recognize the grip of an authorized shooter. Sensors in the handle measure the pressure the hand exerts as it squeezes the trigger. Then algorithms check the shooter's grip with stored, authorized patterns to give the go-ahead. "We can build a brain inside the gun," said Timothy N. Chang, a professor of electrical engineering at the New Jersey Institute of Technology who devised the hardware for the grip-recognition system. "The technology is becoming so cheap that we can have not just a computer in every home, but a computer in every gun." The main function of the system is to distinguish a legitimate shooter from, for example, a child who comes upon a handgun in a drawer. Electronics within the gun could one day include Global Positioning System receivers, accelerometers and other devices that could record the time and direction of gunfire and help reconstruct events in a crime investigation. For a decade, researchers at many labs have been working on so-called smart or personalized handguns designed to prevent accidents. These use fingerprint scanners to recognize authorized shooters, or require the shooter to wear a small token on the hand that wirelessly transmits an unlocking code to the weapon. At the New Jersey Institute of Technology, Michael L. Recce, an associate professor in the department of information systems, decided instead to concentrate on the shooter's characteristic grip. Dr. Recce created the software that does the pattern recognition for the gun. Typically, it takes one-tenth of a second to pull a trigger, Dr. Recce said. While that is a short period, it is long enough for a computer to match the patterns and process the authorization. To bring Dr. Recce's recognition software to life, Dr. Chang created several generations of circuits using off-the-shelf electronic components. He equipped the grips of real and fake handguns with sensors that could generate a charge proportional to the pressure put on them. The pressure on the grip and trigger are read during the beginning of the trigger pull. The signals are sent to an analog-to-digital converter so that they can be handled by the digital signal processor. Patterns of different users can be stored, and the gun programmed to allow one or more shooters. At first the group worked mainly with a simulated shooting range designed for police training. "You can't have guns in a university lab," Dr. Recce said. The computer analysis of hand-pressure patterns showed that one person's grip could be distinguished from another's. "A person grasps a tennis racket or a pen or golf club in an individual, consistent way," he said. "That's what we're counting on." During the past year, the team has moved from simulators to tests with live ammunition and real semiautomatic handguns fitted with pressure sensors in the grip. For five months, five officers from the institute's campus police force have been trying out the weaponry at a Bayonne firing range. "We've been going once a month since June," said Mark J. Cyr, a sergeant in the campus police. "I use a regular 9-millimeter Beretta weapon that fires like any other weapon; it doesn't feel any different." For now, a computer cord tethers the gun to a laptop that houses the circuitry and pattern-recognition software. In the next three months, though, Dr. Chang said, the circuits would move from the laptop into the magazine of the gun. "All the digital signal processing will be built right in," he said. Michael Tocci, a captain in the Bayonne Police Department, recently saw a demonstration of the technology. One shooter was authorized, Captain Tocci said. When this person pulled the trigger, a green light flashed. "But when other officers picked up the gun to fire, the computer flashed red to register that they weren't authorized," he said. The system had a 90 percent recognition rate, said Donald H. Sebastian, senior vice president for research and development at the institute. "That's better fidelity than we expected with 16 sensors in the grip," Dr. Sebastian said. "But we'll be adding more sensors, and that rate will improve." Dr. Chang said the grip for the wireless system would have 32 pressure sensors. "Now, in the worst case, the system fails in one out of 10 cases," he said. "But we've already seen that with the new sensor array, the recognition is much higher." Dr. Sebastian said the team was considering adding palm recognition as a backup. To develop a future weapon, the university is working with a ballistics research and development company, Metal Storm, of Arlington, Va. "We'll use our recognition system on their weapons platform," Dr. Sebastian said. The Metal Storm gun has plenty of room for the pattern-recognition circuitry. Rounds are kept in the gun's barrel, not in a magazine in the grip. There is a small amount of the gun's own electronic circuitry in the handle to control the firing, said Arthur Schatz, senior vice president for operations at the company. "Otherwise it's pretty much empty, allowing the grip system to be housed within the handle," he said. Captain Tocci of the Bayonne Police Department said the pattern-recognition technology was promising, particularly because accidental deaths occur when guns are not safely stored. "If a child picks up a gun that is not secured, this way it can't be fired," he said. Guns taken from a home during a robbery would be rendered useless, too. "The premise the gun is based on has credibility," he said. When people see a live demonstration of the pattern-recognition system working, he said, "you think, yes, this is possible." E-mail: Eisenberg at nytimes.com Copyrigh -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Thu Jan 6 11:53:06 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 06 Jan 2005 11:53:06 -0800 Subject: Spaf's mailing list on information assurance/security, cybercrime Message-ID: <6.0.3.0.0.20050106115204.03b4ea70@pop.idiom.com> ------ Forwarded Message From: Gene Spafford Date: Wed, 05 Jan 2005 15:06:18 -0500 To: Subject: mailing list announcement for IP I have created the mailing list "ias-opportunities at cerias.purdue.edu" for distributing announcements of funding opportunities, conference and journal calls, and similar solicitations specifically about issues of information assurance, information security, and cybercrime-related issues. This is not limited to academics -- these announcements should be of interest as well to people in government and industry. Members of the list can send announcements such as the above to the list. Non-members can send announcements to "ias-opportunities-submit at cerias.purdue.edu" for posting. If you are interested in subscribing to the list, send email to "ias-opportunities-request at cerias.purdue.edu" with the message subscribe If you want to subscribe an address other than the one from which you send the email, use the message subscribe This list is for announcements only -- not discussions, and should be low-volume. A WWW-archive of posts is available at . Cheers, --spaf ------ End of Forwarded Message From eugen at leitl.org Thu Jan 6 03:03:56 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Jan 2005 12:03:56 +0100 Subject: Banks Test ID Device for Online Security In-Reply-To: <41DC2724.809@opencs.com.br> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BE6@rsana-ex-hq1.NA.RSA.NET> <20050105032142.7E8D4F2CB@red.metdow.com> <41DC2724.809@opencs.com.br> Message-ID: <20050106110356.GN9221@leitl.org> On Wed, Jan 05, 2005 at 02:43:00PM -0300, Mads Rasmussen wrote: > Here in Brazil it's common to ask for a new pin for every transaction Ditto in Germany, when PIN/TAN method is used. There's also HBCI-based banking, which either uses keys living in filesystems, or smartcards -- this one doesn't need TANs. Gnucash and aqmoney/aqmoney2 can do HBCI, even with some smartcards. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Thu Jan 6 09:06:40 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 06 Jan 2005 12:06:40 -0500 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: <41DD4F02.4E22D74@cdc.gov> Message-ID: Well, I used to be pro gun-control prior to the Patriot Act. Guess the Patriot Act made me something of a Patriot. And come to think of it, "Bowling for Columbine" has the accidental affect of making it clear that Guns themselves are not the problem in the US. -TD >From: "Major Variola (ret)" >To: "cypherpunks at al-qaeda.net" >Subject: Re: California Bans a Large-Caliber Gun, and the Battle Is On >Date: Thu, 06 Jan 2005 06:45:22 -0800 > >At 09:53 AM 1/4/05 -0500, R.A. Hettinga wrote: > >Terri Carbaugh, a spokeswoman for the governor, said Mr. >Schwarzenegger, a > >Republican, had made his position clear during his campaign. > > > > "It's a military-type weapon," Ms. Carbaugh said of the .50 BMG, "and >he > >believes the gun presents a clear and present danger to the general >public." > >Ms C has earned herself a few hundred footpounds, or a few meters of >rope >and tree-rental. The Constitution explicitly protects our right to bear > >military (not animal-hunting) arms. > >------ >An RPG a day keeps the occupiers away. From roy at rant-central.com Thu Jan 6 09:30:04 2005 From: roy at rant-central.com (Roy M. Silvernail) Date: Thu, 06 Jan 2005 12:30:04 -0500 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: References: Message-ID: <41DD759C.6070301@rant-central.com> Tyler Durden wrote: > And come to think of it, "Bowling for Columbine" has the accidental > affect of making it clear that Guns themselves are not the problem in > the US. What leads you to believe that was accidental? -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT SpamAssassin->procmail->/dev/null->bliss http://www.rant-central.com From iang at systemics.com Thu Jan 6 05:10:31 2005 From: iang at systemics.com (Ian G) Date: Thu, 06 Jan 2005 13:10:31 +0000 Subject: AOL Help : About =?ISO-8859-1?Q?AOL=AE_PassCode?= In-Reply-To: <41DD1672.2070207@joergschneider.com> References: <41DB001B.2060308@systemics.com> <87pt0k6dn1.fsf@deneb.enyo.de> <41DD1672.2070207@joergschneider.com> Message-ID: <41DD38C7.7070505@systemics.com> Joerg Schneider wrote: > So, PassCode and similar forms of authentication help against the > current crop of phishing attacks, but that is likely to change if > PassCode gets used more widely and/or protects something of interest > to phishers. > > Actually I have been waiting for phishing with MITM to appear for some > time (I haven't any yet ... By this you mean a dynamic, immediate MITM where the attacker proxies through to the website in real time? Just as a point of terms clarification, I would say that if the attacker collects all the information by using a copy of the site, and then logs in later at leisure to the real site, that's an MITM. (If he were to use that information elsewhere, so for example creating a new credit arrangement at another bank, then that technically wouldn't be an MITM.) Perhaps we need a name for this: real time MITM versus delayed time MITM? Batch time MITM? > Assuming that MITM phishing will begin to show up and agreeing that > PassCode over SSL is not the solution - what can be done to counter > those attacks? The user+client has to authenticate the server. Everything that I've seen over the last two years seems to fall into that one bucket. > Mutual authentication + establishment of a secure channel should do > the trick. SSL with client authentication comes to my mind... Maybe. But that only addresses the MITM, not the theft of user information. -- News and views on what matters in finance+crypto: http://financialcryptography.com/ From ptrei at rsasecurity.com Thu Jan 6 11:20:53 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 6 Jan 2005 14:20:53 -0500 Subject: sitting ducks Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776BF3@rsana-ex-hq1.NA.RSA.NET> Major Variola (ret) wrote: > > At 12:16 PM 1/4/05 -0500, John Kelsey wrote: > >Interesting questions: How hard is it for someone to actually > hit an airplane with a rifle bullet? How often do airplane > maintenance people notice bulletholes? > > > >My understanding is that a single bullethole in a plane > is not likely to do anything serious to its operation--the > hole isn't big enough to depressurize the cabin of a big > plane, and unless it hits some critical bits of the plane, > it's not going to cause mechanical problems. > FWIW Recall that a few 'copters have been taken down with > AK fire, though the birds/round is likely low. And copters > are more delicate than a multi-engined fixed wing. It appears that the Iraqi resistance fighters figured out that of several of them simultaneously fire full-auto AK's in front of a chopper flying overhead, sometimes they'll get lucky. Of course, these are low, slow targets. We're discussing a terrorist trying to take out a commercial jet with a 50 BMG, right? Even at takeoff, a passenger jet is moving at 150-200 mph, a *lot* faster than a clay pigeon, or the choppers the Iraqis hit. > Hitting the cabin would be pretty effective though. And > certain parts of big planes are vital, perhaps moreso > on fly by wire Airbus planes. I understand that there is redundancy in the critical components. Hitting the pilot AND copilot at takeoff would probably be effective, but you've got one (1) shot before its out of range, and its moving fast. A tracer into a fuel tank may also be effective. > A homemade mortar through the roof of your van > (IRA style) onto a stationary, taxiing plane > would be pretty spectacular, sitting ducks... > lots of cameras... easy getaway or > repeat fire.. But that's not the 50 BMG scenario. The most effective way to use the 50 BMG would probably be to hit an engine intake rotor while the jet is still on the ground, starting its takeoff roll. This probably won't kill anyone, but would have a big economic impact as people decided not to fly. ...but that's still a damn difficult shot. The target is moving, the bullet has non-trivial flight time (well over a second at long range). Getting a first shot hit is highly improbable. All in all, the 50 BMG vs jet scenario is just plain bogus. > Of course the BMG crap is all about eroding > rights, not reality. I honestly don't think that many politicians wake up in the morning and think to themselves 'What rights can I erode today?'. I think it's more 'what can I do that will make me *look* good?' . It doesn't matter if their action is actually effective, it matters that it makes them appear to be 'doing something' and makes for a good 5 second sound bite. 50 BMG rifles are used, very rarely, for hunting. For an example, see: http://www.fcsa.org/articles/1994-1/elk_hunt.html More people are into very long range (1000 yard and up) target shooting. Those are the only 'legitimate' civilian reasons to use a 50 BMG. It's like owning a McLaren F1 - you can't use it much, but its very, very, cool. As a result, it's difficult for most people to come up with a justification to own one beyond 'because it's very, very cool'. [I'm deliberately leaving aside the 2A rights issue (which in a better world would be then end of the argument) since it doesn't seem to get much traction with most politicians or sheeple any more]. 50BMG rifles look very, very, tactical. I've never seen one with a walnut stock. They are the canonical 'scary looking gun'. So, the politician sees a type of gun: * Which theoreticly could be used to do Very Bad Things. * Owned by a group of people too small to be significant voting block. * For which its difficult to come up with a practical use. * Which looks very photogenicly scary. ...and he or she thinks 'Wow, a lot of people will feel safer it I ban these, and I can make them think I'm protecting them. Also, getting on TV with one of these is a great visual.' Actual reality doesnt enter it. Peter Trei From rsw at jfet.org Thu Jan 6 13:16:57 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Thu, 6 Jan 2005 15:16:57 -0600 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: <41DD759C.6070301@rant-central.com> References: <41DD759C.6070301@rant-central.com> Message-ID: <20050106211657.GA18325@positron.jfet.org> "Roy M. Silvernail" wrote: > What leads you to believe that was accidental? Most likely the fact that Michael Moore is pro-gun control. It shows a certain level of cognitive dissonance to say "guns aren't the problem! Ban guns!" Of course, in Michael Moore's case, that level of dissonance was long ago demonstrated (and surpassed). -- Riad S. Wahby rsw at jfet.org From meltsner at gmail.com Thu Jan 6 14:32:36 2005 From: meltsner at gmail.com (Ken Meltsner) Date: Thu, 6 Jan 2005 16:32:36 -0600 Subject: [FoRK] Hamachi "mediated" peer-to-peer sounds interesting Message-ID: Basically, a way to get around NAT and other router issues for a peer-to-peer system, mostly seamlessly integrated as a special network driver. Systems connect to a back end server which relays traffic between peers on named private networks. Sort of P2P meets VPN -- if they added HTTPS tunneling, it would run through nearly any corporate firewall/proxy server. No magic, as far as I can tell, but apparently a decent piece of work. I like the named private network capability in principle. Ken Meltsner Excerpt from http://www.hamachi.cc/security showing a sound approach (I think) to security, including public key exchange: The Framework A Hamachi system is comprised of backend servers and end-node peer clients. Server nodes track client's locations and provide mediation services required for establishing direct peer-to-peer tunnels between client nodes. When the client is activated, it establishes TCP connection to one of the mediation servers and starts speaking Hamachi protocol to log itself in and synchronize with other clients. The rest of the document deals with security provisions of this protocol, which ensure both privacy and authentication of client-server and client-client communications. Client Identity A Hamachi client is identified by its Hamachi network addresses. The address is assigned the first time the client connects to the mediation servers and it stays the same for as long as client's account exists in the system. The client also generates an RSA key pair, which is used for authentication purposes during login sequence. The public key is passed to the server once - during the first connection when creating new account. To perform regular login, the client submits its identity and uses private key to sign server's challange as described below. The server verifies the signature and this authenticates the client. Server Identity Each Hamachi server owns an RSA keypair. The public key is distributed with client's installation package and thus it is known to the client prior to the first contact. When the client connects to the server, it announces which identity he expects the server to have. If the server has requested identity, the login sequence commences. In the last message of this sequence the server sends a signature of client's data and this confirms server's identity to the client. Message Security The first thing that happens after the client connects to the server is a key exchange. This exchange produces keying material used for encrypting and authenticating all other protocol messages. Messages are encrypted with symmetric cipher algorithm and authenticated with MAC. Every message is also uniquely numbered to prevent replay attacks. Crypto Suite Crypto suite specifies exact algorithms and their parameters used for performing key exchange, key derivation and message encryption. Default crypto suite is defined as follows - DH group - 2048-bit MODP group from RFC 3526 Message encryption - AES-256-CBC using ESP-style padding Message authentication - 96-bit version of HMAC-SHA1 Protocol Details HELO Client connects to the server and sends HELO message: HELO CryptoSuite ServerKfp Ni Gi CryptoSuite is 1 for default crypto suite, ServerKfp is OpenSSH-style fingerprint of expected server public key, Ni and Gi are client's 1024-bit nonce and public DH exponent. If the server has a public key that matches ServerKfp, it replies with: HELO OK Nr Gr where Nr and Gr are server's nonce and public DH exponent. KEYMAT At this point both server and client can compute shared DH secret and generate keying material as follows - KEYMAT = T1 | T2 | T3 | ... T1 = prf (K, Ni | Nr | 0x01) T2 = prf (K, T1 | Ni | Nr | 0x02) T3 = prf (K, T2 | Ni | Nr | 0x03) ... where K is a shared DH secret, and prf is HMAC-SHA1. All subsequent protocol messages are encrypted with the Ke key and authenticated using the Ka key. Ke and Ka are taken from KEYMAT. In case of default crypto suite Ke uses first 256 bits of KEYMAT, and Ka - next 160 bits. Message Protection Prior to encrypting protocol message the sender pads it to the size of cipher block (16 bytes with default crypto suite) using ESP padding. The message is then encrypted and prepended with a message ID, which is a monotonically increasing 32 bit number. As the last step HMAC is generated over the whole message (ID and encrypted data), appended at the end and the message is sent out. Above message protection scheme is consistent with those employed by TLS, IKE/IPsec. AUTH The client logs into the system by sending AUTH message: AUTH Identity Signature(Ni | Nr | Gi | Gr, Kp_cli) where Identity is client's 32-bit Hamachi address and Signature is a concatenation of nonces and public DH exponents encrypted with client's private key. The server uses Id to locate client's account, obtains its public key and verifies the signature. If the signature is correct, the server replies with: AUTH OK Signature(Nr | Ni | Gr | Gi, Kp_srv) where Signature is created using server's private key that matches ServerKfp from HELO message. Peer to peer traffic When two Hamachi clients start talking to each other, they employ the same message protection as when talking to the server. Currently clients do not perform the key exchange of their own, they use keying material provided by the server instead. This keying mechanism is used on temporary basis and will only be available during beta testing. The production release will have clients obtaining KEYMAT through their own key exchange using each other's RSA keys for authentication. _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Thu Jan 6 16:55:53 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 6 Jan 2005 19:55:53 -0500 Subject: DIMACS Workshop on Information Markets, NJ Feb 2-4 2005 Message-ID: --- begin forwarded text From rah at shipwright.com Thu Jan 6 18:07:55 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 6 Jan 2005 21:07:55 -0500 Subject: Clean Money, Dirty Conscience: Are some Americans guilty of banking while Muslim? Message-ID: Reason magazine December 28, 2004 Clean Money, Dirty Conscience Are some Americans guilty of banking while Muslim? Jeff Taylor The headline grabbing quirkiness of Yasser Arafat's investment in the American bowling industry demonstrates that true global connectedness remains a scary thing. Such financial scorekeeping-whose money, what money, where-is a pointless exercise in an age when funds can circle the Earth in a second and mutate several times along the trip. The clean money, dirty money, blood money obsession would be quaint were it not for the tremendous burden the pursuit of money laundering places on innocent people just trying to enjoy the immense benefits of a modern financial system. The PATRIOT Act's veil of secrecy is beginning to bite in this regard without any evidence that the United States is made safer in the bargain. Some Middle Eastern-surnamed individuals in the U.S. now report an unwillingness on the part of some banks to do business with them based on government money laundering/anti-terror regulations. In fact, while other parts of the PATRIOT Act initially drew fire, Section 314 glided by, largely overlooked by everyone except the bankers. As it turns out, Section 314 is a ticking time-bomb for anyone a buttoned-down banker might consider suspicious. This section requires banks and other federal regulated financial institutions to comply with government requests for information on customers. As with other parts of PATRIOT, Section 314 built upon other long-standing federal bank regs, allowing PATRIOT boosters to use their tired Officer Barbrady "this is nothing out of the unusual" defense of the provision. But Section 314 anticipated and sanctioned a much larger number of information requests in a much shorter period of time, increasing the cost of compliance to banks. Indeed, the initial crush of information requests from the government in September 2002 was so great that the banks won a temporary suspension of the requests. Banks thought they had a much firmer grasp of what to do with Section 314 requests when they resumed in February 2003. However, the catch remained that banks are supposed to comply with Section 314 requests quickly and accurately, divulging no information to anyone about them, and then promptly forget all about the requests. In particular, if an information request for a Joe Terror comes in, and Podunk Bank has no records of a Joe Terror as a customer, the law directs Podunk Bank to do nothing. This practice does avoid flooding the reporting system with replies that say, "yes, we have no Joe Terror," but leaves Podunk Bank with the queasy feeling that it responded to federal regulators by doing nothing. This is not in the nature of bankers. If the feds dropped in, particularly a suit from the criminal section of the Treasury Department, and suggested a change in the color of the balloons in the lobby, there would not be a whole lot of discussion as to why. Banks comply; that is why they are banks. So rather than risk the wrath of regulators, banks very quickly hit upon the idea of keeping names submitted on Section 314 requests on their do-not-do-business-with lists. All banks have them and the lists are perfectly legal. After all, some customers-bad credit risks, chronic check bouncers-may just be more trouble than they are worth. Putting 314-requested names on the list would at least create a paper trail should the feds someday request one and remove a troublesome class of customer from bank rolls to boot. This brings us to the question of the day: Has Section 314 made all Muslim-surnamed customers, or even more broadly, those of Middle Eastern descent in general, more trouble than they are worth to American banks? The American Civil Liberties Union says it has dozens of complaints involving financial institutions denying services to Muslims. A recent case involves a Mississippi man who was suddenly told by his bank that his account had been closed. No explanation was given for the action. Interestingly, however, the bank, AmSouth, recently was fined $40 million by the Treasury for failure to comply with reporting regulations involving money laundering. It is certainly true that the more Middle Eastern names a bank has on record, the more likely it is to be forced to complete Section 314 information requests. The more requests you get, the more likely you are to screw one up and get walloped with a fine. Why not lighten that load and reduce that risk by cutting back on "trigger" names? The logic is undeniable. The banks, of course, would never admit to such a practice, and regulators point to official directions not to use Section 314 requests as a guidepost to a customer's desirability as a client. But this language simply ignores reality, and the reality is that the law has set up a powerful incentive to keep Muslims outside the mainstream financial services sector. Maybe that outcome does not trouble the 44 percent of Americans who say in a poll that they favor restrictions on the civil liberties of Muslims in the U.S. However, it guarantees that some law-abiding Muslims will face frustrating hurdles to living their lives as everyday Americans. And that is troubling to anyone who values freedom and real, lasting security. Jeff Taylor writes the weekly Reason Express. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Thu Jan 6 13:13:58 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Jan 2005 22:13:58 +0100 Subject: [i2p] 0.4.2.6 is available (fwd from jrandom@i2p.net) Message-ID: <20050106211358.GZ9221@leitl.org> ----- Forwarded message from jrandom ----- From isn at c4i.org Fri Jan 7 04:41:49 2005 From: isn at c4i.org (InfoSec News) Date: Fri, 7 Jan 2005 06:41:49 -0600 (CST) Subject: [ISN] SSL VPNs Will Grow 54% A Year, Become Defacto Access Standard: Report Message-ID: http://www.informationweek.com/story/showArticle.jhtml;jsessionid=NIOHIDQYVVDQSQSNDBESKHA?articleID=56900844 By Matthew Friedman Networking Pipeline Jan. 5, 2005 Spending on Secure Sockets Layer Virtual Private Networks (SSL VPN) will grow at a 53% compound annual growth rate, and SSL VPNs will surpass traditional IPsec VPNs as the de-facto remote access security standard by 2008, according to a new report from Forrester Research. In "SSL VPNs Poised for Significant Growth," Forrester associate analyst Robert Whiteley says companies are attracted by the technology's application-level simplicity. Unlike IPsec VPNs, which require special client software to access the network, SSL VPN supports a wide range of devices, from desktop computers to PDAs, and applications, while offering network administrators greater granularity of user information and providing better endpoint security. According to the report, some 44% of American businesses have deployed SSL VPNs, spending $97 million on the technology last year alone. Despite the impressive adoption rate for a technology that has been in the business mainstream for less than a year, Forrester expects SSL VPN deployments to continue to take off, with the market growing at a 53% compound annual growth rate to $1.2 billion in 2004. SSL VPNs are already well-entrenched in the financial and business services industries and in the public sector. Driven by the need to ensure endpoint security for online services, the financial services industry can boast a 56% penetration rate, with business services just behind at 51%. In both cases, Whiteley predicts a compound annual growth of 34% to 2010 which, though impressive, pales beside the expected SSL VPN growth in late-adopting industries. Indeed, Whiteley writes that retail and manufacturing are poised to leap into SSL VPN with gusto over the next few years. "Retail and wholesale allocates 7.8% of its IT spend to security  more than even financial services," he notes. "This vertical shows the most SSL VPN potential because of its eye toward security, relatively little penetration to date, and the need for large, distributed deployments  resulting in 82% annual market growth through 2010." Though only 29% of manufacturers are currently invested in SSL VPNs, Whitely expects that to change dramatically through 2010, predicting a phenomenal 94% compound annual growth rate. IPSec was a poor fit for this vertical's needs, Whiteley observes, but the application-layer flexibility of SSL VPNs should spur rapid adoption. "Manufacturing companies typically don't provide employees with corporate-managed laptops," he writes. "Thus, SSL VPNs allows a 'bring-your-own computer' model where manufacturing companies still control security and user policy but don't have to incur the cost of unnecessary IT infrastructure." _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 7 07:14:46 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 7 Jan 2005 10:14:46 -0500 Subject: [ISN] SSL VPNs Will Grow 54% A Year, Become Defacto Access Standard: Report Message-ID: --- begin forwarded text From eugen at leitl.org Fri Jan 7 01:17:48 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Jan 2005 10:17:48 +0100 Subject: [FoRK] Hamachi "mediated" peer-to-peer sounds interesting (fwd from meltsner@gmail.com) Message-ID: <20050107091748.GI9221@leitl.org> ----- Forwarded message from Ken Meltsner ----- From rah at shipwright.com Fri Jan 7 08:49:10 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 7 Jan 2005 11:49:10 -0500 Subject: [fc-announce] FC05 registration to open next week Message-ID: --- begin forwarded text User-Agent: Microsoft-Entourage/11.1.0.040913 From: "Stuart E. Schechter" To: Subject: [fc-announce] FC05 registration to open next week Sender: fc-announce-admin at ifca.ai Date: Fri, 07 Jan 2005 11:00:54 -0500 Registration for Financial Cryptography and Data Security 2005 will open early next week. My apologies for the delays and thanks for your patience. In the meantime, please do make sure that you've made all your other travel arrangements (flight/hotel/car rental). For more information, see http://fc05.ifca.ai/travel.html Please don't hesitate to get in touch if there's any further information that I can provide you. Best regards Stuart Schechter General Chair Financial Cryptography and Data Security 2005 _______________________________________________ fc-announce mailing list fc-announce at ifca.ai http://mail.ifca.ai/mailman/listinfo/fc-announce --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 7 10:44:32 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 7 Jan 2005 13:44:32 -0500 Subject: [osint] All Charges Are Dismissed in Spy Case Tied to FBI Message-ID: A little spy-porn... Cheers, RAH --- begin forwarded text To: "Bruce Tefft" Thread-Index: AcT0t++lIBQbqlCJT0mOlbNcWsJnqgACh7RA From: "Bruce Tefft" Mailing-List: list osint at yahoogroups.com; contact osint-owner at yahoogroups.com Delivered-To: mailing list osint at yahoogroups.com Date: Fri, 7 Jan 2005 09:06:41 -0500 Subject: [osint] All Charges Are Dismissed in Spy Case Tied to FBI Reply-To: osint at yahoogroups.com All Charges Are Dismissed in Spy Case Tied to FBI By JOHN M. BRODER and NICK MADIGAN New York Times January 07, 2005 LLOS ANGELES, Jan. 6 - A federal judge on Thursday dismissed all charges against a Chinese-American woman accused of using a long-running sexual relationship with a senior F.B.I. agent here to obtain national security documents. The woman, Katrina Leung, a wealthy socialite from San Marino, a suburb of Los Angeles, had faced five criminal counts of unauthorized possession and copying of classified materials. The prosecutors said she removed the files from the briefcase of James J. Smith, a senior F.B.I. agent with whom Ms. Leung had an affair for 20 years. The prosecutors said they stopped short of charging her with espionage because they could not prove that she had passed the documents to China. But on Thursday, Judge Florence-Marie Cooper of Federal District Court dismissed the charges because of what she called prosecutorial misconduct. Judge Cooper agreed with Ms. Leung's lawyers that a plea agreement that prosecutors reached with Mr. Smith last spring unfairly prevented Ms. Leung's lawyers from having access to Mr. Smith, a critical witness. Mr. Smith pleaded guilty to lying to his superiors about the affair. Four other felony charges were dropped, letting him avoid prison time. In exchange, he promised to cooperate in prosecuting Ms. Leung. But the terms of the deal barred contact with the defense team. She had faced 14 years in prison if convicted. The couple were arrested in April 2003, a time of heightened sensitivity about security because of the Sept. 11, 2001, attacks and years of accusations, some unproven, of Chinese espionage in the United States. "Katrina Leung's nightmare is over," the defense lawyers, Janet I. Levine and John D. Vandevelde, said in a statement. "Today, United States District Judge Florence-Marie Cooper granted our motion to dismiss all charges against Katrina because the prosecutors engaged in misconduct, gagging the chief witness against her and then trying to cover it up. You can't do that in America." The United States attorney in the case, Debra W. Yang, said she disagreed with the decision and was considering an appeal. Ms. Yang denied any misconduct on the part of her office and said the accord with Mr. Smith did not prohibit him from talking to Ms. Leung or her lawyers. "I stand behind the work of the prosecutors of this case, and I know that they have conducted themselves ethically," she said. Mr. Smith recruited Ms. Leung as an informer in the early 80's. For 20 years, she was paid $1.7 million to provide information on China. For almost all that time, she and Mr. Smith had an affair. The authorities had at first said Mr. Smith had let her gain access to secret material that she passed to the Chinese. Justice Department officials said they believed that Ms. Leung was a double agent when the F.B.I. was paying her. The initial grand jury indictment against Ms. Leung charged her with stealing sensitive national security documents from her lover, but stopped short of charging that she actually engaged in espionage by passing secrets to China. The authorities said that although they believed they had ample evidence that Ms. Leung had unauthorized access to security material, it would be harder for them to track contacts in China. The difficulty of introducing classified evidence in open court could also complicate the case, officials acknowledged. Judge Cooper admonished the government not only for denying Ms. Leung access to Mr. Smith, but also for trying to conceal the terms of the deal. "In this case," the judge wrote, "the government decided to make sure that Leung and her lawyers would not have access to Smith. When confronted with what they had done, they engaged in a pattern of stone-walling entirely unbecoming to a prosecuting agency." Ms. Leung was a prominent businesswoman and political fund-raiser among Chinese-Americans in Southern California. The authorities said they believed that Ms. Leung would "surreptitiously" take secret documents from Mr. Smith's briefcase on his many visits to her. She was indicted a day after Mr. Smith was indicted on six counts of wire fraud and gross negligence for what the authorities said was letting Ms. Leung take the papers and for lying to his supervisor about their affair and her reliability. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> Give underprivileged students the materials they need to learn. Bring education to life by funding a specific classroom project. http://us.click.yahoo.com/FHLuJD/_WnJAA/cUmLAA/TySplB/TM --------------------------------------------------------------------~-> -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-osint at yahoogroups.com. -------------------------- Brooks Isoldi, editor bisoldi at intellnet.org http://www.intellnet.org Post message: osint at yahoogroups.com Subscribe: osint-subscribe at yahoogroups.com Unsubscribe: osint-unsubscribe at yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: osint-unsubscribe at yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 7 11:36:09 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 7 Jan 2005 14:36:09 -0500 Subject: Atom demo fixes quantum errors Message-ID: Always On Atom demo fixes quantum errors TRN NewsTeam | TRN [] | POSTED: 01.07.05 @09:47 Although quantum computers promise fantastic speed for certain types of very large problems, the logical components of quantum computers -- quantum bits -- are quite fragile, which makes for a large number of errors that must be corrected. Researchers from the National Institute of Standards and Technology have demonstrated a way to correct errors in qubits of beryllium ions held in an electromagnetic trap. The ions represent a 1 or 0 of computer information in their spin, which can be pictured as the counterclockwise or clockwise spin of a top. One way to carry out quantum computing is to take advantage of a weird trait of quantum particles -- they can become entangled, or linked, so that properties like spin remain in lockstep. The researchers' prototype uses lasers to control the qubits' states and electrodes to move them together, which allows them to be entangled. The researchers set a primary qubit to a particular state and entangled it with two other qubits. They deliberately induced an error and then disentangled the qubits by separating them. They measured the other two qubits to determine how the primary qubit needed to be corrected. Quantum error correction schemes have been well explored theoretically, but the researchers' experiment was the first demonstration of a repeatable error-correction procedure and the first using trapped ions, which are a promising candidate for practical quantum computers. Practical quantum computing is a decade or more away. The method could be used in quantum communications applications like quantum cryptography within a few years, according to the researchers. The work appeared in the December 2, 2004 issue of Nature. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From adam at cypherspace.org Fri Jan 7 12:34:32 2005 From: adam at cypherspace.org (Adam Back) Date: Fri, 7 Jan 2005 15:34:32 -0500 Subject: Hamachi "mediated" peer-to-peer sounds interesting (fwd from meltsner@gmail.com) In-Reply-To: <20050107091748.GI9221@leitl.org> References: <20050107091748.GI9221@leitl.org> Message-ID: <20050107203432.GA14959@bitchcake.off.net> Ken Meltsner wrote: > Basically, a way to get around NAT and other router issues for a > peer-to-peer system, mostly seamlessly integrated as a special network > driver. Systems connect to a back end server which relays traffic > between peers on named private networks. Sort of P2P meets VPN -- if > they added HTTPS tunneling, it would run through nearly any corporate > firewall/proxy server. Well if they really relayed traffic between peers on their back end server their pipe would be saturated. (Think kazaa or bit-torrent over hamachi). I hope they actually use the server just for mediation, and send the traffic direct between peers. Unfortunately the documentation is rather light so it's difficult to tell what it does in this regard. I've cc'd Alex Pankratov who is the author (I presume). However maybe this beta version is not complete in that regard. Some other things such as the server mediated key exchange are obviously not shipable grade (server knows all symmetric keys!) Adam From ap at hamachi.cc Fri Jan 7 20:00:49 2005 From: ap at hamachi.cc (Alex Pankratov) Date: Fri, 07 Jan 2005 20:00:49 -0800 Subject: Hamachi "mediated" peer-to-peer sounds interesting (fwd from meltsner@gmail.com) In-Reply-To: <20050107203432.GA14959@bitchcake.off.net> References: <20050107091748.GI9221@leitl.org> <20050107203432.GA14959@bitchcake.off.net> Message-ID: <41DF5AF1.6050806@hamachi.cc> Hi guys, I look at the thread and I'd like to comment on this - >I wonder why they didn't use IPSec. I know IPsec/IKE reasonably well, and I just don't like IKE. It's too generic, it's under-specified and it fairly big pain in the ass to implement (I wrote libike a couple of years ago). Except from being extensively peer-reviewed, the main benefit of using IKE is a (supposed) interoperability with various vendors. Since H doesn't need that I decided to go with a custom protocol, which is nevertheless closely modeled after JFK and ESP. Adam Back wrote: > Ken Meltsner wrote: > >>Basically, a way to get around NAT and other router issues for a >>peer-to-peer system, mostly seamlessly integrated as a special network >>driver. Systems connect to a back end server which relays traffic >>between peers on named private networks. Sort of P2P meets VPN -- if >>they added HTTPS tunneling, it would run through nearly any corporate >>firewall/proxy server. > > > Well if they really relayed traffic between peers on their back end > server their pipe would be saturated. (Think kazaa or bit-torrent > over hamachi). Apparently there's a demand for this kind of service. I'm getting at least couple of questions a day regarding proxy/socks support. I very much doubt though that anyone in near future will be offering a _free_ service of this kind. > > I hope they actually use the server just for mediation, and send the > traffic direct between peers. Yes, that's exactly what we do. Server provides three core services - * peer location * tunnel mediation * network management (ie peer grouping and group-level access control) > > Unfortunately the documentation is rather light so it's difficult to > tell what it does in this regard. I'm severely lacking time for updating the website. I do try to answer all technical questions via email though. > > I've cc'd Alex Pankratov who is the author (I presume). The presumption is correct. > However maybe this beta version is not complete in that regard. Some > other things such as the server mediated key exchange are obviously > not shipable grade (server knows all symmetric keys!) That's obvious to paranoids like you and me :), but not to an average consumer who just needs to play CS or AoE over a VPN. From eugen at leitl.org Fri Jan 7 13:04:16 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Jan 2005 22:04:16 +0100 Subject: DRM Tinkering with Intel's PXA270? Message-ID: <20050107210416.GO9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/07/1137224 Posted by: Cliff, on 2005-01-07 20:10:00 from the don't-refuse-me dept. putko asks: "Intel has a new line of chips with DRM built in. This appears to be the [1]very first DRM-enabled chip to hit the streets. This microprocessor is unlike others available, because the user doesn't have complete control over the thing, and [2]your computer can (theoretically) betray you. For a while now, there have been computers (IBM ThinkPad) that won't boot unless you give the password, but you could always rip out the hard drive and read it, right? With this chip, the keys and RAM are on the chip, and the flash is encrypted, so this really looks locked up tight. Has anyone worked with this chip, and is possible to build your own device that uses the Intel Trusted Wireless Platform to protect your secrets (like your software, perhaps)?" [3]Click Here "I'm reminded of this due to Slashdot's recent story on the [4]iPAQ, which uses the chip (and has some neat security features too). Somewhat surprisingly, nobody brought up the Doomsday scenarios, there. It should also be mentioned that there are companies [5]selling incredibly tiny boards for it. Maybe you can run Linux on them? Wouldn't it suck if the chip had the capabilities and you couldn't use them in your own projects -- e.g. if that was just reserved to big companies like Microsoft? On the other hand, if you can use the features, you might see some neat applications. Assuming you can program the DRM stuff, how do you avoid locking yourself out of the chip while developing? What extra pitfalls may developers run into using it?" References 1. http://www.intel.com/design/pca/prodbref/253820.htm 2. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html 3. http://ads.osdn.com/?ad_id=5717&alloc_id=12468&site_id=1&request_id=7795214&o p=click&page=%2farticle%2epl 4. http://slashdot.org/article.pl?sid=05/01/05/2043247&tid=100 5. http://www.strategic-test.com/pxa270_pxa255_sbc/triton-270_pxa270-cpu_sbc.htm l ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Fri Jan 7 19:27:44 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 7 Jan 2005 22:27:44 -0500 Subject: TSA: Tests going well for Secure Flight Message-ID: CNN TSA: Tests going well for Secure Flight Friday, January 7, 2005 Posted: 11:21 AM EST (1621 GMT) WASHINGTON (AP) -- The government has begun testing a computerized screening system that compares airline passengers' names with those on terrorist watch lists, a Transportation Security Administration official said Thursday. Called "Secure Flight," it's meant to replace a plan that never got to the testing stage because of criticism that it gave the government access to too much personal information. Testing of Secure Flight began November 30. No announcement was made; TSA spokesman Justin Oberman disclosed its status when asked by The Associated Press. The testing has not turned up any suspected terrorists. Oberman said the agency expects to wrap up the first phase of testing in a month. "The technology is working, doing exactly what we wanted it to do," he said. The TSA is testing data on passengers who flew domestic flights on U.S. airlines in June. The airlines, concerned about upsetting passengers, had refused to turn over the information, but the TSA issued a security directive ordering them to do so. About 1.9 million passengers travel by air daily, and part of the test will see if the government's system can handle that much information. The government has sought to improve its process for making sure terrorists don't get on planes since the September 11 hijackers exposed holes in the system. Airlines now simply match passenger names against government watch lists of people considered threats. Federal authorities don't disclose criteria for placing people on the lists, how many names are listed or any identities. In a number of well-publicized incidents, people with names similar to those on the lists were stopped from boarding planes. Among them was Sen. Edward M. Kennedy, D-Massachusetts. Marcia Hofmann, attorney for the Electronic Privacy Information Center, a Washington-based advocacy group, said many problems remain with the Secure Flight program. "The redress process is still a question mark," Hofmann said. "The ability of individuals to access and correct information that is being used to make determinations about them is still at issue." Oberman said the agency is working on a way for passengers to appeal if they think they've been wrongly identified as terrorists. Under Secure Flight, the airlines would electronically transmit to the government passenger names as well as other identifying information. The government would then match that information with the terrorist watch lists; names on those lists are supposed to include biographical information. The passenger information that's being tested is known as passenger name records, or PNR. It can include credit card numbers, travel itineraries, addresses, telephone numbers and meal requests. Oberman said further testing will show whether the system can handle a surge of information during busy air travel periods. Name-matching software will also be fine-tuned, he said. The TSA says Secure Flight differs from the previous plan because it does not compare personal data with commercial databases. Privacy advocates were concerned that doing so would allow the government to accumulate vast amounts of sensitive information about people who weren't suspected of breaking the law. The agency said, however, it will test the passenger information "on a very limited basis" against commercial data to see if that could reduce the number of people who are confused with names on watch lists. Before that happens, though, the Government Accountability Office must report to Congress on the TSA's plan to test the commercial data. That's expected by the end of March. Oberman said he expects testing will be completed by then. However, it's unclear when Secure Flight will be implemented. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Sat Jan 8 09:54:25 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 08 Jan 2005 12:54:25 -0500 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: <20050108161524.GA5699@arion.soze.net> Message-ID: >What else would the PATRIOT act do? That's a particularly malicious >psychological trick on the part of the miserable bastards who named it. >It doesn't so much matter that it's obvious. Somehow, I don't think the bastards were hoping for the kind of "Patriotism" I have in mind: Large caliber guns to protect our constitutional freedoms, or at least to make it damn costly for individuals to carry out orders trying to take them away. -TD From jya at pipeline.com Sat Jan 8 13:20:08 2005 From: jya at pipeline.com (John Young) Date: Sat, 08 Jan 2005 13:20:08 -0800 Subject: Tasers for Cops Not You Message-ID: NY Times reports today that SEC is investigating Taser for possible financial irregularity: as last day of business for 2004 racked up a $700,000 sale to an AZ gun shop which brags it sells to civilians, but only a few so far. And that the AZ AG is informally looking at sale of the stun guns to civilians, with cops protesting civilian access to the neatest cop joy toy. However, Taser claims the civilian version is effective only to 15 feet while the LE version will explose a heart at 20 feet. And, Taser says "accidental deaths caused by the shock would have happened to those sick persons anyway." Well, yes, homicidal cops say the perps were begging for it, learning such talk from the president and up to the one who has fun with joy toy tsunamis. Exculpation, says the king, is divine, and my Taser shocks shit further than yours. Here are photos of the Taser in manufacture, sale, training, promo, and accidental misfire: http://cryptome.org/taser-eyeball.htm From skquinn at speakeasy.net Sat Jan 8 13:55:33 2005 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Sat, 08 Jan 2005 15:55:33 -0600 Subject: Tasers for Cops Not You In-Reply-To: References: Message-ID: <1105221334.4608.0.camel@xevious> On Sat, 2005-01-08 at 13:20 -0800, John Young wrote: > Here are photos of the Taser in manufacture, sale, training, > promo, and accidental misfire: > > > http://cryptome.org/taser-eyeball.htm This came up 404 as of a few minutes ago. -- Shawn K. Quinn From justin-cypherpunks at soze.net Sat Jan 8 08:15:24 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 8 Jan 2005 16:15:24 +0000 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: References: <41DD4F02.4E22D74@cdc.gov> Message-ID: <20050108161524.GA5699@arion.soze.net> On 2005-01-06T12:06:40-0500, Tyler Durden wrote: > > Well, I used to be pro gun-control prior to the Patriot Act. Guess the > Patriot Act made me something of a Patriot. What else would the PATRIOT act do? That's a particularly malicious psychological trick on the part of the miserable bastards who named it. It doesn't so much matter that it's obvious. I should like to take this opportunity to remind that it's an acronym, and therefore is properly written in all caps. The taboo against YELLING should carry over to the acronym, making people subconsciously dislike it. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From bill.stewart at pobox.com Sat Jan 8 23:14:31 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 08 Jan 2005 23:14:31 -0800 Subject: "The Reader of Gentlemen's Mail", by David Kahn Message-ID: <6.0.3.0.0.20050108230829.03c33ed8@pop.idiom.com> My wife was channel-surfing and ran across David Kahn talking about his recent book "The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking". ISBN 0300098464 , Yale University Press, March 2004 Amazon's page has a couple of good detailed reviews http://www.amazon.com/exec/obidos/ASIN/0300098464/qid=1105254301/sr=2-1/ref=pd_ka_b_2_1/102-1630364-0272149 ---- Bill Stewart bill.stewart at pobox.com From justin-cypherpunks at soze.net Sat Jan 8 18:46:56 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 9 Jan 2005 02:46:56 +0000 Subject: California Bans a Large-Caliber Gun, and the Battle Is On In-Reply-To: References: <20050108161524.GA5699@arion.soze.net> Message-ID: <20050109024656.GA29091@arion.soze.net> On 2005-01-08T12:54:25-0500, Tyler Durden wrote: > >What else would the PATRIOT act do? That's a particularly malicious That was scarcasm. > >psychological trick on the part of the miserable bastards who named it. > >It doesn't so much matter that it's obvious. > > Somehow, I don't think the bastards were hoping for the kind of > "Patriotism" I have in mind: Large caliber guns to protect our > constitutional freedoms, or at least to make it damn costly for individuals > to carry out orders trying to take them away. It's the socially conservative public at large who have fallen prey to the association between the PATRIOT act and patriotism. I did not intend to suggest that you or most other cypherpunks members have. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From shmoocon-news at lists.shmoo.com Sun Jan 9 07:38:03 2005 From: shmoocon-news at lists.shmoo.com (shmoocon-news at lists.shmoo.com) Date: Sun, 9 Jan 2005 10:38:03 -0500 Subject: [ShmooCon-News] Saturday night's con Message-ID: Saturday night's fun has basically been finalized, so it's time to clue attendees in. ShmooCon 2005 attendees are invited to boogie at FUR, a rather hip dance club in D.C., Saturday night, February 5th, from 10 to whenever. Check out FUR's website here: http://www.furnightclub.com FUR is letting all ShmooCon 2005 attendees, 21 and over, in for FREE. The private speaker party with open bar in the Mafia lounge at FUR runs from 10 to midnight, and features spinning by everyone's favorite West-coast, DefCon & ToorCon-infamous DJ, Keith! w00t! Anyone who reserved a room at the conference hotel under the ShmooCon group rate will get a pass to the speaker party once they check-in at the hotel. If you didn't reserve a room at the conference hotel, or you aren't a speaker, then you'd better practice on your social engineering skills to score a pass to the speaker party. Rumor has it, speakers will have extra passes to distribute as they see fit. ;) And one more note: FUR, not the Shmoo Group, controls the dress code--read the FUR FAQ here: http://www.furnightclub.com/Content/FAQ.html So no whining about having to look (and smell) nice. Got it? See you at FUR on Saturday night of the con! Sincerely, Beetle The Shmoo Group _______________________________________________ Shmoocon-News mailing list Shmoocon-News at lists.shmoo.com https://lists.shmoo.com/mailman/listinfo/shmoocon-news --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 9 07:44:25 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 10:44:25 -0500 Subject: Police seek missing trucker, nickels Message-ID: The Chicago Tribune Police seek missing trucker, nickels Advertisement Items compiled from Tribune news services January 9, 2005 MIAMI, FLORIDA -- A truck driver has disappeared with the 3.6 million nickels he was hauling to the Federal Reserve Bank in New Orleans, police said Friday. Angel Ricardo Mendoza, 43, picked up the coins, worth $180,000, Dec. 17 from the Federal Reserve in New Jersey and was supposed to haul the cargo--weighing 45,000 pounds--to New Orleans for a trucking company subcontracted by the Federal Reserve, police said. On Dec. 21, Mendoza's empty truck and trailer turned up at a truck stop in Ft. Pierce, Fla. Miami-Dade police, the FBI and the Federal Reserve police are investigating. "We are concerned for his safety because he's missing," Miami-Dade Detective Randy Rossman said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sun Jan 9 02:32:15 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Jan 2005 11:32:15 +0100 Subject: Tasers for Cops Not You In-Reply-To: <1105221334.4608.0.camel@xevious> References: <1105221334.4608.0.camel@xevious> Message-ID: <20050109103215.GN9221@leitl.org> On Sat, Jan 08, 2005 at 03:55:33PM -0600, Shawn K. Quinn wrote: > On Sat, 2005-01-08 at 13:20 -0800, John Young wrote: > > Here are photos of the Taser in manufacture, sale, training, > > promo, and accidental misfire: > > > > > > http://cryptome.org/taser-eyeball.htm > > This came up 404 as of a few minutes ago. The correct URL is http://cryptome.org/taser/taser-eyeball.htm > > -- > Shawn K. Quinn -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rsw at jfet.org Sun Jan 9 12:20:16 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Sun, 9 Jan 2005 14:20:16 -0600 Subject: Google Exposes Web Surveillance Cams In-Reply-To: <20050109192412.GR9221@leitl.org> References: <20050109192412.GR9221@leitl.org> Message-ID: <20050109202016.GA22497@positron.jfet.org> Eugen Leitl wrote: > with the discovery that a pair of simple Google searches permits I love how all of the coverage leaves out the actual search strings, as if it's hard to discover what they are at this point. http://www.google.com/search?q=inurl%3A%22ViewerFrame%3FMode%3D%22 http://www.google.com/search?q=inurl%3A%22MultiCameraFrame%3FMode%3D%22 Perhaps there are others as well; this is what 10 seconds of googling revealed. (There's something strangely meta about using google to discover a google search string.) -- Riad S. Wahby rsw at jfet.org From bill.stewart at pobox.com Sun Jan 9 15:05:15 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 09 Jan 2005 15:05:15 -0800 Subject: Police seek missing trucker, nickels In-Reply-To: References: Message-ID: <6.0.3.0.0.20050109150455.03c64a60@pop.idiom.com> At 01:36 PM 1/9/2005, Tyler Durden wrote: >OK...most of the time I understanding the relevance of the emanations from >RAH, but this one I don't get. What's the relevance? Choate nostalgia? Micropayments, of course :-) From jya at pipeline.com Sun Jan 9 15:16:36 2005 From: jya at pipeline.com (John Young) Date: Sun, 09 Jan 2005 15:16:36 -0800 Subject: "The Reader of Gentlemen's Mail", by David Kahn In-Reply-To: <6.0.3.0.0.20050108230829.03c33ed8@pop.idiom.com> Message-ID: Kahn's is a quite interesting and entertaining book. Among other tales about Yardley and his admirable battles with the USG, Kahn tells how through hilarious Gonzales-grade legal shenanigans the only time a US law has been by enacted against revealing cryptological information, in 1933, to prevent Yardley from publishing a book, and the one-man-law it is still in effect. Chapter 15 A Law Aimed at Yardley, pp. 158-72: The law: An Act For the Protection of Government records Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That whoever, by virtue of his employment by the United States, shall obtain from another or shall have custody of or acess to, or shall have had custody of or access to, any official diplomatic code or any matter prepared in such code, or which purports to have been prepared in any such code, and shall willfully, without authorization or competent authority, publish or furnish to another any such code or matter, or any matter which was obtained while in the process of transmission between any foreign government and its diplomatic mission in the United States, shall be fined not more than $10,000 or imprisoned not more than ten years, or both. Approved June 10, 1933 Franklin D. Roosevelt See: USC Title 18 Section 952 http://assembler.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00000952-- --000-.html Note the orignal $10,000 amount for the fine has been removed. From camera_lumina at hotmail.com Sun Jan 9 13:36:25 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 09 Jan 2005 16:36:25 -0500 Subject: Police seek missing trucker, nickels In-Reply-To: Message-ID: OK...most of the time I understanding the relevance of the emanations from RAH, but this one I don't get. What's the relevance? Choate nostalgia? -TD >From: "R.A. Hettinga" >To: cypherpunks at al-qaeda.net >Subject: Police seek missing trucker, nickels >Date: Sun, 9 Jan 2005 10:44:25 -0500 > > > >The Chicago Tribune > >Police seek missing trucker, nickels >Advertisement Items compiled from Tribune news services > > January 9, 2005 > > MIAMI, FLORIDA -- A truck driver has disappeared with the 3.6 million >nickels he was hauling to the Federal Reserve Bank in New Orleans, police >said Friday. > > Angel Ricardo Mendoza, 43, picked up the coins, worth $180,000, Dec. 17 >from the Federal Reserve in New Jersey and was supposed to haul the >cargo--weighing 45,000 pounds--to New Orleans for a trucking company >subcontracted by the Federal Reserve, police said. > > On Dec. 21, Mendoza's empty truck and trailer turned up at a truck stop >in >Ft. Pierce, Fla. > > Miami-Dade police, the FBI and the Federal Reserve police are >investigating. > > "We are concerned for his safety because he's missing," Miami-Dade >Detective Randy Rossman said. > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From pcapelli at gmail.com Sun Jan 9 14:10:09 2005 From: pcapelli at gmail.com (Pete Capelli) Date: Sun, 9 Jan 2005 17:10:09 -0500 Subject: Police seek missing trucker, nickels In-Reply-To: References: Message-ID: Millions of micropayments lost? On Sun, 09 Jan 2005 16:36:25 -0500, Tyler Durden wrote: > > OK...most of the time I understanding the relevance of the emanations from > RAH, but this one I don't get. What's the relevance? Choate nostalgia? > > -TD > > >From: "R.A. Hettinga" > >To: cypherpunks at al-qaeda.net > >Subject: Police seek missing trucker, nickels > >Date: Sun, 9 Jan 2005 10:44:25 -0500 > > > > > > > >The Chicago Tribune > > > >Police seek missing trucker, nickels > >Advertisement Items compiled from Tribune news services > > > > January 9, 2005 > > > > MIAMI, FLORIDA -- A truck driver has disappeared with the 3.6 million > >nickels he was hauling to the Federal Reserve Bank in New Orleans, police > >said Friday. > > > > Angel Ricardo Mendoza, 43, picked up the coins, worth $180,000, Dec. 17 > >from the Federal Reserve in New Jersey and was supposed to haul the > >cargo--weighing 45,000 pounds--to New Orleans for a trucking company > >subcontracted by the Federal Reserve, police said. > > > > On Dec. 21, Mendoza's empty truck and trailer turned up at a truck stop > >in > >Ft. Pierce, Fla. > > > > Miami-Dade police, the FBI and the Federal Reserve police are > >investigating. > > > > "We are concerned for his safety because he's missing," Miami-Dade > >Detective Randy Rossman said. > > > >-- > >----------------- > >R. A. Hettinga > >The Internet Bearer Underwriting Corporation > >44 Farquhar Street, Boston, MA 02131 USA > >"... however it may deserve respect for its usefulness and antiquity, > >[predicting the end of the world] has not been found agreeable to > >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > > -- Pete Capelli pcapelli at ieee.org http://www.capelli.org PGP Key ID:0x829263B6 "Those who would give up essential liberty for temporary safety deserve neither liberty nor safety" - Benjamin Franklin, 1759 From eugen at leitl.org Sun Jan 9 11:24:12 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Jan 2005 20:24:12 +0100 Subject: Google Exposes Web Surveillance Cams Message-ID: <20050109192412.GR9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/09/1411242 Posted by: CmdrTaco, on 2005-01-09 15:00:00 from the pick-a-password-people dept. An anonymous reader writes "Blogs and message forums buzzed this week with the discovery that a pair of simple Google searches permits [1]access to well over 1,000 unprotected surveillance cameras around the world - apparently without their owners' knowledge." Apparently many of the cams are even aimable. Oops! [2]Click Here References 1. http://www.theregister.co.uk/2005/01/08/web_surveillance_cams_open_to_all/ 2. http://ads.osdn.com/?ad_id=5717&alloc_id=12468&site_id=1&request_id=231150&op =click&page=%2farticle%2epl ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From cypherpunks at einstein.ssz.com Sun Jan 9 20:25:28 2005 From: cypherpunks at einstein.ssz.com (cypherpunks at einstein.ssz.com) Date: Sun, 9 Jan 2005 20:25:28 Subject: Devine Lips for you! Message-ID: <20020110012239.666353C325@server10.safepages.com> **************************************************************************************** This email message is sent in compliance with the 106th Congress E-Mail User Protection Act (H.R. 1910) and the Unsolicited Commercial Electronic Mail Act of 2000 (H.R. 3113). We provide a valid vehicle for you to be removed from our email list. To be removed from our mailing list, simply send an email to remove.faces at eudoramail.com with the subject "remove". **************************************************************************************** The NON-detectable KISS has arrived!!! This is AMAZING product is for the PERFECT non-detectable kiss! These fantastic new lip products are waterproof will not smear off, kiss off, or rub off. Lip-gloss products will not come off until you TAKE them Off. Look like a movie star all day long. For more information on this and other new products send a blank email to: mailto:making.faces at eudoramail.com ============================ For faster service send your Name: Phone number: Best time to call: ============================ To be removed send an email to: mailto:remove.faces at eudoramail.com From rah at shipwright.com Sun Jan 9 18:17:55 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 21:17:55 -0500 Subject: [ShmooCon-News] Saturday night's con Message-ID: --- begin forwarded text From rah at shipwright.com Sun Jan 9 18:30:06 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 21:30:06 -0500 Subject: Police seek missing trucker, nickels In-Reply-To: References: Message-ID: At 5:10 PM -0500 1/9/05, Pete Capelli wrote: >Millions of micropayments lost? Billions. Billions. :-). Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 9 18:40:53 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 21:40:53 -0500 Subject: E-purse and e-gate facility at airport soon Message-ID: Times of Oman - Local News (Monday, January 10, 2005) E-purse and e-gate facility at airport soon By Adarsh Madhavan MUSCAT - Oman will be introducing a host of applications on the smart card, or the national identity card, soon. A top application, which will be introduced this year, will enable the national ID card users to utilise the e-gate (*) (electronic gates) 'fast track' facility at the Seeb International Airport. But even when this facility is launched, it will be only for Omanis and expatriate (nationals and residents) businessmen/women as an initial arrangement. This was unveiled by Colonel (Dr) Sulaiman bin Mohammed Al Harthy, director-general of civil status at the Royal Oman Police (ROP), yesterday. Colonel Sulaiman Al Harthy told newsmen on the sidelines of a seminar, conducted by the Directorate-General of Civil Status and the Bahwan IT, the information technology division of the Suhail Bahwan Group, and Gemplus, their technology partners, which was held at Grand Hyatt Muscat yesterday that the e-gate facility will be only for the private sector businessmen/women. It will be available only to them when it is introduced. Colonel Al Harthy also added that they "would rather wait and evaluate the situation for a while (before implementing it for others). At the moment, it will be only for the businessmen/women in the private sector who are holding the resident cards". Another top facility, which is on the cards and a major priority for the Sultanate, is the e-purse, Colonel Al Harthy added. The e-purse (or the electronic purse) would be like a debit card, which has currency or cash loaded on to the card as an electronic value. It can be used at kiosks, gas stations, vending machines etc and even over the Internet. "For the customer, it offers a very high level of security (unlike the credit card numbers which we give over the Net, here digital keys are exchanged and encryption levels and standards followed are to the highest, so that the customer can rest assured with a high level of security)," Ramakrishna Sathyagopal, principal consultant of Data Capture Solutions, Bahwan IT (formerly SSB Computer Division), a division of Bahwan Trading Co. LLC, explained, adding that it also offers a great deal of convenience to the user who would not have to carry any cash with him/her. Meanwhile, Oman is the first country in the AGCC and the entire Middle East to issue smart cards as a national ID card. The United Arab Emirates (UAE) and Qatar have now followed suit. Colonel Al Harthy was on the upbeat when queried on their expectations after the launch of this card. "It is really up to our expectations and the response of the pubic was great. We really appreciate that," he said. Although the message about the new cards were loud and clear, they would try to emphasise or renew the message whenever they would be introducing new applications, he added. Colonel Al Harthy, was the first speaker at the seminar highlighted details of the card. He was followed by Hisham Surakhi, business development manager, Gemplus, Middle East and Emmanuel Quedreux, project manager, Gemplus, France. Also present was M. K. Janaki Raman, general manager of Bahwan IT and Pierre Servetazz, director of Gemplus, Middle East. The audience comprised of government officials, businessmen, those in the IT segment, and other dignitaries. Also present were Amal Bahwan, director of Bahwan IT; Aqeed Abdullah bin Jameel bin Saif Al Quraini, head of ITS at the Ministry of Defence. The civil status project in Oman is an execution of the Royal Decree No. (66/99), which ordained that the Civil Status Law be issued, and whose article (2) decreed that a new directorate be established and added to the existing group of general directorates of the ROP to execute the Civil Status Law. So far, a total 200,000 cards have been issued. Of this, a total of 150,000 cards have been issued to Omanis and the remaining 50,000, expatriates. According to the plan, as specified by Colonel Al Harthy, all expatriates (starting from children who have reached 15) would be issued their cards by the end of 2006. By the end of 2007, beginning of 2008, all Omanis would be holding their cards. The Directorate General of Civil Status, ROP is the owner of this card. Their long-term vision is to promote this card as the ubiquitous form of mass media, which can be used for identification and authentication, officials from Bahwan IT said. Information such as the civil number of the bearer, a record of marriage, birth and other personal details are already loaded into the card, enabling automated electronic reading of the card possible. Being a smart card, applications on this can be anything from a driver's licence or a health card to digital signatures to a bank card, the officials said. The card includes the carrier's demographic data along with a digital photograph and an electronic fingerprint template making identification, verification and authentication possible by manual and machine readable forms. A person can thus prove who he claims to be at multiple locations, with a single card. With its PKI (public key infrastructure) application readiness, applications like utility/bill payments are envisaged, making e-commerce a reality in the near future. The card itself is a leveller as everyone above the age of 15 would possess one and the DGCS has provided ample user space on the card for it to accommodate many different programs, so multiple applications can easily be added on. All of this will enable bearers of the card better service by simplifying procedures, saving time and effort, thereby commanding wider user acceptance. The DGCS has recognised and acknowledged Bahwan ITs capabilities to take this forward by giving permission to work along with them and Gemplus, Bahwan IT officials said. "We, at the Bahwan IT, the systems integrator for the card applications, with our expertise in this technology, our skills with software development and project management aim to make the Sultanate a closer place, redefining convergence in its true sense by facilitating multiple applications on the card," the officials said. "It is a privilege for Bahwan IT to be working along with the DGCS, ROP on the national ID cards and their applications and with Gemplus being the global leader in Smart Card technology, Bahwan IT honours their invaluable support," they added. New cards with renewed visas MUSCAT - The new national identity cards will be issued to resident expatriates when their visa expires and not when their labour card expires, Colonel (Dr) Sulaiman bin Mohammed Al Harthy, director-general of civil status, ROP, clarified to a query yesterday. "The resident expatriate needs to get his/her national ID card only when their visa expires," Colonel Harthy said. "For those expatriates (in the private sector) who have a visa, which is valid for more than a year, would need to renew their labour card for a year and then wait until the visa expires and then get the new national ID card," he explained. "But, they have to be careful, for sometimes, there can be an overlap between the visa and the labour card, so if they (the expatriates) exceed the allowed time for the Ministry of Manpower, they would have to pay a fine." Family members and children (above 15) should also apply for their national ID card when their visa expires. The labour card becomes obsolete once this national ID card is issued." Colonel Al Harthy noted that the visa would be "embedded in the national ID card. Therefore, an ID card holder (expatriate) will have two visas. One, which will be the stamp in the passport and the other on the ID card itself." To a query, Colonel Harthy said: "Only the ROP will be having access to the information on the ID card. "But, then if you go to a bank and want to open an account, then they would be having the facility to access the information. However, there will be information, which is public, and which they can access and the other private/confidential information, others will not be able to access." Colonel Al Harthy also noted that offences would not be registered on the ID card. Boon for businessmen By A Staff Reporter MUSCAT -The fast-track e-gate facility (*) at the airport will prove to be quite a boon for the private sector businessmen and women, who are constantly on the move. "This will enable the user to avoid long queues, which may prove to be time consuming," Ramakrishna Sathyagopal, principal consultant of Data Capture Solutions, Bahwan IT (formerly SSB Computer Division), a division of Bahwan Trading Co. LLC, told the Times of Oman yesterday. "The smart card will have a biometric template loaded on it. And when the passenger arrives at the airport, he/she will be having the card and will also be directly present there. "So, it enables the user to immediately prove their status. As reports note, it would provide a 'one-to-one' match or authentication. And so when the smart card is put into the e-gate facility it authenticates the person's fingerprint (from the fingerprint scanner) with the fingerprint present on the card. "Basically, this would mean that users can avoid queuing up and the checking process would be done very quickly. Because it checks both the fingerprint as well as the card, it will prove to be an absolutely foolproof method," Ramakrishna said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 9 18:45:14 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 21:45:14 -0500 Subject: Schneier to Speak to Boston CPCU (Chartered Property Casualty Underwriter) Society Message-ID: LicataandKelleherHome 137 South Street, Suite 3 Boston, MA 02111-2838 617-451-2140 x312 FLicata at LicataKelleher.com Security Consultant Bruce Schneier to Speak in Boston on January 20, 2005 Bruce Schneier, Founder and Chief Technical Officer of Counterpane Internet Security of Mountain View, CA will speak to the Boston Chapter of the CPCU (Chartered Property Casualty Underwriter) Society. Counterpane provides Managed Security Services to organizations worldwide. Schneier is an internationally renowned security technologist who was described by The Economist as a "security guru." He is the author of eight books. His book on computer and network security, Secrets and Lies, was called by Fortune "a jewel box of little surprises you can actually use." His current book, Beyond Fear, tackles the problems of security from the small to the large, from computer security to physical security, and security on the whole. His address will be on the subjects of privacy and security, with emphasis on computer and network security. Date: Thursday, January 20, 2005 Time: 7:30 - 8:00 AM Registration 8:00 - 8:30 Breakfast 8:30 - 9:30 Speaker Presentation Place: Newton Marriott 2345 Commonwealth Ave., Newton, MA (at Rte 128 and Mass Pike) Tel 617-969-1000 Topic: Security, With Particular Emphasis on Network and Computer Security Cost: $35.00 per person For more information, contact Frank Licata, CPCU Program Chair, at xFLicata at LicataKelleher.com -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From smb at cs.columbia.edu Sun Jan 9 18:55:44 2005 From: smb at cs.columbia.edu (Steven M. Bellovin) Date: Sun, 09 Jan 2005 21:55:44 -0500 Subject: "The Reader of Gentlemen's Mail", by David Kahn In-Reply-To: Your message of "Sat, 08 Jan 2005 23:14:31 PST." <6.0.3.0.0.20050108230829.03c33ed8@pop.idiom.com> Message-ID: <20050110025545.733C23C0104@berkshire.machshav.com> In message <6.0.3.0.0.20050108230829.03c33ed8 at pop.idiom.com>, Bill Stewart writ es: >My wife was channel-surfing and ran across David Kahn talking about his >recent book >"The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of >American Codebreaking". > >ISBN 0300098464 , Yale University Press, March 2004 > >Amazon's page has a couple of good detailed reviews >http://www.amazon.com/exec/obidos/ASIN/0300098464/qid=1105254301/sr=2-1/ref=pd >_ka_b_2_1/102-1630364-0272149 > I have the book. For the student of the history of cryptography, it's worth reading. For the less dedicated, it's less worthwhile. It's not "The Codebreakers"; it's not "The Code Book"; other than the title quote (and I assume most readers of this list know the story behind it), there are no major historical insights. The most important insight, other than Yardley's personality, is what he was and wasn't as a cryptanalyst. The capsule summary is that he was *not* a cryptanalytic superstar. In that, he was in no way a peer of or a competitor to Friedman. His primary ability was as a manager and entrepreneur -- he could sell the notion of a Black Chamber (with the notorious exception of his failure with Stimson), and he could recruit good (but not always great) people. But he never adapted technically. His forte was codes -- he know how to create them and how to crack them. But the world's cryptanalytic services were also learning how to crack them with great regularity; that, as much as greater ease of use, was behind the widespread adoption of machine cryptography (Enigma, M-209, Typex, Purple, etc.) during the interwar period. Yardley never adapted and hence he (and his organizations) became technologically obsolete. One of the reviews on Amazon.com noted skeptically Kahn's claim that Friedman was jealous of Yardley's success with women. I have no idea if that's true, though moralistic revulsion may be closer. But I wonder if the root of the personal antagonism may be more that of the technocrat for the manager... --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From rah at shipwright.com Sun Jan 9 18:59:08 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 9 Jan 2005 21:59:08 -0500 Subject: Police seek missing trucker, nickels In-Reply-To: <6.0.3.0.0.20050109150455.03c64a60@pop.idiom.com> References: <6.0.3.0.0.20050109150455.03c64a60@pop.idiom.com> Message-ID: At 3:05 PM -0800 1/9/05, Bill Stewart wrote: >Micropayments, of course :-) *Bearer* micropayments... :-) Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From cypherpunks at toad.com Sun Jan 9 22:10:11 2005 From: cypherpunks at toad.com (cypherpunks at toad.com) Date: Sun, 9 Jan 2005 22:10:11 Subject: Phone service 1.4 cents a minute Message-ID: <20020110030707.5C3853C4DD@server10.safepages.com> **************************************************************************************** This email message is sent in compliance with the 106th Congress E-Mail User Protection Act (H.R. 1910) and the Unsolicited Commercial Electronic Mail Act of 2000 (H.R. 3113). We provide a valid vehicle for you to be removed from our email list. To be removed from our mailing list, simply send an email to remove.faces at eudoramail.com with the subject "remove". **************************************************************************************** Finally! A flat rate long distance service at 1.4 cents per minute for a real phone company! Includes all 50 states, (in-state toll calls as well), 3-way calling and conference calling. No need to change long distance carriers. This price is a limited offer so act now! DISTRIBUTORS NEEDED! Our people are already making over $10,000.00/month working from home. No fee to become a distributor. email me at: mailto:phoneservice at email.com email me at: mailto:phoneservice at email.com Include your nameand phone number to hear our clear serivce. To be removed send a blank email to: mailto:undo21 at yahoo.com From rah at shipwright.com Mon Jan 10 05:52:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 10 Jan 2005 08:52:28 -0500 Subject: Momentum Is Gaining for Cellphones as Credit Cards Message-ID: The New York Times January 10, 2005 Momentum Is Gaining for Cellphones as Credit Cards By MATT RICHTEL eople already use their cellphones to read e-mail messages, take pictures and play video games. Before long, they may use them in place of their wallets. By embedding in the cellphone a computer chip or other type of memory device, a phone can double as a credit card. The chip performs the same function as the magnetic strip on the back of a credit card, storing account information and other data necessary to make a purchase. In Asia, phone makers are already selling phones that users can swipe against credit or debit card readers, in much the same way they would swipe plastic MasterCard or Visa cards. Trials are now under way to bring the technology to America, industry executives said. Ron Brown, executive director of the Infrared Data Association, a trade group representing companies pushing the technology for cellphone credit cards, said that the new handsets could become "a major form of payment, because cellphones are the most ubiquitous device in the world." He added, though, that "cash will never go away." Advocates say that consumers will readily embrace the technology as a way to pay for even small purchases, because it is less bother than taking a credit card out of a purse or parting with cash. The impending changes to the cellphone happen to coincide with major shifts taking place in the banking industry. Since credit cards are still considered somewhat inconvenient, particularly for quick, small purchases, major credit card companies have developed "contactless payment" technologies for checkout counters that allow customers to wave their cards near an electronic reader without having to swipe the card or sign their name. MasterCard, for example, has introduced a system called PayPass that lets cardholders wave a card in front of a reader to initiate a payment, much as motorists use E-ZPass and similar systems to pay tolls and ExxonMobil customers use SpeedPass to buy gas. Several major credit card companies issue PayPass cards; McDonald's has agreed to accept them at some restaurants. And American Express announced late last year that it would have its system, ExpressPay, in more than 5,000 CVS drugstores by the middle of this year. Judy Tenzer, a spokeswoman for American Express, said the technology made it more likely that customers would use credit cards to pay for small items. Cellphone makers are hoping these new payment systems will also make it easier to market handsets with credit card functions, although they could just as easily represent competition for the practice of paying by cellphone. The marriage of cellphone and charge card poses some significant challenges, including security problems. To reduce fraud from stolen phones, consumers may be required to punch an authorization code into their phone each time a charge is made. For more than a year, phone makers, software companies and computer chip manufacturers have been working to develop secure and reliable payment technology for cellphones. After the phone's chip is recognized by the electronic reader, the credit card account number will be verified, as it is now, and the price of the purchase will be added to the consumer's credit card bill. The new phones may also be capable of being programmed for a prepaid sum from which payments could be deducted. But there have been some glitches in the product trials, according to Jorge Fernandes, chief executive of Vivotech, a cellphone software company based in Santa Clara, Calif. In two trials, one at a corporation in the Midwest and the other at Santa Clara University, Vivotech used infrared technology for communications between the phone and the card reader. Participants had to aim the cellphone at the reader in a certain way for the infrared beam to be picked up. "People got very upset," Mr. Fernandes said. "Pointing your cellphone at a target is very difficult." Mr. Fernandes said the company believed it might have solved that problem by switching to a technology that uses low-level radio signals. Last month, Vivotech began testing the technology, which allows users to wave the phone within a couple of inches of a reader, at a sports arena in the Atlanta area. Cellphones are becoming mainstream payment devices in Korea and Japan. In Japan, NTT DoCoMo, the mobile phone operator, said that it had already sold more than a million phones equipped with chips that include the payment function. More than 13,000 Japanese shops have electronic readers capable of communicating with the phones. For now, the phones are used mostly to debit a prepaid amount, which is deposited by plugging the phone into a machine similar to an A.T.M. that takes cash and credits the handset. In South Korea, people are already using cellphones as credit cards, said Sue Gordon-Lathrop, vice president for the consumer products platform for Visa International. She said American consumers would eventually embrace these new functions, but acceptance could be slower than in Japan and Korea, where people are more comfortable with using phones for many purposes. Also, she said, there are more cellphone operators in America, making it harder to set standard technology and business practices. "The phones are exciting, but it's going to be a long time" before a widespread base of merchants and consumers in America are equipped to use them, she said. For now, some of the major American cellphone companies are monitoring the technology without committing to it. Jim Ryan, senior vice president of product development for Cingular Wireless, the country's largest cellphone provider, said the company was "closely watching" the progress in this field. Copyrigh -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dave at farber.net Mon Jan 10 08:27:15 2005 From: dave at farber.net (David Farber) Date: Mon, 10 Jan 2005 11:27:15 -0500 Subject: [IP] The DNA round-up on Cape Cod Message-ID: ------ Forwarded Message From: "Richard M. Smith" Date: Mon, 10 Jan 2005 11:18:42 -0500 To: Subject: The DNA round-up on Cape Cod Hi, I live in the town of Truro on Cape Cod about 4 or 5 months out of the year. This past week, the Truro has been on the national news because the local police are attempting to obtain DNA samples of all men of the town in order to solve a three-year old murder case. Here are a couple of the articles that give the details of what is going on in this DNA round-up: To Try to Net Killer, Police Ask a Small Town's Men for DNA http://www.nytimes.com/2005/01/10/national/10cape.html Truro abuzz over 'swab' DNA testing http://www.capecodonline.com/cctimes/truroabuzz7.htm I am headed back to my Truro house later this week. If I am approached by the police to provide a DNA sample for their round-up of Truro males, I am planning to refuse. However, I just realized that I already gave a DNA sample to the Town of Truro recently. I paid my property tax bill to the Truro tax collectors office two weeks ago. My DNA is on the tax payment envelope that I licked. Envelopes are apparently a good source of DNA material according to this article: DNA on Envelope Reopens Decades-old Murder Case http://abclocal.go.com/wabc/news/wabc_052103_dnaarrest.html Richard M. Smith http://www.ComputerBytesMan.com ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Mon Jan 10 09:31:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 10 Jan 2005 12:31:51 -0500 Subject: A new license fee for every smart card? Message-ID: : CR80 News A new license fee for every smart card? Monday, January 10 2005 Cyptography Research asks chip or card manufacturers to pay for use of its patented security measures In the late 1990s, a scare tore through the smart card community when the media began running articles attacking the security of the cards and calling into question the vulnerability of chip card-enabled systems. The threat had a very serious sounding name, differential power analysis (DPA), and the concern spread quickly. The Australian Financial Review broke the story on June 6, 1998 leading with the ominous statement, "A ruinous security problem has jeopardized the viability of millions of smartcards in GSM mobile phones as well as the recently introduced Telstra Phonecard." A series of doom and gloom articles followed in technology publications and major newspapers and periodicals. According to the accounts, a group of young cryptographers in San Francisco had discovered a way to extract the encryption keys protecting data in a chip, thus opening its contents for unintended use. The ramifications for the burgeoning GSM market and highly touted stored value programs such as Mondex, Proton, and VisaCash seemed significant. The smart card industry attempted to brush off the significance of the threat pointing to the fact that the attack was confined to laboratory environments and that no actual issued cards had been compromised. But the damage was done it was another public relations hit to an industry trying to define itself in the eyes of the average consumer. Thankfully, the average consumer is fickle. Within months, DPA was forgotten about by all but the most security-focused in the chip and related industries. The media was on to the next story and the crisis disappeared as quickly as it had materialized. Fast forward to November 2004 San Francisco-based Cryptography Research, which specializes in developing and licensing technology to solve complex data security problems, officially announced that it had established a licensing program for its patented DPA countermeasures and, according to Kit Rodgers, VP of Licensing for Cryptography Research, virtually every chip card issued in the market uses the patented countermeasures. But wait a minute. To the casual observer of the smart card industry, it seemed that DPA's "15 minutes of fame" had passed before the millennium. What happened? It turns out that DPA really was a credible threat to chip security, and it turns out that Paul Kocher, one of the young cryptographers that discovered DPA, is the founder of Cryptography Research. At first blush, this might seem odd - the same guy that discovered the threat is selling countermeasures to defend against it. In reality, this is not uncommon in data security circles. It stands to reason that the people discovering the weakness are often in the best position to fix it. If the threat is deemed real following scrutiny by the industry, the protection against the threat is necessary and has inherent value to the industry. That is exactly what happened in this case, says to Mr. Rodgers. So what happened during the 6-plus years that passed between the Australian Financial Review article and the announcement of the licensing program? It turns out that Mr. Kocher and Cryptography Research had shown the vulnerabilities they discovered to Mondex, Visa, and others prior to the 1998 media storm. These card issuers then brought the silicon and card suppliers to see the DPA demonstration. According to Mr. Rodgers, "Under NDA we showed them how to mask and minimize the vulnerabilities. We told them we would be coming back for licensing once the patents were issued." In April 2004, the company announced that it had been granted a series of patents broadly covering countermeasures to DPA attacks. These include: * U.S. Patent #6,654,884: Hardware-level mitigation and DPA countermeasures for cryptographic devices; * U.S. Patent #6,539,092: Leak-resistant cryptographic indexed key update; * U.S. Patent #6,510,518: Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems; * U.S. Patent #6,381,699: Leak-resistant cryptographic method and apparatus; * U.S. Patent #6,327,661: Using unpredictable information to minimize leakage from smartcards and other cryptosystems; * U.S. Patent #6,304,658: Leak-resistant cryptographic method and apparatus; * U.S. Patent #6,298,442: Secure modular exponentiation with leak minimization for smartcards and other cryptosystems; and * U.S. Patent #6,278,783: DES and other cryptographic, processes with leak minimization for smartcards and other cryptosystems. So, it seemed, the time had come for Cryptography Research to go back to the manufacturers with a licensing program. "We began talking to the chip and card suppliers in the spring (2004)," said Mr. Rodgers. "They all knew us so we were not coming from out of the blue." Their message is clear. "You need a secure smart card and for a smart card to be secure it needs to be secure against DPA attacks," says Mr. Rodgers. "We want to be viewed as helping the industry against a major vulnerability." What does the licensing program really mean? Cryptography Research expects companies utilizing the patented countermeasures in their products to pay for its use. But with card products, this could include several companies in the supply chain. The chip manufacturer can employ the countermeasures, the card manufacturer as well, and the card issuer certainly benefits as the end supplier of the finished product. So who pays? According to Mr. Rodgers, "we want (the licensing) to be cost appropriate so only one party in the chain will pay. We don't care which phase (pays the license) so it could be silicon or card manufacturers." In reality, a large smart card manufacturer would likely want the flexibility to choose from a variety of silicon manufacturers-both large and small. Such a manufacturer says Mr. Rodgers, "may want to lock in the price at a great rate. If they get it from a licensed silicon manufacturer, they wouldn't pay again." In short, both chip and card suppliers may be licensed but if a card manufacturer bought chips that had already been licensed, they would not pay a second fee for the cards created with those chips. While it might seem difficult to manage such a process, the pool of potential licensees is not large. According to Mr. Rodgers, "six manufacturers account for about 96% of the chips and five smart card manufacturers supply most of the cards." The question of price How much will the license fees cost? The company is being purposefully vague as they are currently in the discussion phases with industry. Hinting at the cost, Mr. Rodgers says, "we are trying to price this in a way that gives us the appropriate amount of money for the value the technology provides. We think smart cards are an excellent solution for certain security applications and want to succeed along with the market." He mentions that early adopters will receive favorable pricing to give them a competitive advantage. As well, he suggested that they have discussed amnesty for past cards issued without license fees, suggesting the potential that they might seek reparations for products issued in the past. Mr. Rodgers mentions that the company has "allocated $20 million to launch and sustain the licensing program." As with any such program, some portion of those dollars is certain to be earmarked for legal pursuits, either reactive or proactive. In summary, he says, "pricing terms will be appropriate for their (chip and card manufacturers) business. We don't want this to have a negative impact on the industry as that will ultimately hurt our business over the long term." About Cryptography Research: According to Kit Rodgers, Cryptography Research develops and licenses technology solutions, provides services, and conducts applied research to solve some of the world's most complex data security problems. Founded in 1995, they help evaluate and design secure products in the financial security sector and other industries, and are currently focused on helping movie studios secure the forthcoming HD DVD and Blu-ray formats. The company licenses technology in three main areas: DPA countermeasures, CryptoFirewall for set-top pay TV, and content protection mechanisms for next-generation HD discs. To learn more visit them on the web at www.cryptography.com. Additional Resources: To read an article on the DPA threat that appeared on CNET on June 10, 1998, click here. To access a primer on Differential Power Analysis produced by Cryptography Research, click here. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Mon Jan 10 12:41:45 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 10 Jan 2005 12:41:45 -0800 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.R SA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> Message-ID: <6.0.3.0.0.20050110123254.03c44380@pop.idiom.com> At 12:04 PM 1/10/2005, Trei, Peter wrote: >For a gun to work, it is just as important that >it fires when it should, as that it does not >fire when it shouldn't. A safety system >which delays firing by even half a second, >or which introduces a significant false >rejection rate (and 1% is way over the line), >is a positive hazard. I'd rather not have to rely on a gun that's acting like typical Artificial Intelligence software - "Out of Virtual Memory - Garbage-Collecting - Back in a minute" - "Tea? You mean Leaves, boiled in water? That's a tough one!" - "Low on Entropy - please wave the gun around and pull the trigger a few times" Police have enough problems with situations where guns are too slow, such as a guy with a knife ten feet away, and ostensibly smart guns that aren't reliable are really bad. And slowly-responding guns just encourage cops to pull them out early and start shooting early just in case, which is the kind of thing most gun-grabbing liberals want to avoid. ---- Bill Stewart bill.stewart at pobox.com From kelsey.j at ix.netcom.com Mon Jan 10 10:42:04 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Mon, 10 Jan 2005 13:42:04 -0500 (GMT-05:00) Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <30964839.1105382525691.JavaMail.root@bigbird.psp.pas.earthlink.net> >From: "R.A. Hettinga" >Sent: Jan 6, 2005 11:47 AM >To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net >Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire ... >Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire > By ANNE EISENBERG I just wonder what the false negative rates are. Seem like a gun that has a 1% chance of refusing to fire when you *really need it* might not be worth all that much. Similarly, one that you can't get to work if you've got a band-aid on your finger, or a cut on your hand, or whatever, loses a lot of its value. On the other hand, a gun that can't be made to go off by your toddler is a pretty huge win, assuming you're willing to trust the technology, but a 90% accuracy level sounds to me like 10% of the time, your three year old can, in fact, cause the thing to go off. That's not worth much, but maybe they'll get it better. And the "suspect struggles with cop, gets gun, and shoots cop" problem would definitely be helped by a guy that wouldn't go off for 90% of attackers. --John From ptrei at rsasecurity.com Mon Jan 10 12:04:21 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 10 Jan 2005 15:04:21 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> John Kelsey > >Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire > > By ANNE EISENBERG > > I just wonder what the false negative rates are. Seem like a > gun that has a 1% chance of refusing to fire when you *really > need it* might not be worth all that much. Similarly, one > that you can't get to work if you've got a band-aid on your > finger, or a cut on your hand, or whatever, loses a lot of > its value. On the other hand, a gun that can't be made to go > off by your toddler is a pretty huge win, assuming you're > willing to trust the technology, but a 90% accuracy level > sounds to me like 10% of the time, your three year old can, > in fact, cause the thing to go off. That's not worth much, > but maybe they'll get it better. And the "suspect struggles > with cop, gets gun, and shoots cop" problem would definitely > be helped by a guy that wouldn't go off for 90% of attackers. > > --John A remarkable number of police deaths are 'own gun' incidents, so the police do have a strong motivation to use 'smart guns' if they are reliable. In New Jersey, there is some kind of legislation in place to restrict sales to 'smart guns', once they exist. Other types would be banned. (Actually, getting a carry permit in NJ is already almost impossible, unless you're politically connected.) This particular model seems to rely on pressure sensors on the grip. This bothers me - under the stress of a gunfight, you're likely to have a somewhat different pattern than during the enrollment process. Many 'smart guns' also have big problems with issues which arise in real life gun fights - shooting from awkward positions behind cover, one-handed vs two-handed, weak hand (righthander using left hand, and vice versa, which can happen if dictated by cover or injury), point vs sighted shooting, and passing a gun to a disarmed partner. There are other systems which have been proposed; magnetic or RFID rings, fingerprint sensors, etc. The one thing that seems to be common to all of the 'smart gun' designs is that they are conceived by people with little experience in how guns are actually used. To look at a particularly ludicrous example, try http://www.wmsa.net/other/thumb_gun.htm For a gun to work, it is just as important that it fires when it should, as that it does not fire when it shouldn't. A safety system which delays firing by even half a second, or which introduces a significant false rejection rate (and 1% is way over the line), is a positive hazard. When the police switch to smart guns, and have used them successfully for some time (say, a year at least) without problems, I'll beleive them ready for prime time. Peter Trei From camera_lumina at hotmail.com Mon Jan 10 12:42:47 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 10 Jan 2005 15:42:47 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> Message-ID: And we'll probably have many years of non-Smart-Gun type accidents...eg, Drunk guy at party put gun to his head and blew his own brains out, assuming it was a smart gun, or, trailer park momma gives gun to toddler assuming its a "safe" smart gun. -TD >From: "Trei, Peter" >To: "John Kelsey" , "R.A. Hettinga" >, , > >Subject: RE: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire >Date: Mon, 10 Jan 2005 15:04:21 -0500 > >John Kelsey > > > >Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire > > > By ANNE EISENBERG > > > > I just wonder what the false negative rates are. Seem like a > > gun that has a 1% chance of refusing to fire when you *really > > need it* might not be worth all that much. Similarly, one > > that you can't get to work if you've got a band-aid on your > > finger, or a cut on your hand, or whatever, loses a lot of > > its value. On the other hand, a gun that can't be made to go > > off by your toddler is a pretty huge win, assuming you're > > willing to trust the technology, but a 90% accuracy level > > sounds to me like 10% of the time, your three year old can, > > in fact, cause the thing to go off. That's not worth much, > > but maybe they'll get it better. And the "suspect struggles > > with cop, gets gun, and shoots cop" problem would definitely > > be helped by a guy that wouldn't go off for 90% of attackers. > > > > --John > >A remarkable number of police deaths are 'own gun' >incidents, so the police do have a strong motivation >to use 'smart guns' if they are reliable. > >In New Jersey, there is some kind of legislation >in place to restrict sales to 'smart guns', once >they exist. Other types would be banned. (Actually, >getting a carry permit in NJ is already almost >impossible, unless you're politically connected.) > >This particular model seems to rely on pressure >sensors on the grip. This bothers me - under the >stress of a gunfight, you're likely to have a >somewhat different pattern than during the >enrollment process. > >Many 'smart guns' also have big problems with >issues which arise in real life gun fights - >shooting from awkward positions behind cover, >one-handed vs two-handed, weak hand (righthander >using left hand, and vice versa, which can happen >if dictated by cover or injury), point vs >sighted shooting, and passing a gun to a disarmed >partner. > >There are other systems which have been proposed; >magnetic or RFID rings, fingerprint sensors, etc. > >The one thing that seems to be common to all of >the 'smart gun' designs is that they are >conceived by people with little experience in >how guns are actually used. > >To look at a particularly ludicrous example, try >http://www.wmsa.net/other/thumb_gun.htm > >For a gun to work, it is just as important that >it fires when it should, as that it does not >fire when it shouldn't. A safety system >which delays firing by even half a second, >or which introduces a significant false >rejection rate (and 1% is way over the line), >is a positive hazard. > >When the police switch to smart guns, and >have used them successfully for some time >(say, a year at least) without problems, >I'll beleive them ready for prime time. > >Peter Trei From ptrei at rsasecurity.com Mon Jan 10 14:23:33 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 10 Jan 2005 17:23:33 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFF@rsana-ex-hq1.NA.RSA.NET> Justin wrote: > > On 2005-01-10T15:04:21-0500, Trei, Peter wrote: > > > > John Kelsey > > > > > >Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire > > > > By ANNE EISENBERG > > > > > > I just wonder what the false negative rates are. Seem like a > > > > A remarkable number of police deaths are 'own gun' > > incidents, so the police do have a strong motivation > > to use 'smart guns' if they are reliable. > > The NJ law specifically exempts the police from the smart gun > requirement (which for civilians goes into effect in 2007 or 2008). > Regardless, the legislature doesn't need to get involved for law > enforcement to change their weapons policy and require "smart guns." Cynically, I'm not the slightest bit suprised that the police are exempted: 'safety for the government, not for the people'. > False positives may also present a problem. If the only way to get an > acceptable identification rate (99%, for instance) is to create a 50% > false positive rate for unauthorized users, that's reduces utilitarian > benefit by half. A 1% false negative rate is too high. A 50% false positive rate is *much* too high. > "Smart guns" are a ploy to raise the cost of guns, make them require > more maintenance, annoy owners, and as a result decrease gun > ownership. If it's combined with a rule to ban the transfer and/or ownership of 'dumb' (ie, reliable) guns, then it's also a backdoor gun confiscation policy. I'm afraid that they may get away with it. Here in MA, the only handguns which can legally be bought new are those on a fairly short list compiled by the State Attorney General which meet his arbitrary 'safety standards'. If I wanted, say, a Pardini (a very expensive special purpose .22short target pistol) I'm SOL. In fact, it's almost impossible for MA residents to participate in some of the shooting sports competitively, due to the AG's list. Peter Trei From eugen at leitl.org Mon Jan 10 09:02:21 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jan 2005 18:02:21 +0100 Subject: [IP] The DNA round-up on Cape Cod (fwd from dave@farber.net) Message-ID: <20050110170221.GK9221@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Mon Jan 10 15:18:15 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 10 Jan 2005 18:18:15 -0500 Subject: Should Anarchists Take State Money? Message-ID: Mises Economics Blog January 10, 2005 Should Anarchists Take State Money? by Robert Murphy A discussion on a private email list brought up a familiar topic: When is it permissible for self-described anarchists (let's restrict ourselves here to anarcho-capitalists) to take government money? This is a tricky question, and I have yet to see someone offer a satisfactory list of necessary and sufficient conditions. Usually when an-caps argue about this, they end up shooting more and more refined analogies back and forth. For example, to me it's not enough to say that any money spent in the private sector is legitimate (vis-a-vis one's anarchism). I personally would not feel justified in working for a Halliburton. However, what about the guy who opens a Dunkin Donuts near a police station? Is he accepting "government money"? Does it matter if he's in a podunk town with a sheriff and a deputy, versus if he lives in LA and knows for a fact that several of his customers beat the #$#)($* out of suspects? A big problem in this area is education: Can anarcho-capitalist economists take teaching posts at State schools? After all, the State intervenes heavily in education, which is a perfectly laudable market institution. But surely there are more teaching posts because of the State than there otherwise would be. Does the an-cap professor have to estimate whether his or her post would actually exist in the absence of State intervention, or is that irrelevant? Personally, I have decided that I will never work for an official State school. If I really mean it when I refer (in LRC articles, for example) to the State as "a gang of killers and thieves," then how can I possibly associate with such people? Yes yes, there are millions of analogies and counterarguments, but for me there is a definite line to be drawn at actually being on the payroll. (I also wouldn't take welfare, for example, even though in previous years I have put in a lot to the tax system.) Before closing, I should say that in no way am I taking a holier than thou stance. For example, I applied for the Stafford (unsubsidized!) loan in grad school, even though the State technically coerced those lending institutions into offering me such low rates. And I know a guy who is so hard core about starving the beast, that he felt like a sellout when he took a job on the books and had some of his paycheck withheld. (I.e. when he worked under the table, then at least his money wasn't funding the State's wars etc.) But as far as State schools, I think there are a few other things that people often leave out of the discussion. First, why would I want to throw my talents into a State school? I would much rather work on the side of the underdog, and every time I publish a paper or give a talk, I want a private school to get the credit. (This also applies to whatever influence I have on students; I don't want to enhance a State school's reputation by churning out better-than-otherwise students, so long as I could do the same at a private school.) A second issue is a bit more subtle: When moderate Americans hear of an-cap professors berating the existence of the State, while they work for the State, I think two things happen. (A) They think, "What a hypocrite! These ivory tower academics need to get in the real world before redesigning society!" And (B), they think, "Our government is so open and tolerant! It even employs academics who call for its abolition! I'm so glad I live here and not under the Taliban." (Again, this is not meant as a criticism of those who choose to work at State schools. I'm just explaining my position.) Posted by Murphy at January 10, 2005 08:08 AM Comments You're very lucky that you have private colleges where you live. Many have no such choice. Then all one can do is firmly bite the hand that feeds. Posted by: Sudha Shenoy at January 10, 2005 08:40 AM Ayn Rand had an article that was instructive on this issue. She was asked whether it was moral for someone to take a government-backed student loan. She said it was, because the person receiving the loan had no moral duty to abstain from receiving a benefit the government was giving to others. Rand distinguished between such benefits and those who choose to work in the government at jobs that had no function other than to violate individual rights (I believe she cited the Federal Trade Commission as an example.) The difference was between using a service that *should* be provided by the public sector (i.e. the Postal Service) and those that could never exist in a free market (i.e. monopoly regulators). Of course, Rand was only addressing the ethical dilema; whether taking state money is practical towards advancing one's particular interests or ideology is a separate question. Posted by: Skip Oliva at January 10, 2005 08:43 AM Hans-Hoppe teaches at the University of Las Vegas, Nevada and Murray Rothbard taught there before him. I do not see this as being hypocritical. The main reason why is that if the government taxes and spends on universities, it inevitably pushes private institutions out of the market by charging artificially low tuition. Therefore, the number of available positions at private universities is diminished, reducing opportunities for non-public university professorships. The bottom line is that the state has created a system in which there is crime all around us. If we worried about "taking advantage" of this crime all the time we probably wouldn't even step outside our front doors in the morning, and we certainly wouldn't be driving on public roads. On the other hand, there would definately be something wrong with say becoming an IRS agent while claiming to be an anarcho-capitalist at the same time. Posted by: Steven Kane at January 10, 2005 08:44 AM Actually I thought Rand's best contribution was this: "There is, of course, a limitation on the moral right to take a government job: one must not accept any job that demands ideological services, i.e., any job that requires the use of one's mind to compose propaganda material in support of welfare statism -- or any job in a regulatory administrative agency enforcing improper, non-objective laws." (Objectivist, June 1966, sent by Roderick Long) Now, this is interesting. Many people think it might be a bad thing, for example, for a libertarian to work for the INS or the IRS or some such, but would be happy to take a job as a presidential speech writer. Somehow it is usually assumed to be ok to do intellectual work but not ok to actually rob and kill for the state. Rand seems to be saying that it is as bad or worse to offer one's intellectual talents for propaganda reasons. Posted by: Jeffrey at January 10, 2005 08:52 AM I recently struggled with this problem. Here in Detroit the automotive industry (most of the city) shuts down between Christmas and New Years (because of the UAW contracts). For most this is a paid vacation but I am currently a contract employee (The big three hire all new employees as contractors first to avoid all the messy federal laws restricting their right to fire people for being incompetent), so it was forced time off for me. The problem is so common though that every contract employee is given a small packet of information on how to solve the problem of losing wages over the vacation: apply for unemployment. I struggled for days, being an anarcho-capitalist, on whether or not it was ethical to accept the state's welfare money. Sure, I think welfare is robbery and wrong to the core but I am forced to pay in to it whether I like it or not - so why not reclaim some of that money? Ultimately I decided that it was ethical but I simply couldn't bring myself to do it. Ethical maybe, but it still felt immoral to me. Having just graduated from college and moved to a new place I could have really used the money - but I just felt dirty about taking it. Posted by: Adam H at January 10, 2005 10:15 AM Here is Rothbard's point of view on this question: "The ground on which we must stand, to be moral and rational in a state-run world is to: (1) work and agi-tate as best we can, in behalf of liberty; (2) while working in the matrix of our given world, to refuse to add to its sta-tism; and (3) to refuse absolutely to participate in State activities that are immoral and criminal per se." Posted by: Jeffrey at January 10, 2005 10:26 AM I worked for a small private startup at my last job. Even though we were "private", most of our money came from government agencies/projects. I think the public/private distinction can be misleading. What matters is what interests you are serving. Are you serving people's voluntary wants and needs or demand created by government regulation and taxes? I don't think there's a clear cut answer in most situations. Posted by: Danny Taggart at January 10, 2005 10:42 AM Sam Bostaph wrote, on the list: "Murphy raises several questions--and gives no answers to them. Then, he asserts personal preferences--with loose or no reasoning to support them. He might as well be discussing choices from menu." I agree with Sam. And as I wrote on the list: "Bottom line: the overwrought, over-agonized, over-thought attempts to justify one's way of living in this imperfect world are simply pointless. "First, libertarian employees of state universities might try to come up with any number of justifications for why their chosen career is "justified". But in the end, how many of them would quit if their little libertarian calculus came out the wrong way? I think it's clear the answer is near-zero. Clearly this is just make-weight argument; rationalization. Strunk and White say, if you don't know how to pronounce a word, say it loud! "Why compound ignorance with inaudibility?" Likewise, if you are going to enter the game of life--in this mixed-state world, where some careers one would choose in the free market are largely monopolized by the state; where one must participate in state-decreed institutions and rules in order to flourise, prosper, succeed, and survive--don't pussyfoot around about it. Don't be embarrassed by it. Don't, for God's sake, *apologize* for it. Remember Galt had the face without pain or fear or guilt. Those who opppose the current malicious order are not to blame for it. They are -- we are -- already victims. To insist that we victims -- *because* we are victims (those who respect rights) -- have to suffer even further damage, to restrict ourselves from career and business and life opportunities that, ironically, our fellow men who do not agonize over the morality of their choices, ... frankly, to my mind, it is ridiculous and obscene. "Libertarianism at its essence distinguishes between victim and aggressor. To whine and hand-wring about what one libertarianly can or cannot do in this world -- when our non-libertarian enemies, yes enemies, do not give a damn about it -- is, in my view, to equate victim with aggressor; to blame the victim for trying to make it in the the nonlibertarian world he has been thrust into; a world that is nonlibertarain specifically because of the beliefs and actions of his fellow non-libertarian citizens. To say he should have a higher standard of behavior than them is to add injury to injury." Murphy writes, "I personally would not feel justified in working for a Halliburton." I suppose there are a few die-hard types out there whose personal preferences would lead them to ever and ever greater personal sacrifices so they feel they are living by some kind of moral principles or something. But I find the entire notion that you *need*, in general, to "justify" where you work is just a bit silly. I agree w/ Bostaph that Murphy supplies no reasons for his assertions; why it's okay to set up a donut shop selling to police, but not to "be on the payroll". Surely Austrians are aware there is nothing economically special about the "employee" relationship; just as political borders are just political and not economically objective. I believe it is not hypocritical to live in the real world, as a general matter. What is hypocritical, in my view, is the pretense of some libertarians that they work at their present state-related jobs *only* because they have found a way to justify it. I would be a lot of money that 99% of these people would not quit their jobs, even if you could show them their little pet proofs "justifying" the morality of their position is flawed. So it's just a makeweight argument trotted out in a vain attempt to show that one's chosen career is "justified"; but the only reason to do this is the false notion that one's career *needs* justifying. Posted by: Stephan Kinsella at January 10, 2005 11:21 AM Jeffrey's quote from Rothbard (in particular, "(2) while working in the matrix of our given world, to refuse to add to its sta-tism"), I believe, answers the titular question perfectly. Even if it is the case that, by starting from scratch, a better system could be constructed, if our aim is the construction of that system, we must recognize that we do not have the luxury of erasing the influences of Marx, FDR, et al. Those who would change the system must necessarily work within it, and if that means using U.S. Mint-coined money, so be it. Posted by: Lowell at January 10, 2005 11:26 AM Stephan, Interesting points, although showing that something is moral or immoral, legal or illegal, does not in any way show that one would stop doing it. Everyone acts immorally numerous times each day. The fact that they know they're acting such doesn't stop them from doing such. Good people try to strive to be the best they can, presumeably. Ultimately, everyone has to live with what they do, and with how other people perceive what they do. A good person is someone who tries to do what he thinks is moral. Such people generally are engaged in careers they think moral. It will take a lot of argument to convince them otherwise. However, if they can be convinced of the immorality of their career, they will quit it (or cease being good people). An "evil" person is someone who does not bother to try doing what he thinks is moral. That is, the person who knows what is moral, yet does not abide by it. I would characterize Alan Greenspan as such a person. Posted by: David Heinrich at January 10, 2005 11:36 AM In an earlier post on this blog, I noted the example of Todd Zywicki, a law professor who recently finished a stint as planning director at the FTC. In his professorial role (at a state school, George Mason), Zywicki has portrayed himself as a free-market champion. Yet during his FTC service, he stood by and said nothing while the agency committed all sorts of individual rights violations. This is the type of person who needs to be condemned as evil--the man who poses as an ally of free markets, yet when put in a position of authority does nothing to advance the cause. Posted by: Skip Oliva at January 10, 2005 12:05 PM I wonder what Ayn Rand would have thought of the fact that one of her closest associates is now the person who is responsible for carrying out the biggest inflationist institution in the world-and also propagates for the usefullness of that institution. Posted by: Stefan Karlsson at January 10, 2005 01:49 PM Libertarians who work as speechwriters for the State do great damage. They enable the interventionists to disguise their destructiveness with positive-sounding rhetoric. Posted by: JS Henderson at January 10, 2005 01:49 PM Unless something great happens, the government is going to be stealing my money and violating my rights until the day I die. I have no problem getting some of that money back through subsidized loans and government scholarships. Although I do believe it is disrespectful for the government to sponsor a scholarship in Barry Goldwater's name, I am proud to be nominated for it. Posted by: Horatio at January 10, 2005 02:02 PM As the for the private/state school arguments, private schools subsidized by the state also. Kids complete the fafsa and receive pell grants, and loans to go the both schools. We support the state in so many ways because we enhance society and its members. I think you're justified if you work is agaisnt the government, but not against the people. Posted by: Andy D at January 10, 2005 03:50 PM Stephan, I agree w/ Bostaph that Murphy supplies no reasons for his assertions; why it's okay to set up a donut shop selling to police, but not to "be on the payroll". Just to clarify, I didn't say it was OK to set up a donut shop. I asked if it were (for those who think one can't work for Halliburton in good conscience). My point here is not to lay out the definitive answer, but rather to say that I think I could come up with particular examples that would cast doubt upon any hard-and-fast rule people on either side give. E.g. if an an-cap thinks there's no problem working for Halliburton, then we can ask about a military company that exclusively supplies stuff to the gov't. I agree with Bostaph that I didn't give any answers; that's my point. (But this implies of course that I didn't agree with the official positions both of you took. As I recall, Bostaph said something like, "They aren't fair with me, so I'm not going to worry about playing nice with them." That's not the issue; no one is saying you shouldn't work for the State because it might violate the rights of the tax man. Am I allowed to mug a guy walking down the street because the IRS took my money?) I didn't bring this up on the List because I thought this topic was getting beaten to a pulp, but since you posted your response from there, let me address something that concerned me: To insist that we victims -- *because* we are victims (those who respect rights) -- have to suffer even further damage, to restrict ourselves from career and business and life opportunities that, ironically, our fellow men who do not agonize over the morality of their choices, ... frankly, to my mind, it is ridiculous and obscene. Here you're just begging the question. Are you an innocent victim "(those who respect rights)" if you work for the government? No one is arguing that the victims of gov't abuse should hurt themselves even more so; the claim is that victims of government abuse aren't thereby given a green light to abuse third parties as compensation. And finally, I don't see why you're disgusted that "our side" is worried about choosing justified means. Isn't that what makes us libertarians, that we worry about violating side constraints? Posted by: RPM at January 10, 2005 04:04 PM -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Mon Jan 10 18:27:50 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 10 Jan 2005 18:27:50 -0800 Subject: Adware for Windows Media Player spreading by P2P Message-ID: <6.0.3.0.0.20050110181748.03c8afe8@pop.idiom.com> http://www.theregister.com/2004/12/31/p2p_adware_threat/ According to an article in The Register, Overpeer is spreading adware-infected Windows Media Audio and Windows Media Video files via P2P. PC World Magazine did some research, ran Etherpeek, and found that the adware was going to Overpeer, which is owned by Loudeye, who strongly defend the practice, saying music pirates deserve what they get. Of course, what the article isn't mentioning is that this means that the WMA and WMV file formats have features that can be used with the Windows Media Player to support adware, so a good chunk of the blame belongs back in Redmond. (Remind me again why closed-source DRMware is a good idea?) Now, it wouldn't bother me if the Windows Media Player's silly trippy visuals that you get when playing audio that doesn't have a video track were replaced by some advertising video, as long as it's all self-contained and doesn't phone home to tell advertisers what I'm listening to. But this one seems to be pretty chatty. ---- Bill Stewart bill.stewart at pobox.com From justin-cypherpunks at soze.net Mon Jan 10 13:51:06 2005 From: justin-cypherpunks at soze.net (Justin) Date: Mon, 10 Jan 2005 21:51:06 +0000 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050110215106.GA2630@arion.soze.net> On 2005-01-10T15:04:21-0500, Trei, Peter wrote: > > John Kelsey > > > >Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire > > > By ANNE EISENBERG > > > > I just wonder what the false negative rates are. Seem like a > > A remarkable number of police deaths are 'own gun' > incidents, so the police do have a strong motivation > to use 'smart guns' if they are reliable. The NJ law specifically exempts the police from the smart gun requirement (which for civilians goes into effect in 2007 or 2008). Regardless, the legislature doesn't need to get involved for law enforcement to change their weapons policy and require "smart guns." False positives may also present a problem. If the only way to get an acceptable identification rate (99%, for instance) is to create a 50% false positive rate for unauthorized users, that's reduces utilitarian benefit by half. Batteries go dead. Solder joints break. Transistors and capacitors go bad. Pressure sensors jam. This is not the kind of technology I want in something that absolutely, positively has to go boom if I want it to. For handguns, I'll stick with pure mechanical mechanisms, thanks. "Smart guns" are a ploy to raise the cost of guns, make them require more maintenance, annoy owners, and as a result decrease gun ownership. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From justin-cypherpunks at soze.net Mon Jan 10 16:35:28 2005 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 11 Jan 2005 00:35:28 +0000 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire In-Reply-To: References: <017630AA6DF2DF4EBC1DD4454F8EE29704776BFE@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050111003528.GA5192@arion.soze.net> On 2005-01-10T15:42:47-0500, Tyler Durden wrote: > > And we'll probably have many years of non-Smart-Gun type accidents...eg, > Drunk guy at party put gun to his head and blew his own brains out, > assuming it was a smart gun, or, trailer park momma gives gun to toddler > assuming its a "safe" smart gun. Some gun "accidents" are suicides reported as such to avoid embarrassment to the family. Similarly, I think a few of the gun "accidents" involving real "children", which are extremely rare to begin with, go like this... "Son, why don't you take this gun and pretend to go shoot daddy? It's not loaded." Or, "Son, why don't you take the gun, put it to your head, and pull the trigger? It's not loaded." I don't believe the article when it says that smart guns are useless if stolen. What do they have, a tamper-proof memory chip storing a 128-bit reprogramming authorization key that must be input via computer before allowing a new person to be authorized? And what's to stop a criminal from ripping out all the circuitry and the safety it engages? -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From ptrei at rsasecurity.com Tue Jan 11 07:07:22 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 11 Jan 2005 10:07:22 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C01@rsana-ex-hq1.NA.RSA.NET> Justin wrote: > > I don't believe the article when it says that smart guns are > useless if > stolen. What do they have, a tamper-proof memory chip > storing a 128-bit > reprogramming authorization key that must be input via computer before > allowing a new person to be authorized? And what's to stop a criminal > from ripping out all the circuitry and the safety it engages? The 'stolen gun' problems most of the so-called 'smart gun' proposals are trying to address are the situation when a cop's own gun is taken from him and immediately used against him, or a kid finding one in a drawer. A determined and resourceful person can, given time, defeat them all. After all, a 'determined and resourceful person can build a gun from scratch with a small machine shop, and many do (its not automatically illegal). I link below to an absolutely bizarre proposal - apparently real and claimed to be existing in prototype - by an South African inventor to make an unstealable gun. Amongst other weirdness, it fires the specially manufactured cartridges by firing a laser into the glass-backed primer. As a result removing the electronics would make it unusable. You'd have to hack it instead. http://www.wmsa.net/other/thumb_gun.htm This is a typical example of what I meant when I said that 'smart gun' proposals all come from people with zero knowledge of how guns are used. I strongly suspect that the gun in the picture is a non-working prop. Peter Trei From camera_lumina at hotmail.com Tue Jan 11 07:11:34 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 11 Jan 2005 10:11:34 -0500 Subject: Should Anarchists Take State Money? In-Reply-To: Message-ID: Hey! I just created a small replica of Rodan's "The Thinker" by sculpting it out of my poop! -TD >From: "R.A. Hettinga" >To: cypherpunks at al-qaeda.net >Subject: Should Anarchists Take State Money? >Date: Mon, 10 Jan 2005 18:18:15 -0500 > > > > >Mises Economics Blog > > >January 10, 2005 > > > >Should Anarchists Take State Money? > >by Robert Murphy > >A discussion on a private email list brought up a familiar topic: When is >it permissible for self-described anarchists (let's restrict ourselves here >to anarcho-capitalists) to take government money? This is a tricky >question, and I have yet to see someone offer a satisfactory list of >necessary and sufficient conditions. Usually when an-caps argue about this, >they end up shooting more and more refined analogies back and forth. > >For example, to me it's not enough to say that any money spent in the >private sector is legitimate (vis-a-vis one's anarchism). I personally >would not feel justified in working for a Halliburton. However, what about >the guy who opens a Dunkin Donuts near a police station? Is he accepting >"government money"? Does it matter if he's in a podunk town with a sheriff >and a deputy, versus if he lives in LA and knows for a fact that several of >his customers beat the #$#)($* out of suspects? > >A big problem in this area is education: Can anarcho-capitalist economists >take teaching posts at State schools? After all, the State intervenes >heavily in education, which is a perfectly laudable market institution. But >surely there are more teaching posts because of the State than there >otherwise would be. Does the an-cap professor have to estimate whether his >or her post would actually exist in the absence of State intervention, or >is that irrelevant? > >Personally, I have decided that I will never work for an official State >school. If I really mean it when I refer (in LRC articles, for example) to >the State as "a gang of killers and thieves," then how can I possibly >associate with such people? Yes yes, there are millions of analogies and >counterarguments, but for me there is a definite line to be drawn at >actually being on the payroll. (I also wouldn't take welfare, for example, >even though in previous years I have put in a lot to the tax system.) > >Before closing, I should say that in no way am I taking a holier than thou >stance. For example, I applied for the Stafford (unsubsidized!) loan in >grad school, even though the State technically coerced those lending >institutions into offering me such low rates. And I know a guy who is so >hard core about starving the beast, that he felt like a sellout when he >took a job on the books and had some of his paycheck withheld. (I.e. when >he worked under the table, then at least his money wasn't funding the >State's wars etc.) > >But as far as State schools, I think there are a few other things that >people often leave out of the discussion. First, why would I want to throw >my talents into a State school? I would much rather work on the side of the >underdog, and every time I publish a paper or give a talk, I want a private >school to get the credit. (This also applies to whatever influence I have >on students; I don't want to enhance a State school's reputation by >churning out better-than-otherwise students, so long as I could do the same >at a private school.) > >A second issue is a bit more subtle: When moderate Americans hear of an-cap >professors berating the existence of the State, while they work for the >State, I think two things happen. (A) They think, "What a hypocrite! These >ivory tower academics need to get in the real world before redesigning >society!" And (B), they think, "Our government is so open and tolerant! It >even employs academics who call for its abolition! I'm so glad I live here >and not under the Taliban." > >(Again, this is not meant as a criticism of those who choose to work at >State schools. I'm just explaining my position.) > >Posted by Murphy at January 10, 2005 08:08 AM > >Comments > > >You're very lucky that you have private colleges where you live. Many have >no such choice. Then all one can do is firmly bite the hand that feeds. > >Posted by: Sudha Shenoy at January 10, 2005 08:40 AM > >Ayn Rand had an article that was instructive on this issue. She was asked >whether it was moral for someone to take a government-backed student loan. >She said it was, because the person receiving the loan had no moral duty to >abstain from receiving a benefit the government was giving to others. Rand >distinguished between such benefits and those who choose to work in the >government at jobs that had no function other than to violate individual >rights (I believe she cited the Federal Trade Commission as an example.) >The difference was between using a service that *should* be provided by the >public sector (i.e. the Postal Service) and those that could never exist in >a free market (i.e. monopoly regulators). > > Of course, Rand was only addressing the ethical dilema; whether taking >state money is practical towards advancing one's particular interests or >ideology is a separate question. > >Posted by: Skip Oliva at January 10, 2005 08:43 AM > >Hans-Hoppe teaches at the University of Las Vegas, Nevada and Murray >Rothbard taught there before him. I do not see this as being hypocritical. >The main reason why is that if the government taxes and spends on >universities, it inevitably pushes private institutions out of the market >by charging artificially low tuition. Therefore, the number of available >positions at private universities is diminished, reducing opportunities for >non-public university professorships. > >The bottom line is that the state has created a system in which there is >crime all around us. If we worried about "taking advantage" of this crime >all the time we probably wouldn't even step outside our front doors in the >morning, and we certainly wouldn't be driving on public roads. > >On the other hand, there would definately be something wrong with say >becoming an IRS agent while claiming to be an anarcho-capitalist at the >same time. > >Posted by: Steven Kane at January 10, 2005 08:44 AM > >Actually I thought Rand's best contribution was this: "There is, of course, >a limitation on the moral right to take a government job: one must not >accept any job that demands ideological services, i.e., any job that >requires the use of one's mind to compose propaganda material in support of >welfare statism -- or any job in a regulatory administrative agency >enforcing improper, non-objective laws." (Objectivist, June 1966, sent by >Roderick Long) > >Now, this is interesting. Many people think it might be a bad thing, for >example, for a libertarian to work for the INS or the IRS or some such, but >would be happy to take a job as a presidential speech writer. Somehow it is >usually assumed to be ok to do intellectual work but not ok to actually rob >and kill for the state. Rand seems to be saying that it is as bad or worse >to offer one's intellectual talents for propaganda reasons. > > Posted by: Jeffrey at January 10, 2005 08:52 AM > >I recently struggled with this problem. Here in Detroit the automotive >industry (most of the city) shuts down between Christmas and New Years >(because of the UAW contracts). For most this is a paid vacation but I am >currently a contract employee (The big three hire all new employees as >contractors first to avoid all the messy federal laws restricting their >right to fire people for being incompetent), so it was forced time off for >me. The problem is so common though that every contract employee is given a >small packet of information on how to solve the problem of losing wages >over the vacation: apply for unemployment. > >I struggled for days, being an anarcho-capitalist, on whether or not it was >ethical to accept the state's welfare money. Sure, I think welfare is >robbery and wrong to the core but I am forced to pay in to it whether I >like it or not - so why not reclaim some of that money? > >Ultimately I decided that it was ethical but I simply couldn't bring myself >to do it. Ethical maybe, but it still felt immoral to me. Having just >graduated from college and moved to a new place I could have really used >the money - but I just felt dirty about taking it. > >Posted by: Adam H at January 10, 2005 10:15 AM > > > Here is Rothbard's point of view on this question: "The ground on which >we >must stand, to be moral and rational in a state-run world is to: (1) work >and agi-tate as best we can, in behalf of liberty; (2) while working in the >matrix of our given world, to refuse to add to its sta-tism; and (3) to >refuse absolutely to participate in State activities that are immoral and >criminal per se." > >Posted by: Jeffrey at January 10, 2005 10:26 AM > >I worked for a small private startup at my last job. Even though we were >"private", most of our money came from government agencies/projects. I >think the public/private distinction can be misleading. What matters is >what interests you are serving. Are you serving people's voluntary wants >and needs or demand created by government regulation and taxes? I don't >think there's a clear cut answer in most situations. > >Posted by: Danny Taggart at January 10, 2005 10:42 AM > >Sam Bostaph wrote, on the list: "Murphy raises several questions--and gives >no answers to them. Then, he asserts personal preferences--with loose or no >reasoning to support them. He might as well be discussing choices from >menu." > >I agree with Sam. And as I wrote on the list: "Bottom line: the >overwrought, over-agonized, over-thought attempts to justify one's way of >living in this imperfect world are simply pointless. > >"First, libertarian employees of state universities might try to come up >with any number of justifications for why their chosen career is >"justified". But in the end, how many of them would quit if their little >libertarian calculus came out the wrong way? I think it's clear the answer >is near-zero. Clearly this is just make-weight argument; rationalization. >Strunk and White say, if you don't know how to pronounce a word, say it >loud! "Why compound ignorance with inaudibility?" Likewise, if you are >going to enter the game of life--in this mixed-state world, where some >careers one would choose in the free market are largely monopolized by the >state; where one must participate in state-decreed institutions and rules >in order to flourise, prosper, succeed, and survive--don't pussyfoot around >about it. Don't be embarrassed by it. Don't, for God's sake, *apologize* >for it. Remember Galt had the face without pain or fear or guilt. Those who >opppose the current malicious order are not to blame for it. They are -- we >are -- already victims. To insist that we victims -- *because* we are >victims (those who respect rights) -- have to suffer even further damage, >to restrict ourselves from career and business and life opportunities that, >ironically, our fellow men who do not agonize over the morality of their >choices, ... frankly, to my mind, it is ridiculous and obscene. > > "Libertarianism at its essence distinguishes between victim and >aggressor. >To whine and hand-wring about what one libertarianly can or cannot do in >this world -- when our non-libertarian enemies, yes enemies, do not give a >damn about it -- is, in my view, to equate victim with aggressor; to blame >the victim for trying to make it in the the nonlibertarian world he has >been thrust into; a world that is nonlibertarain specifically because of >the beliefs and actions of his fellow non-libertarian citizens. To say he >should have a higher standard of behavior than them is to add injury to >injury." > >Murphy writes, "I personally would not feel justified in working for a >Halliburton." I suppose there are a few die-hard types out there whose >personal preferences would lead them to ever and ever greater personal >sacrifices so they feel they are living by some kind of moral principles or >something. But I find the entire notion that you *need*, in general, to >"justify" where you work is just a bit silly. I agree w/ Bostaph that >Murphy supplies no reasons for his assertions; why it's okay to set up a >donut shop selling to police, but not to "be on the payroll". Surely >Austrians are aware there is nothing economically special about the >"employee" relationship; just as political borders are just political and >not economically objective. > >I believe it is not hypocritical to live in the real world, as a general >matter. What is hypocritical, in my view, is the pretense of some >libertarians that they work at their present state-related jobs *only* >because they have found a way to justify it. I would be a lot of money that >99% of these people would not quit their jobs, even if you could show them >their little pet proofs "justifying" the morality of their position is >flawed. So it's just a makeweight argument trotted out in a vain attempt to >show that one's chosen career is "justified"; but the only reason to do >this is the false notion that one's career *needs* justifying. > >Posted by: Stephan Kinsella at January 10, 2005 11:21 AM > >Jeffrey's quote from Rothbard (in particular, "(2) while working in the >matrix of our given world, to refuse to add to its sta-tism"), I believe, >answers the titular question perfectly. > >Even if it is the case that, by starting from scratch, a better system >could be constructed, if our aim is the construction of that system, we >must recognize that we do not have the luxury of erasing the influences of >Marx, FDR, et al. Those who would change the system must necessarily work >within it, and if that means using U.S. Mint-coined money, so be it. > >Posted by: Lowell at January 10, 2005 11:26 AM > >Stephan, > >Interesting points, although showing that something is moral or immoral, >legal or illegal, does not in any way show that one would stop doing it. >Everyone acts immorally numerous times each day. The fact that they know >they're acting such doesn't stop them from doing such. Good people try to >strive to be the best they can, presumeably. > >Ultimately, everyone has to live with what they do, and with how other >people perceive what they do. > > A good person is someone who tries to do what he thinks is moral. Such >people generally are engaged in careers they think moral. It will take a >lot of argument to convince them otherwise. However, if they can be >convinced of the immorality of their career, they will quit it (or cease >being good people). > > An "evil" person is someone who does not bother to try doing what he >thinks is moral. That is, the person who knows what is moral, yet does not >abide by it. I would characterize Alan Greenspan as such a person. > > Posted by: David Heinrich at January 10, 2005 11:36 AM > >In an earlier post on this blog, I noted the example of Todd Zywicki, a law >professor who recently finished a stint as planning director at the FTC. In >his professorial role (at a state school, George Mason), Zywicki has >portrayed himself as a free-market champion. Yet during his FTC service, he >stood by and said nothing while the agency committed all sorts of >individual rights violations. This is the type of person who needs to be >condemned as evil--the man who poses as an ally of free markets, yet when >put in a position of authority does nothing to advance the cause. > > Posted by: Skip Oliva at January 10, 2005 12:05 PM > >I wonder what Ayn Rand would have thought of the fact that one of her >closest associates is now the person who is responsible for carrying out >the biggest inflationist institution in the world-and also propagates for >the usefullness of that institution. > >Posted by: Stefan Karlsson at January 10, 2005 01:49 PM > >Libertarians who work as speechwriters for the State do great damage. They >enable the interventionists to disguise their destructiveness with >positive-sounding rhetoric. > >Posted by: JS Henderson at January 10, 2005 01:49 PM > >Unless something great happens, the government is going to be stealing my >money and violating my rights until the day I die. I have no problem >getting some of that money back through subsidized loans and government >scholarships. Although I do believe it is disrespectful for the government >to sponsor a scholarship in Barry Goldwater's name, I am proud to be >nominated for it. > >Posted by: Horatio at January 10, 2005 02:02 PM > >As the for the private/state school arguments, private schools subsidized >by the state also. Kids complete the fafsa and receive pell grants, and >loans to go the both schools. We support the state in so many ways because >we enhance society and its members. I think you're justified if you work is >agaisnt the government, but not against the people. > >Posted by: Andy D at January 10, 2005 03:50 PM > >Stephan, > >I agree w/ Bostaph that Murphy supplies no reasons for his assertions; why >it's okay to set up a donut shop selling to police, but not to "be on the >payroll". > >Just to clarify, I didn't say it was OK to set up a donut shop. I asked if >it were (for those who think one can't work for Halliburton in good >conscience). My point here is not to lay out the definitive answer, but >rather to say that I think I could come up with particular examples that >would cast doubt upon any hard-and-fast rule people on either side give. >E.g. if an an-cap thinks there's no problem working for Halliburton, then >we can ask about a military company that exclusively supplies stuff to the >gov't. > >I agree with Bostaph that I didn't give any answers; that's my point. (But >this implies of course that I didn't agree with the official positions both >of you took. As I recall, Bostaph said something like, "They aren't fair >with me, so I'm not going to worry about playing nice with them." That's >not the issue; no one is saying you shouldn't work for the State because it >might violate the rights of the tax man. Am I allowed to mug a guy walking >down the street because the IRS took my money?) > >I didn't bring this up on the List because I thought this topic was getting >beaten to a pulp, but since you posted your response from there, let me >address something that concerned me: > >To insist that we victims -- *because* we are victims (those who respect >rights) -- have to suffer even further damage, to restrict ourselves from >career and business and life opportunities that, ironically, our fellow men >who do not agonize over the morality of their choices, ... frankly, to my >mind, it is ridiculous and obscene. > > Here you're just begging the question. Are you an innocent victim >"(those >who respect rights)" if you work for the government? No one is arguing that >the victims of gov't abuse should hurt themselves even more so; the claim >is that victims of government abuse aren't thereby given a green light to >abuse third parties as compensation. > >And finally, I don't see why you're disgusted that "our side" is worried >about choosing justified means. Isn't that what makes us libertarians, that >we worry about violating side constraints? > > > >Posted by: RPM at January 10, 2005 04:04 PM > > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From adam at homeport.org Tue Jan 11 07:48:12 2005 From: adam at homeport.org (Adam Shostack) Date: Tue, 11 Jan 2005 10:48:12 -0500 Subject: Simson Garfinkel analyses Skype - Open Society Institute Message-ID: >From owner-cryptography+eugen=leitl.org at metzdowd.com Thu Jan 27 01:04:39 2005 User-Agent: Mutt/1.4.2i On Mon, Jan 10, 2005 at 08:33:41PM -0800, David Wagner wrote: | In article <41E07994.5060004 at systemics.com> you write: | >Voice Over Internet Protocol and Skype Security | >Simson L. Garfinkel | >http://www.soros.org/initiatives/information/articles_publications/articles/ security_20050107/OSI_Skype5.pdf | | >Is Skype secure? | | The answer appears to be, "no one knows". The report accurately reports | that because the security mechanisms in Skype are secret, it is impossible | to analyze meaningfully its security. Most of the discussion of the | potential risks and questions seems quite good to me. | | But in one or two places the report says things like "A conversation on | Skype is vastly more private than a traditional analog or ISDN telephone" | and "Skype is more secure than today's VoIP systems". I don't see any | basis for statements like this. Unfortunately, I guess these sorts of | statements have to be viewed as blind guesswork. Those claims probably | should have been omitted from the report, in my opinion -- there is | really no evidence either way. Fortunately, these statements are the | exception and only appear in one or two places in the report. The basis for these statements is what the other systems don't do. My Vonage VOIP phone has exactly zero security. It uses the SIP-TLS port, without encryption. It doesn't encrypt anything. So, its easy to be more secure than that. So, while it may be bad cryptography, it is still better than the alternatives. Unfortunately. Adam --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- Forwarded message from Peter Gutmann ----- From socket0 at gmail.com Tue Jan 11 02:56:48 2005 From: socket0 at gmail.com (Anton Raath) Date: Tue, 11 Jan 2005 11:56:48 +0100 Subject: Google Exposes Web Surveillance Cams In-Reply-To: <20050109202016.GA22497@positron.jfet.org> References: <20050109192412.GR9221@leitl.org> <20050109202016.GA22497@positron.jfet.org> Message-ID: <6c63fcce05011102564e01f38a@mail.gmail.com> Riad S. Wahby wrote: > I love how all of the coverage leaves out the actual search strings, as > if it's hard to discover what they are at this point. A fairly comprehensive list of search strings per camera/manufacturer can be found here: http://www.i-hacked.com/Computer-Components/Software-Internet/Finding-Online-Webcams!.html A! -- ================================================== anton l. raath http://raath.org/ ================================================== Do not go gentle into that good night, Old age should burn and rave at close of day; Rage, rage against the dying of the light. -- Dylan Thomas ================================================== From ptrei at rsasecurity.com Tue Jan 11 09:05:15 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 11 Jan 2005 12:05:15 -0500 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C03@rsana-ex-hq1.NA.RSA.NET> Justin wrote: > On 2005-01-11T10:07:22-0500, Trei, Peter wrote: >> Justin wrote: >>> >>> I don't believe the article when it says that smart guns >>> are useless if stolen. What do they have, a tamper-proof >>> memory chip storing a 128-bit reprogramming authorization >>> key that must be input via computer before allowing a new >>> person to be authorized? And what's to stop a criminal from >>> ripping out all the circuitry and the safety it engages? >> >> The 'stolen gun' problems most of the so-called 'smart gun' >> proposals are trying to address are the situation when a >> cop's own gun is taken from him and immediately used against >> him, or a kid finding one in a drawer. A determined and >> resourceful person can, given time, defeat them all. > > from the article: > "Guns taken from a home during a robbery would be rendered > useless, too." That statement, in the OA, is not a quote - it's either something the author dreamed up, or (in context) BS fed her by a NJ cop So, we've established that a NYT journalist, writing on a subject she probably knows nothing about, will regurgitate any naively plausible bullshit she's fed. What else is new? My statement that there are a significant number of cops killed by their own guns, and a small but tragic number of people killed accidentally playing with improperly stored guns they find, remains true. These 'smart guns' could reduce that problem, but making them mandatory is a threat to freedom. >>> The South African Smart gun... >> http://www.wmsa.net/other/thumb_gun.htm > Totally useless. Failure modes and various other complaints: I laughed when I saw this (my first thought was "How could anyone practice enough to maintain proficiency?") I was later appalled when I found a colleague using it as an example in a presentation on biometrics. I also strongly expect that Mr. van Zyl does not have a functioning device - this is vaporware of some kind. Peter Trei From rah at shipwright.com Tue Jan 11 09:32:49 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 11 Jan 2005 12:32:49 -0500 Subject: Simple snoop-proof email launched Message-ID: New Scientist Simple snoop-proof email launched 16:04 11 January 2005 NewScientist.com news service Will Knight Software that aims to make encrypted email communications simple enough for even computer novices to use was released on Tuesday. Encryption is the science of securing communications against eavesdropping by converting the content of a message into a code, or cipher, which can only be unlocked using a secret "key". But modern cryptography often involves using complex mathematical algorithms and convoluted key exchanges to protect messages against skilled code-crackers. Ciphire, developed by Ciphire Labs in Munich, Germany, uses a technique called "public key cryptography" to sign and encrypt email messages. Once loaded on to a computer hard drive the software performs all of the complex tasks involved behind the scenes. Ciphire also works with almost any email software client - like Microsoft Outlook, for example - without requiring prior configuration. "The real benefit is the ease of use," says Laird Brown, chief strategist at Ciphire. "Everything is automated, so it's much like a virus scanner. It just sits quietly in the background." Brown told New Scientist the security of the system has also undergone rigorous testing. "From a security perspective, we've taken it as far as we can," he says. The program is being offered free for non-commercial use and can be used by companies for a licence fee. Virtual invisibility Once installed on a PC, Ciphire runs in the background in conjunction with an email client program. It intercepts email after the "send" button is pressed but before the email leaves the computer, and intercepts incoming email before it is formally received by the email program, making it virtually invisible to the user. The program automatically manages the creation of a set of public and private cryptographic keys, simply prompting the user for a password from which the keys are generated. The public key is sent to Ciphire's servers and the private one is stored safely on the user's machine. The two keys are mathematically linked in such a way that two independent parties can communicate securely without first exchanging secret keys. A private key can be combined with another person's public key to create an encrypted message that can be deciphered using the corresponding public and private pair. Each time a message is sent Ciphire checks with its servers to see if the recipient already has their own public key. If they do, the program uses this to encrypt the message. At the other end of the exchange, the recipient's version of the program should automatically retrieve the sender's public key and perform the necessary decryption. If the recipient does not have a key pair the program simply "signs" a message - this key allows the recipient to confirm an email's authenticity but does not protect it from eavesdroppers. Unique signatures The keys kept on Ciphire's servers are also utilised to generate coded signatures unique to the content of each email message sent using the system. If the content of a message is intercepted and altered somewhere between being sent and received - this signature will not be the same, alerting users to the tampering. Brown says this makes it virtually impossible for anyone - including Ciphire itself - to change keys without users becoming aware. Ciphire had several independent cryptography experts audit the software and made modifications based on their recommendations. Russ Housley, of US company Vigil Security, who performed a study of the software, says that it stood up to scrutiny. "The security provided by Ciphire is very robust," he told New Scientist. "In every situation, the designers have chosen the strongest possible cryptographic algorithms and the longest possible key sizes." Housley notes that Ciphire combines several encryption algorithms. This means messages should remain secure even if a fundamental flaw should emerge in one of the algorithms. "This is like holding your pants up with both a belt and suspenders," he says. "If one fails, your pants still stay up." But Housley adds that the main advantage of the software is its simplicity. "If it is difficult to use, then it will not be used," he says. "Transparency is vital for acceptance by users." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 11 09:34:16 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 11 Jan 2005 12:34:16 -0500 Subject: The Secret Lives of Just About Everybody Message-ID: The New York Times January 11, 2005 The Secret Lives of Just About Everybody By BENEDICT CAREY One mislaid credit card bill or a single dangling e-mail message on the home computer would have ended everything: the marriage, the big-time career, the reputation for decency he had built over a lifetime. So for more than 10 years, he ruthlessly kept his two identities apart: one lived in a Westchester hamlet and worked in a New York office, and the other operated mainly in clubs, airport bars and brothels. One warmly greeted clients and waved to neighbors, sometimes only hours after the other had stumbled back from a "work" meeting with prostitutes or cocaine dealers. In the end, it was a harmless computer pop-up advertisement for security software, claiming that his online life was being "continually monitored," that sent this New York real estate developer into a panic and to a therapist. The man's double life is an extreme example of how mental anguish can cleave an identity into pieces, said his psychiatrist, Dr. Jay S. Kwawer, director of clinical education at the William Alanson White Institute in New York, who discussed the case at a recent conference. But psychologists say that most normal adults are well equipped to start a secret life, if not to sustain it. The ability to hold a secret is fundamental to healthy social development, they say, and the desire to sample other identities - to reinvent oneself, to pretend - can last well into adulthood. And in recent years researchers have found that some of the same psychological skills that help many people avoid mental distress can also put them at heightened risk for prolonging covert activities. "In a very deep sense, you don't have a self unless you have a secret, and we all have moments throughout our lives when we feel we're losing ourselves in our social group, or work or marriage, and it feels good to grab for a secret, or some subterfuge, to reassert our identity as somebody apart," said Dr. Daniel M. Wegner, a professor of psychology at Harvard. He added, "And we are now learning that some people are better at doing this than others." Although the best-known covert lives are the most spectacular - the architect Louis Kahn had three lives; Charles Lindbergh reportedly had two - these are exaggerated examples of a far more common and various behavior, psychologists say. Some people gamble on the sly, or sample drugs. Others try music lessons. Still others join a religious group. They keep mum for different reasons. And there are thousands of people - gay men and women who stay in heterosexual marriages, for example - whose shame over or denial of their elemental needs has set them up for secretive excursions into other worlds. Whether a secret life is ultimately destructive, experts find, depends both on the nature of the secret and on the psychological makeup of the individual. Psychologists have long considered the ability to keep secrets as central to healthy development. Children as young as 6 or 7 learn to stay quiet about their mother's birthday present. In adolescence and adulthood, a fluency with small social lies is associated with good mental health. And researchers have confirmed that secrecy can enhance attraction, or as Oscar Wilde put it, "The commonest thing is delightful if only one hides it." In one study, men and women living in Texas reported that the past relationships they continued to think about were most often secret ones. In another, psychologists at Harvard found that they could increase the attraction between male and female strangers simply by encouraging them to play footsie as part of a lab experiment. The urge to act out an entirely different persona is widely shared across cultures as well, social scientists say, and may be motivated by curiosity, mischief or earnest soul-searching. Certainly, it is a familiar tug in the breast of almost anyone who has stepped out of his or her daily life for a time, whether for vacation, for business or to live in another country. "It used to be you'd go away for the summer and be someone else, go away to camp and be someone else, or maybe to Europe and be someone else" in a spirit of healthy experimentation, said Dr. Sherry Turkle, a sociologist at the Massachusetts Institute of Technology. Now, she said, people regularly assume several aliases on the Internet, without ever leaving their armchair: the clerk next door might sign on as bill at aol.com but also cruise chat rooms as Armaniguy, Cool Breeze and Thunderboy. Most recently, Dr. Turkle has studied the use of online interactive games like Sims Online, where people set up families and communities. She has conducted detailed interviews with some 200 regular or occasional players, and says many people use the games as a way to set up families they wish they had, or at least play out alternative versions of their own lives. One 16-year-old girl who lives with an abusive father has simulated her relationship to him in Sims Online by changing herself, variously, into a 16-year-old boy, a bigger, stronger girl and a more assertive personality, among other identities. It was as a more forceful daughter, Dr. Turkle said, that the girl discovered she could forgive her father, if not change him. "I think what people are doing on the Internet now," she said, "has deep psychological meaning in terms of how they're using identities to express problems and potentially solve them in what is a relatively consequence-free zone." Yet out in the world, a consequence-rich zone, studies find that most people find it mentally exhausting to hold onto inflammatory secrets - much less lives - for long. The very act of trying to suppress the information creates a kind of rebound effect, causing thoughts of an affair, late-night excursions or an undisclosed debt to flood the consciousness, especially when a person who would be harmed by disclosure of the secret is nearby. Like a television set in a crowded bar, the concealed episode seems to play on in the mind, attracting attention despite conscious efforts to turn away. The suppressed thoughts even recur in dreams, according to a study published last summer. The strength of this effect undoubtedly varies from person to person, psychiatrists say. In rare cases, when people are pathologically remorseless, they do not care about or even perceive the potential impact of a secret on others, and therefore do not feel the tension of keeping it. And those who are paid to live secret lives, like intelligence agents, at least know what they have signed up for and have clear guidelines to tell them how much they can reveal to whom. But in a series of experiments over the past decade, psychologists have identified a larger group they call repressors, an estimated 10 to 15 percent of the population, who are adept at ignoring or suppressing information that is embarrassing to them and thus well equipped to keep secrets, some psychologists say. Repressors score low on questionnaires that measure anxiety and defensiveness - reporting, for example, that they are rarely resentful, worried about money, or troubled by nightmares and headaches. They think well of themselves and don't sweat the small stuff. Although little is known about the mental development of such people, some psychologists believe they have learned to block distressing thoughts by distracting themselves with good memories. Over time - with practice, in effect - this may become habitual, blunting their access to potentially humiliating or threatening memories and secrets. "This talent is likely to serve them well in the daily struggle to avoid unwanted thoughts of all kinds, including unwanted thoughts that arise from attempts to suppress secrets in the presence of others," Dr. Wegner, of Harvard, said in an e-mail message. The easier it is to silence those thoughts and the longer the covert activity can go on, the harder it may be to confess later on. In some cases, far stronger forces are at work in shaping secret lives. Many gay men and some lesbians marry heterosexual partners before working out their sexual identity, or in defiance of it. The aim is to please parents, to cover their own shame or to become more acceptable to themselves and society at large, said Dr. Richard A. Isay, a psychiatrist at Cornell University who has provided therapy to many closeted gay men. Very often, he said, these men struggle not to act on their desires, and they begin secret lives in desperation. This eventually forces agonizing decisions about how to live with, or separate from, families they love. "I know that I did not pursue the orientation that I have, and know that I have always been as I am now," one man wrote in a letter published in Dr. Isay's book "Becoming Gay." "I know that it becomes more difficult to live in the lonely shell that I do now, but can see no way out of it." When exposure of a secret life will destroy or forever poison the public one, people must either come clean and choose, or risk mental breakdown, many therapists say. Dr. Seth M. Aronson, an assistant professor of psychiatry at Mount Sinai School of Medicine, has treated a pediatrician with a small child and a wife at home who was sneaking off at night to bars, visiting prostitutes and even fighting with some of the women's pimps. At one session, the man was so drunk he passed out; at another, he brought a prostitute with him. "It was one of those classic splits, where the wife was perfect and wonderful but he was demeaning these other women," and the two lives could not coexist for long, Dr. Aronson said. In a famous paper on the subject of double lives, published in 1960, the English analyst Dr. Donald W. Winnicott argued that a false self emerged in particular households where children are raised to be so exquisitely tuned to the expectations of others that they become deaf to their own longings and needs. "In effect, they bury a part of themselves alive," said Dr. Kwawer of the White Institute. The pediatrician treated by Dr. Aronson, for example, grew up in a fundamentalist Christian household in which his mother frequently and disapprovingly compared him to his uncle, who was a rogue and a drinker. Dr. Kwawer's patient, the real estate developer, had parents who frowned on almost any expression of appetite, and imprinted their son with a strong sense of upholding the family image. He married young, in part to please his parents. Both men are still getting psychotherapy but now live one life apiece, their therapists say. The pediatrician has curtailed his extracurricular activities, returned home mentally and confessed some of his troubles to his wife. The real estate developer has separated from his wife, but lives close by and helps with the children. The break caused a period of depression for everyone involved, Dr. Kwawer said, but the man now has renewed energy at work, and has reconnected with friends and his children. The secret trysts have stopped, as has the drug use, and he feels he has his life back. "Contrary to what many people assume," Dr. Kwawer said, "quite often a secret life can bring a more lively, more intimate, more energized part of themselves out of the dark." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jrandom at i2p.net Tue Jan 11 13:03:10 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 11 Jan 2005 13:03:10 -0800 Subject: [i2p] weekly status notes [jan 11] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, time for the weekly update * Index 1) Net status 2) 0.5 progress 3) 0.6 status 4) azneti2p 5) fbsd 6) hosts.txt as WoT 7) ??? * 1) Net status Overall the net is handling itself well, though we had some problems with one of the irc servers being offline and my outproxy acting up. However, the other irc server was (and still is) around (though at the moment doesn't have CTCP disabled - see [1]), so we were able to satiate our need for irc :) [1] http://ugha.i2p/HowTo/IrcAnonymityGuide * 2) 0.5 progress There's progress, ever onwards! Ok, I suppose I should get into a little more detail than that. I've finally got the new tunnel routing crypto implemented and tested (yay!), but during some discussions we found a place where there could be one level of anonymity leak, so its being revised (the first hop would have known they were the first hop, which is Bad. but really really easy to fix). Anyway, I hope to get the docs and code on that updated and posted soon, and docs on the rest of the 0.5 tunnel operation / pooling / etc posted later. More news when there's more news. * 3) 0.6 status (what!?) Mule has begun investigations into the UDP transport, and we've been mining zab for his experiences with limewire's UDP code. Its all very promising, but much work to be done (and still several months out on the roadmap [2]). Got some inspiration or suggestions? Get involved and help focus it towards what needs to be done! [2] http://www.i2p.net/roadmap#0.6 * 4) azneti2p I almost wet my pants when I got the info, but it looks like the folks at azureus have written up an I2P plugin, allowing both anonymous tracker usage and anonymous data comm! Multiple torrents work within a single I2P destination too, and it uses the I2PSocket directly, allowing tight integration with the streaming lib. The azneti2p plugin is still in the early stages with this 0.1 release, and there are lots of optimizations and ease of use improvements coming down the pipe, but if you're up for getting your hands dirty, swing by i2p-bt on the i2p irc networks and get in on the fun :) For the adventurus types, get the latest azureus [3], check their i2p howto [4], and snag the plugin [5]. [3] http://azureus.sourceforge.net/index_CVS.php [4] http://azureus.sourceforge.net/doc/AnonBT/i2p/I2P_howto.htm [5] http://azureus.sourceforge.net/plugin_details.php?plugin=azneti2p duck has been taking heroic measures to keep compatability with i2p-bt, and there is frantic hacking in #i2p-bt as I type this, so keep an eye out for a new i2p-bt release Real Soon Now. * 5) fbsd Thanks to the work of lioux, there's now a freebsd ports entry for i2p [6]. While we aren't really looking to have lots of distro-specific installs out there, he promises to keep it updated when we give sufficient notice for new release. This should be helpful for fbsd-current folks - thanks lioux! [6] http://www.freshports.org/net/i2p/ * 6) hosts.txt as WoT Now that the 0.4.2.6 release has bundled in Ragnarok's addressbook, the process of keeping your hosts.txt populated with new entries is in every user's control. Not only that, but you can view the addressbook subscriptions as a poor-man's web of trust - you import new entries from a site you trust to introduce you to new destinations (defaults being dev.i2p and duck.i2p). With this capacity comes a whole new dimension - the ability for people to choose what sites to essentially link to in their hosts.txt and which ones not to. While there is a place for the public free-for-all that has occurred in the past, now that the naming system is not just in theory but in practice fully distributed, people will need to figure out their own policies on publishing other people's destinations. The important part behind the scenes here is that this is a learning opportunity for the I2P community. Before, both gott and I were trying to help push the naming issue by publishing gott's site as jrandom.i2p (he asked for that site first - I did not, and have no control whatsoever as to the contents of that URL). Now we may begin to explore how we are going to deal with sites not listed in the http://dev.i2p.net/i2p/hosts.txt or on forum.i2p. Not being posted on those locations doesn't prevent in any way a site from operating - your hosts.txt is just your local address book. Anyway, enough babbling, I just wanted to put people on notice so we can all see what is to be done. * 7) ??? Yowza, thats a lot of stuff. Busy week, and I don't forsee things slowing down anytime soon. So, swing on by the meeting in a few minutes and we can talk about stuff. =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB5D2EGnFL2th344YRAoMnAJsHxgRyB3eydlqKiCy54CYzRCEbsQCfRWV0 ItUMfG4sTnmRKk5m2u9Yxjg= =cJJx -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From justin-cypherpunks at soze.net Tue Jan 11 08:02:05 2005 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 11 Jan 2005 16:02:05 +0000 Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776C01@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776C01@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050111160205.GA3676@arion.soze.net> On 2005-01-11T10:07:22-0500, Trei, Peter wrote: > Justin wrote: > > > > I don't believe the article when it says that smart guns are useless > > if stolen. What do they have, a tamper-proof memory chip storing a > > 128-bit reprogramming authorization key that must be input via > > computer before allowing a new person to be authorized? And what's > > to stop a criminal from ripping out all the circuitry and the safety > > it engages? > > The 'stolen gun' problems most of the so-called 'smart gun' proposals > are trying to address are the situation when a cop's own gun is taken > from him and immediately used against him, or a kid finding one in a > drawer. A determined and resourceful person can, given time, defeat > them all. from the article: "Guns taken from a home during a robbery would be rendered useless, too." The South African Smart gun... > http://www.wmsa.net/other/thumb_gun.htm Totally useless. Failure modes and various other complaints: -cannot connect to cellular network -cannot receive GPS signal -out of batteries -laser diode craps out -fingerprint scanner takes more than 0 time to use. -ammunition is more expensive -"window" in ammunition can be dirty or fogged, causing failure -any sort of case failure will probably destroy the electronics -will never be as small as subcompact firearms -if smartcard is stolen, gun won't fire (other "smart guns" use rings) -all the electronic tracing capability requires gun/ammo registration I'd almost rather have a taser. What assurance do I have that the circuitry won't malfunction and fire when I don't want it to? What if a HERF gun can not only render the gun useless, but make it fire as well? -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From eugen at leitl.org Tue Jan 11 13:09:59 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Jan 2005 22:09:59 +0100 Subject: [i2p] weekly status notes [jan 11] (fwd from jrandom@i2p.net) Message-ID: <20050111210958.GX9221@leitl.org> ----- Forwarded message from jrandom ----- From pgut001 at cs.auckland.ac.nz Tue Jan 11 08:00:29 2005 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 12 Jan 2005 05:00:29 +1300 Subject: Simson Garfinkel analyses Skype - Open Society Institute Message-ID: David Wagner writes: >>Is Skype secure? > >The answer appears to be, "no one knows". There have been other posts about this in the past, even though they use known algorithms the way they use them is completely homebrew and horribly insecure: Raw, unpadded RSA, no message authentication, no key verification, no replay protection, etc etc etc. It's pretty much a textbook example of the problems covered in the writeup I did on security issues in homebrew VPNs last year. (Having said that, the P2P portion of Skype is quite nice, it's just the security area that's lacking. Since the developers are P2P people, that's somewhat understandable). Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From bill.stewart at pobox.com Wed Jan 12 13:59:53 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 12 Jan 2005 13:59:53 -0800 Subject: [IP] No expectation of privacy in public? In a pig's eye! (fwd from dave@farber.net) In-Reply-To: <41E58903.9050906@rant-central.com> References: <20050112200116.GA9221@leitl.org> <41E58903.9050906@rant-central.com> Message-ID: <6.0.3.0.0.20050112124900.03a2d990@pop.idiom.com> At 12:30 PM 1/12/2005, Roy M. Silvernail wrote: >Just out of curiosity, if the man doesn't need a warrent >to place a surveilance device, shouldn't it be within your rights >to tamper with, disable or remove such a device if you discover one? Do you mean that if you discover an unsolicited gift of consumer electronics attached to your car, do you have the right to play with it just as you would if it came in the mail? I would certainly expect so... On the other hand, if it appears to be a lost item, you could be a good public citizen and take it to the police to see if anybody claims it... "GPS tracker" is an ambiguous description, though. GPS devices detect where they are, but what next? A device could record where it was, for later collection, or it could transmit its position to a listener. Tampering with existing recordings might have legal implications, but putting a transmitter-based system in your nearest garbage can or accidentally leaving it in a taxi or mailing it to Medellin all seem like reasonable activities. ---- Bill Stewart bill.stewart at pobox.com From dave at farber.net Wed Jan 12 11:46:47 2005 From: dave at farber.net (David Farber) Date: Wed, 12 Jan 2005 14:46:47 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! Message-ID: Orwell was an amateur djf ------ Forwarded Message From: Lauren Weinstein Date: Wed, 12 Jan 2005 11:38:28 -0800 To: Cc: Subject: No expectation of privacy in public? In a pig's eye! Dave, It's time to blow the lid off this "no expectation of privacy in public places" argument that judges and law enforcement now spout out like demented parrots in so many situations. Technology has rendered that argument meaningless -- unless we intend to permit a pervasive surveillance slave society to become our future -- which apparently is the goal among some parties. It is incredibly disingenuous to claim that cameras (increasingly tied to face recognition software) and GPS tracking devices (which could end up being standard in new vehicles as part of their instrumentation black boxes), etc. are no different than cops following suspects. Technology will effectively allow everyone to be followed all of the time. Unless society agrees that everything you do outside the confines of your home and office should be available to authorities on demand -- even retrospectively via archived images and data -- we are going down an incredibly dangerous hole. I use the "slimy guy in the raincoat" analogy. Let's say the government arranged for everyone to be followed at all times in public by slimy guys in raincoats. Each has a camera and clipboard, and wherever you go in public, they are your shadow. They keep snapping photos of where you go and where you look. They're constantly jotting down the details of your movements. When you go into your home, they wait outside, ready to start shadowing you again as soon as you step off your property. Every day, they report everything they've learned about you to a government database. Needless to say, most people would presumably feel incredibly violated by such a scenario, even though it's all taking place in that public space where we're told that we have no expectation of privacy. Technology is creating the largely invisible equivalent of that guy in the raincoat, ready to tail us all in perpetuity. If we don't control him, he will most assuredly control us. --Lauren-- Lauren Weinstein lauren at pfir.org or lauren at vortex.com or lauren at privacyforum.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, Fact Squad - http://www.factsquad.org Co-Founder, URIICA - Union for Representative International Internet Cooperation and Analysis - http://www.uriica.org Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com - - - > > ------ Forwarded Message > From: Gregory Hicks > Reply-To: Gregory Hicks > Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) > To: > Cc: > Subject: Ruling gives cops leeway with GPS > > Dave: > > For IP if you wish... > > http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect criminal investigations > nationwide, a federal judge has ruled police didn't need a warrant when > they attached a satellite tracking device to the underbelly of a car > being driven by a suspected Hells Angels operative. > > [...snip...] > > All Times Union materials copyright 1996-2005, Capital Newspapers > Division of The Hearst Corporation, Albany, N.Y. > > ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From roy at rant-central.com Wed Jan 12 12:30:59 2005 From: roy at rant-central.com (Roy M. Silvernail) Date: Wed, 12 Jan 2005 15:30:59 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! (fwd from dave@farber.net) In-Reply-To: <20050112200116.GA9221@leitl.org> References: <20050112200116.GA9221@leitl.org> Message-ID: <41E58903.9050906@rant-central.com> Re: the embedded item: >>http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 >> >>Ruling gives cops leeway with GPS >>Decision allows use of vehicle tracking device without a warrant >> >>By BRENDAN LYONS, Staff writer >>First published: Tuesday, January 11, 2005 >> >>In a decision that could dramatically affect criminal investigations >>nationwide, a federal judge has ruled police didn't need a warrant when >>they attached a satellite tracking device to the underbelly of a car >>being driven by a suspected Hells Angels operative. Just out of curiosity, if the man doesn't need a warrent to place a surveilance device, shouldn't it be within your rights to tamper with, disable or remove such a device if you discover one? By extension, is there a business opportunity for bug-sweeping? Either a storefront or a properly equipped pickup truck with bright signage. (oh, yeah... I'm sure *that* would go over well with the Powers That Be) -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT SpamAssassin->procmail->/dev/null->bliss http://www.rant-central.com From rah at shipwright.com Wed Jan 12 13:39:56 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 12 Jan 2005 16:39:56 -0500 Subject: Effort to Speed Airport Security Is Going Private Message-ID: The Wall Street Journal January 12, 2005 Effort to Speed Airport Security Is Going Private Move Aims to Expand Program That Preregisters People Who Travel Frequently By AMY SCHATZ Staff Reporter of THE WALL STREET JOURNAL January 12, 2005; Page D1 The Homeland Security Department, under pressure to jump-start a program allowing select preregistered travelers to speed through airport security, is turning to the private sector for help. The Registered Traveler program gives frequent air passengers access to special security lines, provided they first voluntarily undergo criminal and terrorist background checks. In exchange, they get a biometric identification card -- containing a fingerprint and other personal data -- and access to the shorter lines. The program has generally received favorable reviews from volunteers and the three-month trial has been extended indefinitely. There is just one problem: The pilot program, currently administered by the department's Transportation Security Administration, is offered at only five airports for just 10,000 volunteers. This means that Registered Travelers can use their cards only at their home airports and nowhere else. TSA's pace at expanding the test into a national program has, so far, been the biggest complaint. The slow introduction has prompted interest from some businesses, who believe that travelers would be willing to pay to participate in the program. Interested entrepreneurs include Steven Brill, who started American Lawyer magazine and Court TV and, after writing a book on Sept. 11, decided to get into the homeland-security business. In a plan set to be unveiled in coming weeks, TSA officials will lay out some details of a privately operated Registered Traveler pilot program at Orlando International Airport. The success of the pilot, expected to begin by the end of March, could determine the future of the Registered Traveler program and be a model for expanding it nationally. Mr. Brill and others have been pushing for TSA to privatize the program, saying that businesses are better equipped than the government to market and expand it, especially because some travelers have indicated that they would pay annual fees -- as much as $100 -- for faster screening. TSA officials agree, believing that passengers, not taxpayers, should fund Registered Traveler, because it is likely to be used by business people rather than leisure travelers. Homeland Security officials are eager to see it move forward. TSA has had some false starts in other initiatives, and it has taken knocks for long lines and intrusive pat-down searches. But privacy advocates, who have already voiced concern about the government-run pilot programs, are even more worried now that TSA is turning to the private sector. EXPRESS LINE How expedited security works in five pilot programs: Who's eligible: 10,000 frequent- flier club members; enrollment closed What they provide: Fingerprint, iris scan, personal data What they get: Biometric ID card What they have to do at airport: Open laptop, remove keys, coins. What they don't have to do: Join leisure travelers for random screening. They complain that Homeland Security officials routinely publish privacy guidelines too vague to give the public a real understanding of how personal data are handled. A privatized system could exacerbate the problem, says Marcia Hoffman, staff counsel of the Electronic Privacy Information Center, a Washington nonprofit organization. TSA sees private-sector involvement as a route to faster growth. "We're trying to encourage as much private sector participation as possible," says Justin Oberman, a TSA official in charge of both Registered Traveler and its more controversial sister-project, Secure Flight, a computerized prescreening system that will replace a system currently run by the airlines. Plans to run the privatized pilot in Orlando were publicly disclosed in October, when AirTran Airways, a unit of Orlando-based AirTran Holdings Inc., said it would participate in the program. But efforts between TSA and the airport to reach terms on the pilot have dragged on. One reason: TSA officials haven't decided whether to compile a master list of Registered Travelers, which could be used to check passengers at all participating airports, or allow private companies to maintain passenger data in a universal format easily accessed by competitors. The Orlando airport hasn't yet chosen a vendor to run its test, although airport officials say they are in talks with Mr. Brill's New York-based company, Verified Identity Pass Inc. Verified Identity would essentially assume marketing responsibilities while its partners -- possibly including Lockheed Martin Corp. -- would install scanners, process applications and manufacture ID cards. TSA screeners, who are government employees, would continue to staff the security lines. Orlando officials say their program will be open to all passengers, although they will likely first market it through airline frequent-flier programs. But unlike the current test, which is free to volunteers recruited through frequent-flier programs, the Orlando program will eventually charge a fee. Some estimates put the cost to passengers at $50 to $100 annually. "This is something people will voluntarily pay for at the right price," says Mr. Brill, who estimates the startup cost at between $500,000 and $1 million per airport. Initially, one Registered Traveler lane would be installed at the airport's east terminal, which serves Delta Air Lines Inc. and AirTran. Airport officials would later add a lane in Orlando's other terminal and likely open it to travelers on any airline. Registered travelers are required to undergo the same security screening as other passengers, but usually in separate lines. They have to do the same basic things, such as empty their pockets of keys and other metal items or take a laptop out of its case. But they aren't randomly chosen for extra screening and must undergo secondary screening only if they set off a metal detector. At Minneapolis-St. Paul International Airport, where 2,500 frequent Northwest Airlines fliers are enrolled, from 130 to 180 registered travelers use the special security lane daily, says Tim Anderson, deputy executive director for airport operations. They can move through security in as little as a few minutes. There are other concerns about private sector involvement. Passengers could grow so tired of being harassed at airport security checkpoints that they will feel compelled to join the program, says Ms. Hoffman, of the Electronic Privacy Information Center. "You worry that we'll get to a point where Registered Traveler isn't so much voluntarily as necessary to get through security with a minimum of hassle," she says. On the privacy issue, TSA officials argue that they have written stringent protections for private data and that the program is voluntary. "We'd have less information about you than American Express or the airlines," Mr. Brill says. As long as the program is voluntary, and offers separate lines and shorter wait times, many will be willing to sacrifice on personal privacy, predicts Bill Connors, executive director of the National Business Travel Association and a registered traveler participant. "There are a lot of people who'd be up for it," he says. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Wed Jan 12 19:02:14 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 12 Jan 2005 19:02:14 -0800 Subject: To Tyler Durden Message-ID: <41E5E4B6.9DFA3A76@cdc.gov> TD, I just watched _Fight Club_ so I finally get your nym. (Here in low-earth geosynchronous orbit, content is delayed). Cool. I had thought it was your real name. Maj. Variola (ret) From mv at cdc.gov Wed Jan 12 19:26:14 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 12 Jan 2005 19:26:14 -0800 Subject: Tasers for Cops Not You Message-ID: <41E5EA56.73D2022E@cdc.gov> At 01:20 PM 1/8/05 -0800, John Young wrote: >However, Taser claims the civilian version is effective >only to 15 feet while the LE version will explose a heart >at 20 feet. And, Taser says "accidental deaths caused >by the shock would have happened to those sick persons >anyway." > >Well, yes, homicidal cops say the perps were begging for it, >learning such talk from the president and up to the one who >has fun with joy toy tsunamis. John: A taser is > 50 KV and microamps. Not fun but it doesn't cause fibrillation. (Incoherent cardiac muscle contraction -> no pulse.) I now work for a company that makes defibrillators. It takes a few 10s of Joules through the heart to fibrillate, typically 100-200 J for an adult, during a certain critical window during the sinus rhythm. Our gizmos discharge ~200 uF at up to 2 KV to defibrillate a fibrillating heart, which will also fibrillate if administered to a healthy heart at the wrong time, as I said. That's up to 40 amps. (Through the pads a chest is 20-200 ohms, typically 50.) Without a defibrillator the person is dead, CPR or not. That's the science. As far as pigs wanting slaves/peasants/citizens to be unarmed, well, agree. As far as choke holds on negroes, excessive force on cocaine-stimulated citizens, etc goes, I have nothing to bear on this. As far as banning lethal and nonlethal weapons for use by all but state minions, we agree. When tasers, mace, body armor, .50 cal or lesser rifles are outlawed, well, you know the rest. (Of course mace is best applied with q-tips to the eyes of sitting protesters. And the mercenaries in Iraq do fine with pillowcases and 12V batteries.) Though heavens fall, let justice be done. From mv at cdc.gov Wed Jan 12 19:28:15 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 12 Jan 2005 19:28:15 -0800 Subject: Google Exposes Web Surveillance Cams Message-ID: <41E5EACF.9C0B4995@cdc.gov> At 02:20 PM 1/9/05 -0600, Riad S. Wahby wrote: >I love how all of the coverage leaves out the actual search strings, as >if it's hard to discover what they are at this point. I'm similarly annoyed that articles omit the URLs of "terrorist web sites", being forced to check ogrish.com, even if I couldn't read the language. But government and its presses know best. From mv at cdc.gov Wed Jan 12 19:31:36 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 12 Jan 2005 19:31:36 -0800 Subject: [IP] The DNA round-up on Cape Cod (fwd from dave@farber.net Message-ID: <41E5EB98.952E13D6@cdc.gov> The Beast doesn't know who licked the stamp. A fiducial sample is what they want. In Calif, they could merely arrest you for a bogus charge to have the "right" to sample your families DNA as carried by you. Schwarzenegger is not Austrian accidentally. GATTACA was optimistic. At 06:02 PM 1/10/05 +0100, Eugen Leitl wrote: >I live in the town of Truro on Cape Cod about 4 or 5 months out of the year. >This past week, the Truro has been on the national news because the local >police are attempting to obtain DNA samples of all men of the town in order >to solve a three-year old murder case. Here are a couple of the articles >that give the details of what is going on in this DNA round-up: > > To Try to Net Killer, Police Ask a Small Town's Men for DNA > http://www.nytimes.com/2005/01/10/national/10cape.html > > Truro abuzz over 'swab' DNA testing > http://www.capecodonline.com/cctimes/truroabuzz7.htm > >I am headed back to my Truro house later this week. If I am approached by >the police to provide a DNA sample for their round-up of Truro males, I am >planning to refuse. However, I just realized that I already gave a DNA >sample to the Town of Truro recently. I paid my property tax bill to the >Truro tax collectors office two weeks ago. My DNA is on the tax payment >envelope that I licked. > >Envelopes are apparently a good source of DNA material according to this >article: > > DNA on Envelope Reopens Decades-old Murder Case > http://abclocal.go.com/wabc/news/wabc_052103_dnaarrest.html > >Richard M. Smith >http://www.ComputerBytesMan.com > > > >------ End of Forwarded Message > > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature] From mv at cdc.gov Wed Jan 12 19:38:54 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 12 Jan 2005 19:38:54 -0800 Subject: expectation of privacy Message-ID: <41E5ED4E.CE7C426F@cdc.gov> At 09:01 PM 1/12/05 +0100, Eugen Leitl wrote: > >It's time to blow the lid off this "no expectation of privacy in >public places" argument that judges and law enforcement now spout out >like demented parrots in so many situations. A court refused to hear the case of a man accused of owning unlicensed pharmaceuticals when a pig entered a locked loo. The loo was part of a gas station; the attendant called the pigs. A prostitute was in there too, with him, and the area rife with folks of that profession, FWIW, which is nothing. But the court held reduced expectation of privacy in a public loo. One imagines much fun with anonymous calls when state employees are in such places, but this does not temper our disgust, or desire for karma with extreme prejudice. From eugen at leitl.org Wed Jan 12 12:01:16 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Jan 2005 21:01:16 +0100 Subject: [IP] No expectation of privacy in public? In a pig's eye! (fwd from dave@farber.net) Message-ID: <20050112200116.GA9221@leitl.org> ----- Forwarded message from David Farber ----- From tkaitchuck at comcast.net Wed Jan 12 22:51:51 2005 From: tkaitchuck at comcast.net (Tom Kaitchuck) Date: Thu, 13 Jan 2005 00:51:51 -0600 Subject: [i2p] Distributed Search Engine Message-ID: For those of you that do not know, I am currently working on building a distributed search engine for I2P. While it is still in an alpha state, it is approaching the point where it could use some wider testing. It is now in cvs under the module khksearch. I was planning to hold off on releasing it until I fixed a bug preventing servers from joining in mid operation, but it has proved elusive enough, that I think more eyeballs may help. One thing that some of you may be interested in even if you don't care about the search engine itself, is that to make it work with I2P I took the streaming library for Java and put it into a wrapper class that imitates java.net so all one has to do is take the wrapper code put it in the class path and in your java program replace "import java.net.*" with "Import search.connection.*" and your app is instantly ported to I2P. (Assuming it is fairly simplistic and only has one socket server per Jvm instance. But this could easily be improved upon if anyone is interested. ) There is still lots to do, not all of which requires huge technical skill. (Code cleanup, Better instructions, Startup scripts for windows and other JVMs) Also the existing awt interface needs to be converted into an applet or so that it can run within a webpage. The biggest thing that remains to be done is implementing the ranking code, I plan to do this next. As far as the license goes, it will we a free software license that permits modification and public access to the source. (probably lgpl or similar) However all of the scripts and all of the code for the wrapper, were written by me, and are public domain. So if you are interested in helping out, or would just like to play with it, check it out. _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Thu Jan 13 06:58:02 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 13 Jan 2005 09:58:02 -0500 Subject: Ridge Wants Fingerprints in Passports Message-ID: The New York Times January 13, 2005 Ridge Wants Fingerprints in Passports By MATTHEW L. WALD WASHINGTON, Jan. 12 - The United States should issue passports that include a full set of the bearer's fingerprints, Tom Ridge, the departing secretary of homeland security, said Wednesday. Mr. Ridge said the change would induce foreign governments to do the same on the passports they issue. Privacy advocates promised to fight the Ridge suggestion, in part because it would deliver the prints of American travelers to foreign governments, and the State Department has been cool to it as well. Mr. Ridge, speaking at the Center for Strategic and International Studies, a research group here, cast his comments as advice to Michael Chertoff, chosen by President Bush on Tuesday to succeed him. "Be aggressive, go after 10 fingerprints on the passports," Mr. Ridge said, adding that it was "a lot easier to negotiate with your allies if you've already done what you're asking them to do." Applicants for visas to visit the United States must already submit to finger scans of both index fingers. Experts call them scans, not prints, because the images are taken on a scanner screen, without ink. Later this year, a 2002 law will require people whose nationality allows them to enter this country without a visa to present machine-readable passports that incorporate a digital photograph as biometric data. A spokeswoman for the State Department, Kelly Shannon, said that the machine-readable passports the United States issues would have a computer chip with 64 kilobytes of memory, far more than is needed for the traveler's name, date and place of birth, passport number and a single photo. The chip could be used for other biometric data in the future, including an additional photo, Ms. Shannon said, adding that "the globally interoperable, chosen biometric for travel documents" was photos. At the Electronic Privacy Information Center, a nonprofit group here, Marc Rotenberg, the president, said that providing foreign governments with the fingerprints of each American visitor would "make it easier for those foreign governments to conduct their own investigations of U.S. citizens in that foreign country." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Thu Jan 13 08:06:56 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 13 Jan 2005 11:06:56 -0500 Subject: To Tyler Durden In-Reply-To: <41E5E4B6.9DFA3A76@cdc.gov> Message-ID: WHAT THE FUCK ARE YOU TALKING ABOUT! THIS IS MY REAL NAME GODDAMMIT!!! Wait, I'm getting sleepy...gotta take a nap... -TD >From: "Major Variola (ret)" >To: "cypherpunks at al-qaeda.net" >Subject: To Tyler Durden >Date: Wed, 12 Jan 2005 19:02:14 -0800 > >TD, >I just watched _Fight Club_ so I finally get your nym. (Here in >low-earth geosynchronous orbit, content is delayed). Cool. >I had thought it was your real name. > >Maj. Variola (ret) From eugen at leitl.org Thu Jan 13 02:48:53 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Jan 2005 11:48:53 +0100 Subject: [i2p] Distributed Search Engine (fwd from tkaitchuck@comcast.net) Message-ID: <20050113104853.GN9221@leitl.org> ----- Forwarded message from Tom Kaitchuck ----- From kelsey.j at ix.netcom.com Thu Jan 13 11:26:11 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Thu, 13 Jan 2005 14:26:11 -0500 (GMT-05:00) Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire Message-ID: <21660260.1105644373821.JavaMail.root@grover.psp.pas.earthlink.net> >From: Justin >Sent: Jan 10, 2005 7:35 PM >To: cypherpunks at al-qaeda.net >Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire ... >Some gun "accidents" are suicides reported as such to avoid >embarrassment to the family. I've heard this from other people, too--some in reasonably good positions to know how such things were reported. And there's surely some ambiguity between fatal accidents caused by doing something really stupid and intentional suicides. ... --John From rah at shipwright.com Thu Jan 13 13:39:39 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 13 Jan 2005 16:39:39 -0500 Subject: Blue Iraq: Local Experts in Global Communications Message-ID: I expect a few cypherpunks will know the founder of blueiraq... Cheers, RAH (who wonders who's running rediraq.com... ;-)) ------ Blue Iraq Local Experts in Global Communications about Blue Iraq | Products and Services | Technology and Networks | Iraq FAQ | Support | Contact Us Iraq FAQ FAQs Technology and Internet in Iraq: Frequently Asked Questions We have found that there are a few common questions about Internet access and general IT in Iraq. By answering these questions here, we can try to improve understanding inside and outside Iraq of the unique environment which exists here. What kind of Internet connection does Iraq have? Iraq does not have "one main Internet connection". As of 2003, Iraq has had no landline or microwave relay connections to the outside world. All international communications, and most domestic communications, have been via satellite. Domestic wireline or wireless networks rely on satellite access for international connectivity. Many businesses use small satellite terminals (VSATs) to communicate directly with the outside world. Who uses Internet service in Iraq? The US Department of Defense, DoD and Redevelopment Contractors, Western expatriates, and the Iraqi Government are major users of Internet and international communications services in Iraq. Additionally, many NGOs, universities, and Iraqi businesses are establishing internet connectivity. One of the major purchasers of Internet service in the domestic Iraqi market is for small, entrepreneurial Internet Cafes. Why is service in Iraq more expensive than in other parts of the world? Satellite capacity is usually more expensive than terrestrial connectivity, due to the high costs of satellites and limited RF capacity available on a given transponder. However, satellites also have very high reliability, and are the only practical means of deploying communications rapidly over a large territory without building extensive (and vulnerable) fixed infrastructure. Modern shared IP-optimized Ku-band VSAT systems can be very affordably priced compared to older satellite communications systems. Communications companies operating in Iraq also face higher operating costs than similar communications companies operating elsewhere in the world, due to security concerns and lack of infrastructure. Can I use Voice over IP (VoIP) over satellite? Generally VoIP will require special settings to work reliably over satellite. We currently only support our iDirect network and dedicated satellite capacity for VoIP applications, and all supported VoIP communications must go through our VoIP gateway to ensure traffic prioritization and quality of service. Your competitors offer some systems which are cheaper, and can use Iraqis to do the installation. Why should I use Blue Iraq? Our prices are actually lower than most other satellite systems, based on service capacity and performance -- unlike a lot of companies, we specify our systems based on observed performance in Iraq, not a fanciful design specification. Due to the security situation, it is very difficult for Iraqis to get onto US bases to do installations. We do use trained Iraqis for off-base installs in some cases. However, in many cases, we have found that having US engineers do the world results in the most effective solution with the highest overall quality. An inexpensive system which does not work reliably is no bargain. Why should I purchase a system from an Iraq-focused network operating company, vs. one of the satellite owners or major networks? One word: presence. Blue Iraq has trained personnel on the ground in Iraq who are familiar with the environment. Many other vendors have never set foot in Iraq, and rely on local contract installation companies to do installations. Non-Iraq based companies also do not have personnel in Iraq do provide after-sale support if anything goes wrong. In a place like Iraq, many things can go wrong. Isn't it too dangerous to operate a business in Iraq? The news shows bombings and kidnappings every day? Iraq can be a very dangerous place. However, we take all reasonable precautions to minimize this risk. Our personnel travel with appropriate levels of security, and will refuse to go to sites which are not adequately secured. We primarily operate in conjunction with the US military, and rely on US military helicopter transport between secure bases. All personnel have appropriate protective gear and training. Why does the military use commercial internet services? Doesn't it have enough satellite capacity of its own? The US military makes extensive use of commercial products and systems for a wide variey of non-tactical purposes, as commercial systems often provide the cheapest, best, and most cost-effective solution to a given problem. Commercial satellite networks are extensively used for Morale, Welfare, and Recreation (MWR) purposes, administrative and support systems, and more. Do you do business in the Iraqi economy, or only on DOD bases? Our primary customers are located on DOD bases: the DOD, its personnel, and contractors. However, we do business with the local Iraqi economy via Iraqi resellers and installers. How can I get Internet service as an individual in Iraq? Please evaluate our products and services. Due to capital costs of our VSAT systems, our mobile Inmarsart R-BGAN system may be desirable for low-volume individual users. Alternately, you could try finding others with whom to share a VSAT system and split the cost. How can I get Internet service for my unit or company? Please evaluate our products and services, with particular attention to our VSAT systems. Please contact us with any additional questions. Can you set up service outside Iraq? We can interface with corporate or military networks anywhere in the world. We can also provide satellite communications or other IT systems outside Iraq, but our focus is on the DOD, Iraq and its neighbors, Afghanistan, and the Islamic world in general. How do I register an Iraq Domain Name (.iq)? At present, .iq domain names are unavailable. We suggest using name-iq.com, name-iraq.com, nameiraq.com, or other similar names. When do you think the occupation/insurgency/etc. will end? We can't predict the future. However, even if Iraq became a peaceful nation today, it would be many years before infrastructure had been rebuilt to the level required for a fully functional economy. Can I invest in Blue Iraq? What is your stock ticker symbol? What is the minimum investment? Blue Iraq is not currently a publicly traded company, nor is it listed on any stock exchange. We are currently raising our first round of funds from angel investors within the technology industry, and those familiar with Iraq. If you are an SEC-qualified investor interested in investing at least USD 100 000, please contact our investor relations department at ir at blueiraq.com. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Jan 13 14:19:12 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 13 Jan 2005 17:19:12 -0500 Subject: Altnet trying to 'mug' companies Message-ID: p2pnet.net - the original daily p2p and digital media news site Altnet trying to 'mug' companies Jay Flemma p2pnet.net News:- Entertainment lawyer Jay Flemma doesn't believe Altnet's circular email campaign to p2p companies in a bid to get them to license the TrueNames 'hash' patent will work. In fact, "As I understand the lay of the land in this case, I believe they are grossly over-reaching in attempting to turn the world of IP into the wild, wild west and effectively mug these companies by trying to make them pay for something for which they do not have the rights to defend or prosecute," he told p2pnet. Flemma, who specialises in music, film, tv and book law with particular emphasis on the confluence of the media with the Net, is consulting with companies who've received the Altnet patent letter. "We're having discussions as to whether or not Altnet really has a leg to stand on," says Flemma, an expert in the legalities of Net distribution media. But, "I think their attorney's claims in the Washington Post that a jury found that their patent was valid is woefully inaccurate because it is not a jury question - or what's called a question of fact, whether or not a patent is valid," he says. "That is a question of law," "I can tell you this: juries do not rule on the question of whether or not a patent is valid." The EFF (Electronic Frontier Foundation) is taking an interest in events, we understand. As p2pnet was the first to report on Monday, Altnet has fired off a round of identical letters to companies it believes use hashes (think 'links') for a digital file. How2Share Technologies, a small Canadian company based in Victoria on Vancouver Island, British Columbia, and which markets PiXPO software for a picture sharing network, is one of the more recent victims. "I don't think the Patent has any legs," managing director Jim Wallace told p2pnet. Without saying it in so many words, the Altnet letters imply that if firms it approaches don't license the patent, they'll be sued. In the meanwhile, in case you're wondering what all the fuss is about, "A Hash as unique identifier was the whole idea behind hashing algorithms," says Exo in a p2pnet comment. Read on >>>>>>>>>>>>>>>>>>>>>>>> Earliest example I can recall was the Hash sorting technique. In essence IBM's punch card sorting machines (pre WWII) are an early example of hash sorting. In the punch card machine the hash was simply a nibble from a specific character column that is used to steer the card to a specific bin. This hash is only perfect in the since that all cards having the same character in the selected column will be steered to the same bin. To sort on a wider field, you simply start with the least significant column of the sort field; run the cards, re-stack first bin on top of second bin, and so on, repeating for each column in the field. In data communications the CRC is a hash guaranteed to be unique over a specific number of bits. A CRC-16 is unique for files up to 2^16 bits in length, CRC-32 for up to 2^32 bits. Different CRC algorithms use different bits to generate the feedback used to digest the data into a hash. (early 1970's?) CRC's were first used to detect data errors over serial data links. Early example: IBM mainframe to terminal equipment communications using SNA and SDLC protocols. TCP/IP protocol uses a CRC-32 to detect packet errors. (Mid 19080's) The field of cryptography, specifically public key cryptography, needed secure hashing algorithms. (Only secure in the sense that the estimated length of time to brute force content that will generate a specific hash value will take a very long time on the order of many CPU years. RSA patented various Message Digest functions (in the 1970's, several RSA patents recently expired and are now public domain). Most of us are familiar with the MD5 algorithm in which several P2P applications use to generate file Hash values. The whole Idea of using a Message Digest function in cryptography was to generate a hash on a plain text document (file) such that it could be used to detect if that document changes in any way. If any character in the document (file) is different then the hash will be different. These hashes are used when digitally signing a document, to verify that a document is the exact same (uniquely identified) document you viewed before signing. To prevent someone from changing the hash, it is encrypted using your private key so that others can verify using your public key. The results of processing the document using the MD function should exactly match the hash decoded using your public key. Databases have used such hashing algorithms to generate unique keys for locating data in a database. Software has a good example in the C++ language standard template library in the implementation of the std map object. The map object stores a key, the key can be plain text, but is usually a hash to minimize the number of characters that need to be compared when dealing with long strings. The key is used in a binary search to locate the mapped data. This technique was introduced in the STL library in the mid 1980's when C++ first appeared, but the general technique in software originates in Data structure text books well before that. Earliest reference I can cite from the top of my head is in Donald Knuth's "the art of computer programming" from the early 1970's. =================== Stay tuned. =================== See:- first to report - Altnet tries TrueNames on p2p ops, p2pnet, January 10, 2005 (Thursday 13th January 2005) -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Thu Jan 13 17:46:39 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 13 Jan 2005 17:46:39 -0800 Subject: Ridge Wants Fingerprints in Passports Message-ID: <6.0.3.0.0.20050113174453.039efa58@pop.idiom.com> He's smearing his sticky fingerprints all over everything else, and now he wants them in our passports? Oughtta learn to keep his hands to himself. ---- Bill Stewart bill.stewart at pobox.com From emc at artifact.psychedelic.net Thu Jan 13 17:48:13 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Thu, 13 Jan 2005 17:48:13 -0800 (PST) Subject: Florida man faces bioweapon charge In-Reply-To: Message-ID: <200501140148.j0E1mDnB013892@artifact.psychedelic.net> RAH pastes: ... > Steven Michael Ekberg, 22, had at least 83 castor beans and other > byproducts consistent with the manufacture of ricin in his possession, the > FBI said. ... > They said they also found, in a cardboard box in Ekberg's room, glass vials > containing white granules suspected of being husk-less, chopped castor > beans, a byproduct of the manufacture of ricin. I'm confused here. Is possession of castor beans possession of ricin? Is possession of chopped castor beans possession of ricin? > He then picked up another container and stated words to the effect, "This > would make you really sick," the source allegedly told authorities. I could pick up a container of Drano, and make the same commment. Big deal. > The source told police that Ekberg had two books containing information on > how to make poisons from household chemicals and plants, according to the > affidavit. Still legal to own, as far as I know. > His mother, Theresa Ekberg, told the FBI that he has been treated for > depression, according to the affidavit. > His mother also told authorities that in the past her son had possessed > some "chemicals." > She said that on at least one occasion he showed her something he had > purchased via the Internet and expressed concern that if their cat > inadvertently ate enough of it, the cat would die, according to the > affidavit. Obviously this news story is the grand prize winner in an innuendo contest. > The FBI is still investigating who sent two letters that contained ricin in > 2003 through the U.S. postal system. Those letters contained threats and > complaints about labor regulations in the trucking industry. > In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died > after a man attacked him with an umbrella that had been rigged to inject a > ricin pellet under his skin. And WTF does this have to do with the guy with the castor beans? Looks like "Ricin Theatre" has joined "Anthrax Theatre" in the armory of Weapons of Mass Deception. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From rah at shipwright.com Thu Jan 13 17:24:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 13 Jan 2005 20:24:51 -0500 Subject: Florida man faces bioweapon charge Message-ID: CNN Florida man faces bioweapon charge FBI says accused had poison ricin and several weapons Thursday, January 13, 2005 Posted: 7:00 PM EST (0000 GMT) MIAMI, Florida (CNN) -- An Ocala, Florida, man was arrested by the FBI after they found the biotoxin ricin in his possession in the home he shares with his mother. Steven Michael Ekberg, 22, had at least 83 castor beans and other byproducts consistent with the manufacture of ricin in his possession, the FBI said. Ricin is a poison that can be made from the waste from processing castor beans, according to the Centers for Disease Control and Prevention. The former waiter also had several weapons, including an AK-47 and an Uzi, the FBI said. Ekberg was taken into custody Wednesday night and was scheduled to appear Thursday afternoon before a federal magistrate in Ocala. He is being charged with possession of a biological weapon. "We are still investigating and are trying to determine what his intentions were, but we have no information that he released it to anyone," said FBI spokesman Jeff Westcott. "We believe that he acquired the materials over the Internet, but we are still investigating," he said. In their affidavit, FBI officials said they found a number of seeds in packaging that describes the material as "very poisonous." They said they also found, in a cardboard box in Ekberg's room, glass vials containing white granules suspected of being husk-less, chopped castor beans, a byproduct of the manufacture of ricin. The FBI said Ekberg has no known ties to terrorists or extremists. A hazardous-materials team took the substance to the Florida Health Department laboratory in Jacksonville, where it was confirmed to be ricin, the FBI said. FBI biohazard teams swept the house to ensure that no one in the neighborhood could become contaminated. Ekberg was arrested on an unrelated weapons and narcotics charge last weekend by the Marion County Sheriff's Office. According to the FBI affidavit, an anonymous source now acting as a confidential source called the sheriff's office and told authorities that Ekberg showed him the materials several months ago. "If I put this on your food, this would kill you immediately," Ekberg allegedly told the source, pointing to the contents of a container, according to the affidavit. He then picked up another container and stated words to the effect, "This would make you really sick," the source allegedly told authorities. Picking up another container, he said, "This would kill you, but not right away." The source told police that Ekberg had two books containing information on how to make poisons from household chemicals and plants, according to the affidavit. Ekberg, who has a license to carry concealed weapons, was in possession of various handguns at the time of his arrest, in addition to the Uzi and AK-47, authorities said. His mother, Theresa Ekberg, told the FBI that he has been treated for depression, according to the affidavit. His mother also told authorities that in the past her son had possessed some "chemicals." She said that on at least one occasion he showed her something he had purchased via the Internet and expressed concern that if their cat inadvertently ate enough of it, the cat would die, according to the affidavit. She advised that her son had had the chemicals for several years. The confidential source, according to the FBI, told authorities that Ekberg would often mix his anti-depression medication with alcohol and visit bars carrying concealed weapons. If convicted, he could face up to 10 years in prison. The FBI is still investigating who sent two letters that contained ricin in 2003 through the U.S. postal system. Those letters contained threats and complaints about labor regulations in the trucking industry. In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died after a man attacked him with an umbrella that had been rigged to inject a ricin pellet under his skin. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dave at farber.net Fri Jan 14 01:02:03 2005 From: dave at farber.net (David Farber) Date: Fri, 14 Jan 2005 04:02:03 -0500 Subject: [IP] more on No expectation of privacy in public? In a pig's eye! Message-ID: ------ Forwarded Message From: Josh Duberman Reply-To: Date: Thu, 13 Jan 2005 19:19:51 -0800 To: Subject: Re: [IP] No expectation of privacy in public? In a pig's eye! Hi - I forwarded these messages to author David Brin. His reply is below, and he gave permission for you to post it IP if you wish. Thank you and best wishes - Josh ------------ Josh, thanks for sharing these remarks about privacy. Alas, these folks are falling for the usual trap that has snared so many well-meaning people for the last decade. They are right to worry about creeping Big Brotherism... and vigorously defending the wrong stretch of wall. What weird reflex is it, that makes bright people fall for the trap of seeing SECRECY as a friend of freedom? (Oh, when it's YOUR secrecy you call it "privacy.") To rail against others seeing, without suggesting any conceivable way that (1) the technologies could be stopped or (2) how it would help matters to stop govt surveillance even if we could. As I've emphasized in The Transparent Society, the thing that has kept us free and safe has been to emphasize MORE information flows. To ENHANCE how much average people know. http://www.futurist.com/portal/future_trends/david_brin_empowerment.htm http://www.salon.com/tech/feature/2004/08/04/mortal_gods/index_np.html And yes, this is the one way to protect genuine PRIVACY... though any sensible person knows that the word will be re-defined in a new century flooded with cheap cameras. (For a look at the near future, see: http://www.ojr.org/ojr/workplace/1078288485.php) This inane reflex to try to blind others, instead of empowering citizens to look back, is like a drug, alas. But slowly people are awakening to the facts. The world will be a sea of cameras and vision. But that needn't be a nightmare, if we can hold the watchers accountable by looking BACK. With cordial regards, David Brin www.davidbrin.com David Farber wrote: > > Orwell was an amateur djf > > > ------ Forwarded Message > From: Lauren Weinstein > Date: Wed, 12 Jan 2005 11:38:28 -0800 > To: > Cc: > Subject: No expectation of privacy in public? In a pig's eye! > > Dave, > > It's time to blow the lid off this "no expectation of privacy in > public places" argument that judges and law enforcement now spout out > like demented parrots in so many situations. > > Technology has rendered that argument meaningless -- unless we > intend to permit a pervasive surveillance slave society to become > our future -- which apparently is the goal among some parties. > > It is incredibly disingenuous to claim that cameras (increasingly > tied to face recognition software) and GPS tracking devices (which > could end up being standard in new vehicles as part of their > instrumentation black boxes), etc. are no different than cops > following suspects. > > Technology will effectively allow everyone to be followed all of the > time. Unless society agrees that everything you do outside the > confines of your home and office should be available to authorities > on demand -- even retrospectively via archived images and data -- we > are going down an incredibly dangerous hole. > > I use the "slimy guy in the raincoat" analogy. Let's say the > government arranged for everyone to be followed at all times in > public by slimy guys in raincoats. Each has a camera and clipboard, > and wherever you go in public, they are your shadow. They keep > snapping photos of where you go and where you look. They're > constantly jotting down the details of your movements. When you go > into your home, they wait outside, ready to start shadowing you > again as soon as you step off your property. Every day, they report > everything they've learned about you to a government database. > > Needless to say, most people would presumably feel incredibly > violated by such a scenario, even though it's all taking place in > that public space where we're told that we have no expectation of > privacy. > > Technology is creating the largely invisible equivalent of that guy > in the raincoat, ready to tail us all in perpetuity. If we don't > control him, he will most assuredly control us. > > --Lauren-- > Lauren Weinstein > lauren at pfir.org or lauren at vortex.com or lauren at privacyforum.org > Tel: +1 (818) 225-2800 > http://www.pfir.org/lauren > Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org > Co-Founder, Fact Squad - http://www.factsquad.org > Co-Founder, URIICA - Union for Representative International Internet > Cooperation and Analysis - http://www.uriica.org > Moderator, PRIVACY Forum - http://www.vortex.com > Member, ACM Committee on Computers and Public Policy > Lauren's Blog: http://lauren.vortex.com > > > - - - > > > >> >> ------ Forwarded Message >> From: Gregory Hicks >> Reply-To: Gregory Hicks >> Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) >> To: >> Cc: >> Subject: Ruling gives cops leeway with GPS >> >> Dave: >> >> For IP if you wish... >> >> http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 >> >> Ruling gives cops leeway with GPS >> Decision allows use of vehicle tracking device without a warrant >> >> By BRENDAN LYONS, Staff writer >> First published: Tuesday, January 11, 2005 >> >> In a decision that could dramatically affect criminal investigations >> nationwide, a federal judge has ruled police didn't need a warrant when >> they attached a satellite tracking device to the underbelly of a car >> being driven by a suspected Hells Angels operative. >> >> [...snip...] >> >> All Times Union materials copyright 1996-2005, Capital Newspapers >> Division of The Hearst Corporation, Albany, N.Y. >> >> >> >> > > > ------ End of Forwarded Message > -- Josh Duberman, Pivotalinfo LLC, 15100 SE 38th St. #819, Bellevue, WA 98006; Tel:(425) 746-0050; Cell:(425) 591-8200; pivotalinfo at usa.net; Information For Solutions In Business & Science ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From jtrjtrjtr2001 at yahoo.com Fri Jan 14 06:01:46 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 14 Jan 2005 06:01:46 -0800 (PST) Subject: Searching with Images instead of Words In-Reply-To: <20050114074712.GM9221@leitl.org> Message-ID: <20050114140146.54345.qmail@web21204.mail.yahoo.com> hi, They had been researching on this line in Indian Institue of Science, Bangalore. I think image searching has fundamental limits. For successfully matching two images, there should be a subset of information in both that totally match or match with a high probability. Expecting a front view of an image to match with a side view of the same image is impossible. They are both disjoint sets of information. If all the images are frontal images, we can match them with a hight probability, otherwise I doubt this technology has a future. Sarad. --- Eugen Leitl wrote: > > Link: > http://slashdot.org/article.pl?sid=05/01/13/184226 > Posted by: CmdrTaco, on 2005-01-13 20:29:00 > > from the blessing-for-those-who-can't-spell dept. > [1]johnsee writes "A computer vision researcher > by the name of Hartmut > Neven is [2]developing ingenious new technology > that allows the > searching of a database by submitting an image, > for example, off a > mobile phone camera. Imagine taking a photo of a > street corner to find > out where you are, or the photo of a city > building to see its history" > > IFRAME: [3]pos6 > > References > > 1. http://www.sandstorming.com/ > 2. > http://www.thefeature.com/article?articleid=101341&ref=5147543 > 3. > http://ads.osdn.com/?ad_id=2936&alloc_id=13732&site_id=1&request_id=9329739 > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl > ______________________________________________________________ > ICBM: 48.07078, 11.61144 > http://www.leitl.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 > 8B29 F6BE > http://moleculardevices.org > http://nanomachines.net > > ATTACHMENT part 2 application/pgp-signature __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com From justin-cypherpunks at soze.net Thu Jan 13 22:37:49 2005 From: justin-cypherpunks at soze.net (Justin) Date: Fri, 14 Jan 2005 06:37:49 +0000 Subject: Florida man faces bioweapon charge In-Reply-To: <200501140148.j0E1mDnB013892@artifact.psychedelic.net> References: <200501140148.j0E1mDnB013892@artifact.psychedelic.net> Message-ID: <20050114063748.GA31567@arion.soze.net> On 2005-01-13T17:48:13-0800, Eric Cordian wrote: > > RAH pastes: > > > She said that on at least one occasion he showed her something he had > > purchased via the Internet and expressed concern that if their cat > > inadvertently ate enough of it, the cat would die, according to the > > affidavit. > > Obviously this news story is the grand prize winner in an innuendo > contest. The article also neglects to mention FEDERAL AGENCIES' pet KILL ratio. I'm not sure about cats specifically, but dog killing is quite popular. > > The FBI is still investigating who sent two letters that contained ricin in > > 2003 through the U.S. postal system. Those letters contained threats and > > complaints about labor regulations in the trucking industry. Evidently the kid was in possession of Envelopes of Mass Destruction as well as castor beans, guns, and books. Envelopes! Everyone knows that civilized people communicate via instant/text message or email (insofar as they are distinct). We have no need for these ENVELOPES, which as well as being used to send toxins to KILL LAW-ABIDING TAXPAYERS also cause untold annual economic damage from paper-cut-caused hospital visits. > > In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died > > after a man attacked him with an umbrella that had been rigged to inject a > > ricin pellet under his skin. > > And WTF does this have to do with the guy with the castor beans? I spot the beginnings of yet another war. Please excuse me while I go bury my umbrellas. PATRIOTS use hooded raincoats. We have no NEED for barbaric and dangerous implements like UMBRELLAS. > Looks like "Ricin Theatre" has joined "Anthrax Theatre" in the armory of > Weapons of Mass Deception. You forgot the guns! The GUNS! Those terrible and bloody implements of death ARE totally unnecessary! Never mind that they're PERFECTLY LEGAL and they don't make ricin (excuse me, castor beans) any more deadly. He still had guns! -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From justin-cypherpunks at soze.net Thu Jan 13 22:38:15 2005 From: justin-cypherpunks at soze.net (Justin) Date: Fri, 14 Jan 2005 06:38:15 +0000 Subject: Ridge Wants Fingerprints in Passports In-Reply-To: <6.0.3.0.0.20050113174453.039efa58@pop.idiom.com> References: <6.0.3.0.0.20050113174453.039efa58@pop.idiom.com> Message-ID: <20050114063815.GB31567@arion.soze.net> On 2005-01-13T17:46:39-0800, Bill Stewart wrote: > > He's smearing his sticky fingerprints all over everything else, > and now he wants them in our passports? > Oughtta learn to keep his hands to himself. Fine with me if the first person to get a new biometric passport gets Ridge's fingers as part of the deal -- to verify for the world that the prints are valid. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From eugen at leitl.org Thu Jan 13 23:47:12 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jan 2005 08:47:12 +0100 Subject: Searching with Images instead of Words Message-ID: <20050114074712.GM9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/13/184226 Posted by: CmdrTaco, on 2005-01-13 20:29:00 from the blessing-for-those-who-can't-spell dept. [1]johnsee writes "A computer vision researcher by the name of Hartmut Neven is [2]developing ingenious new technology that allows the searching of a database by submitting an image, for example, off a mobile phone camera. Imagine taking a photo of a street corner to find out where you are, or the photo of a city building to see its history" IFRAME: [3]pos6 References 1. http://www.sandstorming.com/ 2. http://www.thefeature.com/article?articleid=101341&ref=5147543 3. http://ads.osdn.com/?ad_id=2936&alloc_id=13732&site_id=1&request_id=9329739 ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Fri Jan 14 05:55:52 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 08:55:52 -0500 Subject: Brin needs killing, XIIV In-Reply-To: <20050114090501.GU9221@leitl.org> References: <20050114090501.GU9221@leitl.org> Message-ID: At 10:05 AM +0100 1/14/05, Eugen Leitl wrote: >Brin needs killing, XIIV er, "Eleventy Four"? "Fifteen the hard way"? ;-) Cheers, RAH Who was backhanded once for calling Brin a statist in public... -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 06:05:32 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 09:05:32 -0500 Subject: Do You Own Yourself? Message-ID: The Lawful Path Do You Own Yourself? by Butler Shaffer One of my favorite quotations comes from Thomas Pynchon: "If they can get you asking the wrong questions, they don4t have to worry about answers." Our world is in the mess it is in today because most of us have internalized the fine art of asking the wrong questions. Contrary to the thinking that would have us believe that the conflict, violence, tyranny, and destructiveness that permeates modern society is the result of "bad" or "hateful" people, disparities in wealth, or lack of education, all of our social problems are the direct consequence of a general failure to respect the inviolability of one another4s property interests! I begin my Property classes with the question: "do you own yourself?" Most of my students eagerly nod their heads in the affirmative, until I warn them that, by the time we finish examining this question at the end of the year, they will find their answer most troubling, whatever it may be today. "If you do own yourself, then why do you allow the state to control your life and other property interests? And if you answer that you do not own yourself, then what possible objection can you raise to anything that the state may do to you?" We then proceed to an examination of the case of Dred Scott v. Sandford. The question of whether Dred Scott was a self-owning individual, or the property of another, is the same question at the core of the debate on abortion. Is the fetus a self-owning person, or an extension of the property boundaries of the mother? The same property analysis can be used to distinguish "victimizing" from "victimless" crimes: murder, rape, arson, burglary, battery, theft, and the like, are victimizing crimes because someone4s property boundaries were violated. In a victimless crime, by contrast, no trespass to a property interest occurs. If one pursues the substance of the "issues" that make up political and legal debates today, one always finds a property question at stake: is person "x" entitled to make decisions over what is his, or will the state restrain his decision-making in some way? Regulating what people can and cannot put into their bodies, or how they are to conduct their business or social activities, or how they are to educate their children, are all centered around property questions. "Property" is not simply some social invention, like Emily Post4s guide to etiquette, but a way of describing conditions that are essential to all living things. Every living thing must occupy space and consume energy from outside itself if it is to survive, and it must do so to the exclusion of all other living things on the planet. I didn4t dream this up. My thinking was not consulted before the life system developed. The world was operating on the property principle when I arrived and, like the rest of us, I had to work out my answers to that most fundamental, pragmatic of all social questions: who gets to make decisions about what? The essence of "ownership" is to be found in control: who gets to be the ultimate decision maker about people and "things" in the world? Observe the rest of nature: trees, birds, fish, plants, other mammals, bacteria, all stake out claims to space and sources of energy in the world, and will defend such claims against intruders, particularly members of their own species. This is not because they are mean-spirited or uncooperative: quite the contrary, many of us have discovered that cooperation is a great way of increasing the availability of the energy we need to live well. We have found out that, if we will respect the property claims of one another and work together, each of us can enjoy more property in our lives than if we try to function independently of one another. Such a discovery has permitted us to create economic systems. There is no way that I could have produced, by myself, the computer upon which I am writing this article. Had I devoted my entire life to the undertaking, I would have been unable even to have conceived of its technology. Many other men and women, equally unable to have undertaken the task by themselves, cooperated without even knowing one another in its creation. Lest you think that my writing would have to have been accomplished through the use of a pencil, think again: I would also have been unable to produce a pencil on my own, as Leonard Read once illustrated in a wonderful, brief essay. Such cooperative undertakings have been possible because of a truth acknowledged by students of marketplace economic systems, particularly the Austrians about human nature: each of us acts only in anticipation of being better off afterwards as a result of our actions. Toward whatever ends we choose to act, and such ends are constantly rearranging their priorities within us, their satisfaction is always expressed in terms inextricably tied to decision making over something one owns (or seeks to own). Whether I wish to acquire some item of wealth, or to give it away; whether I choose to write some great novel or paint some wondrous work of art; or whether I just wish to lie around and look at flowers, each such act is premised on the fact that we cannot act in the world without doing so through property interests. It is in anticipation of being able to more fully express our sense of what is important to us, both materially and spiritually, that we cooperate with one another. "Property" also provides a means for maximizing both individual liberty and peace in society. For once we identify who the owner of some item of property is, that person4s will is inviolate as to such property interest. He or she can do what they choose with respect to what is theirs. If I own a barn, I can set fire to it should I so choose. If I must first get another4s permission, such other person is the owner. Individual liberty means that my decision making is immune from the coercion of others, and coercion is always expressed in terms of property trespasses. At the same time, the property principle limits the scope of my decision making by confining it to that which is mine to control. This is why problems such as industrial "pollution" are usually misconceived, reflecting the truth of Pynchon4s earlier quote. A factory owner who fails to confine the unwanted byproducts of his activities to his own land, is not behaving as a property owner, but as a trespasser. Economists have an apt phrase for this: socializing the costs. He is behaving like any other collectivist, choosing to extend his decision making over the property of others! But not all of us choose to pursue our self-interests through cooperation with others. Cooperation can exist only when our relationships with others are on a voluntary basis which, in turn, requires a mutual respect for the inviolability of one another4s property boundaries. Those who seek to advance their interests in non-cooperative ways, create another system: politics. If you can manage to drag your mind away from the drivel placed there by your high school civics class teacher, and look at political systems in terms of what they in fact do, you will discover this: every such system is founded upon a disrespect for privately owned property! All political systems are collectivist in nature, for each presumes a rightful authority to violate the will, including confiscation, of property owners. One can no more conceive of "politics" without "theft" than of "war" without "violence." Every political system is defined in terms of how property is to be controlled in a given society. In communist systems, the state confiscates all the means of production. In less-ambitious socialist systems, the state confiscates the more important means of production (e.g., railroads, communications, steel mills, etc.). Under fascism, "title" to property remains in private hands, but "control" over such property is exercised by the state. Thus, fascism has given us state regulatory systems, in which property owners, be they farmers, homeowners, or businesses, have the illusion of owning what they believe to be "theirs," while the state increasingly exercises the real ownership authority (i.e., control). In welfare state systems, the state confiscates part of the income of individuals and redistributes it to others. As stated earlier, property is an existential fact. Whatever the society in which we live, someone will make determinations as to who will live where, what resources can be consumed by whom (and when), and how such property will be controlled. Such decisions can either be made by individual property owners, over what is theirs to control, or by the state presuming the authority to control the lives of each of us. When such decisions are made by the state, it is claiming ownership over our lives. It is at this point that I let the students in on the secret the political establishment would prefer not to have revealed: the 13th Amendment to the U.S. Constitution did not end slavery, but only nationalized it! That most Americans acquiesce in such political arrangements, and take great offense should anyone dare to explain their implications, has led me to the conclusion that America may be the last of the collectivist societies to wither away. Most Americans, sad to say, seem unprepared to deny the state4s authority to direct their lives and property as political officials see fit. The reason for this, as my first-day question to students is designed to elicit, is that most of us refuse to insist upon self-ownership. We may, of course, choose to accept our role as state-owned chattels, particularly if we are well-treated by our masters. We may be so conditioned in our obeisance that, like cattle entering the slaughterhouse, we may pause to lick the hand of the butcher out of gratitude for having been well cared for. On the other hand, we may decide to reclaim our self-ownership by taking back the control over our lives that we have long since abandoned. Perhaps the insanity of our social destructiveness, including the Bush Administration4s deranged declaration of a permanent war against the rest of the world, will bring about an examination of alternative ways of living together in conditions of peace and liberty. Our political systems cannot bring about such harmonious and life-sustaining ways because they are premised on a rejection of the principle of self-ownership. In a society of self-owning individuals, there would be no place for politicians, bureaucrats, and other state functionaries. Like the rest of us, they would have to confine their lives to minding their own business, and deriving whatever benefit they could from persons who chose to cooperate with them. There is one person who can restore you to a state of self-ownership, however, and that person is you. To do so, you need only assert your claim, not as some empty gesture, but in full understanding of the existential meaning of such a claim, including the willingness to take full control of and responsibility for your life. While your claim will likely evoke cries of contempt from many, you may also find yourself energized by a life force that permeates all of nature; an ilan vital that reminds us that life manifests itself only through individuals, and not as collective monstrosities; that life belongs to the living, not to the state or any other abstraction. February 25, 2002 Butler Shaffer [send him e-mail] teaches at the Southwestern University School of Law. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 06:31:41 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 09:31:41 -0500 Subject: Isle of Man welcomes US online punters Message-ID: The Register Biting the hand that feeds IT The Register ; Internet and Law ; eCommerce ; Original URL: http://www.theregister.co.uk/2005/01/13/isle_man_gambling/ Isle of Man welcomes US online punters By Lester Haines (lester.haines at theregister.co.uk) Published Thursday 13th January 2005 15:37 GMT The Isle of Man now allows US punters to gamble in online casinos based on the island, the NY Times reports. The announcement will rattle US authorities opposed to American citizens having a flutter beyond the reach of US legislation. Indeed, US prosecutors have launched a series of actions against operations doing business with foreign online casinos. Some credit cards, Amex (http://www.theregister.co.uk/2004/10/18/gambling_block/) included, do not allow customers to gamble on the web at all. In response, the WTO recently declared (http://www.theregister.co.uk/2004/11/11/us_gambling_wto_rumble/) that this prohibition of cross-border trade breaks breached the 1994 general agreement on trade and services, and ruled in favour of Caribbean nation Antigua and Barbuda in the matter. The Isle of Man has operated online casinos since 2001, initially attracting some big-bucks operators including MGM Mirage. However, after an initial boom, a flattened market provoked many, MGM among them, to shut down their Irish Sea operations. The island's new policy came into force on 1 January, and is clearly an attempt to revitalise the online gambling economy. Tim Craine, the head of electronic business for the Isle of Man, said: "There's a lot of business looking to relocate to a reputable, regulated jurisdiction. We're hoping to capitalize on that business by changing our policy." Craine confirmed that the Isle of Man is particularly looking to attract representatives of the burgeoning online poker business (http://www.theregister.co.uk/2005/01/12/online_poker/), currently worth between $2m and $2.5m per day worldwide. . Related stories Punters warm to online poker (http://www.theregister.co.uk/2005/01/12/online_poker/) Online roulette has Germans in a spin (http://www.theregister.co.uk/2004/11/15/spielbank_wiesbaden/) WTO rules against US gambling laws (http://www.theregister.co.uk/2004/11/11/us_gambling_wto_rumble/) UK Gov unwraps Gambling Bill (http://www.theregister.co.uk/2004/10/19/gambling_bill/) Amex prevents punters gambling online (http://www.theregister.co.uk/2004/10/18/gambling_block/) Online poker ace scores #4,500 - per week (http://www.theregister.co.uk/2004/09/15/online_poker_ace/) Irish punters enjoy online betting (http://www.theregister.co.uk/2004/05/05/irish_online_betting/) -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 06:35:34 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 09:35:34 -0500 Subject: US slaps on the wardriver-busting paint Message-ID: The Register Biting the hand that feeds IT The Register ; Security ; Network Security ; Original URL: http://www.theregister.co.uk/2005/01/13/wi_fi_paint/ US slaps on the wardriver-busting paint By Lester Haines (lester.haines at theregister.co.uk) Published Thursday 13th January 2005 11:52 GMT Security-minded US decorators' supply outfit Force Field Wireless (http://forcefieldwireless.com) claims to have developed a DIY solution to the international menace of marauding geek wardrivers - DefendAir paint "laced with copper and aluminum fibers that form an electromagnetic shield, blocking most radio waves and protecting wireless networks". According to a South Florida Sun Sentinel report (http://www.sun-sentinel.com/business/local/sfl-sbgizmos09jan09,0,2849380.story?coll=sfla-business-headlines), one coat of the water-based paint "shields Wi-Fi, WiMax and Bluetooth networks operating at frequencies from 100 megahertz to 2.4 gigahertz", while two or three applications are "good for networks operating at up to five gigahertz". Simple as that. Of course, there are a few downsides to this miracle product. First up, you must be careful how you slap it on. Force Field Wireless rep Harold Wray admits that "radio waves find leaks", while the company asks users to be aware that the product "must be applied selectively" otherwise it "might hinder the performance of radios, televisions and cell phones". Reg readers can make of this apparent contradiction what they will, and are asked to direct any technically-based sceptisicm to Force Field Wireless, and not to Vulture Central. Thankyou. Another snagette is that DefendAir is available only in grey - a fact sufficient to provoke what is known in the UK as "interior designers' wobbly". Mercifully, it can be used as a primer, so those who require wireless peace of mind plus bold fashion statement can rest assured that coat of "Wardriver Crimson" will cover it up quite nicely. It only remains for us to say that DefendAir costs a cool $69 per gallon (US gallon, presumably). Still, that's a small price to pay for the absolute certainty that High School students are not right now sitting across the street recording your credit card details for later deployment in the online purchase of pornography, drugs and semi-automatic weapons. . Related stories Business frets over wireless security (http://www.theregister.co.uk/2004/11/01/wifi_security_worries/) UK scientists roll out Wi-Fi proof wallpaper (http://www.theregister.co.uk/2004/08/12/wifi_wallpaper/) Michigan wardrivers await sentencing (http://www.theregister.co.uk/2004/08/06/michigan_wardrivers_guilty/) Wi-Fi 'sniper rifle' debuts at DEFCON (http://www.theregister.co.uk/2004/08/03/wi-fi_aerial_gun/) -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Fri Jan 14 01:05:01 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jan 2005 10:05:01 +0100 Subject: Brin needs killing, XIIV Message-ID: <20050114090501.GU9221@leitl.org> ----- Forwarded message from David Farber ----- From ptrei at rsasecurity.com Fri Jan 14 07:07:54 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Fri, 14 Jan 2005 10:07:54 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! (fwd from dave@farber.net) Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C0B@rsana-ex-hq1.NA.RSA.NET> Bill Stewart wrote: > At 12:30 PM 1/12/2005, Roy M. Silvernail wrote: > >Just out of curiosity, if the man doesn't need a warrent > >to place a surveilance device, shouldn't it be within your rights > >to tamper with, disable or remove such a device if you discover one? > > Do you mean that if you discover an unsolicited gift of > consumer electronics attached to your car, > do you have the right to play with it just as you would if > it came in the mail? I would certainly expect so... Attaching it to another car would seem a suitable prank - someone who travels a lot, on an irregular path - a pizza delivery guy, or a real estate agent. Or perhaps a long distance truck. It would take some chutzpa, but tacking onto a cops car would send a message.... Peter Trei From rah at shipwright.com Fri Jan 14 10:07:23 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 13:07:23 -0500 Subject: Sun creates worlds smallest SSL Web server Message-ID: - Computer Business Review Sun creates world's smallest SSL Web server Sun Microsystems Inc has created what can truly be called a microsystem. The tiny server, nicknamed "Sizzle" (from Slim SSL), is the size and shape of a quarter. It was created by Sun's engineers as a proof-of-concept machine for embedded applications and will be presented at the Pervasive Computing and Communications show in March. 14 Jan 2005, 10:47 GMT - Sizzle is a wireless Web server and is based on an 8-bit microprocessor designed by Crossbow Technology Inc. The server has 8Kb of main memory, which implements a stripped-down operating system plus a Web server and an SSL server. Crossbow has created its own operating system, called TinyOS, for these remote computers, often referred to as motes. The mote that Sun is using in Sizzle is called the MICA2DOT, and it is powered by a three-volt button battery, like the kind in your motherboard to keep your BIOS settings alive. It is unclear if Sun is using TinyOS or a stripped-down version of Solaris or Linux to create its micro Web server. Sun is adding 128Kb of flash memory to the mote, and it is implementing a version of SSL based on Elliptic Curve Cryptography (ECC) that Sun says makes public key cryptography suitable on a very tiny machine with extremely limited capabilities. Sizzle can complete an SSL handshake in under four seconds, and can do it in under two seconds with sessions that are reused; the Web server can transfer about 450 bytes per second. While you may not be able to run Yahoo on it, you can build vast arrays of sensors with ad hoc networking, which is what motes are for. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From steve49152 at yahoo.ca Fri Jan 14 10:12:16 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Fri, 14 Jan 2005 13:12:16 -0500 (EST) Subject: Brin needs killing, XIIV In-Reply-To: <20050114090501.GU9221@leitl.org> Message-ID: <20050114181216.4529.qmail@web51807.mail.yahoo.com> To leave the attributions and headers, or not? --- Eugen Leitl wrote: > ----- Forwarded message from David Farber ----- > > From: David Farber > Date: Fri, 14 Jan 2005 04:02:03 -0500 > To: Ip > Subject: [IP] more on No expectation of privacy in public? > In a pig's eye! > Thank you and best wishes - Josh > ------------ > > Josh, thanks for sharing these remarks about privacy. > Alas, these folks are falling for the usual trap that > has snared so many well-meaning people for the last > decade. They are right to worry about creeping Big > Brotherism... and vigorously defending the wrong > stretch of wall. I was naive once too. > What weird reflex is it, that makes bright people fall > for the trap of seeing SECRECY as a friend of freedom? As we all know, 'freedom' is a value-neutral term when used on it's own, without a suitable modifier, as in the above. > (Oh, when it's YOUR secrecy you call it "privacy.") To I imagine that most people, in the fuzzy space of colloquial conceptions, associate 'privacy' with the information security of their own lives, and associate `secrecy' with the concealment of corporate or government information, processes, and assets. But we may use the terms interchangeably if it makes you happy. To wit: I have secrets which I would like to keep from malicious criminals and other government workers. > rail against others seeing, without suggesting any > conceivable way that > > (1) the technologies could be stopped or > (2) how it would help matters to stop govt > surveillance even if we could. > As I've emphasized in The Transparent Society, the > thing that has kept us free and safe has been to > emphasize MORE information flows. To > ENHANCE how much average people know. Ok, that is a nice idea but... > http://www.futurist.com/portal/future_trends/david_brin_empowerment.htm [skimmed] Given the information-centric disparity that already exists between individuals of varying allegiance or association, how is it possible to assure that most everyone is brought up to speed on the current state- of-the-art in the numerous fields of study and technology that relate to intelligence and counter- intelligence in such a way as to make the playing field level for all? As it stands, with the mutability inherent in the acquisition and interpretation of signals and surveillance data, it is too easy for large masses of people to acquire widespread mis- conceptions about the veracity of the information at their disposal. Put another way: hypothetical well-organised dis-information sophisticates could in theory arrange to give the masses a false sense of security and inclusiveness within a subtly fraudulent framework of public-mediated surveillance and information sharing. Perhaps this could be arranged by building backdoors and covert access points in the public surveillance network which would allow the 'cabal' to diguise their activities while also permitting them to arbitrarily muck about with the publically availble data, subject only to constraints imposed by the actual state-of-the-art -- enhanced on a practical level by virtue of limiting in some ways the technology available to the masses. If that makes sense to you, then it should become obvious that certifying the `public surveillance network' free compromise by privilaged elites of any kind becomes a very difficult task. And as we all know, groups like the NSA and their foreign counterparts already enjoy an indeterminate lead on the public in areas of interest and relation to information technology and surveillance. So, how do we as average citizens mitigate the threat of being lulled into a false sense of security by the flashy newness of some kind of hypothetical BrinWorld public surveillance and sharing network? Clearly this is a large problem, and I certainly don't have the answer. But, I think the idea of BrinWorld is the correct approach, and obviously some very intelligent people think so too. I would refer to the paper entitiled "The Weapon of Openness", by Arthur Kantrowitz, which approaches this issue from a more general perspective. Most likely, there is a solution that we all can live with. Avoiding the risks will, however, be rather difficult. Personally, I wouldn't mind too much living in a total surveillance world if I were assured that everyone else was subject to the same level of scrutiny. This is primarily because I don't engage in activities which are particularly shameful or which are dependent upon the immoral or wanton explotation and subversion of another person's right to pursue interests that do not harm others. I am fully aware that a great many people do engage in such activities, some of which are cultural rites or religious rituals that are validated by the tacit legitimacy given to them by a tyrranical majority. And then there are people who live off the avails of crime because they find that such activities are `manly', stimulating, or otherwise pleasureable in some way. > And yes, this is the one way to protect genuine > PRIVACY... though any sensible person knows that the > word will be re-defined in a new century flooded with > cheap cameras. I'm not sure that this is the _only_ way, but it is surely the way that looks as though it will acend to the fore in the near term. > (For a look at the near future, see: > http://www.ojr.org/ojr/workplace/1078288485.php) > > This inane reflex to try to blind others, instead of > empowering citizens to look back, is like a drug, So goes the psychological theory of the moment. I'm not so sure that the mechanism is quite so simple as to lend itself to a reduction that makes it no different to chemical addiction. > alas. But slowly people are awakening to the facts. Mmm-hmmm. > The world will be a sea of cameras and vision. But > that needn't be a nightmare, if we can hold the > watchers accountable by looking BACK. Well, yes. But we also need to do quite a bit of work to design the *secure* systems, networks, and code to make it all happen as it should. Regards, Steve [remainder left for context] > With cordial regards, > > David Brin > www.davidbrin.com > > David Farber wrote: > > > > Orwell was an amateur djf > > > > > > ------ Forwarded Message > > From: Lauren Weinstein > > Date: Wed, 12 Jan 2005 11:38:28 -0800 > > To: > > Cc: > > Subject: No expectation of privacy in public? In a pig's eye! > > > > Dave, > > > > It's time to blow the lid off this "no expectation of privacy in > > public places" argument that judges and law enforcement now spout out > > like demented parrots in so many situations. > > > > Technology has rendered that argument meaningless -- unless we > > intend to permit a pervasive surveillance slave society to become > > our future -- which apparently is the goal among some parties. > > > > It is incredibly disingenuous to claim that cameras (increasingly > > tied to face recognition software) and GPS tracking devices (which > > could end up being standard in new vehicles as part of their > > instrumentation black boxes), etc. are no different than cops > > following suspects. > > > > Technology will effectively allow everyone to be followed all of the > > time. Unless society agrees that everything you do outside the > > confines of your home and office should be available to authorities > > on demand -- even retrospectively via archived images and data -- we > > are going down an incredibly dangerous hole. > > > > I use the "slimy guy in the raincoat" analogy. Let's say the > > government arranged for everyone to be followed at all times in > > public by slimy guys in raincoats. Each has a camera and clipboard, > > and wherever you go in public, they are your shadow. They keep > > snapping photos of where you go and where you look. They're > > constantly jotting down the details of your movements. When you go > > into your home, they wait outside, ready to start shadowing you > > again as soon as you step off your property. Every day, they report > > everything they've learned about you to a government database. > > > > Needless to say, most people would presumably feel incredibly > > violated by such a scenario, even though it's all taking place in > > that public space where we're told that we have no expectation of > > privacy. > > > > Technology is creating the largely invisible equivalent of that guy > > in the raincoat, ready to tail us all in perpetuity. If we don't > > control him, he will most assuredly control us. > > > > --Lauren-- > > Lauren Weinstein > > lauren at pfir.org or lauren at vortex.com or lauren at privacyforum.org > > Tel: +1 (818) 225-2800 > > http://www.pfir.org/lauren > > Co-Founder, PFIR - People For Internet Responsibility - > http://www.pfir.org > > Co-Founder, Fact Squad - http://www.factsquad.org > > Co-Founder, URIICA - Union for Representative International Internet > > Cooperation and Analysis - http://www.uriica.org > > Moderator, PRIVACY Forum - http://www.vortex.com > > Member, ACM Committee on Computers and Public Policy > > Lauren's Blog: http://lauren.vortex.com > > > > > > - - - > > > > > > > >> > >> ------ Forwarded Message > >> From: Gregory Hicks > >> Reply-To: Gregory Hicks > > >> Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) > >> To: > >> Cc: > >> Subject: Ruling gives cops leeway with GPS > >> > >> Dave: > >> > >> For IP if you wish... > >> > >> http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 > >> > >> Ruling gives cops leeway with GPS > >> Decision allows use of vehicle tracking device without a warrant > >> > >> By BRENDAN LYONS, Staff writer > >> First published: Tuesday, January 11, 2005 > >> > >> In a decision that could dramatically affect criminal investigations > >> nationwide, a federal judge has ruled police didn't need a warrant > when > >> they attached a satellite tracking device to the underbelly of a car > >> being driven by a suspected Hells Angels operative. > >> > >> [...snip...] > >> > >> All Times Union materials copyright 1996-2005, Capital Newspapers > >> Division of The Hearst Corporation, Albany, N.Y. > >> > >> > >> > >> > > > > > > ------ End of Forwarded Message > > > > > -- > Josh Duberman, Pivotalinfo LLC, > 15100 SE 38th St. #819, Bellevue, > WA 98006; Tel:(425) 746-0050; > Cell:(425) 591-8200; pivotalinfo at usa.net; > Information For Solutions In Business & Science > > > > ------ End of Forwarded Message > > ------------------------------------- > You are subscribed as eugen at leitl.org > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: > http://www.interesting-people.org/archives/interesting-people/ > ----- End forwarded message ----- > -- > Eugen* Leitl leitl > ______________________________________________________________ > ICBM: 48.07078, 11.61144 http://www.leitl.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > http://moleculardevices.org http://nanomachines.net > > [demime 1.01d removed an attachment of type application/pgp-signature] > ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From rah at shipwright.com Fri Jan 14 11:09:10 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 14:09:10 -0500 Subject: Hanging the Pirates Message-ID: Forbes Security Hanging the Pirates 01.31.05 Paul Kocher has a way to save Hollywood from illegal copying. Over the past few months top brass from Hollywood and Japan's consumer electronics giants have been hashing out their futures in hotel meeting rooms in Tokyo and Los Angeles. Topic A is the politically charged debate over the standard for the new high-definition DVDs, which the film industry hopes will swell the current $24 billion DVD market, as hi-def becomes the norm. Most of the players want to get something decided on within a year. But, as big as the stakes are in those discussions, the movie studios are even more keen on the outcome of the talks on the 39th floor of Toshiba's Tokyo headquarters. By the Numbers Price of Piracy Illegal file-sharing hits music far harder than film--for now. $21 billion n DVD sales in U.S. in 2004, a 200% increase since 2000. $12 billion CD sales in U.S., a 17% decline since 2000. $3 billion Amount movie studios lose to piracy each year. $4 billion Amount music publishers lose to piracy each year. Sources: Adams Media Research; RIAA; MPAA. There, a select security committee representing both hardware and film makers has an extremely rare opportunity to stop digital piracy from doing to movies what it did to music. Napster and its ilk have helped knock 17% off of record label sales in the past three years. With DVD's basic encryption already cracked and one-quarter of American homes now capable of broadband-speed downloads, it's inevitable that one day the latest Harry Potter film will be swapped as easily as U2's new hit. "This is the number one priority at the highest levels," says Thomas Lesinski, president of Paramount Home Entertainment. "The studios want to have more control over protecting our content." One of the most important people involved in that discussion is Paul Kocher, the 31-year-old president of Cryptography Research, a tiny San Francisco consulting and licensing firm that brought in $6 million last year. Kocher is soft-spoken, young and obscure, but his credibility in the encryption business is sterling. Eight years ago, fresh out of Stanford, Kocher cowrote Secure Sockets Layer (SSL), the protocol that secures the vast majority of commerce on the Internet. What Kocher is pushing is the concept of renewable security. Any attempt to erect a one-time, rigid barrier between thieves and content, he says, is useless, including the current method pushed through by the Japanese consumer electronics companies. "With very few exceptions, all the major security systems being used by the studios today are either broken and can't be fixed, or they're not deployed widely enough to be worth hacking," says Kocher. Under the existing Content Scrambling System, electronics makers install the exact same encryption code into nearly every DVD player. But that was broken by European hackers in 1999 and the trick disseminated widely on the Internet. Even the least sophisticated user can now download a program that easily copies protected movies. Kocher's alternative is to allow for constant change. His system, called self-protecting digital content, places the security on the disc instead of in the player. A software "recipe" running into the millions of steps is burned onto every new movie disc. Each DVD player would contain a small chip costing only a few extra cents that would follow the recipe faithfully. If the DVD player decides the disc is secure, it will decode it and play the movie. But each film could have a different recipe. So if a pirate breaks the code on Spider-Man 2, he wouldn't necessarily be able to break the code on Elf. The studios would always be one step ahead of the thieves; at the very least it would take pirates more time to break each film. Not a big deal: Studios make most of their money from DVDs in the first three months, anyway. "A lot of security systems are hard and brittle," says Robert Baldwin, head of the security firm Plus Five Consulting. "Paul's is more like a willow tree. It bends and recovers." No studio executive contacted would comment on Kocher's scheme on the record, but it looks likely to be the backbone of any eventual security standard. A group including IBM, Toshiba, Time Warner and Microsoft is also angling to get a complementary encryption scheme called AACS into every future player. It will likely be written to work with Kocher's idea. Consumer electronics firms, which dictated the last encryption format, never had much to lose from security leaks. Film executives like the fact that Kocher's scheme gives them a stronger hand. Now they will be able to decide how much security they want on each disc and when it needs to be updated. Kocher, son of a physics professor at Oregon State University in Corvallis, says he learned about computing because he stayed home a lot, too lazy to bike the two miles into town. He initially wanted to be a veterinarian. "It's not a good job from a financial perspective, but it includes the interesting parts of medicine, and if you make a mistake you haven't done in someone's grandma," says Kocher. He ran out of money while at Stanford, so he started doing security consulting for Microsoft and RSA Security. By the time Kocher graduated from Stanford, he was already well-known as a protigi of Martin Hellman, the co-inventor of public key encryption, the most widely used security technique on the Internet. A year after college Netscape asked Kocher to redesign from scratch the security behind e-commerce. On the old version thieves could intervene in a transaction, weaken the encryption and steal information. Kocher redesigned the system to ensure that seller and buyer are working off of the strongest encryption possible, and that if someone interferes, the sale fails. "With all the problems on the Internet, SSL has stood as an industrial-strength protocol," says Taher Elgamal, who worked with Kocher on SSL. With SSL Kocher had full control over how the protocol would turn out. Things aren't so straightforward with the new DVD standards. Kocher is in the middle of a battle between Sony and Toshiba to define the new standards. Both sides are in favor of renewable security, but they haven't decided how to get it. For example, downloading fixes over an Internet connection is one idea that has been floated by Microsoft and others. With players like Sony, Microsoft and Intel all trying to impose their own agendas, there's a risk the compromises could result in a less secure standard. For the most part Kocher has avoided political battles, sitting through the endless, heated standards meetings and tapping on his Treo from the side of the room, interrupting quietly now and then to endorse his fix. There's money in this for him, just not that much--given that he's looking at only several cents per disc for his firm if Cryptography's solution is ultimately used. That could eventually work out to $75 million based on the current 1.5 billion copies sold worldwide. More lucrative would be the consulting fees from the studios when they eventually start deciding what kind of security they want on each title. That's unlikely to happen until high-definition DVDs get traction, sometime around 2007. "The formats have to decide to build in a system that will make it possible to fix problems later," says Kocher. "When you have the tools to handle security risks, they'll inevitably get used." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 12:04:33 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 15:04:33 -0500 Subject: Victor Davis Hanson: Triangulating the War Message-ID: The best book I read this year was Hanson's "Carnage and Culture". Recommend it highly. Cheers, RAH -------- Victor Davis Hanson The National Review January 14, 2005, 7:30 a.m. Triangulating the War Yesterday's genius, today's fool, tomorrow's what? Victor Davis Hanson Reading the pages of foreign-policy journals, between the long tracts on Bush's "failures" and neoconservative "arrogance," one encounters mostly predictions of defeat and calls for phased withdrawal - always with resounding criticism of the American "botched" occupation. Platitudes follow: "We can't just leave now," followed by no real advice on how a fascist society can be jumpstarted into a modern liberal republic. After all, there is no government handbook entitled, "Operation 1A: How to remove a Middle East fascist regime in three weeks, reconstruct the countryside, and hold the first elections in the nation's history - all within two years." Almost all who supported the war now are bailing on the pretext that their version of the reconstruction was not followed: While a three-week war was their idea, a 20-month messy reconstruction was surely someone else's. Yesterday genius is today's fool - and who knows next month if the elections work? Witness Afghanistan where all those who recently said the victory was "lost" to warlords are now suddenly quiet. Heads You Lose, Tails We Win Indeed, from the oscillating analyses of Iraq, the following impossible picture often emerges from our intelligentsia. It was a fatal error to disband the Iraqi army. That led to lawlessness and a loss of confidence in the American ability to restore immediate order after Saddam's fall. Yet it was also a fatal error to keep some Baathists in the newly constituted army. They were corrupt and wished reform to fail - witness the Fallujah Brigade that either betrayed us or aided the enemy. So we turned off the Sunnis by disbanding the army - and yet somehow turned off the Shiites by keeping some parts of it. Massive construction projects were hogged by gargantuan American firms, ensconced in the Green Zone that did not engage either local Iraqi workers or small companies and thus squandered precious good will. Or, indigenous contractors proved irresponsible and unreliable, evidence for why Iraq was in such bad shape to begin with. And when we did put exclusive reliance on them, it ensured only lackadaisical and half-hearted reconstruction. We also lost hearts and minds by using GPS bombs to obliterate houses full of killers and take out blocks of insurgents. And yet we lost hearts and minds by failing to act decisively and de facto turning over large enclaves to terrorists and Saddamites whom we were afraid to root out. Elections should have been held earlier; no, they must be delayed since they come too soon when the country is still unsecured. Our helmeted soldiers with sunglasses are holed up in enclaves, don't mingle, and perpetuated the heavy-handed image of snooty occupiers. But leaving the Green Zone is an open invitation to kidnapping and worse. So we are both too well hidden and yet not hidden enough. Embedded media gave us a real-time picture of the fighting. But (if one is conservative) it left open the opportunity for sensationalism on the part of wannabe crusaders, and (if one is liberal) it created too close a psychological bond with the soldiers that impaired objectivity. It was a mistake to postpone Iraqi sovereignty for so long; but it is an equal mistake to rush into elections while the country is so insecure. The CIA is impotent, out-of-touch, and clownish; somehow it mind-controlled Allawi, Chalabi, and a host of other Iraqi "puppets." The litany from the mercurial Beltway always goes on: There were enough troops to take out Saddam in three weeks, but not enough to restore order to the countryside - but still too many that resulted in too high an American profile on the streets of Baghdad. The transformations of Donald Rumsfeld (this week's genius, last week's fool) have left us stripped down and bereft of the muscle needed. Yet new, more mobile brigades in strikers and special forces with laptops are preferable to old armored divisions on the streets of Iraqi. We cannot flee, but must not stay. Iraqis publicly say we should leave, but privately beg us to remain. We were after cheap oil, but gas prices somehow climbed almost immediately after we went in. Democracy won't work with these people, but somehow we are seeing three elections in the wake of the Taliban, Arafat, and Saddam. There are many constants in all this pessimistic confusion - beside the fact that we are becoming a near hysterical society. First, our miraculous efforts in toppling the Taliban and Saddam have apparently made us forget war is always a litany of mistakes. No conflict is conducted according to either antebellum planning or can proceed with the benefit of hindsight. Iraq was not Yemen or Qatar, but rather the most wicked regime in the world, in the heart of the Arab world, full of oil, terrorists, and mass graves. There were no helpful neighbors to keep a lid on their own infiltrating jihadists. Instead we had to go into the heart of the caliphate, take out a mass murderer, restore civil society after 30 years of brutality, and ward off Sunni and Baathist fomenters in Saudi Arabia, Jordan, and Syria - all the while keeping out Iranian-Shiite agents bent on stopping democracy. The wonder is not that there is violence and gloom in Iraq, but that less than two years after Saddam was removed, elections are still on track. The Follies of World War II Second, our very success creates ever increasing expectations of perfection for a postmodern America used to instant gratification. We now look back in awe at World War II, the model of military success, in which within four years an unprepared United States won two global wars, at sea, on the ground, and in the air, in three continents against Japan, Italy, and Germany, and supplied both England and the Soviet Union. But our forefathers experienced disaster after disaster in a tale of heartbreak, almost as inglorious as the Korean mess or Vietnam tragedy. And they did things to win we perhaps claim we would now not: Shoot German prisoners in the Bulge, firebomb Axis cities, drop the bomb - almost anything to stop fascists from slaughtering even more millions of innocents. Our armored vehicles were deathtraps and only improved days before the surrender. American torpedoes were often duds. Unescorted daylight bombing proved a disaster, but continued. Amphibious assaults like Anzio and Tarawa were bloodbaths and emblematic of terrible planning and command. The recapture of Manila was clumsy and far too costly. Okinawa was the worst of all operations, and yet was begun just over fourth months before the surrender - without any planning for Kamikazes who were shortly to kill 5,000 American sailors. Patton, the one general that could have ended the western war in 1944, was relieved and then subordinated to an auxiliary position with near fatal results for the drive from Normandy; mediocrities like Mark Clark flourished and were promoted. Admiral King resisted the life-saving convoy system and unnecessarily sacrificed merchant ships; while Bull Halsey almost lost his unprepared fleet to a storm. The war's aftermath seemed worse, to be overseen by an untried president who was considered an abject lightweight. Not-so-quite collateral damage had ruined entire cities. Europe nearly starved in winter 1945-6. Millions were on the road in mass exoduses. After spending billions to destroy Nazi Germany we had to spend billions more to rebuild it - and repair the devastation it had wrought on its neighbors. Our so-called partisan friends in Yugoslavia and Greece turned out to be hard-core Communist killers. Soon enough we learned that the guerrillas in the mountains of Europe whom we had idolized, in fact, fought as much for Communism as against fascism - but never for democracy. But at least there was clear-cut strategic success? Oh? The war started to keep Eastern Europe free of Nazis and ended up ensuring that it was enslaved by Stalinists. Poland was neither free in 1940 nor in 1946. By early 1946 we were already considering putting former Luftwaffe pilots in American jets - improved with ample borrowing from Nazi technology - to protect Europe from the Red Army carried westward on GM trucks. We put Nazis on trials for war crimes even as we invited their scientists to our shores to match their counterparts in the Soviet Union who were building even more lethal weapons to destroy us. Our utopian idea of a global U.N. immediately deteriorated into a mess - decades of vetoes in the Security Council by Stalinists and Maoists, even as former colonial states turned thugocracies in the General Assembly ganged up on Israel and the survivors of the Holocaust. After Americans had liberated France and restored his country, General de Gaulle created the myth of the French resistance and immediately triangulated with our enemies to reforge some pathetic sort of French grandeur. An exhausted England turned over to us a collapsing empire, with the warning that it might all turn Communist. Tired of the war and postbellum costs, Americans suddenly were asked to wage a new Cold War to keep a shrinking West and its allies free. The Department of War turned into the Department of Defense, along with weird new things like the U.S. Air Force, Strategic Air Command, Food for Peace, Alliance for Progress, Voice of America, and thousands of other costly entities never dreamed of just a few years earlier. And yet our greatest generation thought by and large they had done pretty well. We in contrast would have given up in despair in 1942, New York Times columnists and NPR pundits pontificating "I told you so" as if we were better off sitting out the war all along. Iraqi options Finally, the United States has a number of options in Iraq. In fact, the paradoxes are ever more confronting our enemies. There is a glaring problem for the terrorists in Iraq: 75 percent of the country wants elections. The Sunni clerics wish to delay them on the strange logic that they either cannot or will not stop their brethren who are trying to derail the voting through which their cause will lose. But such appeals appear increasingly empty - almost like the Secessionists complaining about Northern voters in 1860 might imperil the Union. And no one is all that sure that there really is a purist Sunni block of millions of obstructionists, rather than just ordinary Iraqis who want to vote and are in fear of extremists who claim their allegiance. Saudi Arabia unleashed terrorists to stop democracy in Iraq, and is now worried their young Frankensteins hate their creators just as much. So we are inching ahead as global television soon will air an elected and autonomous government fighting fascists for the chance of democracy. If the Kurds and the Shiite majorities vote for us to leave, then we must - but to do so would be to ensure the return of the Baathists, the domination of Wahhabi fundamentalism, or the Lebanonization of the country. And so they probably won't. There is much talk of an Iranian takeover, but no evidence that an Iraqi Shiite sees himself as more an Iranian than an Arab. All this we cannot see at the present as we in our weariness lament the losses of almost 1,100 combat dead and billions committed to people who appear from 30-second media streams to be singularly ungracious and not our sort of folk. We dwell on unmistakable lapses, never on amazing successes - just as we were consumed with Afghanistan in its dark moments, but now ignore its road to success. But never mind all this: The long-term prospects are still as bright as things seem gloomy in the short-term - but only if we emulate our grandfathers and press on with the third Middle East election in the last six months. - Victor Davis Hanson is a military historian and a senior fellow at the Hoover Institution at Stanford University. His website is victorhanson.com. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Fri Jan 14 15:42:18 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 14 Jan 2005 15:42:18 -0800 Subject: Police Worried About New Vest-Penetrating Gun In-Reply-To: References: Message-ID: <6.0.3.0.0.20050114152232.00a247d0@pop.idiom.com> At 01:54 PM 1/14/2005, R.A. Hettinga wrote: > >NEW YORK -- There is a nationwide alert to members of law enforcement >regarding a new kind of handgun which can render a bulletproof vest >useless, as first reported by NewsChannel 4's Scott Weinberger. >... >The weapon is light, easily concealable and can fire 20 rounds in seconds >without reloading. A couple of questions to the gunpunks out there... I've heard that rifles easily penetrate bullet-proof vests, and that vests are really only useful against average-to-small handguns and against shotguns. Is this accurate? Any idea how much you can saw off a rifle and still have it penetrate typical cop vests? (And I assume the "20 rounds in seconds" is just a scary way to say "it has a big magazine and you have to pull the trigger 20 times".) Also, the police expressed worry that criminals might hear about these guns and then the cops would be in big trouble. Sounds silly to me - while some criminals might buy a "cop-killer handgun" for bragging rights, random criminals presumably only buy weapons useful for the scenarios they imagine being in, which is Saturday Night Specials for most applications, or whatever currently fashionable Mac10/Uzi/etc. for druglord armies that expect to be shooting at each other, or rifles for distance work and dual-use pickup-truck decoration. Do many criminals expect to initiate shootouts with vest-wearing cops in scenarios where a rifle isn't practical? Do most cops wear bullet-proof vests regularly other than in holdup/hostage SWAT situations, where the criminal might have rifles anyway, and where a regular pistol is just fine for shooting hostages? Or is this mainly a problem for the cases when cops want to stage military-style pre-dawn assaults on people's houses, where they expect that the targets usually only have pistols handy near the bed and don't have time for rifles? Seems like scare-mongering to me, not a practical concern. ---- Bill Stewart bill.stewart at pobox.com From camera_lumina at hotmail.com Fri Jan 14 13:14:43 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 14 Jan 2005 16:14:43 -0500 Subject: Searching with Images instead of Words In-Reply-To: <20050114140146.54345.qmail@web21204.mail.yahoo.com> Message-ID: >Expecting a front view of an image to match with a >side view of the same image is impossible. They are >both disjoint sets of information. > >If all the images are frontal images, we can match >them with a hight probability, otherwise I doubt this >technology has a future. You are applying pure logic to a very complex subject. I'd bet this is already routinely done by TLAs and whatnot, at least as a pre-screen before human photograph inspectors. The most obvious hole in your statement is with respect to 2D Spatial FFTs of the image...you can probably greatly increase your match probability via certain masking criteria applied to the 2D FFT. And from there there's lots of stuff that can be done with colors and other indirect stuff such as (perhaps) camera signatures in the photo (eg, If there's text that says "Hamamatsu Synchroscan Streak Camera" then don't bother doing the FFT--it ain't a picture of your dog). Look...a human being can recognize the side image of a person a lot of the time. There should be no reason this intelligence can't be encoded somehow. -TD From rah at shipwright.com Fri Jan 14 13:54:32 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 16:54:32 -0500 Subject: Police Worried About New Vest-Penetrating Gun Message-ID: wnbc.com Police Worried About New Vest-Penetrating Gun NEW YORK -- There is a nationwide alert to members of law enforcement regarding a new kind of handgun which can render a bulletproof vest useless, as first reported by NewsChannel 4's Scott Weinberger. New Gun Frightens Police Scott Weinberger The most shocking fact may be that the gun -- known as the "five-seven" -- is being marketed to the public, and it's completely legal It was a very difficult decision for members of law enforcement to go public about the new weapon, but officers fear that once word of the weapon begins to circulate in the wrong circles, they will be in great danger. They agreed to speak to NewsChannel 4, hoping the public will understand what they call the most devastating weapon they face. The weapon is light, easily concealable and can fire 20 rounds in seconds without reloading. "This would be devastating," said Chief Robert Troy, of the Jersey City Police Department. Troy said he learned about the high-powered pistol from a bulletin issued by Florida Department of Law Enforcement to all of its agents. Troy believes faced with this new weapon, his officers would be at a total disadvantage. "Dealing with a gun like this -- it's a whole new ballgame," Troy said. Troy is not the only member of law enforcement to voice concern. As NewsChannel 4 began to contact several more departments in the Tri-State Area, it turned out that officers in Trumball, Conn., had seized one of these handguns during a recent arrest. "Certainly, handguns are a danger to any police officer on any day, but one that specifically advertised by the company to be capable of defeating a ballistic vest is certainly the utmost concern to us," said Glenn Byrnes, of the Trumball Police Department. However, the company said that bullet is not sold to the public. Instead, gun buyers can purchase what the company calls a training or civilian bullet -- the type loaded into the gun confiscated by Trumball police. At a distance of 21 feet, Trumball police Sgt. Lenny Scinto fired the five-seven with the ammo sold legally to the public into a standard police vest. All three penetrated the vest. The bullets even went through the back panel of the vest, penetrating both layers. In a similar test, an officer fired a .45-caliber round into the same vest. While the shot clearly knocked it down, it didn't penetrate the vest, and an officer would likely have survived the assault. "The velocity of this round makes it a more penetrating round -- that's what had me concerned," Scinto said. FN Herstal told NewsChannel 4 that they dispute the test, stating, "Most law enforcement agencies don't have the ability to properly test a ballistic vest." When NewsChannel 4 asked how this could have happened, the spokesperson said: "We [the company] are not experts in ballistic armor." Back in Trumball, Scinto said his officers would have to rethink how to protect the public and protect themselves. "This is going to add a whole new dimension to training and tactics. With the penetration of these rounds, you're going to have to find something considerably heavier than we normally use for cover and concealment to stop this round," Scinto said. In Jersey City, Troy said he will appeal to lawmakers, hoping they will step in before any of his officers are confronted with the five-seven. "This does not belong in the civilian population. The only thing that comes out of this is profits for the company and dead police officers," Troy said. "I would like the federal government to ban these rounds to the civilian public." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 14:00:33 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 17:00:33 -0500 Subject: Terrorism as an Excuse Message-ID: The National Review January 14, 2005, 9:24 a.m. Terrorism as an Excuse Another CBS campaign. By John R. Lott Jr. Who could oppose laws preventing terrorists from getting guns? Obviously no one. But it would be nice if laws accomplished something more than simply making it more difficult for Americans to own guns. Ironically the day before CBS finally released its report on the 60 Minutes Memogate scandal, 60 Minutes was again stirring up fears about how terrorists would use 50-caliber rifles to attack Americans. Last year it was the semi-automatic assault-weapons ban before it expired. Sen. Charles E. Schumer (D., N.Y.) claimed the ban was "the most effective measures against terrorism that we have." Of course, nothing happened when the law expired last year. There was nothing unique about the guns that are banned under the law. Though the phrase "assault weapon" conjures up images of the rapid-fire machine guns used by the military, in fact the weapons covered by the ban function the same as any semiautomatic hunting rifle; they fire the exact same bullets with the exact same rapidity and produce the exact same damage as hunting rifles. Back in the mid-1980s it was the hysteria over "plastic guns" when the Austrian company Glock began exporting pistols to the United States. Labeled as "terrorist specials" by the press, fear spread that their plastic frame and grip would make them invisible to metal detectors. Glocks are now common and there are good reasons they are one of the favorite pistols of American police officers. The "plastic gun" ban did not ban anything since it is not possible to actually build a working plastic gun. Now it is the 50-caliber rifles' turn, especially with California outlawing the sale of these guns since the beginning of the year. For years gun-control groups have tried to ban 50-caliber rifles because of fears that criminals could use them. Such bans have not been passed these guns were simply not suited for crime. Fifty-caliber rifles are big, heavy guns, weighing at least 30 pounds and using a 29-inch barrel. They are also relatively expensive. Models that hold one bullet at a time run nearly $3,000. Semi-automatic versions cost around $7,000. Wealthy target shooters and big-game hunters, not criminals, purchase them. The bottom line is that only one person in the U.S. has been killed with such a gun, and even that one alleged case is debated. The link to terrorism supposedly provides a new possible reason to ban 50-caliber rifles. But the decision to demonize these particular guns and not say .475-caliber hunting rifles is completely arbitrary. The difference in width of these bullets is a trivial .025 inches. What's next? Banning .45-caliber pistols? Indeed the whole strategy is to gradually reduce the type of guns that people can own. Sniper Central, a site for both military snipers and law-enforcement sharpshooters, claims that "For military extreme long-range anti-personnel purposes, the .338 Lapua is king. Even the .50BMG falls short. (Do to accuracy problems with current ammo)." The .338 Lapua round simply has what is called a better bullet coefficient, it produces less drag as it travels through the air. With a 50-caliber rifle it is possible for an extremely skilled and lucky marksman to hit a target at 1,800 meters (versus 1,500 meters plus for the .338 Lapua), though most marksmen say that the effective range for any of these guns is around 1,000 meters. The worst abuse that 60 Minutes focused on was the Branch Davidians in Waco in 1993 having a 50-caliber gun. Yet, no one was harmed with the gun, and the Davidians surely had many other weapons. 60 Minutes also tried to scare people with incendiary and explosive ammunition, but the ammunition discussed is already illegal. Fighting terrorism is a noble cause, but the laws we pass must have some real link to solving the problem. Absent that, many will think that 60 Minutes and gun-control groups are simply using terrorism as an excuse to promote rules that he previously pushed. Making it difficult for law-abiding Americans to own guns should not be the only accomplishment of new laws. - John Lott, a resident scholar at the American Enterprise Institute, is the author of The Bias Against Guns and More Guns, Less Crime. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 16:52:33 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 19:52:33 -0500 Subject: Feral Cities Message-ID: Norton FERAL CITIES Richard J. Norton Imagine a great metropolis covering hundreds of square miles. Once a vital component in a national economy, this sprawling urban environment is now a vast collection of blighted buildings, an immense petri dish of both ancient and new diseases, a territory where the rule of law has long been replaced by near anarchy in which the only security available is that which is attained through brute power.1 Such cities have been routinely imagined in apocalyptic movies and in certain science-fiction genres, where they are often portrayed as gigantic versions of T. S. Eliot's Rat's Alley.2 Yet this city would still be globally connected. It would possess at least a modicum of commercial linkages, and some of its inhabitants would have access to the world's most modern communication and computing technologies. It would, in effect, be a feral city. Admittedly, the very term "feral city" is both provocative and controversial. Yet this description has been chosen advisedly. The feral city may be a phenomenon that never takes place, yet its emergence should not be dismissed as impossible. The phrase also suggests, at least faintly, the nature of what may become one of the more difficult security challenges of the new century. Over the past decade or so a great deal of scholarly attention has been paid to the phenomenon of failing states.3 Nor has this pursuit been undertaken solely by the academic community. Government leaders and military commanders as well as directors of nongovernmental organizations and intergovernmental bodies have attempted to deal with faltering, failing, and failed states. Involvement by the United States in such matters has run the gamut from expressions of concern to cautious humanitarian assistance to full-fledged military intervention. In contrast, however, there has been a significant lack of concern for the potential emergence of failed cities. This is somewhat surprising, as the feral city may prove as common a feature of the global landscape of the first decade of the twenty-first century as the faltering, failing, or failed state was in the last decade of the twentieth. While it may be premature to suggest that a truly feral city-with the possible exception of Mogadishu-can be found anywhere on the globe today, indicators point to a day, not so distant, when such examples will be easily found. This article first seeks to define a feral city. It then describes such a city's attributes and suggests why the issue is worth international attention. A possible methodology to identify cities that have the potential to become feral will then be presented. Finally, the potential impact of feral cities on the U.S. military, and the U.S. Navy specifically, will be discussed. DEFINITION AND ATTRIBUTES The putative "feral city" is (or would be) a metropolis with a population of more than a million people in a state the government of which has lost the ability to maintain the rule of law within the city's boundaries yet remains a functioning actor in the greater international system.4 In a feral city social services are all but nonexistent, and the vast majority of the city's occupants have no access to even the most basic health or security assistance. There is no social safety net. Human security is for the most part a matter of individual initiative. Yet a feral city does not descend into complete, random chaos. Some elements, be they criminals, armed resistance groups, clans, tribes, or neighborhood associations, exert various degrees of control over portions of the city. Intercity, city-state, and even international commercial transactions occur, but corruption, avarice, and violence are their hallmarks. A feral city experiences massive levels of disease and creates enough pollution to qualify as an international environmental disaster zone. Most feral cities would suffer from massive urban hypertrophy, covering vast expanses of land. The city's structures range from once-great buildings symbolic of state power to the meanest shantytowns and slums. Yet even under these conditions, these cities continue to grow, and the majority of occupants do not voluntarily leave.5 Feral cities would exert an almost magnetic influence on terrorist organizations. Such megalopolises will provide exceptionally safe havens for armed resistance groups, especially those having cultural affinity with at least one sizable segment of the city's population. The efficacy and portability of the most modern computing and communication systems allow the activities of a worldwide terrorist, criminal, or predatory and corrupt commercial network to be coordinated and directed with equipment easily obtained on the open market and packed into a minivan. The vast size of a feral city, with its buildings, other structures, and subterranean spaces, would offer nearly perfect protection from overhead sensors, whether satellites or unmanned aerial vehicles. The city's population represents for such entities a ready source of recruits and a built-in intelligence network. Collecting human intelligence against them in this environment is likely to be a daunting task. Should the city contain airport or seaport facilities, such an organization would be able to import and export a variety of items. The feral city environment will actually make it easier for an armed resistance group that does not already have connections with criminal organizations to make them. The linkage between such groups, once thought to be rather unlikely, is now so commonplace as to elicit no comment. WHAT'S NEW? But is not much of this true of certain troubled urban areas of today and of the past? It is certainly true that cities have long bred diseases. Criminal gangs have often held sway over vast stretches of urban landscape and slums; "projects" and shantytowns have long been part of the cityscape. Nor is urban pollution anything new-London was environmentally toxic in the 1960s. So what is different about "feral cities"? The most notable difference is that where the police forces of the state have sometimes opted not to enforce the rule of law in certain urban localities, in a feral city these forces will not be able to do so. Should the feral city be of special importance-for example, a major seaport or airport-the state might find it easier to negotiate power and profit-sharing arrangements with city power centers to ensure that facilities important to state survival continue to operate. For a weak state government, the ability of the feral city to resist the police forces of the state may make such negotiations the only option. In some countries, especially those facing massive development challenges, even the military would be unequal to imposing legal order on a feral city. In other, more developed states it might be possible to use military force to subdue a feral city, but the cost would be extremely high, and the operation would be more likely to leave behind a field of rubble than a reclaimed and functioning population center. Other forms of state control and influence in a feral city would also be weak, and to an unparalleled degree. In a feral city, the state's writ does not run. In fact, state and international authorities would be massively ignorant of the true nature of the power structures, population, and activities within a feral city. Yet another difference will be the level and nature of the security threat posed by a feral city. Traditionally, problems of urban decay and associated issues, such as crime, have been seen as domestic issues best dealt with by internal security or police forces. That will no longer be an option. REASONS FOR CONCERN Indeed, the majority of threats posed by a feral city would be viewed as both nontraditional and transnational by most people currently involved with national security. Chief among the nontraditional threats are the potential for pandemics and massive environmental degradation, and the near certainty that feral cities will serve as major transshipment points for all manner of illicit commodities. As has been noted, city-born pandemics are not new. Yet the toxic environment of a feral city potentially poses uniquely severe threats. A new illness or a strain of an existing disease could easily breed and mutate without detection in a feral city. Since feral cities would not be hermetically sealed, it is quite easy to envision a deadly and dangerously virulent epidemic originating from such places. As of this writing, the SARS outbreak of 2003 seems to offer an example of a city (Guangdong, China) serving as a pathogen incubator and point of origin of an intercontinental epidemic.6 In the case of SARS, the existence of the disease was rapidly identified, the origin was speedily traced, and a medical offensive was quickly mounted. Had such a disease originated in a feral city, it is likely that this process would have been much more complicated and taken a great deal more time. As it is, numerous diseases that had been believed under control have recently mutated into much more drug-resistant and virulent forms. Globally, large cities are already placing significant environmental stress on their local and regional environments, and nowhere are these problems more pronounced than in coastal metropolises. A feral city-with minimal or no sanitation facilities, a complete absence of environmental controls, and a massive population-would be in effect a toxic-waste dump, poisoning coastal waters, watersheds, and river systems throughout their hinterlands.7 Major cities containing ports or airfields are already trying to contend with black-market activity that ranges from evading legal fees, dues, or taxes to trafficking in illegal and banned materials. Black marketeers in a feral city would have carte blanche to ship or receive such materials to or from a global audience.8 As serious as these transnational issues are, another threat is potentially far more dangerous. The anarchic allure of the feral city for criminal and terrorist groups has already been discussed. The combination of large profits from criminal activity and the increasing availability of all families of weapons might make it possible for relatively small groups to acquire weapons of mass destruction. A terrorist group in a feral city with access to world markets, especially if it can directly ship material by air or sea, might launch an all but untraceable attack from its urban haven. GOING FERAL Throughout history, major cities have endured massive challenges without "going feral." How could it be determined that a city is at risk of becoming feral? What indicators might give warning? Is a warning system possible? The answer is yes. This article offers just such a model, a taxonomy consisting of twelve sets of measurements, grouped into four main categories.9 In it, measurements representing a healthy city are "green," those that would suggest cause for concern are "yellow," and those that indicate danger, a potentially feral condition, "red." In the table below, the upper blocks in each category (column) represent positive or healthy conditions, those at the bottom unhealthy ones. The first category assesses the ability of the state to govern the city. A city "in the green" has a healthy, stable government-though not necessarily a democratically elected one. A democratic city leadership is perhaps the most desirable, but some cities governed by authoritarian regimes could be at extremely low risk of becoming feral. City governments "in the green" would be able to enact effective legislation, direct resources, and control events in all parts of the city at all times.10 A yellow indication would indicate that city government enjoyed such authority only in portions of the city, producing what might be called "patchwork" governance, or that it exerted authority only during the day-"diurnal" governance. State authorities would be unable to govern a "red" city at all, or would govern in name only.11 An entity within the city claiming to be an official representative of the state would simply be another actor competing for resources and power. THE HEALTH OF CITIES Government Economy Services Security Healthy Enacts effective legislation, directs resources, controls events in all portions of the city all the time. Not corrupt. Robust. Significant foreign investment. Provides goods and services. Possesses stable and adequate tax base. Complete range of services, including educational and cultural, available to all city residents. Well regulated by professional, ethical police forces. Quick response to wide spectrum of requirements. Marginal Exercises only "patchwork" or "diurnal" control. Highly corrupt. Limited/no foreign investment. Subsidized or decaying industries and growing deficits. Can manage minimal level of public health, hospital access, potable water, trash disposal. Little regard for legality/human rights. Police often matched/ stymied by criminal "peers." Going Feral At best has negotiated zones of control; at worst does not exist. Either local subsistence industries or industry based on illegal commerce. Intermittent to nonexistent power and water. Those who can afford to will privately contract. Nonexistent. Security is attained through private means or paying protection. The second category involves the city's economy. Cities "in the green" would enjoy a productive mix of foreign investment, service and manufacturing activities, and a robust tax base. Cities afforded a "yellow" rating would have ceased to attract substantial foreign investment, be marked by decaying or heavily subsidized industrial facilities, and suffer from ever-growing deficits. Cities "in the red" would have no governmental tax base. Any industrial activity within their boundaries would be limited to subsistence-level manufacturing and trade or to illegal trafficking-in smuggled materials, weapons, drugs, and so on. The third category is focused on city services. Cities with a "green" rating would not only have a complete array of essential services but would provide public education and cultural facilities to their populations. These services would be available to all sectors without distinction or bias. Cities with a yellow rating would be lacking in providing education and cultural opportunities but would be able to maintain minimal levels of public health and sanitation. Trash pickup, ambulance service, and access to hospitals would all exist. Such a city's water supply would pass minimum safety standards. In contrast, cities in the "red" zone would be unable to supply more than intermittent power and water, some not even that. Security is the subject of the fourth category. "Green" cities, while obviously not crime free, would be well regulated by professional, ethical police forces, able to respond quickly to a wide spectrum of threats. "Yellow" cities would be marked by extremely high crime rates, disregard of whole families of "minor crimes" due to lack of police resources, and criminal elements capable of serious confrontations. A "yellow" city's police force would have little regard for individual rights or legal constraints. In a "red" city, the police force has failed altogether or has become merely another armed group seeking power and wealth. Citizens must provide for their own protection, perhaps by hiring independent security personnel or paying protection to criminal organizations. A special, overarching consideration is corruption. Cities "in the green" are relatively corruption free. Scandals are rare enough to be newsworthy, and when corruption is uncovered, self-policing mechanisms effectively deal with it. Corruption in cities "in the yellow" would be much worse, extending to every level of the city administration. In yellow cities, "patchwork" patterns might reflect which portions of the city were able to buy security and services and which were not. As for "red"cities, it would be less useful to speak of government corruption than of criminal and individual opportunism, which would be unconstrained. CITY "MOSAICS" The picture of a city that emerges is a mosaic, and like an artist's mosaic it can be expected to contain more than one color. Some healthy cities function with remarkable degrees of corruption. Others, robust and vital in many ways, suffer from appalling levels of criminal activity. Even a city with multiple "red" categories is not necessarily feral-yet. It is the overall pattern and whether that pattern is improving or deteriorating over time that give the overall diagnosis. It is important to remember a diagnostic tool such as this merely produces a "snapshot" and is therefore of limited utility unless supported by trend analysis. "Patchwork" and "diurnal" situations can exist in all the categories; an urban center with an overall red rating-that is, a feral city-might boast a tiny enclave where "green" conditions prevail; quite healthy cities experience cycles of decline and improvement. Another caution concerns the categories themselves. Although useful indicators of a city's health, the boundaries are not clearly defined but can be expected to blur. The Healthy City: New York. To some it would seem that New York is an odd example of a "green" city. One hears and recalls stories of corruption, police brutality, crime, pollution, neighborhoods that resemble war zones, and the like. Yet by objective indicators (and certainly in the opinion of the majority of its citizens) New York is a healthy city and in no risk of "going feral." Its police force is well regulated, well educated, and responsive. The city is a hub of national and international investment. It generates substantial revenues and has a stable tax base. It provides a remarkable scope of services, including a wide range of educational and cultural opportunities. Does this favorable evaluation mean that the rich are not treated differently from the poor, that services and infrastructure are uniformly well maintained, or that there are no disparities of economic opportunity or race? Absolutely not. Yet despite such problems New York remains a viable municipality. The Yellow Zone: Mexico City. This sprawling megalopolis of more than twenty million continues to increase in size and population every year. It is one of the largest urban concentrations in the world. As the seat of the Mexican government, it receives a great deal of state attention. However, Mexico City is now described as an urban nightmare.12 Mexico City's air is so polluted that it is routinely rated medically as unfit to breathe. There are square miles of slums, often without sewage or running water. Law and order is breaking down at an accelerating rate. Serious crime has doubled over the past three to four years; it is estimated that 15.5 million assaults now occur every year in Mexico City. Car-jacking and taxi-jacking have reached such epidemic proportions that visitors are now officially warned not to use the cabs. The Mexico City police department has ninety-one thousand officers-more men than the Canadian army-but graft and corruption on the force are rampant and on the rise. According to Mexican senator Adolfo Zinser, police officers themselves directly contribute to the city's crime statistics: "In the morning they are a policeman. In the afternoon they're crooks." The city's judicial system is equally corrupt. Not surprisingly, these aspects of life in Mexico City have reduced the willingness of foreign investors to send money or representatives there.13 Johannesburg: On a Knife Edge. As in many South African cities, police in Johannesburg are waging a desperate war for control of their city, and it is not clear whether they will win. Though relatively small in size, with only 2.9 million official residents, Johannesburg nevertheless experiences more than five thousand murders a year and at least twice as many rapes. Over the last several years investors and major industry have fled the city. Many of the major buildings of the Central Business District have been abandoned and are now home to squatters. The South African National Stock Exchange has been removed to Sandton-a safer northern suburb. Police forces admit they do not control large areas of the city; official advisories warn against driving on certain thoroughfares. At night residents are advised to remain in their homes. Tourism has dried up, and conventions, once an important source of revenue, are now hosted elsewhere in the country. The city also suffers from high rates of air pollution, primarily from vehicle exhaust but also from the use of open fires and coal for cooking and heating. Johannesburg's two rivers are also considered unsafe, primarily because of untreated human waste and chemicals leaching from piles of mining dross. Mining has also contaminated much of the soil in the vicinity. Like those of many states and cities in Africa, Johannesburg's problems are exacerbated by the AIDS epidemic. Nationally it is feared the number of infected persons may reach as high as 20 percent of the population. All sectors of the economy have been affected adversely by the epidemic, including in Johannesburg.14 Although Mexico City and Johannesburg clearly qualify for "yellow" and "red" status, respectively, it would be premature to predict that either of these urban centers will inevitably become feral. Police corruption has been an aspect of Mexico City life for decades; further, the recent transition from one political party to two and a downswing in the state economy may be having a temporarily adverse influence on the city. In the case of Johannesburg, the South African government has most definitely not given up on attempts to revive what was once an industrial and economic showplace. In both Mexico and South Africa there are dedicated men and women who are determined to eliminate corruption, clean the environment, and better the lives of the people. Yet a note of caution is appropriate, for in neither example is the trend in a positive direction. Further-and it should come as no surprise-massive cities in the developing world are at far greater risk of becoming feral than those in more developed states. Not only are support networks in such regions much less robust, but as a potentially feral city grows, it consumes progressively more resources.15 Efforts to meet its growing needs often no more than maintain the status quo or, more often, merely slow the rate of decay of government control and essential services. All this in turn reduces the resources that can be applied to other portions of the country, and it may well increase the speed of urban hypertrophy. However, even such developed states as Brazil face the threat of feral cities. For example, in March 2003 criminal cartels controlled much of Rio de Janeiro. Rio police would not enter these areas, and in effect pursued toward them a policy of containment.16 FERAL CITIES AND THE U.S. MILITARY Feral cities do not represent merely a sociological or urban-planning issue; they present unique military challenges. Their very size and densely built-up character make them natural havens for a variety of hostile nonstate actors, ranging from small cells of terrorists to large paramilitary forces and militias. History indicates that should such a group take American hostages, successful rescue is not likely.17 Combat operations in such environments tend to be manpower intensive; limiting noncombatant casualties can be extraordinarily difficult. An enemy more resolute than that faced in the 2003 war with Iraq could inflict substantial casualties on an attacking force. The defense of the Warsaw ghetto in World War II suggests how effectively a conventional military assault can be resisted in this environment. Also, in a combat operation in a feral city the number of casualties from pollutants, toxins, and disease may well be higher than those caused by the enemy. These environmental risks could also affect ships operating near a feral city. Its miles-long waterfront may offer as protected and sheltered a setting for antishipping weapons as any formal coastal defense site. Furthermore, many port cities that today, with proper security procedures, would be visited for fuel and other supplies will, if they become feral, no longer be available. This would hamper diplomatic efforts, reduce the U.S. Navy's ability to show the flag, and complicate logistics and supply for forward-deployed forces. Feral cities, as and if they emerge, will be something new on the international landscape. Cities have descended into savagery in the past, usually as a result of war or civil conflict, and armed resistance groups have operated out of urban centers before. But feral cities, as such, will be a new phenomenon and will pose security threats on a scale hitherto not encountered.18 It is questionable whether the tools, resources, and strategies that would be required to deal with these threats exist at present. But given the indications of the imminent emergence of feral cities, it is time to begin creating the means. NOTES 1. I am indebted to my colleague Dr. James Miskel for the "petri dish" analogy. 2. Thomas Stern Eliot, "The Wasteland," in The New Oxford Book of English Verses: 1250-1950, ed. Helen Gardner (New York: Oxford University Press, 1972), p. 881. 3. See, for example, James F. Miskel and Richard J. Norton, "Spotting Trouble: Identifying Faltering and Failing States," Naval War College Review 50, no. 2 (Spring 1997), pp. 79-91. 4. Perhaps the most arbitrary component of this definition is the selection of a million inhabitants as a defining characteristic of a feral city. An earlier approach to this issue focused on megacities, cities with more than ten million inhabitants. However, subsequent research indicated that much smaller cities could also become feral, and so the population threshold was reduced. For more information on concepts of urbanization see Stanley D. Brunn, Jack F. Williams, and Donald J. Zeigler, Cities of the World: World Regional Urban Development (Lanham, Md.: Rowman & Littlefield, 2003), pp. 5-14. 5. Such a pattern is already visible today. See Brunn, Williams, and Zeigler, chap. 1. 6. "China Criticized for Dragging Feet on Outbreak," News in Science, 7 April 2003, p. 1. 7. The issue of pollution stemming from coastal cities is well documented. For example, see chapter two of United Nations Environmental Program, Global Environmental Outlook-2000 (London: Earthscan, 2001). 8. The profits involved in such enterprises can be staggering. For example, the profits from smuggled cigarettes in 1997 were estimated to be as high as sixteen billion dollars a year. Among the identified major smuggling centers were Naples, Italy; Hong Kong; and Bogota, Colombia. Raymond Bonner and Christopher Drew, "Cigarette Makers Are Seen as Aiding Rise in Smuggling," New York Times, 26 August 1997, C1. 9. A similar approach was used in Miskel and Norton, cited above, for developing a taxonomy for identifying failing states. 10. This is not to imply that such a city would be 100 percent law-abiding or that incidents of government failure could not be found. But these conditions would be the exception and not the rule. 11. Not that this would present no complications. It is likely that states containing a feral city would not acknowledge a loss of sovereignty over the metropolis, even if this were patently the case. Such claims could pose a significant obstacle to collective international action. 12. Transcript, PBS Newshour, "Taming Mexico City," 12 January 1999, available at www.Pbs.org/newshour/bb/latin_American/jan-jun99/mexico [accessed 15 June 2003]. 13. Compiled from a variety of sources, most notably "Taming Mexico City," News Hour with Jim Lehrer, transcript, 12 January 1999. 14. Compiled from a variety of sources, including BBC reports. 15. Brunn, Williams, and Zeigler, p. 37. 16. Interview, Dr. Peter Liotta, with the author, Newport, R.I., 14 April 2003. 17. While the recent successful rescue of Army Private First Class Jessica Lynch during the 2003 Iraq War demonstrates that success in such operations is not impossible, U.S. experiences with hostages in Iran, Lebanon, and Somalia would suggest failure is a more likely outcome. 18. It is predicted that 60 percent of the world's population will live in an urban environment by the year 2030, as opposed to 47 percent in 2000. Furthermore, the majority of this growth will occur in less developed countries, especially in coastal South Asia. More than fifty-eight cities will boast populations of more than five million people. Brunn, Williams, and Zeigler, pp. 9-11. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 16:54:49 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 19:54:49 -0500 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) Message-ID: Click the link for the couple of tables referenced in the text. Cheers, RAH -------- Naval War College Spotting Trouble Identifying Faltering and Failing States Richard J. Norton and James F. Miskel In the past several years, images of American servicemembers hurriedly deploying to various parts of the developing world in response to collapses of state governments have become relatively common. For example, in 1995 U.S. troops kept uneasy watch on the borders of the disintegrating Former Republic of Yugoslavia, patrolled the streets of Haiti, dealt with streams of refugees pouring out of Rwanda, and withdrew from Somalia after four years of humanitarian operations. These operations have not been inexpensive; they have cost billions of dollars and dozens of American lives. U.S. military involvement with faltering and failing states takes many forms. 1 Actual combat may be involved, against opponents ranging from criminal gangs possessing little more than light infantry weapons to semiprofessional armies boasting artillery and armor. 2 In other circumstances, "nation building" activities, such as road building, water purification, and power restoration, make up the bulk of the efforts. Additional tasks have included advising on clearing land mines, providing security escorts to representatives of humanitarian organizations, serving as an interim police force, evacuating foreign nationals, or simply maintaining an offshore military presence. As 1995 demonstrated, states can fail in any portion of the populated globe. The preparation time given U.S. military planners to respond to these missions can range from months to only days; actual involvement may last from weeks to years, with a proportionate range of costs. Additionally, in an era of shrinking resources and limited force structure, it is all the more significant that units committed to these missions are likely to be unavailable for other operations. Therefore, military leaders are among the decision makers who have a vested interest in being able to predict more accurately which states are likely to fail. Others with this interest would include the president, senior diplomats in the State Department, and the directors of humanitarian nongovernmental organizations. Early identification of candidates for failure would allow time to list required assets and prepare detailed contingency plans. If, as we shall argue, traditional economic aid does not significantly help states that are at high risk of failure, early identification could also aid in forestalling the authorization of costly and unproductive civil affairs or nation-building missions. In fact, early warning can provide time to debate usefully whether the military should be involved at all, and if it should, what shape the participation should take. Despite the frequent and prominent involvement of the U.S. military, dealing with faltering and failed states is primarily a diplomatic issue. Traditionally, development aid has been viewed as an essential element in preventing states from failing. Development aid has included military nation building and civil affairs projects, not only as routine peacetime operations but also as part of disaster response packages and postconflict assistance. These projects are often funded solely by the regional commanders in chief or the military services. Attempts to apply this aid have frequently been lengthy and quite costly. 3 Yet notwithstanding the costs that were borne, these efforts have restored very few failing states to health. Debates regarding the efficient and effective application of current fiscally constrained military budgets have become commonplace, both within and outside the military services. A factor in this debate may be a dawning anxiety about the wisdom of "high risk, low return" investments in failing states, investments that may yield little or no positive return. For these reasons it seems to us that military planners and decision makers should be interested in considering new approaches toward aiding failing and faltering states. 4 One such approach would recognize that the economic, social, and political conditions in failing states are so adverse that they merit qualitatively different treatment by the United States. Too often, U.S. foreign aid and military assistance policies have dealt with failing states as if they were no different from other underdeveloped and poor nations. Traditional programs were designed for less dire situations and can, at best, only moderate the symptoms, not cure such diseases. Thus, continued spending on traditional forms of foreign aid for these states is not the most cost-effective strategy in an era of scarce resources. A better approach--akin to "triage" for battlefield wounds--would limit aid in these cases to short-term humanitarian assistance, like disaster relief. These states do not offer fertile soil for economic development assistance undertakings that are long-term or require sustained maintenance by the host country. Thus, environmental, education, and family planning projects funded by the Agency for International Development, or military "civic action" support for school reconstruction and public health system development, would be recognized as essentially futile. Examples of nations in such dire straits would have included Rwanda and Somalia: years of aid were not successful in promoting self-sustaining economic growth and stability--if they had been, operations RESTORE HOPE and SUPPORT HOPE would not have been necessary. A prerequisite to formulating any new approach to these states is to be able to distinguish accurately states that are failing or faltering from the larger group of underdeveloped states that, while poor, are not so near extremis. Making this type of distinction between poor and failing states may be even more important for military leaders today than in the past, because decisions about aid and military "humanitarian" operations are often heavily influenced by the emotions of the public and their elected representatives. This emotional response is triggered by the world media, when they telecast gripping visual images of suffering from wherever on the globe their attention is focused. To a large extent, this is as it should be; in a democracy, the people ought to decide how much money should be spent on foreign aid and to which states the resources should be dedicated. On one hand, the public will find if difficult to make these judgments without at least some information from the media; on the other hand, however, the media's focus is normally only short-term. Appreciating the complex problems in faltering and failing states requires a more significant investment in time than the media are ordinarily willing to invest. Objectively distinguishing states that are faltering and failing from those that are "only" poor may enable military and political leaders the better to explain policies and decisions. A logical first step, then, toward a systematic approach is to develop a reliable method to identify faltering and failing states before they fail. Ideally, such a methodology would also be useful for evaluating apparent improvements made by a failing state--to distinguish the signals of genuine, sustainable progress from the noise of false starts and empty promises. In other words, policy makers could thereby determine when the conditions in a failing state had stabilized or had begun so to improve that development aid, including nation-building and civil affairs operations performed by military units, could be fruitfully resumed. The purpose of this article is to stimulate discussion about a methodology that could be used for identifying the failing states of today and tomorrow. What this article will not do is attempt to determine exactly how much money the United States should spend on foreign aid, or how much of the Defense Department's budget should be reserved for dealing with faltering and failing states. Nor will it attempt to determine how individual foreign aid projects should be evaluated or which specific programs are the most effective. These important issues deserve separate consideration. We are, of course, not the first to observe or comment upon "failing states." Others have preceded us in documenting the phenomenon and have framed the borders of the debate. They remind us that the current policy debates should focus more on the problems of failed and faltering states and less on such issues as the potential merits of consolidating Washington's foreign policy bureaucracies. One scholar, Robert Kaplan, has provided a disturbing and pessimistic analysis of failing states. 5 According to Kaplan, most of the nation-states in West Africa have virtually ceased to govern in any meaningful way. All along a coastal crescent from Nigeria west to Liberia, national governments have been overwhelmed by extreme poverty, disease, crime, and anarchic violence. Endemic civil wars and clan violence will almost inevitably make necessary some form of military protection and involvement in aid efforts if these nations are to have any hope of achieving even limited success. Worse, Kaplan sees no real cure for the sociopathology of several West African states. Foreign aid, even if administered under military protection, will have no lasting effect other than to reduce the fiscal and other resources of the contributing countries. Any aid that the United States provides to the failed states of West Africa, he argues, will be no more than a sop to American domestic interest groups. If ailing and fallen trees may be used as an analogy for faltering and failed states, Kaplan might characterize the cause of failure as poor soil. By contrast, Gerald B. Helman and Steven B. Ratner would instead blame shallow roots. 6 In their view, many of the states that were created or that gained independence after World War II were simply not well prepared to face the daunting challenges of the 1980s and 1990s. Helman and Ratner perceive the situation for these states as serious but not entirely hopeless. The cure they propose is "conservatorship," under which the United Nations would directly supervise or actually take over the government of a failed state until it became fully capable of administering its own affairs. 7 U.S. military and political leaders should immediately understand, these authors warn, that such a conservatorship would inevitably involve American military participation in some form or another. Taking the ailing-tree analogy a step further, Paul Kennedy would identify neither shallow roots nor poor soil as the cause of failure; he would ascribe the blame to gypsy moths and insufficient rain. Every state in the world faces figurative gypsy moth swarms, e.g., transnational problems like environmental degradation and AIDS. The least advanced states are too poor to buy their way out of these problems, and they do not get enough rain (in the form of investment or foreign aid) to save themselves. As a result, they may be doomed to the chaos that Kaplan saw in West Africa. Conversely, the most advanced states possess, or can afford, pest control, irrigation, and well-drilling equipment; that is, their educated populations and research and technology infrastructures give them the wherewithal to meet or adjust to transnational challenges. Kennedy's solution to the problem of faltering and failing states would be to launch international crusades against these transnational problems and to invest more heavily in the economic development of states that are falling behind. 8 Participation of the U.S. military in this solution would not be surprising. Each of these solutions raises some very thorny questions. Which states outside West Africa would people write off? Are all of the West African states lost causes? Will these states be lost causes forever? Which states would others put under conservatorship? Practically everyone concedes that conservatorship is so expensive that the international community could afford to handle very few cases at any given time. That being so, which failed nations would be placed on a "waiting list," condemned to anarchy until their turn for conservatorship came up? Or would an international crusade attempt to rescue all poor states simultaneously? If their number is too great, which states would be rescued first? What might be done for the others while they collapse? Answering these questions requires a methodology--a taxonomy for identifying failing and faltering states. We will offer such a taxonomy and suggest how it could be applied in practice. Our taxonomy comprises nine sets of measurements, grouped into three main categories. The first category assesses the trends in the living conditions of a state's population, with emphasis on whether factors that might favor economic development are better or worse than in other developing states. The measurements of the second category appraise the capacity of the private-sector economy to improve living conditions, over both the long and short terms. The third category evaluates the capacity of the governmental structure to maintain or improve the economic infrastructure, the foundation on which the economy would begin improving living conditions. In order to apply these measurements, it is necessary to devise certain criteria by which to evaluate a state's performance. We have color-coded the basic assessments that might be assigned each criterion. Red "tiles" represent conditions that are substantially worse than the average for all developing nations, yellow tiles indicate a status near that average, and green denotes conditions substantially above it. When the results in each of the three categories are combined, a "mosaic" emerges, a picture of a state's health. Although an infinite number of gradations are possible, we place states, like the criteria, into one of three lists--also coded green, yellow, and red. Green states appear to be in no danger of failure; red marks those that are already failing or have a strong possibility of doing so; whereas states in the yellow list are faltering--they stand at a crossroads and could go either way. These are very broad categories, and the boundaries tend to blur. Like all mosaics, the overall "picture" for any given state is likely to contain tiles of different colors; the final determination would be based on the predominate one. Thus a state might have widespread poverty, and receive a red tile for that, but nevertheless be coded yellow or even green overall, depending upon how this single criterion stacked up against others. The mosaic analogy is not perfect, inasmuch as it calls to mind a static image, a snapshot. A single data point simply cannot give an accurate depiction of a state's potential for failure. In Figure 1 we indicate an improving trend by an upward-pointing arrow; a negative trend would be represented by a downward one, whereas the absence of an arrow would indicate stagnation (unless the tile was green, when absence of an arrow would reflect stability). Analysis of trend data is crucial if one is to distinguish between a state heading toward failure and a poor but viable nation. For example, data demonstrating improving trends would suggest that a state is likely to survive; negative trends or stagnation in a "red" or "yellow" state could represent the opposite. It is also important to note that this methodology does not provide a date by which a certain country will fail, or even a guarantee of failure. Its value, as stated earlier, lies in identifying those states that warrant a different foreign-aid approach--not the reverse, i.e., those for which maintenance of traditional foreign aid schemes is appropriate. It may also be helpful to remember that this evaluation system makes no value judgment about the nature of a state's government. Neither does it measure the intentions of its political leadership; responding to intent is the province of foreign policy, not aid policy. For example, though a state ruled by a corrupt but effective dictator might not be considered "failing" by our methodology, the United States might decide, for policy reasons, to suspend aid until democratic reforms were implemented. Social Conditions Category One primarily addresses the social conditions of a state. We have selected three measurements to represent this category--poverty, literacy, and also mortality (the death rate) and morbidity (incidence of disease)--because they are related to basic building blocks of economic growth and prosperity. Poverty. Many organizations regularly examine the fiscal health of states, and there are numerous definitions of poverty. Our definition is based on what most experts would agree is the absolute minimum requirement to support one of the most basic of human needs--getting enough food to stay alive. We thus use the methodology of the Food and Agricultural Organization of the United Nations, which tracks the per capita calories available (as percentage of need). It should be noted that this measure is relatively unconcerned with unequal distribution of resources; many nations, including the United States, have unequal distribution patterns. Literacy. Literacy, the proportion of adults that can read, is widely recognized as an indicator of human development. Statistics on this measurement are collected and used by many international organizations. Obviously, low rates of literacy reflect poor prospects for economic growth and must discourage private-sector investments. A trend indicating a lack of improvement in the literacy rate is also an indicator that the governmental and private-sector infrastructures lack the capability to administer basic social programs that are preconditions for economic development. Because the focus of this taxonomy is on identifying states that may not be suited for traditional forms of aid, this measurement deals with the overall rate of literacy. In many states there are significant differences between the education offered to men and women; in such states the adult male population has a higher literacy rate than the adult female group. In other countries there are significant disparities in the literacy rates of different ethnic groups. These are important issues, but they do not necessarily indicate that a state is failing or faltering. For example, women have a much lower literacy rate than men in Saudi Arabia, Turkey, and Syria--three nations that are relatively advanced economically. 9 Mortality and morbidity. This measurement seeks out nations that are substantially worse off than other developing states in these two related areas and have been unable to register improvements in recent years. It is not intended simply to identify states where disease is more prevalent than in Western Europe or North America. Statistics on life expectancy and infant mortality are the two most widely compiled measurements of mortality and morbidity. In conjunction with data on the government's expenditures on health, these statistics provide meaningful insight into a state's capacity for economic growth. Unfortunately, figures on central government expenditures for health are not available for many developing countries; also, World Bank and World Health Organization reports do not include data on public health budgets from any of the nations that have high mortality or morbidity rates. 10 As with low literacy rates, high mortality and morbidity is likely to discourage private investment from abroad. Further, if mortality and morbidity rates are higher than the average for all developing countries and are not improving, the likelihood exists that there are serious deficiencies in the governmental and private-sector infrastructures. Private Sector Category Two deals with the capacity of the private sector to improve living conditions. To represent this category we have chosen three measurements--inflation, emigration, and infrastructure--that, taken together, give an indication of a state's capacity to survive economically in the global economy. Inflation. Every state, at one time or another, suffers peak levels of inflation. Many have also experienced episodes of hyperinflation. Sustained hyperinflation is an important indicator that a state may be headed for failure. However, inflation figures may be highly volatile. On one hand, a long-term trend of rising inflation does not bode well; consistent inflation indicates underlying governmental difficulties, and also that more than short-term improvement will be required to dampen consumer, domestic, and foreign-investor expectations about inflation. On the other hand, even a brief period of hyperinflation may be enough to damage severely a state's chances of avoiding failure. For this and other measurements, then, though the trend is important, it is also necessary to note the impact of current conditions. Emigration. As with inflation, most states have been "sending" countries at one time or another. In most cases, voluntary emigration has benefited both sender and receiver. Dividends have included increased foreign exchange in the form of remittances; relief of unemployment and population pressures; and the opportunity to improve the living condition of the migrant. However, excessive levels of migration may add to difficulties imposed by high morbidity and mortality rates. Another potential negative effect is "brain-drain," the emigration of technical and professional personnel essential to the maintenance of industry, services, and government administration. Very general data regarding outward migration flows are collected by the UN and the World Bank. The U.S. State Department and the United Nations High Commissioner for Refugees provide data for worldwide refugee flows and the internal movements of displaced persons. (These data, incidentally, are often in conflict with those reported by sending and receiving countries.) Taken together, despite their shortcomings these figures can be used to derive some useful trend data. Infrastructure. "Infrastructure" is often taken to refer to public goods, such as highways and airports, or private assets like telephones. Such measures as telephones per capita are significant. If the trend is positive, it is an indication that a platform for economic growth is being erected and that the state involved is neither faltering nor failing. An important, if less concrete, example of a private infrastructure good is a state banking system, and further, the amounts entrusted to it by private citizens. If a state suffers from severe economic problems and has no mechanisms for encouraging savings, its platform for economic growth is probably even weaker than more tangible public goods might indicate alone. It may seem counterintuitive to discuss savings in poor states, but the evidence indicates that they do exist. The strength of these savings and their related programs are important to foreign investors, who view their absence as a sign of serious problems. Such shortcomings usually stem from manipulations by vested interests of a state's economy for their own gain, implying that there are insufficient incentives for free enterprise. Government Strength Category Three addresses a government's ability and willingness to invest in the improvements to state infrastructure required to support economic growth. As with Categories One and Two, we have chosen three measurements to represent this category--border control, law and order, and government action. Efforts to improve infrastructure and promote growth are long-term ones and require significant investments at least of organized sweat equity (e.g., equity resulting from labor invested) in operations and maintenance. A certain amount of security is necessary for both the state's exposure and that of donors of foreign aid and sponsors of military civil affairs projects. What is important here is to measure not a state's ability to provide security for individual projects or locations but rather its overall capacity and willingness to provide it. Although a certain amount of data regarding the following three measurements is available from a variety of sources, the final rating of a given state in this category must be a subjective one. Border control. Although the state-centric model of the international political system may no longer be as powerful as it once was, states are likely to remain the most important actors in the international arena for the foreseeable future. One of the primary functions of any state is to control its borders, in order to regulate commerce, maintain security, exercise its legal system, and so forth. Its capacity to do so is a valuable litmus test of the viability of a state's central government. An inability to perform this function also suggests significant problems in other areas. Law and order. Maintaining internal order is a second key measure of a government's--and state's--prospects. In extreme cases the ability of the central government to guarantee the safety of its citizens stops at the doorways of a few federal buildings in the capital. The presence of criminal-controlled enclaves, rampant criminal activity, the failure or incompetence of government police forces, and a lack of public belief in the efficacy of government law enforcement all point to potentially serious, even fatal, flaws. Other indicators in this category would be civil wars or armed and effective resistance groups. Where the latter are present, there is almost always an obvious and direct tie-in with control of borders. Government action. The final criterion in Category Three, government ability and willingness to act, cuts directly to the capability of a central government. In some cases, it is so weak that it is unable to perform. (Robert Kaplan would say that all West African states, for instance, would receive a red tile for this measurement.) In other cases, the government does have the means to act but fails to do so because of corruption, ineptitude, or misplaced priorities. Such a state may have significant natural resources, financial assets, or a public-sector and economic infrastructure but be led by an individual or group that has abrogated the responsibilities of government. Such regimes, in effect, cause their state to fail in order to advance their own interests, e.g., Idi Amin in Uganda. Sometimes their attitude leads only to insurrection and revolution, but the result may be the failure of the state itself. A Special Challenge For the purposes of illustration we have chosen to apply this methodology (retroactively) to Somalia for the 1980-1990 time frame. 11 The results are indicated in Figure 2. Insufficient information is available to assess the color of certain tiles, but we would argue that the preponderance of red tiles and downward-pointing arrows for the period would have indicated Somalia's potential failure to such U.S. policy makers as joint commanders in chief in the years preceding its collapse. For brevity we present only one example in this article; however, our work with other cases suggests that this methodology warrants continued and deeper investigation. It should be reemphasized that the final determination of a state's potential for failure rests on no single area. For example, in the United States (a nation that is not deemed in danger of failure) one could cite failure to control borders and high crime rates as potentially serious problems. It is the combination of data and trends across all three categories that allows one to assign a color code to an individual state. There are difficulties inherent in this taxonomy. Currently, there is no single, central location where the required information can be obtained. The Central Intelligence Agency does not now maintain a central database. Some elements of the data reside at the Department of State, others at the UN, and still others at private organizations. In some areas the figures are unreliable or nonexistent. We would therefore recommend as a starting point the establishment of a central repository for the required information, one that is unclassified and accessible to all. The material should be gathered overtly, either by the countries themselves or by reputable research teams. Although the CIA might be the most logical custodian (already possessing, as it does, the tools of data collection and assimilation), its national intelligence function may make it politically unsuited to this role. The UN, despite its significant inefficiencies and multilayered bureaucracies, would seem the best home for this global database, despite the enormous political pressures sometimes applied to portray a "rosy picture." Data now obtainable is sketchy, unreliable, or nonexistent for some countries and regions, and for significant historical periods of time. The reason may be an inability on the part of the state to collect such data (perhaps in itself an indicator of a problem) or reluctance to publicize poor performance. Data can be falsified to make a state look better (or worse, in an effort to attract aid) than it actually is. To begin to correct these potential flaws, states might be required to submit data as part of the price of admission to the United Nations, or as a prerequisite for UN assistance and funding. Random verification could ascertain the validity of reported figures, although we suspect that many nongovernmental organizations would voluntarily serve, in effect, as watchdogs. Measurements requiring a subjective judgment pose a special challenge. The U.S. ambassador to a state should obviously be consulted. However, this does raise the issue of possible "clientism," and it could place an ambassador who submitted a negative input in a potentially difficult position. The regional commander in chief should also be brought in, especially in regard to the capacity of the military branches of a government, which are, in some cases, responsible for internal security. A better solution, in our opinion, would be for the Central Intelligence Agency (or the United Nations) to be the central collection point. These data could then be forwarded for review by a senior interagency working group (IWG), which would submit recommendations to the National Security Council for decision. There is no reason why private relief organizations could not have representatives on this IWG. (Selecting an appropriately experienced individual to represent this large and diverse community would seem to be a challenge best solved by the "relief community" itself.) In this manner, civil and military attempts to provide developmental aid could be directed toward those areas where they would do the most long-term good; advance planning could be undertaken for humanitarian responses to states at high risk of collapse; and nations recovering from failure could be channeled the right form of assistance. Over time, it appears, such a consistent approach would both most wisely invest donor assets and provide the most long-lasting benefit to those in need. Notes 1. States like the Soviet Union or Czechoslovakia may be thought of having failed in the same sense that the Holy Roman Empire failed--they are now "extinct." Obviously, extinct states are not contenders for U.S. aid or other forms of assistance; on the other hand, in the late 1980s and early 1990s Czechoslovakia and other states were in fact approaching political failure. A foreign aid taxonomy must distinguish between political failures that are "positive" (e.g., consistent with U.S. national interests or reflective of the political consensus in, or economic self-interest of, the affected country) and those that are negative, as in Somalia, where there was widespread anarchy and starvation. 2. This statement should not be taken as minimizing the difficulties of any variety of combat but merely as pointing out the range of capabilities possessed by potential opponents. 3. The authors recognize that American foreign aid spending actually constitutes less than 6 percent of the total U.S. budget and that the majority of foreign aid is predisbursed to Israel, Egypt, Greece, and Turkey. (The wisdom of that may be debated, but it is not the subject of this article.) Nevertheless, development efforts are expensive in terms of real dollars spent and even more so in proportion to the foreign aid budget consumed. 4. According to U.S. News & World Report (Tim Zimmerman, 12 February 1996, p. 42), Vice President Al Gore requested that the Central Intelligence Agency study this problem. For the Agency response, see D.C. Esty, J.A. Goldstone, T.R. Gurr, P.T. Surko, and A.N. Unger, "State Failure Task Force Report," Working Paper for the Central Intelligence Committee (Washington: November 1995). 5. Robert D. Kaplan, "The Coming Anarchy," The Atlantic Monthly, February 1994, pp. 44-76. 6. Gerald B. Helman and Steven B. Ratner, "Saving Failed States," Foreign Policy, Winter 1992-1993, pp. 3-21. 7. Ibid., pp. 12-5. 8. Paul Kennedy, Preparing for the Twenty-First Century (New York: Random House, 1993). 9. World Bank, World Bank Development Report 1994 (New York: Oxford Univ. Press, 1995), p. 163. 10. World Bank, pp. 180-1; World Health Organization, The World Health Report 1995 (Geneva: 1995), pp. 105-8. 11. Sources for this example include the World Bank's World Development Reports (New York: Oxford Univ. Press, 1991, 1992, 1993, 1994, 1995); U.S. Department of Commerce, Bureau of the Census, World Population Profile 1994 (Washington: U.S. Govt. Print. Off., 1994) and Demographic, Economic, Social Statistics for the World (Washington: U.S. Govt. Print. Off., 1996); World Resources Institute, World Resources 1994-5: Guide to the Global Environment; and World Health Organization. Dr. Miskel is a professor of national security affairs at the Naval War College. During the Reagan and Bush administrations he served on the National Security Council as Director for Defense Policy and Arms Control. Dr. Miskel's doctorate is in modern European and Soviet history; he is the author of Buying Trouble? National Security and Reliance on Foreign Industry (Lanham, Md.: University Press of America, 1993). Commander Norton recently retired from the U.S. Navy, after spending his last three years of active duty as a faculty member of the National Security Decision Making Department at the Naval War College. He is currently an adjunct professor of international relations at Florida International University and a Ph.D candidate at The Fletcher School of Law and Diplomacy. His most recent publication was National Security Decision Making, vol. II, Case Studies in Contingency Operations, which he coedited with Professor Miskel (Naval War College Press, 1994). [Return to top] -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 14 20:01:08 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 14 Jan 2005 23:01:08 -0500 Subject: FBI Keeping Records on Pre-9/11 Travelers Message-ID: My Way News FBI Keeping Records on Pre-9/11 Travelers Jan 14, 7:45 PM (ET) By LESLIE MILLER WASHINGTON (AP) - If you're among the millions of Americans who took airline flights in the months before the Sept. 11, 2001, terrorist attacks, the FBI probably knows about it - and possibly where you stayed, whom you traveled with, what credit card you used and even whether you ordered a kosher meal. The bureau is keeping 257.5 million records on people who flew on commercial airlines from June through September 2001 in its permanent investigative database, according to information obtained by a privacy group and made available to The Associated Press. Privacy advocates say they're troubled by the possibility that the FBI could be analyzing personal information about people without their knowledge or permission. "The FBI collected a vast amount of information about millions of people with no indication that they had done anything unlawful," said Marcia Hofmann, attorney with the Electronic Privacy Information Center, which learned about the data through a Freedom of Information Act request. "The fact that they're hanging on to the information is inexcusable," Hofmann said on Friday. FBI spokesman Bill Carter said the bureau was required to retain its records. "There are rules that have been set by the National Archives with regard to the retention of records by government agencies," Carter said. Hofmann, though, said the FBI still had a legal responsibility to tell people that it had obtained information about them and to let them have access to it. As part of its investigation into the terrorist attacks, the FBI asked for, and got, the records from a number of airlines shortly after Sept. 11. The FBI also got one set of data through a federal grand jury subpoena. The privacy center in May requested records of the FBI's acquisition of the data. The bureau last week turned over 12 pages of information, much of it blanked out for security reasons. The 12 pages do show that the bureau obtained 82.1 million passenger manifests, or lists of people who flew on planes, between January and September 2001, in addition to the 257.5 million passenger name records. Citing privacy concerns, the FBI didn't reveal which airlines turned over the information, which airline employees turned it over and which FBI special agents got it. The data are called passenger name records, or PNR, and can include a variety of information such as credit card numbers, travel itineraries, addresses, telephone numbers and meal requests. David Hardy, the FBI's chief of the record/information dissemination section of the records management division, said in a legal document dated Jan. 5 that the data were being stored and combined with other information from the Sept. 11 investigation, dubbed PENTTBOMB. "I have been advised that the Airline Data Sets have been entered by the Cyber Division into a 'Data Warehouse' and have been intertwined for analytical purposes with the information from several other PENTTBOMB Data Sets," Hardy wrote in a statement to the U.S. District Court for the District of Columbia, where the privacy center filed its suit. Hofmann, the attorney for the privacy group, said the FBI had a legitimate reason for collecting information to get a better picture of the hijackers' travel patterns and possible associates. But, she said, "it wouldn't seem that there's any reason to keep that information now." The FBI's Carter said he couldn't comment on what may be happening to the data because the bureau is involved in a lawsuit by the privacy center. Daniel Solove, a George Washington University Law School professor and author of a book on privacy, said not enough is known about what the FBI is doing with the data to determine if there is a problem. "Data just sits around and who knows what people are doing with it?" Solove said. "The public is left completely out of the loop, not told what this data is for. The agency is basically saying 'Trust us.'" Solove suggested there was irony in Congress last year ordering the FBI to more quickly purge information obtained in background checks of gun buyers. That, he said, can be useful in tracking down criminals. "Congress wants to protect guns at great cost, but when it comes to privacy and civil liberties generally, it doesn't register on the same level," Solove said. --- On the Net: Electronic Privacy Information Center: http://www.epic.org FBI: http://www.doj.gov -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From justin-cypherpunks at soze.net Fri Jan 14 22:49:01 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 15 Jan 2005 06:49:01 +0000 Subject: Police Worried About New Vest-Penetrating Gun In-Reply-To: References: Message-ID: <20050115064901.GA12599@arion.soze.net> On 2005-01-14T16:54:32-0500, R.A. Hettinga wrote: > > > Police Worried About New Vest-Penetrating Gun I care? Well, perhaps I do... I should go pick one up before they're banned. > The most shocking fact may be that the gun -- known as the "five-seven" -- > is being marketed to the public, and it's completely legal The name is "Five-seveN." It's made by Fabrique Nationale (FN). Allegedly the U.S. secret service likes the Five-seveN, along with the FN P90 (unavailable to civilians except title 2 firearms dealers because it's only made in a select-fire version). They both use the same 5.7mm rounds, which makes logistics easier. Of course, they also use MP5s and 9mm handguns... Other guns with civilian-legal "armor-piercing" ammo include the CZ-52, .223 pistols, and most all rifles. > At a distance of 21 feet, Trumball police Sgt. Lenny Scinto fired the > five-seven with the ammo sold legally to the public into a standard police > vest. All three penetrated the vest. The real ammo penetrates CRISAT/PAGST armor at 100m and 300m respectively. Level 2 or 3a armor is really rather pathetic. > Back in Trumball, Scinto said his officers would have to rethink how to > protect the public and protect themselves. Police have no duty to protect the public. Anyway, most of "the public" doesn't walk around wearing vests, so protecting "the public" from these is no different than protecting them from other firearms. Protecting the police from these is no different than protecting them from rifles. Only trauma plates can stop pointy, high-velocity rounds. > "This is going to add a whole new dimension to training and tactics. With > the penetration of these rounds, you're going to have to find something > considerably heavier than we normally use for cover and concealment to stop > this round," Scinto said. Cool, more LEOs instantly recognizable as beetles, having exoskeletons. I recommend Kafka's Metamorphoses to them as sociological grounding for what sort of reaction they can expect. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From justin-cypherpunks at soze.net Sat Jan 15 01:38:23 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 15 Jan 2005 09:38:23 +0000 Subject: Police Worried About New Vest-Penetrating Gun In-Reply-To: <6.0.3.0.0.20050114152232.00a247d0@pop.idiom.com> References: <6.0.3.0.0.20050114152232.00a247d0@pop.idiom.com> Message-ID: <20050115093823.GB12599@arion.soze.net> On 2005-01-14T15:42:18-0800, Bill Stewart wrote: > > At 01:54 PM 1/14/2005, R.A. Hettinga wrote: > > > > >NEW YORK -- There is a nationwide alert to members of law enforcement > >regarding a new kind of handgun which can render a bulletproof vest > >useless, as first reported by NewsChannel 4's Scott Weinberger. > >... > >The weapon is light, easily concealable and can fire 20 rounds in seconds > >without reloading. > > A couple of questions to the gunpunks out there... > I've heard that rifles easily penetrate bullet-proof vests, > and that vests are really only useful against average-to-small handguns > and against shotguns. Is this accurate? There are various levels of body armor specified by the NIJ. In order of effectiveness (lower to higher): Levels IIa, II, IIIa, III, and IV. http://www.nlectc.org/txtfiles/BodyArmorStd/NIJSTD010103.html Level IV typically takes the form of a trauma plate and is put into a pouch in the front (and/or in the back) of soft body armor. III and IV are heavier, bulkier, and as a result aren't used as much. The NIJ standards are based on stopping standard bullets up to certain velocity limits (preventing them from going through the vest), _plus_ "backface deformation" limits. They put the vests over geletin, and the volume displaced by the vest when it absorbs the shot is measured and must be less than a specified limit. There is a lot of sentiment that this testing method is crap, and all that should matter is whether the bullet goes through the vest. Or at least that backface deformation should be less heavily emphasized. Then there are other specifications outside of the NIJ scheme; for instance, the there's "PAGST" and "CRISAT" body armor. I don't recall what they stand for. > Any idea how much you can saw off a rifle > and still have it penetrate typical cop vests? A lot. 5.56mm pistols (based on the AR-15 and available from olympic arms or bushmaster, among other manufacturers) are perfectly legal and will shoot through IIIa vests. The real jump up is between IIIa and III; the former mainly stops handgun rounds, while the latter allegedly stops standard .223 and .308 loads, but I'm not sure... before I looked it up just now, I thought only level IV trauma plates stopped .308. Cops typically wear level II or IIIa armor. And even trauma plates will not stop repeated hits to the same area. If you expect to be shot at with a rifle, you do not want to be out in the open where many hits are unavoidable. Ceramic plates weaken through chipping, and metal plates weaken through stress/deformation. > (And I assume the "20 rounds in seconds" is just a scary way to say > "it has a big magazine and you have to pull the trigger 20 times".) Of course. Otherwise it would be a machine gun, and new machine guns are not available to civilians... and haven't been since the 1986 Firearm Owners Protection Act. The anti-gun forces try hard to associate the assault weapons ban expiry with the availability of machineguns. They are lying. > Also, the police expressed worry that criminals might hear about > these guns and then the cops would be in big trouble. This gun, the Five-seveN, has been available for years. What hasn't been available for years, I don't think, is the "practice" non-AP ammunition. And, of course, some FFLs (gun dealers) are unwilling to sell the Five-seveN to private citizens. > Sounds silly to me - while some criminals might buy a > "cop-killer handgun" for bragging rights, > random criminals presumably only buy weapons useful for the > scenarios they imagine being in, Other armor-piercing handguns include .223 pistols and the CZ 52; there are also nasty rounds, though generally unavailable, for 9mm handguns that will penetrate IIIa armor. Ordinary rounds at +P+ pressures may even do it. The Five-seveN bullets have a muzzle velocity about half-way between handgun bullet velocities and rifle bullet velocities. Given the round diameter (5.7mm) and the short barrel (compared to rifles) of the Five-seveN, it's essentially a rifle round. 5.56mm pistols fire rounds with nearly the same diameter, though they weigh more (5.7mm bullets are ~30gr, standard 5.56mm is 55 or 62gr) and therefore require more powder to achieve the same velocities. Hence the longer cartridges for 5.56mm (I use .223 and 5.56 interchangably; they're technically not the same thing but close enough for government work). Most .223 pistols are based on the AR-15, so their magazines attach outside of the pistol grip and make them look scarier. That also makes them slightly less concealable, which is why they're not being attacked by the anti-gun forces. Perhaps the anti-gunners don't think they're legal. > which is Saturday Night Specials for most applications, > or whatever currently fashionable Mac10/Uzi/etc. > for druglord armies that expect to be shooting at each other, > or rifles for distance work and dual-use pickup-truck decoration. Uzis, MP5s, short-barrelled rifles. They'll have top of the line handguns; If I were a criminal, I'd carry what I'd carry anyway, a Walther p99 compact plus several full p99 mags (they work in the p99 compact, something that cannot be said for H&K P2000 mags and the P2000 compact). Don't be fooled by the association with James Bond. The factory p99 is an excellent gun (if you don't mind polymer). The PPK is another story. > Do many criminals expect to initiate shootouts with vest-wearing cops > in scenarios where a rifle isn't practical? I don't know what criminals think is practical. Very few criminals make killing police officers their primary objective, for obvious reasons. The fact that they get into a shooting at all implies that they have planned, at some level, to kill police if they need to. The statistics speak for themselves. It's rare to see rifles involved unless the criminal is at home, in a car, or actively committing a crime (and even in the last case, they're less common than in homes and cars). http://www.fbi.gov/ucr/ucr.htm middle of the page, "Law Enforcement Officers Killed and Assaulted" According to the 2003 pdf, in 2003, 34 officers were killed with a handgun, 10 killed with a rifle (out of 52 murders). 34 of the 52 were wearing body armor. On page 35 of the pdf (document p. 27), handguns were the murder weapon in 56 ambush situations, compared with only 28 where rifles were the murder weapon. > Do most cops wear bullet-proof vests regularly other than in > holdup/hostage SWAT situations, where the criminal might have rifles anyway, > and where a regular pistol is just fine for shooting hostages? They are not bullet-proof. That's a term the anti-gun forces like because it implies that any gun/ammo combination that will defeat the vests are somehow magical or evil. And yes, the majority of officers, particularly city police, wear soft body armor. Typically it is NIJ level 3a or level 2, so it will not stop high-pressure or maliciously-shaped standard-caliber handgun rounds, nor 5.7mm (Five-seveN), nor 7.62x25mm Tokarev (CZ 52). The CZ 52 can be found in very good condition for $100-125. I recall advice from somewhere that the CZ 52 firing pin should be replaced with a titanium one on account of reliability and safety concerns. http://world.guns.ru/handguns/hg58-e.htm > Or is this mainly a problem for the cases when cops want to stage > military-style pre-dawn assaults on people's houses, > where they expect that the targets usually only have > pistols handy near the bed and don't have time for rifles? It's a problem for any cop wearing common body armor. Most beat cops and detectives wear it. I don't know about SWAT teams -- of course they wear some sort of armor, but I'd guess level 3 and possibly trauma plates as well. I don't know how the Five-seveN training rounds do against level 3, but I'd guess they are stopped. > Seems like scare-mongering to me, not a practical concern. Of course it's not a practical concern. Criminals already have access to handguns that will defeat common soft body armor. This media panic was instigated by a press release from the Violence Policy Center, which has evidently (for now) given up trying to pass a new assault weapon ban, and is instead finding new legislative targets. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From justin-cypherpunks at soze.net Sat Jan 15 08:02:49 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 15 Jan 2005 16:02:49 +0000 Subject: Police Worried About New Vest-Penetrating Gun In-Reply-To: <20050115093823.GB12599@arion.soze.net> References: <6.0.3.0.0.20050114152232.00a247d0@pop.idiom.com> <20050115093823.GB12599@arion.soze.net> Message-ID: <20050115160249.GA20093@arion.soze.net> On 2005-01-15T09:38:23+0000, Justin wrote: > On 2005-01-14T15:42:18-0800, Bill Stewart wrote: > > > Seems like scare-mongering to me, not a practical concern. > > Of course it's not a practical concern. Criminals already have access > to handguns that will defeat common soft body armor. This media panic > was instigated by a press release from the Violence Policy Center, which > has evidently (for now) given up trying to pass a new assault weapon > ban, and is instead finding new legislative targets. I didn't remember which group it was, and I guessed wrong. It wasn't the VPC. It was the Brady Campaign/MMM. http://releases.usnewswire.com/GetRelease.asp?id=41691 -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus 53 From measl at mfn.org Sat Jan 15 16:10:16 2005 From: measl at mfn.org (J.A. Terranson) Date: Sat, 15 Jan 2005 18:10:16 -0600 (CST) Subject: [Antisocial] Remember These?? (fwd) Message-ID: <20050115181000.R29903@ubzr.zsa.bet> ---------- Forwarded message ---------- Date: Sat, 15 Jan 2005 18:03:24 -0600 (CST) From: someguy at mfn.org Reply-To: Antisocial To: antisocial at mfn.org Subject: [Antisocial] Remember These?? So now that the hunt is officially off. It truly is a shame that the media is not all over this. Once again we see the coporate media covering for their boy W. sg ******************* But for those who say we haven't found the banned manufacturing devices or banned weapons, they're wrong, we found them. George W. Bush, President Interview with TVP Poland 5/30/2003 We don't want the smoking gun to be a mushroom cloud Condoleeza Rice, US National Security Advisor CNN Late Edition 9/8/2002 How the United States should react if Iraq acquired WMD. "The first line of defense...should be a clear and classical statement of deterrence--if they do acquire WMD, their weapons will be unusable because any attempt to use them will bring national obliteration." Condoleeza Rice, US National Security Advisor January/February 2000 issue of Foreign Affairs 2/1/2000 We are greatly concerned about any possible linkup between terrorists and regimes that have or seek weapons of mass destruction...In the case of Saddam Hussein, we've got a dictator who is clearly pursuing and already possesses some of these weapons.. A regime that hates America and everything we stand for must never be permitted to threaten America with weapons of mass destruction. Dick Cheney, Vice President Detroit, Fund-Raiser 6/20/2002 Simply stated, there is no doubt that Saddam Hussein now has weapons of mass destruction. Dick Cheney, Vice President Speech to VFW National Convention 8/26/2002 There is already a mountain of evidence that Saddam Hussein is gathering weapons for the purpose of using them. And adding additional information is like adding a foot to Mount Everest. Ari Fleischer, Press Secretary Response to Question From Press 9/6/2002 Right now, Iraq is expanding and improving facilities that were used for the production of biological weapons. George W. Bush, President Speech to UN General Assembly 9/12/2002 Iraq has stockpiled biological and chemical weapons, and is rebuilding the facilities used to make more of those weapons. We have sources that tell us that Saddam Hussein recently authorized Iraqi field commanders to use chemical weapons -- the very weapons the dictator tells us he does not have George W. Bush, President Radio Address 10/5/2002 The Iraqi regime . . . possesses and produces chemical and biological weapons. It is seeking nuclear weapons. We know that the regime has produced thousands of tons of chemical agents, including mustard gas, sarin nerve gas, VX nerve gas. George W. Bush, President Cincinnati, Ohio Speech 10/7/2002 And surveillance photos reveal that the regime is rebuilding facilities that it had used to produce chemical and biological weapons. George W. Bush, President Cincinnati, Ohio Speech 10/7/2002 After eleven years during which we have tried containment, sanctions, inspections, even selected military action, the end result is that Saddam Hussein still has chemical and biological weapons and is increasing his capabilities to make more. And he is moving ever closer to developing a nuclear weapon. George W. Bush, President Cincinnati, Ohio Speech 10/7/2002 We've also discovered through intelligence that Iraq has a growing fleet of manned and unmanned aerial vehicles that could be used to disperse chemical or biological weapons across broad areas George W. Bush, President Cincinnati, Ohio Speech 10/7/2002 Iraq, despite UN sanctions, maintains an aggressive program to rebuild the infrastructure for its nuclear, chemical, biological, and missile programs. In each instance, Iraq's procurement agents are actively working to obtain both weapons-specific and dual-use materials and technologies critical to their rebuilding and expansion efforts, using front companies and whatever illicit means are at hand. John Bolton, Undersecretary of State for Arms Control Speech to the Hudson Institute 11/1/2002 We estimate that once Iraq acquires fissile material -- whether from a foreign source or by securing the materials to build an indigenous fissile material capability -- it could fabricate a nuclear weapon within one year. It has rebuilt its civilian chemical infrastructure and renewed production of chemical warfare agents, probably including mustard, sarin, and VX. It actively maintains all key aspects of its offensive BW [biological weapons] program. John Bolton, Undersecretary of State for Arms Control Speech to the Hudson Institute 11/1/2002 Iraq could decide on any given day to provide biological or chemical weapons to a terrorist group or to individual terrorists,...The war on terror will not be won until Iraq is completely and verifiably deprived of weapons of mass destruction. Dick Cheney, Vice President Denver, Address To Air National Guard 12/1/2002 If he declares he has none, then we will know that Saddam Hussein is once again misleading the world. Ari Fleischer, Press Secretary Press Briefing 12/2/2002 The president of the United States and the secretary of defense would not assert as plainly and bluntly as they have that Iraq has weapons of mass destruction if it was not true, and if they did not have a solid basis for saying it Ari Fleischer, Press Secretary Response to Question From Press 12/4/2002 We know for a fact that there are weapons there. Ari Fleischer, Press Secretary Press Briefing 1/9/2003 I am absolutely convinced, based on the information that's been given to me, that the weapon of mass destruction which can kill more people than an atomic bomb -- that is, biological weapons -- is in the hands of the leadership of Iraq. Bill Frist, Senate Majority Leader MSNBC Interview 1/10/2003 What is unique about Iraq compared to, I would argue, any other country in the world, in this juncture, is the exhaustion of diplomacy thus far, and, No. 2, this intersection of weapons of mass destruction. Bill Frist, Senate Majority Leader NewsHour Interview 1/22/2003 The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa. Our intelligence sources tell us that he has attempted to purchase high-strength aluminum tubes suitable for nuclear weapons production. George W. Bush, President State of the Union Address 1/28/2003 Our intelligence officials estimate that Saddam Hussein had the materials to produce as much as 500 tons of sarin, mustard and VX nerve agent. George W. Bush, President State of the Union Address 1/28/2003 We know that Saddam Hussein is determined to keep his weapons of mass destruction, is determined to make more. Colin Powell, Secretary of State Remarks to UN Security Council 2/5/2003 There can be no doubt that Saddam Hussein has biological weapons and the capability to rapidly produce more, many more. And he has the ability to dispense these lethal poisons and diseases in ways that can cause massive death and destruction. If biological weapons seem too terrible to contemplate, chemical weapons are equally chilling Colin Powell, Secretary of State Addresses the U.N. Security Council 2/5/2003 We have sources that tell us that Saddam Hussein recently authorized Iraqi field commanders to use chemical weapons -- the very weapons the dictator tells us he does not have. George W. Bush, President Radio Address 2/8/2003 In Iraq, a dictator is building and hiding weapons that could enable him to dominate the Middle East and intimidate the civilized world -- and we will not allow it. George W. Bush, President Speech to the American Enterprise Institute 2/26/2003 If Iraq had disarmed itself, gotten rid of its weapons of mass destruction over the past 12 years, or over the last several months since (UN Resolution) 1441 was enacted, we would not be facing the crisis that we now have before us . . . But the suggestion that we are doing this because we want to go to every country in the Middle East and rearrange all of its pieces is not correct. Colin Powell, Secretary of State Interview with Radio France International 2/28/2003 I am not eager to send young Americans into harm's way in Iraq, or to see innocent people killed or hurt in military operations. Given all of the facts and circumstances known to us, however, I am convinced that if we wait, a threat will continue to materialize in Iraq that could cause incalculable damage to world peace in general, and to the United States in particular. Bill Frist, Senate Majority Leader Letter to Future of Freedom Foundation 3/1/2003 Iraq is a grave threat to this nation. It desires to acquire and use weapons of mass terror and is run by a despot with a proven record of willingness to use them. Iraq has had 12 years to comply with UN requirements for disarmament and has failed to do so. The president is right to say it's time has run out. Bill Frist, Senate Majority Leader Senate Speech 3/7/2003 So has the strategic decision been made to disarm Iraq of its weapons of mass destruction by the leadership in Baghdad? . . . I think our judgment has to be clearly not. Colin Powell, Secretary of State Remarks to UN Security Council 3/7/2003 Getting rid of Saddam Hussein's regime is our best inoculation. Destroying once and for all his weapons of disease and death is a vaccination for the world. Bill Frist, Senate Majority Leader Washington Post op-ed 3/16/2003 Let's talk about the nuclear proposition for a minute. We know that based on intelligence, that [Saddam] has been very, very good at hiding these kinds of efforts. He's had years to get good at it and we know he has been absolutely devoted to trying to acquire nuclear weapons. And we believe he has, in fact, reconstituted nuclear weapons. Dick Cheney, Vice President Meet The Press 3/16/2003 Intelligence gathered by this and other governments leaves no doubt that the Iraq regime continues to possess and conceal some of the most lethal weapons ever devised. George W. Bush, President Address to the Nation 3/17/2003 The United States . . . is now at war "so we will not ever see" what terrorists could do "if supplied with weapons of mass destruction by Saddam Hussein." Bill Frist, Senate Majority Leader Senate Debate 3/20/2003 Well, there is no question that we have evidence and information that Iraq has weapons of mass destruction, biological and chemical particularly . . . all this will be made clear in the course of the operation, for whatever duration it takes. Ari Fleischer, Press Secretary Press Briefing 3/21/2003 There is no doubt that the regime of Saddam Hussein possesses weapons of mass destruction. And . . . as this operation continues, those weapons will be identified, found, along with the people who have produced them and who guard them. General Tommy Franks, Commander in Chief Central Command Press Conference 3/22/2003 One of our top objectives is to find and destroy the WMD. There are a number of sites. Victoria Clark, Pentagon Spokeswoman Press Briefing 3/22/2003 I have no doubt we're going to find big stores of weapons of mass destruction. Kenneth Adelman, Defense Policy Board member Washington Post, p. A27 3/23/2003 We know where they are. They're in the area around Tikrit and Baghdad and east, west, south and north somewhat. Donald Rumsfeld, Secretary of Defense ABC Interview 3/30/2003 We simply cannot live in fear of a ruthless dictator, aggressor and terrorist such as Saddam Hussein, who possesses the world's most deadly weapons. Bill Frist, Senate Majority Leader Speech to American Israel Political Action Committee 3/31/2003 We still need to find and secure Iraq's weapons of mass destruction facilities and secure Iraq's borders so we can prevent the flow of weapons of mass destruction materials and senior regime officials out of the country. Donald Rumsfeld, Secretary of Defense Press Conference 4/9/2003 You bet we're concerned [concerned that those weapons might have been shipped out of the country]about it. And one of the reasons it's important is because the nexus between terrorist states with weapons of mass destruction ... and terrorist groups -- networks -- is a critical link. And the thought that ... some of those materials could leave the country and [get] in the hands of terrorist networks would be a very unhappy prospect. So it is important to us to see that that doesn't happen. Donald Rumsfeld, Secretary of Defense Press Conference 4/9/2003 Obviously the administration intends to publicize all the weapons of mass destruction U.S. forces find -- and there will be plenty. Robert Kagan, Neocon scholar Washington Post op-ed 4/9/2003 I think you have always heard, and you continue to hear from officials, a measure of high confidence that, indeed, the weapons of mass destruction will be found. Ari Fleischer, Press Secretary Press Briefing 4/10/2003 But make no mistake -- as I said earlier -- we have high confidence that they have weapons of mass destruction. That is what this war was about and it is about. And we have high confidence it will be found. Ari Fleischer, Press Secretary Press Briefing 4/10/2003 Were not going to find anything until we find people who tell us where the things are. And we have that very high on our priority list, to find the people who know. And when we do, then well learn precisely where things were and what was done. Donald Rumsfeld, Secretary of Defense Meet the Press 4/13/2003 I have absolute confidence that there are weapons of mass destruction inside this country. Whether we will turn out, at the end of the day, to find them in one of the 2,000 or 3,000 sites we already know about or whether contact with one of these officials who we may come in contact with will tell us, ``Oh, well, there's actually another site,'' and we'll find it there, I'm not sure. General Tommy Franks, Commander in Chief Central Command Fox New 4/13/2003 We are learning more as we interrogate or have discussions with Iraqi scientists and people within the Iraqi structure, that perhaps he destroyed some, perhaps he dispersed some. And so we will find them. George W. Bush, President NBC Interview 4/24/2003 There are people who in large measure have information that we need . . . so that we can track down the weapons of mass destruction in that country. Donald Rumsfeld, Secretary of Defense Press Briefing 4/25/2003 We'll find them. It'll be a matter of time to do so. George W. Bush, President Remarks to Reporters 5/3/2003 I'm absolutely sure that there are weapons of mass destruction there and the evidence will be forthcoming. We're just getting it just now. Colin Powell, Secretary of State Remarks to Reporters 5/4/2003 We never believed that we'd just tumble over weapons of mass destruction in that country. Donald Rumsfeld, Secretary of Defense Fox News Interview 5/4/2003 I'm not surprised if we begin to uncover the weapons program of Saddam Hussein -- because he had a weapons program. George W. Bush, President Remarks to Reporters 5/6/2003 U.S. officials never expected that "we were going to open garages and find" weapons of mass destruction. Condoleeza Rice, US National Security Advisor Reuters Interview 5/12/2003 I just don't know whether it was all destroyed years ago -- I mean, there's no question that there were chemical weapons years ago -- whether they were destroyed right before the war, (or) whether they're still hidden. Maj. Gen. David Petraeus, Commander 101st Airborne Press Briefing 5/13/2003 We said all along that we will never get to the bottom of the Iraqi WMD program simply by going and searching specific sites, that you'd have to be able to get people who know about the programs to talk to you. Paul Wolfowitz, Deputy Secretary of Defense Interview with Australian Broadcasting 5/13/2003 Before the war, there's no doubt in my mind that Saddam Hussein had weapons of mass destruction, biological and chemical. I expected them to be found. I still expect them to be found. Gen. Michael Hagee, Commandant of the Marine Corps Interview with Reporters 5/21/2003 It's going to take time to find them, but we know he had them. And whether he destroyed them, moved them or hid them, we're going to find out the truth. One thing is for certain: Saddam Hussein no longer threatens America with weapons of mass destruction. George W. Bush, President Speech at a weapons factory in Ohio 5/25/2003 Given time, given the number of prisoners now that we're interrogating, I'm confident that we're going to find weapons of mass destruction. Gen. Richard Myers, Chairman Joint Chiefs of Staff NBC Today Show interview 5/26/2003 They may have had time to destroy them, and I don't know the answer. Donald Rumsfeld, Secretary of Defense Remarks to Council on Foreign Relations 5/27/2003 For bureaucratic reasons, we settled on one issue, weapons of mass destruction (as justification for invading Iraq) because it was the one reason everyone could agree on. Paul Wolfowitz, Deputy Secretary of Defense Vanity Fair interview 5/28/2003 The President is indeed satisfied with the intelligence that he received. And I think that's borne out by the fact that, just as Secretary Powell described at the United Nations, we have found the bio trucks that can be used only for the purpose of producing biological weapons. That's proof-perfect that the intelligence in that regard was right on target. Ari Fleischer, Press Secretary Press Briefing 5/29/2003 We have teams of people that are out looking. They've investigated a number of sites. And within the last week or two, they have in fact captured and have in custody two of the mobile trailers that Secretary Powell talked about at the United Nations as being biological weapons laboratories. Donald Rumsfeld, Secretary of Defense Infinity Radio Interview 5/30/2003 You remember when [Secretary of State] Colin Powell stood up in front of the world, and he said Iraq has got laboratories, mobile labs to build biological weapons ...They're illegal. They're against the United Nations resolutions, and we've so far discovered two...And we'll find more weapons as time goes on. George W. Bush, President Press Briefing 5/30/2003 It was a surprise to me then -- it remains a surprise to me now -- that we have not uncovered weapons, as you say, in some of the forward dispersal sites. Believe me, it's not for lack of trying. We've been to virtually every ammunition supply point between the Kuwaiti border and Baghdad, but they're simply not there. Lt. Gen. James Conway, 1st Marine Expeditionary Force Press Interview 5/30/2003 Do I think we're going to find something? Yeah, I kind of do, because I think there's a lot of information out there. Maj. Gen. Keith Dayton, Defense Intelligence Agency Press Conference 5/30/2003 Q: The fact that there hasn't been substantial cache of weapons of mass destruction -- is that an embarrassment? Wolfowitz: No. Is it an embarrassment to people on the other side that we've discovered these biological production vans, which the defector told us about? Paul Wolfowitz, Deputy Secretary of Defense CNN Interview 5/31/2003 This wasn't material I was making up, it came from the intelligence community Colin Powell, Secretary of State Press Briefing 6/2/2003 We know that some of them, especially the biological weapons, were being destroyed," Hastert said, adding that it would "take a little while to find weapons of mass destruction... and we're going to continue to do it. Dennis Hastert, House Speaker R-IL Press Briefing 6/4/2003 We recently found two mobile biological weapons facilities which were capable of producing biological agents. This is the man who spent decades hiding tools of mass murder. He knew the inspectors were looking for them. You know better than me he's got a big country in which to hide them. We're on the look. We'll reveal the truth George W. Bush, President CAMP SAYLIYA, Qatar 6/5/2003 I would put before you Exhibit A, the mobile biological labs that we have found. People are saying, "Well, are they truly mobile biological labs?" Yes, they are. And the DCI, George Tenet, Director of Central Intelligence, stands behind that assessment. Colin Powell, Secretary of State Fox News Interview 6/8/2003 No one ever said that we knew precisely where all of these agents were, where they were stored Condoleeza Rice, US National Security Advisor Meet the Press 6/8/2003 What the president has said is because it's been the long-standing view of numerous people, not only in this country, not only in this administration, but around the world, including at the United Nations, who came to those conclusions...And the president is not going to engage in the rewriting of history that others may be trying to engage in. Ari Fleischer, Press Secretary Response to Question From Press 6/9/2003 Iraq had a weapons program...Intelligence throughout the decade showed they had a weapons program. I am absolutely convinced with time we'll find out they did have a weapons program. George W. Bush, President Comment to Reporters 6/9/2003 The biological weapons labs that we believe strongly are biological weapons labs, we didn't find any biological weapons with those labs. But should that give us any comfort? Not at all. Those were labs that could produce biological weapons whenever Saddam Hussein might have wanted to have a biological weapons inventory. Colin Powell, Secretary of State Associated Press Interview 6/12/2003 Those documents were only one piece of evidence in a larger body of evidence suggesting that Iraq attempted to purchase uranium from Africa ... The issue of Iraq's pursuit of uranium in Africa is supported by multiple sources of intelligence. The other sources of evidence did and do support the president's statement. Sean McCormack, National Security Council Spokesman Statement to press 6/13/2003 My personal view is that their intelligence has been, I'm sure, imperfect, but good. In other words, I think the intelligence was correct in general, and that you always will find out precisely what it was once you get on the ground and have a chance to talk to people and explore it, and I think that will happen. Donald Rumsfeld, Secretary of Defense Press Briefing 6/18/2003 I have reason, every reason, to believe that the intelligence that we were operating off was correct and that we will, in fact, find weapons or evidence of weapons, programs, that are conclusive. But that's just a matter of time...It's now less than eight weeks since the end of major combat in Iraq and I believe that patience will prove to be a virtue Donald Rumsfeld, Secretary of Defense Pentagon media briefing. 6/24/2003 MS. BLOCK: There were no toxins found in those trailers. SECRETARY POWELL: Which could mean one of several things: one, they hadn't been used yet to develop toxins; or, secondly, they had been sterilized so thoroughly that there is no residual left. It may well be that they hadn't been used yet. Colin Powell, Secretary of State All Things Considered, Interview 6/27/2003 That was the concern we had with Saddam Hussein. Not only did he have weapons -- and we'll uncover not only his weapons but all of his weapons programs -- he never lost the intent to have these kinds of weapons. Colin Powell, Secretary of State All Things Considered, Interview 6/27/2003 I think the burden is on those people who think he didn't have weapons of mass destruction to tell the world where they are. Ari Fleischer, Press Secretary Press Briefing 7/9/2003 -- Jesus was a liberal - You know antiestablishment,feed the hungry, heal the sick, forgive others From pcapelli at gmail.com Sat Jan 15 16:35:34 2005 From: pcapelli at gmail.com (Pete Capelli) Date: Sat, 15 Jan 2005 19:35:34 -0500 Subject: [Antisocial] Remember These?? (fwd) In-Reply-To: <20050115181000.R29903@ubzr.zsa.bet> References: <20050115181000.R29903@ubzr.zsa.bet> Message-ID: You forgot a few (found from a quick google search) ... although, naturally the media crawled all over the left for supporting the claims of weapons of mass destruction, while letting Bush off the hook. ----- "There is no doubt that ... Saddam Hussein has invigorated his weapons programs. Reports indicate that biological, chemical and nuclear programs continue apace and may be back to pre-Gulf War status. In addition, Saddam continues to redefine delivery systems and is doubtless using the cover of a licit missile program to develop longer-range missiles that will threaten the United States and our allies." - Letter to President Bush, Signed by Sen. Bob Graham (D, FL,) and others, December 5, 2001 "We begin with the common belief that Saddam Hussein is a tyrant and a threat to the peace and stability of the region. He has ignored the mandated of the United Nations and is building weapons of mass destruction and the means of delivering them." - Sen. Carl Levin (D, MI), Sept. 19, 2002 "We know that he has stored secret supplies of biological and chemical weapons throughout his country." - Al Gore, Sept. 23, 2002 "Iraq's search for weapons of mass destruction has proven impossible to deter and we should assume that it will continue for as long as Saddam is in power." - Al Gore, Sept. 23, 2002 "We have known for many years that Saddam Hussein is seeking and developing weapons of mass destruction." - Sen. Ted Kennedy (D, MA), Sept. 27, 2002 "The last UN weapons inspectors left Iraq in October of 1998. We are confident that Saddam Hussein retains some stockpiles of chemical and biological weapons, and that he has since embarked on a crash course to build up his chemical and biological warfare capabilities. Intelligence reports indicate that he is seeking nuclear weapons..." - Sen. Robert Byrd (D, WV), Oct. 3, 2002 "I will be voting to give the President of the United States the authority to use force-- if necessary-- to disarm Saddam Hussein because I believe that a deadly arsenal of weapons of mass destruction in his hands is a real and grave threat to our security." - Sen. John F. Kerry (D, MA), Oct. 9, 2002 "There is unmistakable evidence that Saddam Hussein is working aggressively to develop nuclear weapons and will likely have nuclear weapons within the next five years ... We also should remember we have always underestimated the progress Saddam has made in development of weapons of mass destruction." - Sen. Jay Rockefeller (D, WV), Oct 10, 2002 "He has systematically violated, over the course of the past 11 years, every significant UN resolution that has demanded that he disarm and destroy his chemical and biological weapons, and any nuclear capacity. This he has refused to do" Rep. - Henry Waxman (D, CA), Oct. 10, 2002 "In the four years since the inspectors left, intelligence reports show that Saddam Hussein has worked to rebuild his chemical and biological weap ons stock, his missile delivery capability, and his nuclear program. He has also given aid, comfort, and sanctuary to terrorists, including al Qaeda members .. It is clear, however, that if left unchecked, Saddam Hussein will continue to increase his capacity to wage biological and chemical warfare, and will keep trying to develop nuclear weapons." - Sen. Hillary Clinton (D, NY), Oct 10, 2002 "We are in possession of what I think to be compelling evidence that Saddam Hussein has, and has had for a number of years, a developing capacity for the production and storage of weapons of mass destruction." - Sen. Bob Graham (D, FL), Dec. 8, 2002 "Without question, we need to disarm Saddam Hussein. He is a brutal, murderous dictator, leading an oppressive regime ... He presents a particularly grievous threat because he is so consistently prone to miscalculation ... And now he is miscalculating America's response to his continued deceit and his consistent grasp for weapons of mass destruction ... So the threat of Saddam Hussein with weapons of mass destruction is real ..." - Sen. John F. Kerry (D, MA), Jan. 23. 2003 On Sat, 15 Jan 2005 18:10:16 -0600 (CST), J.A. Terranson wrote: -- Pete Capelli pcapelli at ieee.org http://www.capelli.org PGP Key ID:0x829263B6 "Those who would give up essential liberty for temporary safety deserve neither liberty nor safety" - Benjamin Franklin, 1759 From rah at shipwright.com Sat Jan 15 16:36:36 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 15 Jan 2005 19:36:36 -0500 Subject: Carnivore No More In-Reply-To: <20050115233150.GA9221@leitl.org> References: <20050115233150.GA9221@leitl.org> Message-ID: At 12:31 AM +0100 1/16/05, Eugen Leitl wrote: >it is believed that unspecified > commercial surveillance tools are employed now. It was always AGGroup's Skyline package to begin with. The FBI is like NASA. They never build anything, and take all the credit. Cheers, RAH ------ -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sat Jan 15 20:16:50 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 15 Jan 2005 23:16:50 -0500 Subject: Driver's license scandals raise national security worries Message-ID: Driver's license scandals raise national security worries By JOHN CHRISTOFFERSEN Associated Press Writer January 15, 2005, 5:30 PM EST BRIDGEPORT, Conn. -- Tracy Lucas-Stevenson earned $40,000 as a state motor vehicle employee, so she raised investiators' eyebrows when an acquaintance said she bragged about buying a Lincoln Navigator, a pool and a new kitchen within a year. What authorities uncovered was a web of illegal immigrants, shady middlemen with names like "Chile" and "El Gordo" and motor vehicle examiners like Lucas-Stevenson who are accused of issuing illegal driver's licenses. Connecticut had developed a reputation from as far away as Florida as a place where people could buy fraudulent driver's licenses for as much as $3,500 without having to produce any identification. DMV workers also took payoffs for stealing the identities of legitimate license holders, police say. Investigators suspect hundreds of licenses were fraudulently issued, sparking worries about illegal immigration, identity theft and even threats to national security. "It's an alarming number, frankly," said prosecutor John H. Malone. "If we find that many so soon in the investigation, I'd be surprised if there weren't more as the investigation progresses." Similar scams have occurred around the country: _ In New Jersey, nine state motor vehicle employees pleaded guilty to a scheme that involved payoffs for bogus licenses. _ In Illinois, a federal investigation into the trading of bribes for driver's licenses led to dozens of convictions and the indictment of former Gov. George Ryan on racketeering and other charges. _ In Virginia, more than 200 people are losing their licenses because of suspected fraud by a former Department of Motor Vehicles worker who allegedly sold licenses for as much as $2,500 each. The federal intelligence overhaul law signed by President Bush last month imposes new standards on information that driver's licenses must contain. Many states, meanwhile, are cracking down by implementing extra measures to get licenses. In North Carolina, new driver's license photos are compared to mug shots of suspected terrorists, while Minnesota is starting to use new technology designed to thwart counterfeiters. The fraud alarms officials amid fears of identity theft and terrorism. Fake ID cards made it possible for the Sept. 11 terrorists to board commercial flights. "The clear and present danger that fraudulent licenses are in the hands of terrorists or anyone who would harm our country requires the strongest possible action," said Connecticut Attorney General Richard Blumenthal. Investigators are working with federal authorities to compare the names on questionable Connecticut licenses with terrorist databases. There have been no matches so far, officials said. State and local authorities have made 10 arrests, including three employees at the Department of Motor Vehicles. More arrests are expected as investigators try to determine if higher ranking DMV employees were involved. "Presumably a superior would have some knowledge of what the subordinates are doing," Malone said. Lucas-Stevenson, who faces forgery charges, declined comment. She has been placed on administrative leave with pay. The other two DMV employees face bribery charges. Investigators also have uncovered the first identity theft cases. A $4,000 line of credit was taken out in the name of Patrick Milling, an assistant principal in Farmington, to buy an expensive watch and diamonds. Another fake ID card was used to withdraw $11,500 from the bank account of a Bristol man. A DMV employee allegedly received an envelope containing $700 for issuing one of the fake ID cards. Authorities also are investigating more than 200 registrations and 18 driver's licenses traced to a business in Danbury that caters to immigrants from Ecuador. Danbury Mayor Mark Boughton said the Fairfield County city is struggling with a wave of illegal immigration. "We're literally being overrun," Boughton said. The scandal prompted Gov. M. Jodi Rell to order the DMV to examine all aspects of licensing. The agency last week announced a plan that includes a reorganization, new technology to prevent fraud and measures designed to tighten internal oversight of how the DMV issues drivers' licenses. "While I know that the vast majority of our employees are honest and committed to integrity, a few abused that public trust," DMV Commissioner Gary DeFilippo wrote in a letter to employees. "However, the severity of the matter has caused us to look at how this problem started and what might be done to prevent reocurrences." Henry William Pardo, a Florida businessman, warned DMV about the problem after he learned that several Brazilians he hired obtained phony licenses in Connecticut. "Every illegal Brazilian person in this country knows about the Connecticut DMV and the person who sells it," Pardo wrote in a letter to DMV a year ago. That left Pardo _ and authorities _ wondering who else might get an illegal license. "Any al-Qaida member could go to the same place, pay his money and obtain a license and go about his business," Pardo said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sat Jan 15 15:31:51 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 16 Jan 2005 00:31:51 +0100 Subject: Carnivore No More Message-ID: <20050115233150.GA9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/15/1424207 Posted by: CowboyNeal, on 2005-01-15 15:03:00 from the calling-it-quits dept. [1]wikinerd writes "FBI has [2]retired the controversial Carnivore software, strongly criticized by privacy advocates for its email capturing abilities. However, it is believed that unspecified commercial surveillance tools are employed now. What does that mean for Internet users' privacy?" [3]Click Here References 1. http://portal.wikinerds.org/ 2. http://www.securityfocus.com/news/10307 3. http://ads.osdn.com/?ad_id=5671&alloc_id=12342&site_id=1&request_id=5016758&o p=click&page=%2farticle%2epl ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From henry at AegisInfoSys.com Sat Jan 15 22:32:46 2005 From: henry at AegisInfoSys.com (Henry Yen) Date: Sun, 16 Jan 2005 01:32:46 -0500 Subject: panix.com hijacked Message-ID: On Sat, Jan 15, 2005 at 10:50:49AM -0500, Perry E. Metzger wrote: > Panix is highly screwed by this -- their users are all off the air, > and they can't really wait for an appeals process to complete in order > to get everything back together again. from panix shell hosts motd: . panix.net usable as panix.com (marcotte) Sat Jan 15 10:44:57 2005 . . Until we resolve the issue of the domain "panix.com", we have set up . the domain "panix.net" to include the same names and addresses as . "panix.com". . . You may use this as a temporary solution for access to mail, webpages, . etc. Wherever you would use "panix.com", you can replace it with . "panix.net". -- Henry Yen Aegis Information Systems, Inc. Senior Systems Programmer Hicksville, New York --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Sun Jan 16 02:28:51 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 16 Jan 2005 02:28:51 -0800 Subject: Searching with Images instead of Words In-Reply-To: References: <20050114140146.54345.qmail@web21204.mail.yahoo.com> Message-ID: <6.0.3.0.0.20050116022753.03a3d6c8@pop.idiom.com> >>Expecting a front view of an image to match with a >>side view of the same image is impossible. They are >>both disjoint sets of information. >> >>If all the images are frontal images, we can match >>them with a hight probability, otherwise I doubt this >>technology has a future. I think it definitely has a future. I'm a bit skeptical about whether it's a _near_ future, though.... It sounds especially possible for specific classes of pictures, such as outdoor locations in major cities. ---- Bill Stewart bill.stewart at pobox.com From christopher.morrow at mci.com Sat Jan 15 23:08:24 2005 From: christopher.morrow at mci.com (Christopher L. Morrow) Date: Sun, 16 Jan 2005 07:08:24 +0000 (GMT) Subject: panix.com hijacked Message-ID: On Sun, 16 Jan 2005 Valdis.Kletnieks at vt.edu wrote: > On Sun, 16 Jan 2005 01:32:46 EST, Henry Yen said: > > > from panix shell hosts motd: > > > > . panix.net usable as panix.com (marcotte) Sat Jan 15 10:44:57 2005 > > So let's see.. the users will see this when they log into shell.panix.net > (since shell.panix.com is borked).. Somehow, that doesn't seem to help much.. > and the hijackers could be, potentially, running a box pretending to be shell.panix.com, gathering userids and passwds :( --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 16 06:40:34 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 16 Jan 2005 09:40:34 -0500 Subject: panix.com hijacked Message-ID: --- begin forwarded text From rah at shipwright.com Sun Jan 16 06:46:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 16 Jan 2005 09:46:28 -0500 Subject: panix.com hijacked Message-ID: --- begin forwarded text From mv at cdc.gov Sun Jan 16 09:57:16 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 16 Jan 2005 09:57:16 -0800 Subject: [IP] No expectation of privacy in public? In a pig's eye! (fwd from dave@farber.net) Message-ID: <41EAAAFC.5AD7D5DE@cdc.gov> At 10:07 AM 1/14/05 -0500, Trei, Peter wrote: >It would take some chutzpa, but tacking onto a cops >car would send a message.... Too easy. 5 points for adding to cop's personal car 10 points for adding to cop's spouse's personal car 20 points for adding to cop's mistress' personal car Not sure about point assignments for adding to cop's offspring's car adding to cop's offspring's teacher's car From mv at cdc.gov Sun Jan 16 10:00:38 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 16 Jan 2005 10:00:38 -0800 Subject: US slaps on the wardriver-busting paint Message-ID: <41EAABC6.382618E3@cdc.gov> At 09:35 AM 1/14/05 -0500, R.A. Hettinga wrote: >It only remains for us to say that DefendAir costs a cool $69 per gallon >(US gallon, presumably). How much is the TV tax in the UK? How long to pay off the costs of paint to hide one's IF oscillator from the White Vans? Surprising that the Register didn't pick up on this. The Al foil over the windows and screen over the appliance-vents might be telling. Otherwise its a waste of paint. And haven't these paint-scammers heard of foil-backed insulation? From jamesd at echeque.com Sun Jan 16 10:32:30 2005 From: jamesd at echeque.com (James A. Donald) Date: Sun, 16 Jan 2005 10:32:30 -0800 Subject: Feral Cities In-Reply-To: Message-ID: <41EA42BE.32131.717FE43@localhost> -- > Feral cities would exert an almost magnetic influence on > terrorist organizations. Such megalopolises will provide > exceptionally safe havens for armed resistance groups, > especially those having cultural affinity with at least one > sizable segment of the city's population. Yet Mogadishu did *not* provide an exceptionally safe haven for terrorists On the contrary, terrorists hang out where there are strong governments to protect them, extremely strong governments, govenments that attempt to exercise totalitarian control over every aspect of every person's life, speech, and thought. They hung out in Taliban Afghanistan, and today they hang out in Syria. Terrorists, as we discovered in Afghanistan, tend to piss people off. They need a government that is strong enough to intimidate the locals to refrain from killing them. This hand wringing about failed states is nonsense. We would be a lot better off if more regimes failed - starting with Saudi Arabia, which is at present walking both sides of the road on terror, and speaking out of both sides of its mouth. We should send arms to those that hate the current Saudi regime - and worry which of those who received our arms are good guys and which are bad guys after the regime falls. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG lYYew1mXLqlqClNWre3iWNTQSdUjC3dM+wojwWKP 4ZzkUnYtfu/tX/c5VsLePUrbbJ15Ww5uBlRvLj+Ut From jamesd at echeque.com Sun Jan 16 10:42:45 2005 From: jamesd at echeque.com (James A. Donald) Date: Sun, 16 Jan 2005 10:42:45 -0800 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: Message-ID: <41EA4525.30997.72161A4@localhost> -- > For these reasons it seems to us that military planners and > decision makers should be interested in considering new > approaches toward aiding failing and faltering states. 4 > > [...]The cure they propose is "conservatorship," under which > the United Nations would directly supervise or actually take > over the government of a failed state until it became fully > capable of administering its own affairs. 7 U.S. military and > political leaders should immediately understand, these > authors warn, that such a conservatorship would inevitably > involve American military participation in some form or > another. Oh wow, let us expand our current highly popular and successful Iraqi operation to embrace a quarter of the world. Wouldn't it be nice? No, come to think of it, it would not be nice. The problem is not failed states. The problem is states like North Korea, Syria, Iraq, and Saudi Arabia, which are not failing, but damn well should. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG KZbrHZ/MYP584OnYd7NsjZjmUpn8Srn0ydIoe269 4ATqczLXXya6Ei6jVdqfx7nHh1/Fdp6s6+VCLrdwO From mv at cdc.gov Sun Jan 16 11:59:22 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 16 Jan 2005 11:59:22 -0800 Subject: Feral Cities Message-ID: <41EAC79A.615695BC@cdc.gov> At 10:32 AM 1/16/05 -0800, James A. Donald wrote: >Terrorists, as we discovered in Afghanistan, tend to piss >people off. They need a government that is strong enough to >intimidate the locals to refrain from killing them. Since when did a few remote Al Q boot camps piss people off? Religion-based initiation of force pisses people off, just as the Xian right will discover should it start beating women in the streets. Don't confuse the govt (eg Taliban, a faith-based organization) with NGOs which may attract cruise missiles, but not hostility from the populace, who probably enjoyed the extra commerce. From bill.stewart at pobox.com Sun Jan 16 12:38:39 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 16 Jan 2005 12:38:39 -0800 Subject: US slaps on the wardriver-busting paint In-Reply-To: <41EAABC6.382618E3@cdc.gov> References: <41EAABC6.382618E3@cdc.gov> Message-ID: <6.0.3.0.0.20050116122814.03a59240@pop.idiom.com> At 10:00 AM 1/16/2005, Major Variola (ret) wrote: >At 09:35 AM 1/14/05 -0500, R.A. Hettinga wrote: > >It only remains for us to say that DefendAir costs a cool >$69 per gallon (US gallon, presumably). > >How much is the TV tax in the UK? How long to pay off the costs of >paint to hide one's IF oscillator from the White Vans? You weren't reading the "how it works" description carefully. It works by blocking RF, so if you put enough paint on to block outgoing RF from your IF oscillator, you'll also block incoming RF headed for your tuner, unless your TV set does a good job of isolating the IF from the antenna. Similarly, if it's doing a good enough job of blocking RF to keep 802.11 WLANs from getting out, it's also keeping cell phone signals from getting in. RF is surprisingly leaky stuff. Back when I ran a TEMPEST-shielded room, we'd find easily-measurable leaks if the copper-wool filler in the joints wasn't packed tightly, or if we stuck a paper clip in one of the fiber-waveguide holes. We were measuring at 450 MHz, which was a really high frequency for the mid 1980s when computers ran at 10 MHz, and our room was about 120 dB tight when everything was working. Looks like the tax is UKP 116, so if the paint is only sold in whole gallons, and the white vans come around monthly to test, it could pay off in 3-4 months if it worked, except that it probably won't work. ---- Bill Stewart bill.stewart at pobox.com From jya at pipeline.com Sun Jan 16 16:01:17 2005 From: jya at pipeline.com (John Young) Date: Sun, 16 Jan 2005 16:01:17 -0800 Subject: US slaps on the wardriver-busting paint In-Reply-To: <6.0.3.0.0.20050116122814.03a59240@pop.idiom.com> References: <41EAABC6.382618E3@cdc.gov> <41EAABC6.382618E3@cdc.gov> Message-ID: The paint sounds like yet another sting operation to catch the goofuses who think they can hide RF on the cheap. The folks on the TSCM-L list think the paint is pure snake oil, that the electrophysics of it are crap. Still, phony Tempest protection is a pretty good business, no doubt promoted by the spooks who get better results from signals calling attention to themselves by way of half-assed protection: -- here, look at me trying to shield my nonsense. Several US companies have done quite well selling so-called NSA-grade Tempest protection, even requiring an export license for the hoakum, in cahoots with the agency which welcomes the pointers to users. Joel McNamara's Tempest site has a several references to RF snake oil, some of which appears to be honeypot-grade. Relatedlhy, we assume that the only reason NSA released to us a batch of Tempest docs was to promote the sale of weak systems. Docs which describe the truly good protection have never been released, presuming there is such high-quality of RF security. Tempest could be a diversion from more intricate and interception. Over-confidence in a security system is a bellweather for successful attack. Someday, now 5 years and counting, we hope to get NSA FOI docs on the Brit's Non-Secret Encryption which allegedly was invented before the PK if Diffie Hellman Merkle, and whether any of that pre-PK information was leaked so that DHM could access it, by guile or by accident, NSA by then having developed a crack, and set in motion the faith-based use of "unbreakable" public crypto. From jamesd at echeque.com Sun Jan 16 17:43:54 2005 From: jamesd at echeque.com (James A. Donald) Date: Sun, 16 Jan 2005 17:43:54 -0800 Subject: Feral Cities In-Reply-To: <41EAC79A.615695BC@cdc.gov> Message-ID: <41EAA7DA.12473.8A34B10@localhost> -- James A. Donald: > > Terrorists, as we discovered in Afghanistan, tend to piss > > people off. They need a government that is strong enough to > > intimidate the locals to refrain from killing them. "Major Variola (ret)" > Since when did a few remote Al Q boot camps piss people off? Al Quaeda's job in Afghanistan was to perform the massacres that the Taliban could not trust Afghan troops to do. As reward, they got to do lots of rape. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG XS+RbeI9x56+eGEJSL0XpRb/V4lhlvJ+9hIFdozX 4U+LELZqarYEsN76W5PxOcuYS8LCrTCW7z5upagAP From measl at mfn.org Sun Jan 16 20:31:05 2005 From: measl at mfn.org (J.A. Terranson) Date: Sun, 16 Jan 2005 22:31:05 -0600 (CST) Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: <41EA4525.30997.72161A4@localhost> References: <41EA4525.30997.72161A4@localhost> Message-ID: <20050116222808.C188@ubzr.zsa.bet> On Sun, 16 Jan 2005, James A. Donald wrote: > Oh wow, let us expand our current highly popular and successful > Iraqi operation to embrace a quarter of the world. Wouldn't it > be nice? No, come to think of it, it would not be nice. Since Mein Fuhrer Bush is preparing to escalate to Iran in a few months, you'd better get used to it. > The problem is not failed states. The problem is states like > North Korea, Syria, Iraq, and Saudi Arabia, which are not > failing, but damn well should. No. The problem is states like the US who should keep their fascist noses out of other states business. Let those states rise or fall on their own merits or demerits, but allow nature to take it's course. It's not our place to be decisiding what is an appropriate government for others. Hell, we can't even figure out what's appropriate *here*. > --digsig > James A. Donald -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner From pcapelli at gmail.com Sun Jan 16 20:55:56 2005 From: pcapelli at gmail.com (Pete Capelli) Date: Sun, 16 Jan 2005 23:55:56 -0500 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: <20050116222808.C188@ubzr.zsa.bet> References: <41EA4525.30997.72161A4@localhost> <20050116222808.C188@ubzr.zsa.bet> Message-ID: On Sun, 16 Jan 2005 22:31:05 -0600 (CST), J.A. Terranson wrote: > Since Mein Fuhrer Bush is preparing to escalate to Iran in a few months, > you'd better get used to it. It's interesting you called him that, given your next statement. > No. The problem is states like the US who should keep their fascist noses > out of other states business. Let those states rise or fall on their own > merits or demerits, but allow nature to take it's course. It's not our > place to be decisiding what is an appropriate government for others. > Hell, we can't even figure out what's appropriate *here*. Isolationism didn't work 70 years ago; what makes you think it will work better in this new age of globalism? -- Pete Capelli pcapelli at ieee.org http://www.capelli.org PGP Key ID:0x829263B6 "Those who would give up essential liberty for temporary safety deserve neither liberty nor safety" - Benjamin Franklin, 1759 From jamesd at echeque.com Mon Jan 17 12:02:29 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 17 Jan 2005 12:02:29 -0800 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: <20050116222808.C188@ubzr.zsa.bet> References: <41EA4525.30997.72161A4@localhost> Message-ID: <41EBA955.29560.1250522@localhost> -- James A. Donald wrote: > > Oh wow, let us expand our current highly popular and > > successful Iraqi operation to embrace a quarter of the > > world. Wouldn't it be nice? No, come to think of it, it > > would not be nice. "J.A. Terranson" > Since Mein Fuhrer Bush is preparing to escalate to Iran in a > few months, you'd better get used to it. After the unpleasant experience of nation bulding in Iraq, I hope that for the next round, he will stick to nation destruction. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG wgw43gq8A2g53kCdBjoluX54Qwjxi4g0gYergxL2 4ZpJWmU7pyS7BAOC50oFHVaTl4jAtT7gJJlwH4E14 From rah at shipwright.com Mon Jan 17 10:46:59 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 13:46:59 -0500 Subject: [osint] Women must remove veils in court Message-ID: --- begin forwarded text To: "Bruce Tefft" Thread-Index: AcT8kVM6uKgN+znER4yfU7/dhANxFQADXdMw From: "Bruce Tefft" Mailing-List: list osint at yahoogroups.com; contact osint-owner at yahoogroups.com Delivered-To: mailing list osint at yahoogroups.com Date: Mon, 17 Jan 2005 09:16:05 -0500 Subject: [osint] Women must remove veils in court Reply-To: osint at yahoogroups.com Women must remove veils in court >From correspondents in Auckland January 17, 2005 A MUSLIM woman who said she would rather die than show her face in public must remove her veil while giving evidence in a trial, a New Zealand court ruled today. The Auckland District Court ruled that Fouzya Salim, a witness in a fraud case, and another Muslim woman must show their faces to the judge, lawyers and female court staff but can be concealed from public view, Radio New Zealand reported. The women had been fighting since last year a defence lawyer's application to have their veils lifted in court so their demeanour could be assessed. The Afghanistan-born Ms Salim, who has lived in New Zealand for 10 years, has never left her house without wearing a traditional burqa, which covers the entire body. Today the court ruled that while it could be a fair trial even if the women wore burqas, the defendant had a legitimate expectation of trial by the normal process. The decision said screens and other measures would be used in court to protect the women from further public view. The ruling only applied to the case in question. Last October Ms Salim told the court: "I don't want to show my face in public ... I would rather kill myself than uncover my face and sit here. If I uncover my face then I would be in trouble with God." Defence lawyer Colin Amery said he was "reasonably happy" with the decision, NZPA reported. "It's a partial victory for the New Zealand way of doing things and our justice system," he said. AAP [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> DonorsChoose. A simple way to provide underprivileged children resources often lacking in public schools. Fund a student project in NYC/NC today! http://us.click.yahoo.com/EHLuJD/.WnJAA/cUmLAA/TySplB/TM --------------------------------------------------------------------~-> -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-osint at yahoogroups.com. -------------------------- Brooks Isoldi, editor bisoldi at intellnet.org http://www.intellnet.org Post message: osint at yahoogroups.com Subscribe: osint-subscribe at yahoogroups.com Unsubscribe: osint-unsubscribe at yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: osint-unsubscribe at yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 17 10:49:45 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 13:49:45 -0500 Subject: Texas Instruments to Deliver RFID Solution for MasterCard PayPass Message-ID: Yahoo! Finance Search - Finance Home - Yahoo! - Help Financial News Enter symbol(s) Symbol Lookup Press Release Source: Texas Instruments Texas Instruments to Deliver RFID Solution for MasterCard PayPass Monday January 17, 10:00 am ET DALLAS, Jan. 17 /PRNewswire/ -- Texas Instruments today announced plans to deliver ISO/IEC 14443 compliant radio frequency identification (RFID) chips designed to meet the stringent security requirements for MasterCard International's PayPass(TM) line of RFID payment cards and tokens. TI expects to submit this product for MasterCard certification in the second quarter of 2005. Full production is planned to start in the second half of this year TI's new 13.56 MHz RFID chip is the latest to be introduced in a series of solutions based on the company's ISO/IEC 14443 technology platform. This proven platform features products with universally accepted and standardized cryptography, using National Institute of Standards and Technology (NIST) approved crypto algorithms, including Triple DES and SHA-1. The ISO/IEC 14443 standard allows for this increased level of security because it supports significantly faster rates of data exchange (up to 848 kbits per second), enabling more complex security information to be passed between an RFID card and reader without affecting the user's experience. As an added feature, read ranges for products based on the ISO/IEC 14443 platform are also limited to 4 centimeters (roughly 1.5 inches), further increasing the security of the transaction. As credit and bank card issuers expand pilots throughout the United States and into other countries, the opportunity for TI to serve this market with its secure ISO/IEC 14443 solutions is significant. The December 2004 Nilson Report indicates that payment card manufacturers shipped 4.38 billion units to card issuers (Visa, MasterCard, American Express, Diners Club, Discover, JCB, and ATM cards) and retailers (both credit and pre-paid cards) in 2003. In the first half of 2004, MasterCard's customer financial institutions worldwide had issued more than 627.5 million MasterCard-branded cards, a 6.6% increase over the same period in 2003, according to an August 2004 MasterCard press release. "The financial services industry recognizes that ISO/IEC 14443-based RFID solutions provide the stringent levels of security required for conducting payment transactions," said Shawn Rogers, director, wireless commerce and Tag- it(TM) products, Texas Instruments RFid Systems. "With our heritage in pioneering technologies in new markets, we're working with leading bank card issuers and credit card companies to bring these highly reliable and secure RFID solutions to this market." About Texas Instruments Texas Instruments is the world's largest integrated manufacturer of radio frequency identification (RFID) transponders and reader systems. Capitalizing on its competencies in high-volume semiconductor manufacturing and microelectronics packaging, TI is a visionary leader and at the forefront of establishing new markets and international standards for RFID applications. For more information, contact TI-RFid Systems at 1-888-937-6536 (North America) or +1 972-575-4364 (International), or visit the Web site at http://www.ti-rfid.com. Texas Instruments Incorporated provides innovative DSP and analog technologies to meet our customers' real world signal processing requirements. In addition to Semiconductor, the company's businesses include Sensors & Controls, and Educational & Productivity Solutions. TI is headquartered in Dallas, Texas and has manufacturing, design or sales operations in more than 25 countries. Texas Instruments is traded on the New York Stock Exchange under the symbol TXN. More information is located on the World Wide Web at http://www.ti.com. Source: Texas Instruments -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 17 12:33:46 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 15:33:46 -0500 Subject: Internet noise threatens emergency radio Message-ID: Wherein we all might tempest-up in spite of ourselves? Cheers, RAH ------- New Scientist Internet noise threatens emergency radio 10:31 14 January 2005 Exclusive from New Scientist Print Edition Barry Fox Enlarge image Short-wave interference After the tsunami hit Sri Lanka on 26 December, Victor Goonetilleke, head of the island's amateur radio society, delivered a short-wave radio set and two 12-volt car batteries to the prime minister's emergency headquarters in Colombo. At the same time, three of his friends drove through the devastation to Hambantota, on the hard-hit south-east coast, where they set up another battery-powered short-wave radio. For two days, while the military struggled to restore electricity supplies and phone lines, the prime minister was able to use the short-wave link to talk to staff on the ground. Short-wave signals from Sri Lanka, the Andaman Islands and mainland India also helped to spread news of the disaster around the world. The same happened after the 9/11 attacks and last year's hurricanes in the Caribbean. When phones and mains electricity are down, making the internet unusable, short-wave radio enthusiasts are able to maintain emergency communications. But not, perhaps, for much longer. Plans to deliver broadband internet signals to homes and businesses down mains electricity cables, rather than telephone lines, could cause interference that will drown out the faint signals from distant short-wave transmitters. Unshielded cables Power companies in the US and Europe are pressing ahead with the technology, with the aim of setting up in competition to existing phone-based services. The downside is that the packets of internet data pulsing down unshielded mains cables makes the cables behave like aerials that send short-wave interference beaming out over a wide area. Unless interference of this kind is tightly controlled, it could spell the end for emergency short-wave communications. "A few extra decibels of interference from future networks and I would not have been able to hear the news from amateurs in Sri Lanka, India and the Andaman Islands," says Hilary Claytonsmith of the International Amateur Radio Union's UKbranch. The threat began when the US government gave the go-ahead to broadband over power line (BPL) technology in October. And the European Commission (EC) is close to approving its own version, called power-line communications (PLC). The names are different but the technology is the same: broadband data is sent into people's homes as a high-frequency signal piggybacked on the 50 or 60-hertz mains supply. Unhappy coincidence Because the mains is a noisy environment with ever-changing patterns of interference from sockets, switches, control circuits and electric motors in appliances, the power-line data must be spread over many high-frequency carrier signals if it is to be delivered at the 5 to 10 megabits per second that these services are aiming for. The carrier frequencies used range up to 30 megahertz - which by unhappy coincidence is the radio band that travels best around the world. It is used for amateur radio, short-wave broadcasting (such as the BBC World Service and Deutsche Welle) and includes several dedicated emergency frequencies (see graphic). Because these frequencies bounce off the ionosphere, they carry long distances, which makes them ideal for long-range intercontinental broadcasting. When the US Federal Communications Commission (FCC) gave the go-ahead to BPL, it ruled that at frequencies up to 80 megahertz service providers must use filters on their household equipment. These could be set by a service engineer to chop out any internet transmission frequencies shown to be causing interference to any short-wave radio receivers nearby. The EC and the European Committee for Electrotechnical Standardisation (CENELEC) are trying to set similar filtering rules. Deciding on importance But radio amateurs fear that the rules will allow the filtering to be lifted if it is having a serious effect on internet access speeds. The EC says it wants firm rules that balance "technical, social and economic" factors against the "importance" of services which suffer interference. But who is to decide what is more important, and on what grounds, the radio amateurs ask. Michael Copps, the one FCC commissioner who opposed BPL, believes the organisation has made a rod for its own back. It is going to have to "work hard to monitor, investigate and take quick action" over any power-line internet interference to radio amateurs and others, he says. Some technical fixes may be in the works though. The BBC, for instance, is developing a PLC modem that makes use of the fact that the short-wave frequencies for broadcast radio change throughout the day, as ionospheric conditions dictate. The BBC modem detects which frequency bands are in use at any one time - and filters them out. Such technology is not part of any PLC or BPL system currently in trials, however. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 17 12:41:03 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 15:41:03 -0500 Subject: Emergency Interoperability Consortium Announces Agreement With Department Of Homeland Security Message-ID: Directions Magazine Your GIS News Source EMERGENCY INTEROPERABILITY CONSORTIUM ANNOUNCES AGREEMENT WITH DEPARTMENT OF HOMELAND SECURITY TO PROMOTE DATA SHARING DURING January 17, 2005 Company: E Team, Inc. Industry: Homeland Security Location: Washington, DC, United States of America Groundbreaking public/private sector alliance will promote the development of standards for sharing emergency response information WASHINGTON, D.C.--The Emergency Interoperability Consortium (EIC) announced that it has signed a Memorandum of Agreement (MOA) with the Department of Homeland Security (DHS) to promote the development and proliferation of data sharing standards for emergency response. Thought to be the first of its kind between DHS and a non-government entity, the agreement establishes an alliance between the organizations to jointly promote the design, development, release, and use of XML standards to help solve data sharing problems commonly encountered during emergency operations. The initial term of the agreement is three years. "This DHS/EIC alliance is an important step towards realizing the potential of a public/private partnership to rapidly develop and proliferate valid and commercially sustainable interoperability standards," commented Matt Walton, EIC chairman and vice chairman and founder of E Team, Inc., a Los Angeles-based manufacturer of crisis management software. "Removal of the barriers that currently hinder data sharing in emergencies will benefit everyone involved - from the government agencies that work to secure our nation against potential threats to first responders in the field and the people they assist." Initial collaborative efforts between DHS and EIC have already borne fruit in the release in 2004 of the Common Alerting Protocol (CAP), the first data standard for sharing alert information between dissimilar systems. The next generation of data sharing standards, being developed with the leadership of emergency response organizations, is called Emergency Data Exchange Language (EDXL). It goes beyond alerting to address the routing and substance of a wide variety of interagency emergency messaging. The first of these, a common "header" for routing emergency messages, has been passed from EIC with DHS concurrence to the OASIS formal standards development organization. This EDXL routing tool was first trialed passing messages among ten different emergency communications products in a demonstration at George Washington University sponsored by EIC, DHS, and others late in 2004. Steve Cooper, the DHS Chief Information Officer and signatory on the MOA with EIC, was the keynote speaker at the demonstration. Barry West, the CIO of the Federal Emergency Management Agency (FEMA), also signed the MOA. "The Department of Homeland Security is pleased to have established an alliance with EIC to promote the rapid development of both valid and commercially sustainable standards to share data between all levels of the emergency response community," said Gordon Fullerton, executive sponsor of the Disaster Management Program of DHS. "Based on the early success of CAP, we are committed to working with emergency response practitioners, EIC, the OASIS Technical Committee, and others to produce multiple standards in the coming year that will make it possible to get critical emergency data to those that need it." The Memorandum of Agreement provides for a collaborative process to improve information sharing capabilities to protect the nation and its citizens from the consequences of disasters and other emergencies, regardless of cause. It encourages broad-based participation in the design, development, acceptance, and use of XML standards to enable emergency organizations to receive and share data in real time. EIC and DHS are to work together to educate federal, state, local, and tribal governments, the media, citizens, and industry on the meaning and importance of data sharing within the emergency response communities, and to promote innovation and collaboration in these communities around open architectures and standards. By working together, both DHS and EIC believe that government and industry can more quickly and cost-effectively bridge the data sharing gap between organizations that must be able to interoperate in response to the natural and man-made hazards that form the core of the DHS mission. After an initial term of three years, the agreement can be renewed for additional two-year periods. "Data interoperability is at the heart of effective response," said Richard Taylor, chairman of the safety non-profit ComCARE Alliance, and 9-1-1 director for the State of North Carolina. "We are delighted at the effective and cooperative way EIC and this DHS program are engaging our emergency response members in rapidly developing common standards." ComCARE is represented on EIC's Board. About EIC The Emergency Interoperability Consortium (EIC) was launched in October 2002 to address the nation's lack of consistent technical interoperability and standards for emergency and incident management. Now comprised of over 50 private entities, public agencies, university groups, and non-profit organizations, EIC promotes the development and adoption of standards for using Web services, Extensible Markup Language (XML), and existing exchange protocols that support the timely and accurate exchange of incident information throughout the emergency response communities. For more information on EIC, see www.eic.org, or contact Matt Walton at matt.walton at eic.org or 818-932-0660 ext. 204. Contact: Dina Frale, 818-932-0660 x207, media at eteam.com Matt Walton (matt.walton at eic.org) Phone: 818-932-0660 ext. 204 -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 17 13:34:07 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 16:34:07 -0500 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: <41EBA955.29560.1250522@localhost> References: <41EA4525.30997.72161A4@localhost> <41EBA955.29560.1250522@localhost> Message-ID: At 12:02 PM -0800 1/17/05, James A. Donald wrote: >After the unpleasant experience of nation bulding in Iraq, I >hope that for the next round, he will stick to nation >destruction. Amen. All we really needed was a quick fly-by and reformat, and let Allah sort 'em out, on a grand tour of the um, holy land. Next stop Syria, Iran, etc. Oh, well. Dance with the statist girl who brung ya, and all that. Rummy saw the wisdom of 's plan, but couldn't quite sell it to the Generals-that-be. Tommy had only a small sip of the Kool-Aide, and apparently, but tried to cut it with a whole *vat* full of tanker-piss... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jya at pipeline.com Mon Jan 17 16:44:48 2005 From: jya at pipeline.com (John Young) Date: Mon, 17 Jan 2005 16:44:48 -0800 Subject: Homeland Security Operations Morning Briefs In-Reply-To: Message-ID: Homeland Security Operations Morning Briefs For Official Use Only http://cryptome.org/hsomb/hsmob.htm Samples: ----- Homeland Security Information Network Request for Information (RFI) 1. (FOUO) VIRGINIA: Larceny From Police Officers Private Vehicle Results in Stolen Police Identification Card, Badge, Two Loaded Magazines, and Two Handguns. According to a RFI from the Danville Police Department (DPD), on 23 December, Larceny from a police officers personal vehicle resulted in the following stolen items:  City of Danville Virginia police Identification card in the name of William Henry Chaney  One Silver police badge issued by the city of Danville Police Department  One Silver police badge issued by Pittsylvania County Sheriff's Office (Virginia)  One Glock Model 22, 40 caliber handgun with a Lasermax laser sight mounted on the weapon (serial nr: 879US)  Two loaded magazines  One .38 Caliber Taurus brand handgun with a blue finish  Miscellaneous keys and Panasonic recorder This information was provided in conjunction with a Homeland Security request to Law Enforcement Agencies to provide information that may effect the 2005 Presidential Inauguration. The weapons have been entered into NCIC. This information has been broadcasted to the Eastern seaboard by the Danville Police Department. Immediately, contact the DPD at P.O. Box 3300, Danville, Virginia 24543 and/or at telephone number (434)799-6510 with any information. (Patriot Report: DPD, 24 December 04; HSOC 4897-04) ----- 7. (FOUO) MARYLAND: Suspicious Individual with Various Weapons and a Photo of Air Force One. According to Montgomery County Police Department (MCPD) reporting, on 16 December, a U.S. named individual called the MCPD claiming a weapon had been stolen from his home by federal law enforcement agents conducting a covert operation in his home. A few moments later the individual called back to say he had found the weapon behind his couch. Officers continued to the home to ensure it had not been broken into. The individual allowed the officers into his residence. The officers observed numerous weaponry items throughout the home, to include various IEDs and other suspicious items, such as a Police SWAT Raid jacket, military uniforms, camouflage attire, and various wigs and numerous boxes of hair dye. Officers also recovered two bags that were converted in a way to conceal fire weapons: the first was a computer bag with a U.S. express mail company box inside and holes in front that allowed a gun muzzle to fit and a slit that allowed a hand to be inserted to fire the weapon; the second item was a tennis racket bag converted to hold an M-16 rifle. The individual also had a large amount of paraphernalia and information related to the assassination of JFK as well as photos of Air Force One. The individual claimed the photos of Air Force One were taken when the plane flew over his residence. The individual is in currently in custody and an investigation is on-going. (MCPD; HSOC 4808-04) ----- From rah at shipwright.com Mon Jan 17 14:42:35 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 17:42:35 -0500 Subject: Spotting Trouble Identifying Faltering and Failing States (1997) In-Reply-To: References: <41EA4525.30997.72161A4@localhost> <41EBA955.29560.1250522@localhost> Message-ID: At 4:34 PM -0500 1/17/05, R.A. Hettinga wrote: >Tommy had only a small sip of the Kool-Aide, and >apparently, ^h ^^^^^^^^^^^^^^saw the colors... > but tried to cut it with a whole *vat* full of tanker-piss... I hate it when that happens... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 17 16:55:39 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 17 Jan 2005 19:55:39 -0500 Subject: ShmooCon. 2005. No moose. We swear. Message-ID: Day 1 - Feb 4 Time "Break It!" "Build It!" "BoF It!" 1500 Registration 1600 "Opening Remarks, Yet-Another-Rant, and Your Pre-Con Pep-Talk" Bruce Potter The Shmoo Group 1700 "IDS Gone Bad" Cazz The Shmoo Group 1800 "The Clue Enforcers" Rodney Thayer The Shmoo Group 1900 Hack or Halo Preview 2000 " " 2100 " " Day 2 - Feb 5 Time "Break It!" "Build It!" "BoF It!" 0800 Registration 0930 Keynote Riley "Caezar" Eller CoCo Communications Corp. 1000 TBA Dan Kaminsky Avaya "Linksys WRT54G / WRT54GS 'Magical transformation into a useful piece of equipment or a brick'" Sysmin and Quigon "Low-Latency Anonymizing Networks" BoF Roger Dingledine Tor 1100 "Ph0wned: Phreaking in the 21st Century" Lance James Secure Science Corporation and Lucky225 "Automated WarSpying" Frank "Thorn" Thornton "Practical Privacy and Anonymity for Hackers" BoF Simple Nomad 1200 Lunch Break 1300 "The Secret Lives of Photons" Abaddon "CUTLASS - Encrypted, Peer-to-Peer Communications for Everyone" Todd MacDermid, Jack Lloyd, Kathy Wang, and Nash Foster Syn Ack Labs "Avoiding the Mis-management of Patch Management" BoF Tina Bird InfoExpress 1400 "Old Skewl Hacking: Infra Red - MMIrDA (Major Malfunction's Infra Red Discovery Application)" Major Malfunction "Reconstructing Root Fu; A post-mortem" Peter "Divide" Zdebski Ghetto Hackers "Information wants to be free, but programmers want to eat." BoF Jon Callas PGP Corporation 1500 "Frustrating Automated Static Analysis of Binaries" Pusscat Ghetto Hackers "Design and Implementation of a Wireless IDS" Laurent Butti and Franck Veysset France Telecom "Quantitative Risk Assessments - possible or crack dream?" BoF Toby Kohlenberg Intel Corporation 1600 "/applied cryptography/? oh, i skimmed through that book once." Seth Hardy "High-Speed Computing & Co-Processing with FPGAs" h1kari Dachb0den Research Labs "Reverse Engineering for Fun and BoF It!" BoF Chris Eagle Naval Postgraduate School 1700 Dinner Break 1800 Hack or Halo Sign-Up On-Site BoF #1 1900 " " Sign-Up On-Site BoF #2 2000 " " Sign-Up On-Site BoF #3 2100 2200 Speaker Party 2300 " " Day 3 - Feb 6 Time "Break It!" "Build It!" "BoF It!" 0900 "Binary Difference Analysis via Phase Cancellation" Joe Stewart and Mike Wisener LURHQ "The Warpack: perverting wearable computing on a budget" RenderMan "Lockpicking 101" BoF Deviant Ollam 1000 "Automated Blind SQL Exploitation" Nummish "Building Target-based IDS: Snort on the Move" Martin Roesch Sourcefire "Evidence-based Security Assessment" BoF Crispin Cowan, Adam Shostack, Al Potter, and Ed Reed 1100 "Google Hacking" Johnny Long "Intrusion Prevention and Application Security: The Good, The Bad, and the Ugly" Crispin Cowan Immunix "Zen and The Relevance of Perception to Cyber Security, or, When is a Network Not a Network?" BoF Richard Thieme 1200 "The Evils of XSS: Its not just for cookies anymore" Anton Rager "Trike's Automatic Threat Generation" Brenda "0wn the C0n!" BoF Beetle The Shmoo Group 1300 "Closing Remarks, and Your Last Chance to Throw Shmooballs" Bruce Potter The Shmoo Group news about registration cfp program schedule location sponsors links contact us . privacy policy )2004, The Shmoo Group -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From barnesc at engr.orst.edu Mon Jan 17 22:15:33 2005 From: barnesc at engr.orst.edu (barnesc at engr.orst.edu) Date: Mon, 17 Jan 2005 22:15:33 -0800 Subject: [i2p] Tunnel cryptography for I2P 0.5 (corrected typo) Message-ID: Citizens of I2P, The following is a discussion of tunnel cryptography plans for I2P 0.5. There are two options; one will be chosen. [1] and [2] offer more complete discussion of these plans. Note that the cryptographic methods discussed in [2] are incomplete. They are complete in this message. - Connelly ---------------------------------------------------------------------- Tunnel cryptography for I2P 0.5 ---------------------------------------------------------------------- Currently when I2P 0.4.x passes an (end-to-end encrypted) message M down a tunnel, it is easy for two attackers in different locations of the tunnel to observe the same message M. This makes I2P highly vulnerable to the predecessor attack. Can this situation be improved? The best implementations we currently know of fit in two categories, and use symmetric cryptography. The categories are: 1. The inbound tunnel gateway knows all symmetric private keys used by other hops in the tunnel. The outbound tunnel endpoint knows only its own symmetric private key. Messages are checksummed to prevent modification. Pros: Tagging attacks are defeated. Cons: Attacking an N-length inbound tunnel won't be much harder than attacking a 2-length inbound tunnel. If the gateway is malicious, then the gateway can collude with a malicious hop at any other position in the tunnel; thus the two can identify that they are in the same tunnel. => Predecessor attack. This was one plan by jrandom. A proposed implementation is given [1]. This implementation could be subject to tagging attacks in certain cases. I have a revised scheme in mind that may be safe from these attacks. 2. The inbound tunnel gateway has only its own symmetric private key. Likewise for the outbound tunnel endpoint. No messages are checksummed in the tunnel. All messages have the same size in the tunnel to prevent tagging. Synchronized PRNGs may be used as described at [2] to help prevent tunnel loops (where an attacker DoSes several peers by placing them a "looped" tunnel). Pros: Attacking an N-length inbound tunnel is not easy (one must do timing or message counting analysis). Cons: Tagging (this can be done, but not detected), tunnel loops can be created, extra packets can be generated within the tunnel. This plan was originally drafted in [2] based on a discussion by jrandom and ???. However, this document has pending modifications because it is not a complete cryptosystem. A full implementation plan is appended to the end of this document, based on a discussion by jrandom and Connelly. One of these options will (presumably) be used in I2P 0.5. If you discover a flaw or improvement for either implementation, let us know. If you have other useful input, drop by IRC or post a message to this maillist. We have not found a complete cryptographic analysis for either option. We are using standard cryptographic primitives and methods when possible. Option 2 is known as a "non-checksummed tunnel." ---------------------------------------------------------------------- Proposed Implementation (non-checksummed tunnels) ---------------------------------------------------------------------- Leaving out the PRNGs. As part of a tunnel, we receive and send messages which contain {preIV, payload}. Here preIV is a single block from which the initialization vector (IV) is derived, and payload is a sequence of blocks containing the message which is being delivered down the tunnel. Here 'block' is any string which the symmetric block cipher can operate on. The preIV and the payload are successively wrapped in layers of encryption as a message travels down an inbound tunnel, and messages are successively unwrapped for outbound tunnels. Encryption at hop i: 1. Drop packet (with warning) if we've seen preIV before for a previous message in this tunnel [3]. 2. IV := hash(preIV + hop i's secret key 1) 3. preIV := ecb_encrypt(preIV, hop i's secret key2) 4. payload := cbc_encrypt(payload, hop i's secret key3, IV) 5. Return {preIV, payload}. Decryption at hop i: 1. preIV := ecb_decrypt(preIV, hop i's secret key2) 2. IV := hash(preIV + hop i's secret key1) 3. payload := cbc_decrypt(payload, hop i's secret key3, IV) 4. Return {preIV, payload}. Inbound tunnel: * Message M arrives at the inbound gateway, aka hop 1. * Hops 1, 2, ..., N successively encrypt. * We are the tunnel endpoint, and we have everyone's secret keys, so we can use decrypt(N), decrypt(N-1), ...decrypt(1) to unwrap the encryption made by others. We recover message M. Outbound tunnel: * We have a message M we want to send. * We are the tunnel creator, so we have everyone's secret keys. We build M* by doing encrypt(N), encrypt(N-1), ..., encrypt(1). * We send M* to hop 1. Hops 1, 2, ..., N successively decrypt. * The outbound tunnel endpoint recovers M. [1]. http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/ tunnel.html?rev=HEAD [2]. http://dev.i2p.net/~jrandom/tunnel-alt.html [3]. A hash table or alternatively a bloom filter can be used to detect whether we have previously seen a preIV. This document has been placed in the public domain by Connelly Barnes, 2005-01-17. _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From jrandom at i2p.net Tue Jan 18 03:26:39 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 18 Jan 2005 03:26:39 -0800 Subject: [i2p] Tunnel cryptography for I2P 0.5 (corrected typo) In-Reply-To: <1106028933.41eca98505426@webmail.oregonstate.edu> References: <1106028933.41eca98505426@webmail.oregonstate.edu> Message-ID: <20050118032345.E25100@v2c.arg> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thanks Connelly for the writeup and the discussion, > The following is a discussion of tunnel cryptography plans for > I2P 0.5. There are two options; one will be chosen. A few key changes were missed in this draft, and I've incorporated all of the suggestions from yesterday into [1]. The explanation of the overall rationale for the two different strategies is largely correct. This is still a work in progress, and will be improved as we get both more feedback and clarify some issues. [1]http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/tunnel-alt.html?rev=HEAD An implementation of the crypto for first strategy [2] has been created [3], but as there are some weaknesses in inbound tunnels when dealing with colluding attackers who also control the gateway, the second strategy seems more appealing. Next up I'd like to get that implemented into code so that any further issues can be fleshed out, as well as to make concrete what it is that is being specified. [2]http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/tunnel.html?rev=HEAD [3]http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/java/src/net/i2p/router/tunnel/ Of course, none of those html docs are a finished spec for I2P overall as they assume familiarity with the other non-tunnel-related parts of I2P and do not include the relevent references to where we snagged our ideas ;) This is just a state-of-the-design view into the 0.5 tunnel revamp. Anyway, thanks again for the updates Connelly, and if anyone is looking for the details currently planned for, please see [1]. Suggestions/comments/criticisms always welcome, or if you want to get involved, please get in touch! We're in #i2p on irc.freenode.net and on irc.duck.i2p pretty much all the time. =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB7PDaGnFL2th344YRAnP2AKDuaTX7TNnYa0AuCpc2B90XSluy6QCg7LDv uPddHM1YB6v3RqwBbCXPUGg= =+AIK -----END PGP SIGNATURE----- From warrensmn at warrensmn.com Mon Jan 17 23:06:04 2005 From: warrensmn at warrensmn.com (Riley Cassidy) Date: Tue, 18 Jan 2005 03:36:04 -0330 Subject: Healthy living with less fat Message-ID: <616494777.38164943567050@thebat.net> Anatrim -- The newest and most exciting fat Ioss product available - As scen on Oprah Did you know obesity kiIIs more and more people every year? We know you hate the extra pounds, the ugly look and the social stigmata attached to fat people. Moreover, you can barely do anything about the terrible eating habits of yours. This all sounds familiar? Then we have something for you! Introducing Anatrim, the ultimate product for weight loss. The greatest thing is that Anatrim improves the quality of your life, making you crave food less, giving you better mood and eliminating the extra weight. Read what people say about this product:"This is wonderful! Instead of watching TV and stuffing myself with food l became more interested in exercise. Anatrim got me on the right track. l am more fit now, and there are lots of men around me!"Silvia D., Colorado"I tried some passive weight losing, you know, but with little result. This terrible appetite would just kick in and spoil everything. Once l heard about Anatrim in the media, and I rather liked the information. l tried using it, and my wife said I'm a different person now, 4 months later. 30 pounds off and I keep losing them! And you know, the bedroom thing is cool, too."Mikkey Fox, Bellevue WA Anatrim heIps your brain understand you don't need that much food. It improves your mood, gives you energy and attacks obesity. All thanks to its combination of natural ingredients!Find out more about this dazzling product now!Remove you e-mailt>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t>t> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2033 bytes Desc: not available URL: From eugen at leitl.org Tue Jan 18 00:09:26 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Jan 2005 09:09:26 +0100 Subject: [i2p] Tunnel cryptography for I2P 0.5 (corrected typo) (fwd from barnesc@engr.orst.edu) Message-ID: <20050118080926.GD9221@leitl.org> ----- Forwarded message from barnesc at engr.orst.edu ----- From rah at shipwright.com Tue Jan 18 06:37:57 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 18 Jan 2005 09:37:57 -0500 Subject: Webpay system open to voucher fraud Message-ID: The Register Biting the hand that feeds IT The Register ; Security ; Network Security ; Original URL: http://www.theregister.co.uk/2005/01/17/webpay_voucher_fraud/ Webpay system open to voucher fraud By Jan Libbenga (libbenga at yahoo.com) Published Monday 17th January 2005 16:46 GMT Webpay International AG, the market leading payment system for digital content and services in Europe, doesn't offer a flawless micro payment service, at least in the Netherlands, according to Dutch consumer watchdog tv show Kassa and computer weekly Computer Idee. It is relatively easy to manipulate user data required for the Dutch MSN music download site (TV item in Dutch over here (http://cgi.omroep.nl/cgi-bin/streams?/tv/vara/kassa/bb.laatste.asf?start=00:16:24&end=00:26:13) ). The payments for that site are handled by Webpay under its original name Firstgate. Firstgate users can buy online vouchers and decide which songs they want to purchase later. Kassa and Computer Idee discovered that these vouchers can be easily purchased by filling in someone else's name and bank details. Users can even add money to their prepaid account, again using details from other users. None of this information is verified by Firstgate. Even though upgrading the account requires a pin code, it isn't necessary to enter the code straight away. The song or album to be purchased can be downloaded immediately. Firstgate, which offers the same service for cable operator Chello, doesn't deny that this kind of fraud is possible, but stresses that that fraudsters can be traced and will be prosecuted. However, the company wasn't too thrilled with the publicity and originally threatened to sue broadcaster VARA. Webpay International licenses its micropayment click&buy service also to British Telecom, and to Swisscom, which launched Swisscom click&buy in Q4 2004. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 18 09:17:15 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 18 Jan 2005 12:17:15 -0500 Subject: Austrac beefs up for e-crime fight Message-ID: Australian IT Austrac beefs up for e-crime fight Simon Hayes JANUARY 18, 2005 INTERNET payment systems such as PayPal and e-gold face extra regulation as part of a legislative package designed to stop terrorists and criminals laundering cash through offshore bank accounts. Proprietary payments systems - which escape Australian transactions reporting requirements because the actual transactions take place overseas - are a prime target of laws being drafted by the Federal Attorney-General's Department. The laws follow a parliamentary inquiry into cybercrime last year, which was told that the internet had made it easier for criminal and terrorist money launderers to avoid surveillance. In a submission to the Joint Committee on the Australian Crime Commission, Austrac warned some cyber-transactions were beyond its reach. "It's essential that Australia's regulatory and law enforcement, revenue and national security programs are adequately supported by appropriate legislation, and to ensure that Australia's anti-money-laundering and counter-terrorist financing systems are not compromised," the organisation said. Austrac keeps an eagle eye on traditional funds transfers, scanning some nine million telegraphic transactions in and out of Australia each year, but those using internet-based systems escape the net. While Australian banks are required to report transactions to Austrac, the agency has warned of "uncertainty" about whether internet payments were reportable, as the bank transaction often took place overseas. Austrac acting director Liz Atkins said she hoped the new legislation - to be released in draft form soon - would plug those gaps. "It's a grey area as to whether internet payments systems are caught as cash dealers," she said. "Currently the answer is no, they don't have to report. "The question is whether the new legislation should cover them." Ms Atkins said Austrac was concerned criminals could operate internet payment systems in conjunction with offshore bank accounts and credit cards, purchasing goods and services in Australia, but settling the bills overseas, beyond the reach of Austrac. A spokesman for Attorney-General Philip Ruddock said the draft bill would be released early this year. "Officers from the Attorney-General's Department and Treasury have been exploring the extent to which these services operate in the Australian financial system and what further regulation, if any, may be required to comply with the Financial Action Taskforce recommendations" he said. PayPal managing director Andrew Pipolo said the organisation - owned by internet auction giant eBay - was committed to working with law enforcement agencies. "PayPal is obliged under the Financial Transactions Reporting Act to report suspicious transactions," he said. "Both eBay and PayPal work closely with law enforcement agencies to assist them in investigating and capturing online criminals. "We have zero tolerance to any wrongdoing on PayPal. "There are more than 1000 employees at eBay and PayPal dedicated to making eBay one of the safest places in the world to trade." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jrandom at i2p.net Tue Jan 18 12:30:27 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 18 Jan 2005 12:30:27 -0800 Subject: [i2p] weekly status notes [jan 18] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, weekly update time * Index 1) Net status 2) 0.5 3) i2pmail.v2 4) azneti2p_0.2 5) ??? * 1) Net status Hmm, not much to report here - things still work as they did last week, size of the net is still pretty similar, perhaps a little larger. Some neat new sites are popping up - see the forum [1] and orion [2] for details. [1]http://forum.i2p.net/viewforum.php?f=16 [2]http://orion.i2p/ * 2) 0.5 Thanks to the help of postman, dox, frosk, and cervantes (and everyone who tunneled data through their routers ;), we've collected a full day's worth of message size stats [3]. There are two sets of stats there - height and width of the zoom. This was driven by the desire to explore the impact of different message padding strategies on the network load, as explained [4] in one of the drafts for the 0.5 tunnel routing. (ooOOoo pretty pictures). The scary part about what I found digging through those was that by using some pretty simple hand-tuned padding breakpoints, padding to those fixed sizes would still ended up with over 25% of the bandwidth wasted. Yeah, I know, we're not going to do that. Perhaps y'all can come up with something better by digging through that raw data. [3] http://dev.i2p.net/~jrandom/messageSizes/ [4] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/ tunnel.html?rev=HEAD#tunnel.padding Actually, that [4] link leads us into the state of the 0.5 plans for the tunnel routing. As Connelly posted [5], there has been a lot of discussion lately on IRC about some of the drafts, with polecat, bla, duck, nickster, detonate and others contributing suggestions and probing questions (ok, and snarks ;). After a little more than a week, we came across a potential vulnerability with [4] dealing with an adversary who was somehow able to take over the inbound tunnel gateway who also controlled one of the other peers later in that tunnel. While in most cases this by itself wouldn't expose the endpoint, and would be probabalistically hard to do as the network grows, it still Sucks (tm). So in comes [6]. This gets rid of that issue, allows us to have tunnels of any length, and solves world hunger [7]. It does open another issue where an attacker could build loops in the tunnel, but based on a suggestion [8] Taral made last year regarding the session tags used on ElGamal/AES, we can minimize the damage done by using a series of synchronized pseudorandom number generators [9]. [5] http://dev.i2p.net/pipermail/i2p/2005-January/000557.html [6] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/ tunnel-alt.html?rev=HEAD [7] guess which statement is false? [8] http://www.i2p.net/todo#sessionTag [9] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/ tunnel-alt.html?rev=HEAD#tunnel.prng Don't worry if the above sounds confusing - you're seeing the innards of some gnarly design issues being wrung out in the open. If the above *doesnt* sound confusing, please get in touch, as we're always looking for more heads to hash through this stuff :) Anyway, as I mentioned on the list [10], next up I'd like to get the second strategy [6] implemented to hash through the remaining details. The plan for 0.5 is currently to get all of the backwards incompatible changes together - the new tunnel crypto, etc - and push that as 0.5.0, then as that settles on the net, move on to the other parts of 0.5 [11], such as adjusting the pooling strategy as described in the proposals, pushing that as 0.5.1. I'm hoping we can still hit 0.5.0 by the end of the month, but we'll see. [10] http://dev.i2p.net/pipermail/i2p/2005-January/000558.html [11] http://www.i2p.net/roadmap#0.5 * 3) i2pmail.v2 The other day postman put out a draft plan of action for the next generation mail infrastructure [12], and it looks bloody cool. Of course, there are always yet more bells and whistles we can dream up, but its got a pretty nice architecture in many ways. Check out what's been doc'ed up so far [13], and get in touch with the postman with your thoughts! [12] http://forum.i2p.net/viewtopic.php?t=259 [13] http://www.postman.i2p/mailv2.html 4) azneti2p_0.2 As I posted to the list [14], the original azneti2p plugin for azureus had a serious anonymity bug. The problem was that mixed torrents where some users are anonymous and others are not, the anonymous users would contact the non-anonymous users /directly/ rather than through I2P. Paul Gardner and the rest of the azureus devs were quite responsive and put out a patch right away. The issue I saw is no longer present in azureus v. 2203-b12 + azneti2p_0.2. We haven't gone through and audited the code to review any potential anonymity issues though, so "use at your own risk" (OTOH, we say the same about I2P, prior to the 1.0 release). If you're up for it, I know the azureus devs would appreciate more feedback and bug reports with the plugin. We'll of course keep people informed if we find out about any other issues. [14] http://dev.i2p.net/pipermail/i2p/2005-January/000553.html * 5) ??? Lots going on, as you can see. I think thats about all I've got to bring up, but please swing by the meeting in 40 minutes if there's something else you'd like to discuss (or if you just want to rant about the stuff above) =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB7XCWGnFL2th344YRAmhxAKC9tc+9ocOgu02PBAH1iBEghzpVXQCbBHLB LFh9H55UFtsLPRFk7hxdv1c= =0FdX -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Tue Jan 18 12:46:17 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 18 Jan 2005 15:46:17 -0500 Subject: FW: Securing Wireless Apps in Vertical Markets Webinar from Unstrung Message-ID: Sometimes these webinars can be informative, sometimes they're thinly disguised marketing efforts (that can still have some small value, though). >Dear Colleague, > >As an industry professional, you may be interested to know about an >upcoming online event being presented by Unstrung (www.unstrung.com), the >worldwide source for analysis of the wireless economy. This free Web >seminar - " Securing Wireless Apps in Financial, Government & Military >Markets" - will evaluate recent progress in a critical market. > >Keeping information out of the hands of interlopers is an important task >for any net manager - but it's critical for those with the responsibility >for keeping financial, governmental, and military applications secure. >Security issues continue to be the main concern holding back widespread >wireless adoption in these environments. > >During this presentation we'll focus on: > >- The critical role of security in these vertical markets - why does it >matter? >- Potential effects of wireless network attacks in each market >- The diverse security demands of these three markets >- Case studies of deployments in each market and lessons learned > >Join us on Thursday, January 27, at 2:00 p.m. New York / 7:00 p.m. London >time, for this live Webinar sponsored by Bluesocket and Proxim. > >To sign up for the Webinar, please register through the following link: > >http://metacast.agora.com/link.asp?m=23153&s=4936527&l=0 > >Hope to see you there! > >Unstrung > > > > > > > >============================================ >If you wish to be taken off this list, simply reply to this message and >include the word "unsubscribe" in the subject field - or visit the link >provided below. You will be taken off automatically. > > >http://www.lightreading.com/unsubscribe.asp?subscriberid=4936527 > > >Light Reading Inc. >23 Leonard St. >New York, NY 10013 From rah at shipwright.com Tue Jan 18 15:45:18 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 18 Jan 2005 18:45:18 -0500 Subject: Type III Anonymous Message from Antani anonymous remailer In-Reply-To: <20050118200634.0EED968139@firenze.linux.it> References: <20050118200634.0EED968139@firenze.linux.it> Message-ID: At 9:06 PM +0100 1/18/05, nobody at firenze.linux.it wrote: >Where are the remailer mail2news gateways still operating? >If there are any anymore... This is great. I've been watching, via bittorrent, Lucy Lawless' "Warrior Women" series. The last episode is about Lozen, the Apache medicine-woman who was sister of Antonio, one of the last chiefs of the Chiricahaua band, who raided up and down the Black Range in Southeast New Mexico (Hillsboro, a town in the front range of which, was where my father retired and died, which was why I was interested in the episode; I remember reading "Black Range Tales", and other western memoirs of the time, when I was a kid). She died in Alabama (by way of Florida and Oklahoma) of tuberculosis, 20 years after being captured in New Mexico. There's an echo in here. Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From justin-cypherpunks at soze.net Tue Jan 18 11:54:05 2005 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 18 Jan 2005 19:54:05 +0000 Subject: panix.com hijacked In-Reply-To: References: Message-ID: <20050118195405.GA26279@arion.soze.net> On 2005-01-16T09:46:28-0500, R.A. Hettinga wrote: > On Sun, 16 Jan 2005 Valdis.Kletnieks at vt.edu wrote: > > On Sun, 16 Jan 2005 01:32:46 EST, Henry Yen said: > > > > > > . panix.net usable as panix.com (marcotte) Sat Jan 15 10:44:57 2005 > > > > So let's see.. the users will see this when they log into shell.panix.net > > (since shell.panix.com is borked). Somehow that doesn't seem to help much. > > and the hijackers could be, potentially, running a box pretending to be > shell.panix.com, gathering userids and passwds :( Object lesson in why using replayable passwords is not a good idea. Allah invented nonce-based password hashes and public key crypto for a reason. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." -Heraclitus Kahn.83/D-K.53 From nobody at firenze.linux.it Tue Jan 18 12:06:34 2005 From: nobody at firenze.linux.it (nobody at firenze.linux.it) Date: Tue, 18 Jan 2005 21:06:34 +0100 (CET) Subject: Type III Anonymous Message from Antani anonymous remailer Message-ID: <20050118200634.0EED968139@firenze.linux.it> This is a Type III anonymous message, sent to you by the Winston Smith Project mixminion server at firenze.linux.it. If you do not want to receive anonymous messages, please contact antani- admin at firenze.linux.it. For more information about anonymity, see https://remailer.firenze.linux.it or https://e-privacy.firenze.linux.it. -----BEGIN TYPE III ANONYMOUS MESSAGE----- Message-type: plaintext Where are the remailer mail2news gateways still operating? If there are any anymore... Stale pages serving up dead links to defunct services. Google has let me down. -----END TYPE III ANONYMOUS MESSAGE----- From eugen at leitl.org Tue Jan 18 15:14:57 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2005 00:14:57 +0100 Subject: [i2p] weekly status notes [jan 18] (fwd from jrandom@i2p.net) Message-ID: <20050118231457.GA9221@leitl.org> ----- Forwarded message from jrandom ----- From steve49152 at yahoo.ca Wed Jan 19 02:21:07 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Wed, 19 Jan 2005 05:21:07 -0500 (EST) Subject: Carnivore No More In-Reply-To: Message-ID: <20050119102107.30815.qmail@web51810.mail.yahoo.com> --- "R.A. Hettinga" wrote: > At 12:31 AM +0100 1/16/05, Eugen Leitl wrote: > >it is believed that unspecified > > commercial surveillance tools are employed now. > > It was always AGGroup's Skyline package to begin with. > > The FBI is like NASA. They never build anything, and take all the > credit. At least we now know that the capabilities of the FBI in this regard are at least equivalent to that which a good Linux admin can deploy when he has control of your upstream link. The FBI cannot argue in court that their network eavesdropping capabilities require secrecy and non-disclosure. Sure they can pretend that the userland tools are super high-tech, but the analysis and inteception of arbitrary network traffic is not rocket science. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From rah at shipwright.com Wed Jan 19 07:08:25 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 19 Jan 2005 10:08:25 -0500 Subject: Schneier on Security: Microsoft RC4 Flaw Message-ID: Bruce Schneier Schneier on Security A weblog covering security and security technology. January 18, 2005 Microsoft RC4 Flaw One of the most important rules of stream ciphers is to never use the same keystream to encrypt two different documents. If someone does, you can break the encryption by XORing the two ciphertext streams together. The keystream drops out, and you end up with plaintext XORed with plaintext -- and you can easily recover the two plaintexts using letter frequency analysis and other basic techniques. It's an amateur crypto mistake. The easy way to prevent this attack is to use a unique initialization vector (IV) in addition to the key whenever you encrypt a document. Microsoft uses the RC4 stream cipher in both Word and Excel. And they make this mistake. Hongjun Wu has details (link is a PDF). In this report, we point out a serious security flaw in Microsoft Word and Excel. The stream cipher RC4 [9] with key length up to 128 bits is used in Microsoft Word and Excel to protect the documents. But when an encrypted document gets modified and saved, the initialization vector remains the same and thus the same keystream generated from RC4 is applied to encrypt the different versions of that document. The consequence is disastrous since a lot of information of the document could be recovered easily. This isn't new. Microsoft made the same mistake in 1999 with RC4 in WinNT Syskey. Five years later, Microsoft has the same flaw in other products. Posted on January 18, 2005 at 09:00 AM -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jan 19 07:32:37 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 19 Jan 2005 10:32:37 -0500 Subject: "Microstate": A Mouse Roars Message-ID: The Wall Street Journal January 19, 2005 COMMENTARY A Mouse Roars By VLADIMIR KAVARIC January 19, 2005 PODGORICA, Serbia and Montenegro -- Since the publication in 1776 of "An Inquiry Into the Nature and Causes of the Wealth of the Nations" by Adam Smith, the impact of free-market activity and international trade on economic development is well-known. The experience of recent decades shows that the most successful countries with the highest growth rates are those that have implemented pro-market policies and allow freedom in economic affairs. That's why a transition economy like Montenegro sees its best chance in openness, private initiative, international competition, and economic freedom. Montenegro, the smallest state of the former Yugoslavia with little more than 600,000 inhabitants, presents its economic development concept with the slogan "Montenegro -- Microstate." Microstate in this case has nothing to do with the size of the population or the country. Rather, the Montenegrin Microstate concept, developed by Professor Veselin Vukotic, assumes a minimal role for the state in the economy, low taxes, simple business regulations, a stable institutional framework, and the protection of property rights. The first steps on this road have already been taken. Montenegro adopted the euro as the country's legal tender and thereby minimized the inflation taxation of its citizens. Without that step, the central bank in Montenegro, a transitional economy with weak institutions, would have been under constant pressure to print money. The adoption of the new tax law will introduce one of the lowest corporate tax rates in Europe: a mere 9%. Capital-exchange restrictions have been eliminated and the repatriation of profits made by foreign investors in Montenegro is free. Interest rates are market determined and more than 99% of the prices are freely set. Treating foreign investors just like domestic ones, enjoying the same rights and legal protections, is intrinsic to Montenegro's privatization, investment and business regulations. In order to encourage new business development, the required starting capital for a limited liability company has been reduced to $1. The aluminum industry, which accounts for 60% of total exports, is in the process of being privatized. The tender for Telekom Crna Gore, the national fixed-line operator, is also already underway. Tourism is another area where Montenegro has enormous potential to expand. A majority of hotels are still state-owned but those are now all up for sale while the country is open for new investments. According to the World Tourism Organization, Montenegro's tourism industry will be one of the fastest growing in the world. The biggest obstacles to economic freedom at the moment are high government expenditures and the large number of administrative barriers. A reform of the judicial system would also significantly improve the business ambience. These barriers are, for the most part, part of the old socialist legacy. As anywhere else in the world, the most vigorous objections to the implementation of economic freedom in Montenegro come from rent-seeking groups, monopolists, and people that benefit from state redistribution. But Montenegro also has to overcome a barrier that is peculiar to its political situation. As one of the basic preconditions for signing the Association and Stabilization Agreement with the EU, Brussels insisted on the "harmonization" of economic systems between Serbia and Montenegro. Given the fact that Montenegro wants to develop an open and service-oriented economy while Serbia wants to protect its agriculture and inherited heavy industries, the harmonization of these systems is more than just problematic. The most illustrative example is the harmonization of custom rates. Through this process, Montenegro was forced to increase its custom rates from an average 2.8% to 6%. Montenegro even had to increase custom rates for those products that it doesn't produce itself, such as sugar and textiles. There are, however, new encouraging developments in this area. At a recent conference in Maastricht, the EU proposed a more flexible approach to the accession process of Serbia and Montenegro, the so-called "dual track" path. This dual track process demonstrates that the EU recognizes that the economic realities of Serbia and Montenegro are quite different and that they need to be taken into account. Accepting and acknowledging the economic realities of Serbia and Montenegro would present a new era in interstate relationships in the Balkans. Montenegro would be given the opportunity to take full responsibility for its economic policy. At the same time, the international community would gain stable relations in the region based on respecting mutual interests. An open economy in Montenegro would add to the competitive landscape of the region. More competition (and not harmonization) will lead to prosperity in this part of Europe. Mr. Kavaric is deputy finance minister of Montenegro. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dave at farber.net Wed Jan 19 10:51:24 2005 From: dave at farber.net (David Farber) Date: Wed, 19 Jan 2005 13:51:24 -0500 Subject: [IP] CA State bill could cripple P2P Message-ID: ------ Forwarded Message From: Dewayne Hendricks Reply-To: Date: Wed, 19 Jan 2005 01:38:48 -0800 To: Dewayne-Net Technology List Subject: [Dewayne-Net] CA State bill could cripple P2P State bill could cripple P2P By John Borland Story last modified Tue Jan 18 17:55:00 PST 2005 A bill introduced in California's Legislature last week has raised the possibility of jail time for developers of file-swapping software who don't stop trades of copyrighted movies and songs online. The proposal, introduced by Los Angeles Sen. Kevin Murray, takes direct aim at companies that distribute software such as Kazaa, eDonkey or Morpheus. If passed and signed into law, it could expose file-swapping software developers to fines of up to $2,500 per charge, or a year in jail, if they don't take "reasonable care" in preventing the use of their software to swap copyrighted music or movies--or child pornography. Peer-to-peer software companies and their allies immediately criticized the bill as a danger to technological innovation, and as potentially unconstitutional. "State Sen. Murray did not choose to seek out the facts before introducing misguided legislation that effectively would make criminals out of many companies that bring jobs and economic growth to California," Mike Weiss, CEO of Morpheus parent StreamCast Networks, said in a statement. "This bill is an attack on innovation itself and tax-paying California-based businesses like StreamCast depend on that freedom to innovate." The bill comes as much of the technology world is waiting for the Supreme Court to rule on the legal status of file-swapping technology. Federal courts have twice ruled that peer-to-peer software companies are not legally responsible for the illegal actions of people using their products. Hollywood studios and record companies appealed those decisions to the nation's top court, which is expected to rule on the issue this summer. In the meantime, entertainment companies' push for federal legislation on file-swapping issue has been put temporarily on the back burner. A controversial bill that would have put more legal responsibility on the peer-to-peer developers failed to pass at the end of last year's congressional session. California has taken a lead among states in putting pressure on the file-swapping world. Attorney General Bill Lockyer was a key figure last year in pushing for more state-level legal scrutiny of the companies' actions, and Gov. Arnold Schwarzenegger has sought to ban illegal downloading on any state computers, including those owned by the state university systems. [snip] Archives at: Weblog at: ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From dave at farber.net Wed Jan 19 11:02:11 2005 From: dave at farber.net (David Farber) Date: Wed, 19 Jan 2005 14:02:11 -0500 Subject: [IP] more on CA State bill could cripple P2P Message-ID: ------ Forwarded Message From: Mike O'Dell Date: Wed, 19 Jan 2005 13:58:18 -0500 To: Subject: Re: [IP] CA State bill could cripple P2P actually, taken at face value, this outlaws all network protocol stacks I know about, even terminal emulators with things like x-modem and even file redirection. it's patently bogus, but it could do an immense amount of mischief done before it gets undone (assuming it ever gets done). What i'd like to see is a bill punishing legislators for introducing unconstitutional bills. if a bill is declared unconstitutional, the sponsors of the bill would do prison time for an assault on the public freedom. -mo ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ian at iansawyer.com Wed Jan 19 08:09:08 2005 From: ian at iansawyer.com (Ian W. Sawyer) Date: Wed, 19 Jan 2005 16:09:08 -0000 Subject: [N-B] "Microstate": A Mouse Roars In-Reply-To: Message-ID: <200501191644.j0JGiWg21044@s07.au88dns.com> Whilst I'd agree with most of this article, what it doesn't mention and which is something that does give rise to a bit of concern is the way that the Montenegrin government issued a number banking licences a couple of years ago, took all their fees but not many months later suddenly changed the law and withdrew the licences, effectively making those banks illegal. If a government can do this, without recourse to any effective appeal, in one area, it has the potential to do so in others. Ian. http://iansawyer.com http://iansawyer.ath.cx The state has grown used to treating its taxpayers as a farmer treats his cows, keeping them in a field to be milked. Soon however, in cyberspace, the cows will have wings...... -- "The Sovereign Individual" ~~~~~~~~~~~~ > -----Original Message----- > From: R.A. Hettinga [mailto:rah at shipwright.com] > Sent: 19 January 2005 15:33 > To: osint at yahoogroups.com; cypherpunks at al-qaeda.net; > libertarian-nation at yahoogroups.com; nation-builders at yahoogroups.com > Subject: [N-B] "Microstate": A Mouse Roars > > > > > The Wall Street Journal > > January 19, 2005 > > COMMENTARY > > > A Mouse Roars > > By VLADIMIR KAVARIC > January 19, 2005 > > > PODGORICA, Serbia and Montenegro -- Since the publication in > 1776 of "An > Inquiry Into the Nature and Causes of the Wealth of the > Nations" by Adam > Smith, the impact of free-market activity and international trade on > economic development is well-known. The experience of recent > decades shows > that the most successful countries with the highest growth > rates are those > that have implemented pro-market policies and allow freedom > in economic > affairs. That's why a transition economy like Montenegro sees its best > chance in openness, private initiative, international competition, and > economic freedom. > > Montenegro, the smallest state of the former Yugoslavia with > little more > than 600,000 inhabitants, presents its economic development > concept with > the slogan "Montenegro -- Microstate." Microstate in this > case has nothing > to do with the size of the population or the country. Rather, the > Montenegrin Microstate concept, developed by Professor > Veselin Vukotic, > assumes a minimal role for the state in the economy, low taxes, simple > business regulations, a stable institutional framework, and > the protection > of property rights. > > The first steps on this road have already been taken. > Montenegro adopted > the euro as the country's legal tender and thereby minimized > the inflation > taxation of its citizens. Without that step, the central bank in > Montenegro, a transitional economy with weak institutions, > would have been > under constant pressure to print money. > > The adoption of the new tax law will introduce one of the > lowest corporate > tax rates in Europe: a mere 9%. Capital-exchange restrictions > have been > eliminated and the repatriation of profits made by foreign > investors in > Montenegro is free. Interest rates are market determined and > more than 99% > of the prices are freely set. Treating foreign investors just > like domestic > ones, enjoying the same rights and legal protections, is intrinsic to > Montenegro's privatization, investment and business > regulations. In order > to encourage new business development, the required starting > capital for a > limited liability company has been reduced to $1. The > aluminum industry, > which accounts for 60% of total exports, is in the process of being > privatized. The tender for Telekom Crna Gore, the national fixed-line > operator, is also already underway. Tourism is another area where > Montenegro has enormous potential to expand. A majority of > hotels are still > state-owned but those are now all up for sale while the > country is open for > new investments. According to the World Tourism Organization, > Montenegro's > tourism industry will be one of the fastest growing in the world. > > The biggest obstacles to economic freedom at the moment are > high government > expenditures and the large number of administrative barriers. > A reform of > the judicial system would also significantly improve the > business ambience. > These barriers are, for the most part, part of the old > socialist legacy. > > As anywhere else in the world, the most vigorous objections to the > implementation of economic freedom in Montenegro come from > rent-seeking > groups, monopolists, and people that benefit from state > redistribution. > > But Montenegro also has to overcome a barrier that is peculiar to its > political situation. As one of the basic preconditions for signing the > Association and Stabilization Agreement with the EU, Brussels > insisted on > the "harmonization" of economic systems between Serbia and Montenegro. > Given the fact that Montenegro wants to develop an open and > service-oriented economy while Serbia wants to protect its > agriculture and > inherited heavy industries, the harmonization of these > systems is more than > just problematic. The most illustrative example is the > harmonization of > custom rates. Through this process, Montenegro was forced to > increase its > custom rates from an average 2.8% to 6%. Montenegro even had > to increase > custom rates for those products that it doesn't produce > itself, such as > sugar and textiles. > > There are, however, new encouraging developments in this > area. At a recent > conference in Maastricht, the EU proposed a more flexible > approach to the > accession process of Serbia and Montenegro, the so-called "dual track" > path. This dual track process demonstrates that the EU > recognizes that the > economic realities of Serbia and Montenegro are quite > different and that > they need to be taken into account. > > Accepting and acknowledging the economic realities of Serbia > and Montenegro > would present a new era in interstate relationships in the Balkans. > Montenegro would be given the opportunity to take full > responsibility for > its economic policy. At the same time, the international > community would > gain stable relations in the region based on respecting > mutual interests. > An open economy in Montenegro would add to the competitive > landscape of the > region. More competition (and not harmonization) will lead to > prosperity in > this part of Europe. > > Mr. Kavaric is deputy finance minister of Montenegro. > > -- > ----------------- > R. A. Hettinga > The Internet Bearer Underwriting Corporation > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and antiquity, > [predicting the end of the world] has not been found agreeable to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' [demime 1.01d removed an attachment of type application/x-pkcs7-signature which had a name of smime.p7s] From eugen at leitl.org Wed Jan 19 11:35:56 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2005 20:35:56 +0100 Subject: [IP] CA State bill could cripple P2P (fwd from dave@farber.net) Message-ID: <20050119193555.GF9221@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Wed Jan 19 11:36:38 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2005 20:36:38 +0100 Subject: [IP] more on CA State bill could cripple P2P (fwd from dave@farber.net) Message-ID: <20050119193638.GG9221@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Wed Jan 19 17:41:07 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 19 Jan 2005 20:41:07 -0500 Subject: Two men plead guilty in online file-sharing case Message-ID: < The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Wed Jan 19 13:19:16 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2005 22:19:16 +0100 Subject: OpenVPN Message-ID: <20050119211916.GK9221@leitl.org> If you haven't checked it out yet, you should. Really easy to set up (two Windows XP machines through a NAT on DSL, ping ~50 ms, preshared key, single port open; right now). Looking forward to see how C3-accelerated AES (OpenSSL next stable will support it out of the box) will do, across multiple platforms. Le IPsec c'est mort, vive le OpenVPN. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From adulau at foo.be Wed Jan 19 13:42:45 2005 From: adulau at foo.be (Alexandre Dulaunoy) Date: Wed, 19 Jan 2005 22:42:45 +0100 (CET) Subject: OpenVPN In-Reply-To: <20050119211916.GK9221@leitl.org> Message-ID: On Wed, 19 Jan 2005, Eugen Leitl wrote: > > If you haven't checked it out yet, you should. Really easy to set up (two Windows > XP machines through a NAT on DSL, ping ~50 ms, preshared key, single port open; right now). > Looking forward to see how C3-accelerated AES (OpenSSL next stable will support > it out of the box) will do, across multiple platforms. > > Le IPsec c'est mort, vive le OpenVPN. On peut le dire ;-) The author of OpenVPN is very open to discussion for fixing bugs and adding new functionalities. OpenVPN is also working quite well over satellite and high-latency links... -- -- Alexandre Dulaunoy (adulau) -- http://www.foo.be/ -- http://pgp.ael.be:11371/pks/lookup?op=get&search=0x44E6CBCD -- "Knowledge can create problems, it is not through ignorance -- that we can solve them" Isaac Asimov From dave at farber.net Thu Jan 20 03:02:23 2005 From: dave at farber.net (David Farber) Date: Thu, 20 Jan 2005 06:02:23 -0500 Subject: [IP] The second sincerest form of flattery Message-ID: ------ Forwarded Message From: Matt Blaze Date: Wed, 19 Jan 2005 20:53:58 -0500 To: David Farber Subject: The second sincerest form of flattery One of my research interests is applying the principles of "human-scale" security (such as mechanical locks and alarm systems) to computer science. Although human-scale systems are almost always imperfect, their failure mechanisms are often much more gradual and more predictable than their information systems counterparts, and I believe that by better understanding why this is we might be able to build computer systems that behave in similar ways. Several particularly interesting illustrations of the phenomenon of gradual and predictable security failure can be found in safes and vaults. I'm working on a survey paper, tentatively entitled "Safecracking for the computer scientist," that I hope will stimulate other researchers to think along similar lines. Last month I finished a first draft and put it on my web site. (For those who've not seen it, it's at http://www.crypto.com/papers/safelocks.pdf ) Although the paper is only of rather narrow interest, a couple of weeks ago the wildly popular "Slashdot" news site discovered and linked to the draft; somewhere around 50,000 people downloaded the (large) pdf file that weekend. My web server survived Slashdot's attention, but I was somewhat taken aback by what happened next. A couple of years ago I wrote a paper about weaknesses in the keyspaces of master-keyed mechanical locks (it marked the beginning of my understanding of the similarities between information and physical security). Some locksmiths were outraged that I would publish a paper "revealing" security vulnerabilities in what they believed to be a closed field. See http://www.crypto.com/papers/kiss.html for details, but to make a long story short, some locksmiths do not approve of disclosing vulnerabilities in locks to the "general public," on the grounds that open discussion aids the bad guys more than it helps the good guys. (I don't agree -- and the scientific method's requirement for open scrutiny and debate does not provide an exemption when the subject involves security -- but that's another story for another time.) Perhaps predictably, there has been a similar reaction to my recent draft on safe locks. Shortly after Slashdot linked to the paper, one or more locksmithing trade groups discovered it as well . The response of some locksmiths to the draft has been at least as negative as it was to my master keying paper. I've received quite a bit of uncomplimentary email from locksmiths, and I'm told that locksmithing message boards have recently been abuzz with messages about what a scoundrel I must be to again have written such an "unethical" and "irresponsible" paper. Ironically, the theme of my safecracking survey is that while safes aren't perfect, they largely meet their requirements, and indeed, computer security would do well to emulate their security principles. Nothing in my paper (and indeed, no techniques of which I'm aware) allow one to quickly open decent quality safes. The paper's conclusion is that even if one is fluent in the (not very) secrets of the safecracking trade, the measurable security of even relatively modest safes allows them to be used quite effectively for their intended applications (especially as part of larger security system that complement the safes' limitations). I certainly don't think it would have been unethical to have published an analysis that reached a different conclusion, of course, but my paper as written could hardly be considered an attack against the safe industry or its products. As with the reaction to my master keying paper, many of the complaints I've received are self-contradictory and emotionally charged, often invoking "homeland security" in unspecified but ominous ways. I've developed a thick skin against this sort of thing, and I try not to take it personally (although it's a bit disturbing to have so many people so angry with me over my work). It's rather like being accused of witchcraft; many of the complainers don't seem to be seeking a reasoned debate but are instead venting a broder range of unspoken frustrations that go well beyond either me or my papers. There is simply no effective way to debate on these terms against an angry mob. In any case, some locksmiths are apparently trying to organize a letter writing campaign aimed at various officials at my university, and I'm told that my department chair, my dean, the provost, and the head of campus security have each received (a handful of) letters complaining about me. While Penn's support for the basic principles of academic freedom would protect me even if these officials agreed that my paper was somehow inappropriate, some of the letter writers seem to have unwittingly stumbled upon a weapon that could potentially be very effective (in other contexts) at silencing Internet-based debate. They have accused me of copyright infringement. My paper is heavily illustrated with photographs of safe locks and their components. Several letters have (accurately) pointed out that these photographs are protected by copyright and that by distributing my paper I'm also distributing copyrighted material. This, I must admit, is entirely correct. But I created every one of the images myself, in my own studio, and with my own materials, cameras and computers. I arranged the subjects, lit them, and photographed them. The results are copyrighted, to be sure, but I hold the copyrights. Fortunately, my university is not in the habit of removing the online papers of its faculty without checking with us first, and my paper has remained on my web site unmolested by these spurious copyright claims. But it occurs to me that, given the relevant provisions of the DMCA, a more timid ISP might have reacted quite differently, choosing instead to take down the controversial content until I could prove (or at least assert) that I have the rights to the images in question. This could take days or even weeks, depending on the level of proof demanded. Such a tactic could be a very effective way to harass or suppress authors of contraversial material, and, if done with the sort of vague wording used in the letters about me, would appear to leave the author with no recourse against anybody. The letter writers didn't actually claim copyright, but simply raised the issue. An ISP (had it over-reacted) could plausibly claim that they were simply protecting their interests in quickly taking the questionable material offline. I suspect that, in my case, the organizers of the letter-writing campaign were not dishonestly attempting to exploit the DMCA, but instead genuinely assumed that I had copied my images from some commercial source. A friend suggested that I should take this as a compliment; after all, if imitation is the sincerest form of flattery, perhaps being accused of copyright infringement is the second sincerest. Matt Blaze 19 January 2004 ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ptrei at rsasecurity.com Thu Jan 20 07:47:38 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 20 Jan 2005 10:47:38 -0500 Subject: Scientific American on Quantum Encryption Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C25@rsana-ex-hq1.NA.RSA.NET> I've actually seen these devices in operation. The thing that impressed me most was that the path need not be a single fiber from end to end - you can maintain quantum state across a switchable fiber junction. This means you are no longer limited to a single pair of boxes talking to each other. True, the SciAm article doesn't address a lot of issues, but the fact remains that this technology is interesting and important. Peter Trei > -----Original Message----- > From: owner-cypherpunks at minder.net > [mailto:owner-cypherpunks at minder.net]On Behalf Of Eugen Leitl > Sent: Thursday, January 20, 2005 6:17 AM > To: transhumantech at yahoogroups.com > Cc: cypherpunks at al-qaeda.net > Subject: Scientific American on Quantum Encryption > > > > Scientific American has little clue, as usual (see their > nanotechnology > retraction). > > Link: http://slashdot.org/article.pl?sid=05/01/20/0358215 > Posted by: samzenpus, on 2005-01-20 06:35:00 > > from the just-try-and-break-it dept. > [1]prostoalex writes "Scientific American claims that > [2]advances in > commercially available quantum encryption might obsolete > the existing > factorization-based solutions: "The National Security > Agency or one of > the Federal Reserve banks can now buy a > quantum-cryptographic system > from two small companies - and more products are on the > way. This new > method of encryption represents the first major commercial > implementation for what has become known as quantum information > science, which blends quantum mechanics and information theory. The > ultimate technology to emerge from the field may be a > quantum computer > so powerful that the only way to protect against its prodigious > code-breaking capability may be to deploy quantum-cryptographic > techniques."" From ptrei at rsasecurity.com Thu Jan 20 08:35:47 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Thu, 20 Jan 2005 11:35:47 -0500 Subject: Scientific American on Quantum Encryption Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C28@rsana-ex-hq1.NA.RSA.NET> Eugen Leitl wrote: > On Thu, Jan 20, 2005 at 10:47:38AM -0500, Trei, Peter wrote: > > > I've actually seen these devices in operation. The thing > > that impressed me most was that the path need not be a > > single fiber from end to end - you can maintain quantum > > state across a switchable fiber junction. This means > > Very impressive. If they manage to keep the entanglement all > the way up to > LEO by line of sight it would be even more impressive > (anyone thinks this can be done at all?) > > > you are no longer limited to a single pair of boxes talking to > > each other. At the moment, the practical limit in fiber is around 150 km Getting to LEO is a *lot* harder - remember, you're throwing and catching one photon at a time - a beam that spreads wider than your detector is usually going to miss the detector. Peter Trei From camera_lumina at hotmail.com Thu Jan 20 08:38:47 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 20 Jan 2005 11:38:47 -0500 Subject: Scientific American on Quantum Encryption In-Reply-To: <20050120152335.GA12534@arion.soze.net> Message-ID: Well, I think you've been a little too harsh on Scientific American. In the past a lot of the best articles were written by the pioneers in their fields. In fact, it's where I believe Wittfield and Diffie wrote a great piece on their work. And don't expect anyone (not even a math major) to go grab a quantum mechanics textbook and be able to get anything out of it. One would really need to have done the classical coursework in order to understand it (or at least to know enough to be spurised by it). And if you don't have the math then forget about it. Meanwhile, it IS possible to write intelligently on quantum entanglement, EPR and Aharnov-Bohm, and it's been done by Sci-Am, Penrose, Kaku and plenty of others. -TD >From: Justin >To: cypherpunks at al-qaeda.net >Subject: Re: Scientific American on Quantum Encryption >Date: Thu, 20 Jan 2005 15:23:35 +0000 > >On 2005-01-20T12:16:34+0100, Eugen Leitl wrote: > > Scientific American has little clue, as usual (see their nanotechnology > > retraction). > >How could they possibly get clue? Scientists don't want to write >pop-sci articles for a living. It's impossible to condense most current >research down to digestible kernels that the masses can understand. >SciAm should close down, requiring those who care about science to learn >enough about it to read science journals. > >Professors who can teach a QM course well in a semester are rare enough. >I doubt any one of them could write a 5000 word article on quantum >entanglement that would be intelligible to the average cretinous >American who wants to seem smart by reading Sci-Am. If they want to be >smart, they can start by picking up an undergrad-level book on QM. But >that requires much effort to read, unlike a glossy 5000 word article. > >Journalism should not be a college major. Journalists in the main know >little about how to write and interview, and less about the topics they >write on. They don't understand that being able to write (and in many >cases even that ability is in serious doubt) doesn't qualify them to >write on any topic they choose. Many journalists aren't qualified to >write on anything, not even journalism. > >-- >"War is the father and king of all, and some he shows as gods, others as >men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From camera_lumina at hotmail.com Thu Jan 20 08:43:53 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 20 Jan 2005 11:43:53 -0500 Subject: Scientific American on Quantum Encryption In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776C25@rsana-ex-hq1.NA.RSA.NET> Message-ID: What do you mean? By a physical fiber switch? That's certainly possible, though you'd need a very good condition switch to be able to do it. I'd bet if that switch switched a lot, the QCrypto channel would eventually be unusable. If you're talking about a WDM element or passive splitter or other purely optical component, then you'd need some kind of error correction (in the digital domain) in order to overcome the fact that many of the photons will not choose to go in the direction you want. In the long run I think we'll see some small proliferation, but given the level of integration and how well current coding schemes work, I'd guess this will remain a niche unless there's a major breakthrough in factoring. -TD >From: "Trei, Peter" >To: "Eugen Leitl" , >CC: >Subject: RE: Scientific American on Quantum Encryption >Date: Thu, 20 Jan 2005 10:47:38 -0500 > >I've actually seen these devices in operation. The thing >that impressed me most was that the path need not be a >single fiber from end to end - you can maintain quantum >state across a switchable fiber junction. This means >you are no longer limited to a single pair of boxes talking to >each other. > >True, the SciAm article doesn't address a lot of issues, >but the fact remains that this technology is interesting >and important. > >Peter Trei > > > -----Original Message----- > > From: owner-cypherpunks at minder.net > > [mailto:owner-cypherpunks at minder.net]On Behalf Of Eugen Leitl > > Sent: Thursday, January 20, 2005 6:17 AM > > To: transhumantech at yahoogroups.com > > Cc: cypherpunks at al-qaeda.net > > Subject: Scientific American on Quantum Encryption > > > > > > > > Scientific American has little clue, as usual (see their > > nanotechnology > > retraction). > > > > Link: http://slashdot.org/article.pl?sid=05/01/20/0358215 > > Posted by: samzenpus, on 2005-01-20 06:35:00 > > > > from the just-try-and-break-it dept. > > [1]prostoalex writes "Scientific American claims that > > [2]advances in > > commercially available quantum encryption might obsolete > > the existing > > factorization-based solutions: "The National Security > > Agency or one of > > the Federal Reserve banks can now buy a > > quantum-cryptographic system > > from two small companies - and more products are on the > > way. This new > > method of encryption represents the first major commercial > > implementation for what has become known as quantum information > > science, which blends quantum mechanics and information theory. The > > ultimate technology to emerge from the field may be a > > quantum computer > > so powerful that the only way to protect against its prodigious > > code-breaking capability may be to deploy quantum-cryptographic > > techniques."" From eugen at leitl.org Thu Jan 20 03:16:34 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2005 12:16:34 +0100 Subject: Scientific American on Quantum Encryption Message-ID: <20050120111633.GS9221@leitl.org> Scientific American has little clue, as usual (see their nanotechnology retraction). Link: http://slashdot.org/article.pl?sid=05/01/20/0358215 Posted by: samzenpus, on 2005-01-20 06:35:00 from the just-try-and-break-it dept. [1]prostoalex writes "Scientific American claims that [2]advances in commercially available quantum encryption might obsolete the existing factorization-based solutions: "The National Security Agency or one of the Federal Reserve banks can now buy a quantum-cryptographic system from two small companies - and more products are on the way. This new method of encryption represents the first major commercial implementation for what has become known as quantum information science, which blends quantum mechanics and information theory. The ultimate technology to emerge from the field may be a quantum computer so powerful that the only way to protect against its prodigious code-breaking capability may be to deploy quantum-cryptographic techniques."" IFRAME: [3]pos6 References 1. http://www.everythingfirebird.com/ 2. http://www.sciam.com/article.cfm?chanID=sa006&articleID=000479CD-F58C-11BE-AD 0683414B7F0000&ref=rdf ----- End forwarded message ----- December 20, 2004 Best-Kept Secrets Quantum cryptography has marched from theory to laboratory to real products By Gary Stix At the IBM Thomas J. Watson Research Laboratory, Charles Bennett is known as a brilliant theoretician--one of the fathers of the emerging field of quantum computing. Like many theorists, he has not logged much experience in the laboratory. His absentmindedness in relation to the physical world once transformed the color of a teapot from green to red when he left it on a double boiler too long. But in 1989 Bennett and colleagues John A. Smolin and Gilles Brassard cast caution aside and undertook a groundbreaking experiment that would demonstrate a new cryptography based on the principles of quantum mechanics. The team put together an experiment in which photons moved down a 30-centimeter channel in a light-tight box called "Aunt Martha's coffin." The direction in which the photons oscillated, their polarization, represented the 0s or 1s of a series of quantum bits, or qubits. The qubits constituted a cryptographic "key" that could be used to encrypt or decipher a message. What kept the key from prying eavesdroppers was Heisenberg's uncertainty principle--a foundation of quantum physics that dictates that the measurement of one property in a quantum state will perturb another. In a quantum cryptographic system, any interloper tapping into the stream of photons will alter them in a way that is detectable to the sender and the receiver. In principle, the technique provides the makings of an unbreakable cryptographic key. Today quantum cryptography has come a long way from the jury-rigged project assembled on a table in Bennett's office. The National Security Agency or one of the Federal Reserve banks can now buy a quantum-cryptographic system from two small companies--and more products are on the way. This new method of encryption represents the first major commercial implementation for what has become known as quantum information science, which blends quantum mechanics and information theory. The ultimate technology to emerge from the field may be a quantum computer so powerful that the only way to protect against its prodigious code-breaking capability may be to deploy quantum-cryptographic techniques. The arrival of the quantum computer may portend the eventual demise of ciphers based on factorization. The challenge modern cryptographers face is for sender and receiver to share a key while ensuring that no one has filched a copy. A method called public-key cryptography is often used to distribute the secret keys for encryption and decoding of a full-length message. The security of public-key cryptography depends on factorization or other difficult mathematical problems. It is easy to compute the product of two large numbers but extremely hard to factor it back into the primes. The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization. The secret key being transferred between sender and receiver is encrypted with a publicly available key, say, a large number such as 408,508,091 (in practice, the number would be much larger). It can be decrypted only with a private key owned by the recipient of the data, made up of two factors, in this case 18,313 and 22,307. The difficulty of overcoming a public-key cipher may hold secret keys secure for a decade or more. But the advent of the quantum information era--and, in particular, the capability of quantum computers to rapidly perform monstrously challenging factorizations--may portend the eventual demise of RSA and other cryptographic schemes. "If quantum computers become a reality, the whole game changes," says John Rarity, a professor in the department of electrical and electronics engineering at the University of Bristol in England. Unlike public-key cryptography, quantum cryptography should remain secure when quantum computers arrive on the scene. One way of sending a quantum-cryptographic key between sender and receiver requires that a laser transmit single photons that are polarized in one of two modes. In the first, photons are positioned vertically or horizontally (rectilinear mode); in the second, they are oriented 45 degrees to the left or right of vertical (diagonal mode). In either mode, the opposing positions of the photons represent either a digital 0 or a 1. The sender, whom cryptographers by convention call Alice, sends a string of bits, choosing randomly to send photons in either the rectilinear or the diagonal modes. The receiver, known as Bob in crypto-speak, makes a similarly random decision about which mode to measure the incoming bits. The Heisenberg uncertainty principle dictates that he can measure the bits in only one mode, not both. Only the bits that Bob measured in the same mode as sent by Alice are guaranteed to be in the correct orientation, thus retaining the proper value. After transmission, Bob then communicates with Alice, an exchange that need not remain secret, to tell her which of the two modes he used to receive each photon. He does not, however, reveal the 0- or 1-bit value represented by each photon. Alice then tells Bob which of the modes were measured correctly. They both ignore photons that were not observed in the right mode. The modes measured correctly constitute the key that serves as an input for an algorithm used to encrypt or decipher a message. If someone tries to intercept this stream of photons--call her Eve--she cannot measure both modes, thanks to Heisenberg. If she makes the measurements in the wrong mode, even if she resends the bits to Bob in the same way she measured them, she will inevitably introduce errors. Alice and Bob can detect the presence of the eavesdropper by comparing selected bits and checking for errors. Beginning in 2003, two companies--id Quantique in Geneva and MagiQ Technologies in New York City--introduced commercial products that send a quantum-cryptographic key beyond the 30 centimeters traversed in Bennett's experiment. And, after demonstrating a record transmission distance of 150 kilometers, NEC is to come to market with a product at the earliest next year. Others, such as IBM, Fujitsu and Toshiba, have active research efforts. The products on the market can send keys over individual optical-fiber links for multiple tens of kilometers. A system from MagiQ costs $70,000 to $100,000. "A small number of customers are using and testing the system, but it's not widely deployed in any network," comments Robert Gelfond, a former Wall Street quantitative trader who in 1999 founded MagiQ Technologies. Some government agencies and financial institutions are afraid that an encrypted message could be captured today and stored for a decade or more--at which time a quantum computer might decipher it. Richard J. Hughes, a researcher in quantum cryptography at Los Alamos National Laboratory, cites other examples of information that must remain confidential for a long time: raw census data, the formula for Coca-Cola or the commands for a commercial satellite. (Remember Captain Midnight, who took over HBO for more than four minutes in 1986.) Among the prospective customers for quantum-cryptographic systems are telecommunications providers that foresee offering customers an ultrasecure service. The first attempts to incorporate quantum cryptography into actual networks--rather than just point-to-point connections--have begun. The Defense Advanced Research Projects Agency has funded a project to connect six network nodes that stretch among Harvard University, Boston University and BBN Technologies in Cambridge, Mass., a company that played a critical role in establishing the Internet. The encryption keys are sent over dedicated links, and the messages ciphered with those keys are transmitted over the Internet. "This is the first continuously running operational quantum-cryptography network outside a laboratory," notes Chip Elliott of BBN, who heads the project. The network, designed to merely show that the technology works, transfers ordinary unclassified Internet traffic. "The only secrets I can possibly think of here are where the parking spaces are," Elliott says. Last fall, id Quantique and a partner, the Geneva-based Internet services provider Deckpoint, put on display a network that allowed a cluster of servers in Geneva to have its data backed up at a site 10 kilometers away, with new keys being distributed frequently through a quantum-encrypted link. The current uses for quantum cryptography are in networks of limited geographic reach. The strength of the technique--that anyone who spies on a key transmittal will change it unalterably--also means that the signals that carry quantum keys cannot be amplified by network equipment that restores a weakening signal and allows it to be relayed along to the next repeater. An optical amplifier would corrupt qubits. To extend the distance of these links, researchers are looking beyond optical fibers as the medium to distribute quantum keys. Scientists have trekked to mountaintops--where the altitude minimizes atmospheric turbulence--to prove the feasibility of sending quantum keys through the air. One experiment in 2002 at Los Alamos National Laboratory created a 10-kilometer link. Another, performed that same year by QinetiQ, based in Farnborough, England, and Ludwig Maximilian University in Munich, stretched 23 kilometers between two mountaintops in the southern Alps. By optimizing this technology--using bigger telescopes for detection, better filters and antireflective coatings--it might be possible to build a system that could transmit and receive signals over more than 1,000 kilometers, sufficient to reach satellites in low earth orbit. A network of satellites would allow for worldwide coverage. The European Space Agency is in the early stages of putting together a plan for an earth-to-satellite experiment. (The European Union also launched an effort in April to develop quantum encryption over communications networks, an effort spurred in part by a desire to prevent eavesdropping by Echelon, a system that intercepts electronic messages for the intelligence services of the U.S., Britain and other nations.) Ultimately cryptographers want some form of quantum repeater--in essence, an elementary form of quantum computer that would overcome distance limitations. A repeater would work through what Albert Einstein famously called "spukhafte Fernwirkungen," spooky action at a distance. Anton Zeilinger and his colleagues at the Institute of Experimental Physics in Vienna, Austria, took an early step toward a repeater when they reported in the August 19, 2004, issue of Nature that their group had strung an optical-fiber cable in a sewer tunnel under the Danube River and stationed an "entangled" photon at each end. The measurement of the state of polarization in one photon (horizontal, vertical, and so on) establishes immediately an identical polarization that can be measured in the other. Entanglement spooked Einstein, but Zeilinger and his team took advantage of a link between two entangled photons to "teleport" the information carried by a third photon a distance of 600 meters across the Danube. Such a system might be extended in multiple relays, so that the qubits in a key could be transmitted across continents or oceans. To make this a reality will require development of esoteric components, such as a quantum memory capable of actually storing qubits without corrupting them before they are sent along to a subsequent link. "This is still very much in its infancy. It's still in the hands of physics laboratories," notes Nicolas Gisin, a professor at the University of Geneva, who helped to found id Quantique and who has also done experiments on long-distance entanglement. A quantum memory might be best implemented with atoms, not photons. An experiment published in the October 22 issue of Science showed how this might work. Building on ideas of researchers from the University of Innsbruck in Austria, a group at the Georgia Institute of Technology detailed in the paper how two clouds of ultracold rubidium atoms could be entangled and, because of the quantum linkage, could be inscribed with a qubit, the clouds storing the qubit for much longer than a photon can. The experiment then transferred the quantum state of the atoms, their qubit, onto a photon, constituting information transfer from matter to light and showing how a quantum memory might output a bit. By entangling clouds, Alex Kuzmich and Dzmitry Matsukevich of Georgia Tech hope to create repeaters that can transfer qubits over long distances. Entanglement spooked Einstein, but researchers have used the phenomenon to "teleport" quantum information. The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world. One of those assumptions is that only a single photon represents each qubit. Quantum cryptography works by taking a pulsed laser and diminishing its intensity to such an extent that typically it becomes unlikely that any more than one in 10 pulses contains a photon--the rest are dark--one reason that the data transfer rate is so low. But this is only a statistical likelihood. The pulse may have more than one photon. An eavesdropper could, in theory, steal an extra photon and use it to help decode a message. A software algorithm, known as privacy amplification, helps to guard against this possibility by masking the values of the qubits. But cryptographers would like to have better photon sources and detectors. The National Institute of Standards and Technology (NIST) is one of many groups laboring on these devices. "One very interesting area is the development of detectors that can tell the difference between one, two or more photons arriving at the same time," says Alan Migdall of NIST. Researchers there have also tried to address the problem of slow transmission speed by generating quantum keys at a rate of one megabit per second--100 times faster than any previous efforts and enough to distribute keys for video applications. Quantum cryptography may still prove vulnerable to some unorthodox attacks. An eavesdropper might sabotage a receiver's detector, causing qubits received from a sender to leak back into a fiber and be intercepted. And an inside job will always prove unstoppable. "Treachery is the primary way," observes Seth Lloyd, an expert in quantum computation at the Massachusetts Institute of Technology. "There's nothing quantum mechanics can do about that." Still, in the emerging quantum information age, these new ways of keeping secrets may be better than any others in the codebooks. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Thu Jan 20 03:21:39 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2005 12:21:39 +0100 Subject: [IP] The second sincerest form of flattery (fwd from dave@farber.net) Message-ID: <20050120112139.GT9221@leitl.org> ----- Forwarded message from David Farber ----- From justin-cypherpunks at soze.net Thu Jan 20 07:23:35 2005 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 20 Jan 2005 15:23:35 +0000 Subject: Scientific American on Quantum Encryption In-Reply-To: <20050120111633.GS9221@leitl.org> References: <20050120111633.GS9221@leitl.org> Message-ID: <20050120152335.GA12534@arion.soze.net> On 2005-01-20T12:16:34+0100, Eugen Leitl wrote: > Scientific American has little clue, as usual (see their nanotechnology > retraction). How could they possibly get clue? Scientists don't want to write pop-sci articles for a living. It's impossible to condense most current research down to digestible kernels that the masses can understand. SciAm should close down, requiring those who care about science to learn enough about it to read science journals. Professors who can teach a QM course well in a semester are rare enough. I doubt any one of them could write a 5000 word article on quantum entanglement that would be intelligible to the average cretinous American who wants to seem smart by reading Sci-Am. If they want to be smart, they can start by picking up an undergrad-level book on QM. But that requires much effort to read, unlike a glossy 5000 word article. Journalism should not be a college major. Journalists in the main know little about how to write and interview, and less about the topics they write on. They don't understand that being able to write (and in many cases even that ability is in serious doubt) doesn't qualify them to write on any topic they choose. Many journalists aren't qualified to write on anything, not even journalism. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From eugen at leitl.org Thu Jan 20 07:59:00 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2005 16:59:00 +0100 Subject: Scientific American on Quantum Encryption In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776C25@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776C25@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050120155900.GX9221@leitl.org> On Thu, Jan 20, 2005 at 10:47:38AM -0500, Trei, Peter wrote: > I've actually seen these devices in operation. The thing > that impressed me most was that the path need not be a > single fiber from end to end - you can maintain quantum > state across a switchable fiber junction. This means Very impressive. If they manage to keep the entanglement all the way up to LEO by line of sight it would be even more impressive (anyone thinks this can be done at all?) > you are no longer limited to a single pair of boxes talking to > each other. What makes it very important is early beginnings of practical quantum computing. Will photonics and spintronics in solid state at RT play well with each other? Will error correction scale to large qubit register sizes? Will the algorithm space be large and rich enough to be practical? All very interesting questions Scientific American fails to raise. > True, the SciAm article doesn't address a lot of issues, > but the fact remains that this technology is interesting > and important. I agree that this technology is interesting and important, but not for what it claims to be used for. Quantum encryption right now is a tool to milk the gullible, and hence very much crypto snake oil. For these distances one-time pads by trusted couriers would seem so much more practical and so much cheaper. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From mv at cdc.gov Fri Jan 21 06:37:48 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 21 Jan 2005 06:37:48 -0800 Subject: crypto, science, and popular writing Message-ID: <41F113BC.DB7D6A7E@cdc.gov> At 03:23 PM 1/20/05 +0000, Justin wrote: >How could they possibly get clue? Scientists don't want to write >pop-sci articles for a living. It's impossible to condense most current >research down to digestible kernels that the masses can understand. >SciAm should close down, requiring those who care about science to learn >enough about it to read science journals. That is untrue. In fact, RSA was introduced to the wider audience via Sci Am IIRC. >Professors who can teach a QM course well in a semester are rare enough. >I doubt any one of them could write a 5000 word article on quantum >entanglement that would be intelligible to the average cretinous >American who wants to seem smart by reading Sci-Am. If they want to be >smart, they can start by picking up an undergrad-level book on QM. But >that requires much effort to read, unlike a glossy 5000 word article. I disagree. I think some here --even you-- could write such an article. Simply state entanglement as a given, much like gravity or maxwell's electromagnetics, and then explain how its useful. *Why* and *how* the "givens" are correct is not necessary, perhaps not even known. (After all, all physics does bottom out with phenomenology). The same is true for explaining symmetric crypto, hasing, or PK ---just assume a "hard" function, or a "one way trap door function", ignoring avalanche or the number theory behind it, and go to applications immediately. That Sci Am has gotten lefty and soft is regrettable, but don't think this means that crypto and QM apps can't be explained to your grandmother. From nobody at paranoici.org Fri Jan 21 04:07:54 2005 From: nobody at paranoici.org (Anonymous) Date: Fri, 21 Jan 2005 13:07:54 +0100 (CET) Subject: happy newyear's eve In-Reply-To: <5d7a5367a33651cae734dd0d58fe03d8@melontraffickers.com> Message-ID: > Reagan, Ronald Wilson unres 1911-02-06 2004-06-05 U.S. president Reagan's ssn is 480-07-7456. From sunder at sunder.net Fri Jan 21 10:23:36 2005 From: sunder at sunder.net (sunder) Date: Fri, 21 Jan 2005 13:23:36 -0500 Subject: new egold phisher - this time it's a malware executable Message-ID: <41F148A8.4000809@sunder.net> So, the e-gold phishers are at it again... received a very nice email this morning with an attachment. The Received-From header showed this beauty: "from 195.56.214.184 (dwwsaviej at cable-214-184.hszob.fibernet.bacs-net.hu [195.56.214.184] (may be forged))" Indeed! Don't know if it's a trojan, spyware, virus, or worm, and I couldn't care less since I don't use egold, but would be interesting (just for curiosity's sake) if someone were to disassemble it to see what it does. It's probably a password grabber of some kind, so falls under spyware, but who knows what other evil payloads were in the attachment. ROTFL! ------------------------------------------------------------------------- Text said: Dear E-gold Customer, Herewith we strongly recommend you to install this Service Pack to your PC, as lately we have received a lot of complains regarding unauthorized cash withdrawals from our customers' accounts. This upgrade blocks all currently known Trojan modules and eliminates the possibility of cash withdrawals without your authorization. We highly recommend to install this Service Pack to secure your accounts. Please note, that E-gold doesn't take any responsibility and doesn't accept any claims regarding losses caused by fraudulent actions, if your account has not been duly protected by the present Service Pack. Please find enclosed the archive of the Service Pack installation file in the attachment to this message. From measl at mfn.org Fri Jan 21 14:12:11 2005 From: measl at mfn.org (J.A. Terranson) Date: Fri, 21 Jan 2005 16:12:11 -0600 (CST) Subject: Cpunk Sighting Message-ID: <20050121161118.H19833@ubzr.zsa.bet> John Young, Cryptome strikes again. NPR is running a story on all of the "sensitive information" available. Funny shit! -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner From mv at cdc.gov Fri Jan 21 17:58:13 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 21 Jan 2005 17:58:13 -0800 Subject: Cpunk Sighting Message-ID: <41F1B334.6A58A885@cdc.gov> At 04:12 PM 1/21/05 -0600, J.A. Terranson wrote: >John Young, Cryptome strikes again. NPR is running a story on all of the >"sensitive information" available. Funny shit! LATimes ran something too! And even included a link to the mental-jihadist, terrorist-du-coeur, amateur pan-geo-opticon-astronomer who freely admits having studied what hold buildings (and the thugs that tax them) up, as well as once being an operative of the largest, most WMD'd military ever. Zeus bless his Promethian soul. http://www.latimes.com/news/nationworld/world/la-fg-briefs21jan21,1,5352367.story January 21, 2005 IN BRIEF / CANADA Many Barred From U.S. Because of Security Lists From Times Wire Reports Dozens of people from Canada have been turned back at the U.S. border or prevented from boarding U.S.-bound planes because their names are on the American "no-fly" list or a State Department list of possible terrorists, documents show. The incidents are detailed in daily briefs from the Homeland Security Department. They contain no classified information. A department spokesman confirmed that the memos, posted at http://cryptome.org , were legitimate. From rah at shipwright.com Fri Jan 21 19:51:08 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 21 Jan 2005 22:51:08 -0500 Subject: Airport Screening Gets Smarter Message-ID: The Wall Street Journal January 20, 2005 Airport Screening Gets Smarter Government Rolls Out Tests Of Systems to Improve Detection of Explosives By KATHRYN KRANHOLD Staff Reporter of THE WALL STREET JOURNAL January 20, 2005; Page D1 Prepare to get puffed on. The government is stepping up its investment in technology designed to make screening people and baggage at airports easier and more reliable. General Electric Co. will announce today that the federal Transportation Security Administration has certified its new machines that more precisely detect explosives in checked luggage, reducing false positives and making it possible to do fewer manual searches of bags. The machines, already in place in European cities and Israel, will be tested in U.S. airports this year, according to industry sources. In addition, the TSA, part of the Department of Homeland Security, plans to expand a pilot program using so-called Explosive Trace Portals to scan passengers for explosives. These machines, made by GE and Smith Detections, a unit of London-based Smiths Group PLC, work by blowing puffs of air at passengers, collecting samples of ion-charged air, and instantly analyzing it for explosives, sounding an alarm if any trace is detected. The GE machines are currently in five U.S. airports, including San Diego and Tampa; as many as nine other cities will be added this year, according to the TSA, including Los Angeles, Boston, Miami, Las Vegas and San Francisco. A Smith Detections unit is in New York's Kennedy Airport. Bomb sniffer: GE's 'trace portal,' now in five U.S. airports, tests people for explosives. The technology should go some way toward resolving complaints about the new security procedures in place since 9/11. The TSA has been under fire for the way screeners conduct personal searches, and for mishandling passengers' checked bags during searches. In the latest figures, from November 2004, the TSA received 652 complaints regarding its screening procedures, and an additional 678 complaints about its handling of personal property. That compares with 218 complaints about courtesy and 42 about the processing time. But the technology is advancing faster than the government's ability to deploy it. At current spending levels, says David Plavin, president of Airports Council International-North America, an airport trade group, it will take 15 to 20 years to automate airports' baggage systems with the advanced screening and more-efficient explosives-detection technology. "We're way, way below what large-scale deployment would need," he says. "We're not in the right ballpark." TSA funding for the new technologies has varied from year to year. This year, the TSA has $180 million to purchase explosives-detection systems, up 20% from $150 million in 2004. Additionally, the TSA has announced about $1 billion in grants to pay for airport construction to install screening machines as part of automated baggage systems. GE and analysts who follow the company believe that the market for security technology will continue to grow in the U.S. and overseas as ports and other transportation systems look for ways to screen for explosives. A TSA spokeswoman said the administration is "committed to aggressively deploying the newest technology available" within the authorized budget. Explosives screening has also moved to cruise ships and commercial air cargo. Recently, Miami's airport officials placed one of its explosives-detection screeners at its port area to screen luggage for passengers boarding cruise ships. The TSA also has a small program screening commercial air cargo at a handful of airports in cities including Miami and Dallas. The machines are made by GE and L-3 Communications, a New York City-based manufacturer of security technology, also approved by the TSA. There is competition to produce lower-cost machines. The TSA recently certified another manufacturer, Reveal Imaging Technologies, based in Bedford, Mass., which has developed baggage screening machines that are smaller and less expensive than those made by GE or L-3. GE's newest machines scan bags that have been flagged, checking the molecular makeup of a suspect item. Reveal's machines cost about $500,000 apiece, compared with more than $1 million for GE's and L-3's. But these machines may be viable only in smaller airports. After the Sept. 11 attacks, as part of a federal mandate, the country's 450 airports installed explosive-trace detection machines or explosive-detection machines based on advanced medical computed tomography, or CT technology. The explosive-detection machines, made by GE and L-3, detect items of a certain density that could be an explosive. The machine isn't foolproof; a chunk of cheese or a fruitcake, for example, can falsely trigger an alarm. Once a bag is tagged as having a possible bomb inside, airport security employees further evaluate the bag through an onscreen view and then often a search. GE's newest technology, called Yxlon XES 3000, works in concert with the CT-based explosive-detection machines. Once a bag has been flagged, it is sent through the second machine, which determines the molecular makeup of the suspect item. GE says the secondary screening reduces to a minimum the percentage of false positives -- and the need for time-consuming hand searches. The trace portals that screen individual passengers cost from $130,000 to $150,000 apiece. They are used in addition to metal detectors, but on a random basis, not with every passenger. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From arma at mit.edu Fri Jan 21 22:54:42 2005 From: arma at mit.edu (Roger Dingledine) Date: Sat, 22 Jan 2005 01:54:42 -0500 Subject: Tor 0.0.9.3 is out Message-ID: Tor 0.0.9.3 improves cpu usage, works better when the network was recently offline and you try to use Tor, and makes hidden services less unbearable. http://tor.eff.org/download.html o Bugfixes on 0.0.9: - Backport the cpu use fixes from main branch, so busy servers won't need as much processor time. - Work better when we go offline and then come back, or when we run Tor at boot before the network is up. We do this by optimistically trying to fetch a new directory whenever an application request comes in and we think we're offline -- the human is hopefully a good measure of when the network is back. - Backport some minimal hidserv bugfixes: keep rend circuits open as long as you keep using them; actually publish hidserv descriptors shortly after they change, rather than waiting 20-40 minutes. - Enable Mac startup script by default. - Fix duplicate dns_cancel_pending_resolve reported by Giorgos Pallas. - When you update AllowUnverifiedNodes or FirewallPorts via the controller's setconf feature, we were always appending, never resetting. - When you update HiddenServiceDir via setconf, it was screwing up the order of reading the lines, making it fail. - Do not rewrite a cached directory back to the cache; otherwise we will think it is recent and not fetch a newer one on startup. - Workaround for webservers that lie about Content-Encoding: Tor now tries to autodetect compressed directories and compression itself. This lets us Proxypass dir fetches through apache. ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Sat Jan 22 01:01:46 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 22 Jan 2005 10:01:46 +0100 Subject: Tor 0.0.9.3 is out (fwd from arma@mit.edu) Message-ID: <20050122090145.GF9221@leitl.org> ----- Forwarded message from Roger Dingledine ----- From sunder at sunder.net Sat Jan 22 09:10:59 2005 From: sunder at sunder.net (sunder) Date: Sat, 22 Jan 2005 12:10:59 -0500 Subject: new egold phisher - this time it's a malware executable In-Reply-To: <41F148A8.4000809@sunder.net> References: <41F148A8.4000809@sunder.net> Message-ID: <41F28923.909@sunder.net> Got another one today with a RAR attachment claiming it was a screen shot. Text is: Dear Sir Yesterday you have arrived the amount of $1000 into my account. Of course, I do not object, but you probably were mistaken number of the account when transferred, and it happens not first time. Please look an attached screenshot of all your transfers into my account. I have no idea why you transfer money to me, as I do not know you, and I need no money. If you were mistaken, I'll return this money to you! Sincerely. Nice... what's next? an egold transfer from a lawyer claiming a long lost uncle kicked the bucket and left me a fortune? :-D Wheee! sunder wrote: > So, the e-gold phishers are at it again... received a very nice email > this morning with an attachment. The Received-From header showed this > beauty: "from 195.56.214.184 > (dwwsaviej at cable-214-184.hszob.fibernet.bacs-net.hu [195.56.214.184] > (may be forged))" > > Indeed! > > Don't know if it's a trojan, spyware, virus, or worm, and I couldn't > care less since I don't use egold, but would be interesting (just for > curiosity's sake) if someone were to disassemble it to see what it does. > It's probably a password grabber of some kind, so falls under spyware, > but who knows what other evil payloads were in the attachment. > > ROTFL! > > ------------------------------------------------------------------------- > Text said: > > Dear E-gold Customer, > > Herewith we strongly recommend you to install this Service Pack to your > PC, as lately we have received a lot of complains regarding unauthorized > cash withdrawals from our customers' accounts. This upgrade blocks all > currently known Trojan modules and eliminates the possibility of cash > withdrawals without your authorization. We highly recommend to install > this Service Pack to secure your accounts. > Please note, that E-gold doesn't take any responsibility and doesn't > accept any claims regarding losses caused by fraudulent actions, if your > account has not been duly protected by the present Service Pack. > > Please find enclosed the archive of the Service Pack installation file > in the attachment to this message. From steve49152 at yahoo.ca Sat Jan 22 13:56:56 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Sat, 22 Jan 2005 16:56:56 -0500 (EST) Subject: Cpunk Sighting In-Reply-To: <41F1B334.6A58A885@cdc.gov> Message-ID: <20050122215656.23382.qmail@web51807.mail.yahoo.com> --- "Major Variola (ret)" wrote: > At 04:12 PM 1/21/05 -0600, J.A. Terranson wrote: > >John Young, Cryptome strikes again. NPR is running a story on all of > the > >"sensitive information" available. Funny shit! > > LATimes ran something too! And even included a link to the > mental-jihadist, > terrorist-du-coeur, amateur pan-geo-opticon-astronomer who freely admits > having studied what hold buildings (and the thugs that tax them) up, as > well as once being an operative of the largest, most WMD'd military > ever. Zeus bless his Promethian soul. > > http://www.latimes.com/news/nationworld/world/la-fg-briefs21jan21,1,5352367.story > > > > January 21, 2005 > > IN BRIEF / CANADA > Many Barred From U.S. Because of Security Lists > From Times Wire Reports > > Dozens of people from Canada have been turned back > at the U.S. border or prevented > from boarding U.S.-bound planes because their > names are on the American "no-fly" list > or a State Department list of possible terrorists, > documents show. > > The incidents are detailed in daily briefs from > the Homeland Security Department. They > contain no classified information. > A > department spokesman > > confirmed that the memos, > > posted at > > http://cryptome.org , were > > legitimate. Were legitimate? What happened, did their content expire or something? Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From rah at shipwright.com Sat Jan 22 15:01:13 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 22 Jan 2005 18:01:13 -0500 Subject: Walter B. Wriston: A Remembrance Message-ID: Wriston was in cryptography in WWII, and was also on of the Neal Stephenson's "informants" on finance when he was researching Cryptonomicon. If you ever read his stuff during the dot-com years, he sounded pure financial cypherpunk. Cheers, RAH -------- Forbes Obituary Walter B. Wriston: A Remembrance Steve Forbes, 01.21.05, 6:59 PM ET Walter Wriston Add To Tracker Walt Wriston, former Chairman and CEO of Citicorp/Citibank, was also a founding director of Forbes.com and served until last year. Our revenues would never have equaled what Citicorp took in every few minutes, but to Walt, that did not matter at all. He was, at heart, an innovator, an entrepreneur, an original thinker and a man who delighted in getting things done. He quickly grasped the promise of the Internet and never lost faith in its possibilities in the aftermath of the high-tech bubble. The fact that there would be setbacks and excesses in the field were to him part of the normal course of events in a free market. They never made him lose sight of how powerful an instrument the Internet is. He understood, as few others did, how fundamentally vital is the spread of information. The willingness to pioneer by pursuing and investing in new technologies and going into areas where others wouldn't tread -- or had tread and faltered -- was how this man truly revolutionized American and global banking. The word "revolution" has been grossly over-used, but what Wriston did for finance was just that -- a revolution. Until the 1960s, banking was a backwater. A handful of hours each day was more than sufficient to handle one's responsibilities. Commercial bankers were risk-averse. They were stodgy. They didn't want to be bothered with consumers -- that was for savings banks, not commercial banks. The government told banks what interest rates they were allowed to pay on deposits. Before Walt was through, he almost single-handedly turned banking from the equivalent of a small, sleepy town into a hyper-energetic, New York-like metropolis. Under his leadership, Citibank pioneered automatic-teller machines. It pursued the credit card business in a way that no other bank was doing at the time. He constantly battered government regulations. He expanded internationally at a dizzying pace. Old constraints on banks were consigned to the dustbin of history. Walt made what is now called Citigroup the world's leading financial institution. Because he was not risk-averse, he made his share of mistakes. But these were minute compared to his monumental achievements. Walt was a delight to be around. He believed passionately in free markets. His insights were almost always original and profound. Our board meetings were always productive and stimulating. Walt was both an intellectual and a restless doer. My only regret is that he was never given the reins to run our Treasury Department or the Federal Reserve. Now that would have been a sight to behold! In the end, however, Walt Wriston achieved far, far more than have those who have held these kinds of public sector posts. We have lost a truly remarkable man. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sat Jan 22 10:14:48 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 22 Jan 2005 19:14:48 +0100 Subject: FBI objects to air being breathable Message-ID: <20050122181447.GL9221@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/22/1439222 Posted by: CowboyNeal, on 2005-01-22 16:01:00 from the too-much-freedom dept. An anonymous reader writes "In what seems to be in opposition to the Freedom of Information Act, the FBI is seeking to [1]limit document searches. It seems since now that a lot of documents are in electronic form, searching them is much easier than before, and for that reason the FBI is taking this action." [2]Click Here References 1. http://story.news.yahoo.com/news?tmpl=story&cid=514&e=13&u=/ap/20050121/ap_on _go_ca_st_pe/fbi_openness ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Sat Jan 22 16:17:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 22 Jan 2005 19:17:28 -0500 Subject: Vive le rubber 'ose: 'The Interrogators' and 'Torture': Hard Questions Message-ID: The New York Times January 23, 2005 'The Interrogators' and 'Torture': Hard Questions By ROBERT D. KAPLAN THE INTERROGATORS Inside the Secret War Against Al Qaeda. By Chris Mackey and Greg Miller. Illustrated. 484 pp. Little, Brown & Company. $25.95. TORTURE A Collection. Edited by Sanford Levinson. 319 pp. Oxford University Press. $29.95. T a time when neither a large national economy nor a modern military is required to produce and deploy a weapon that can destroy a medium-size American city, a good interrogator constitutes a better defense against catastrophe than soldiers or marines. No group of people in the defense establishment get to know the enemy better on a personal level than interrogators do. As the Abu Ghraib scandal reveals, some guards and interrogators can be sadistic ghouls; but many other interrogators could qualify as the most liberal people in the armed services since, for one thing, they have spent years studying the language and the history of their captives. As one Special Forces officer told me in Afghanistan, ''In order to defeat the enemy you first have to love him, and his culture.'' Competent interrogation is less about breaking a prisoner down to learn a single fact than about engaging him in hours upon hours of conversation, and comparing his responses on seemingly irrelevant details with those of others revealed under questioning. It is about looking for one plot and finding another; or rather not finding a plot at all, but happening upon -- for example -- the travel patterns and safe houses of a group of Muslim terrorists of one nationality and deducing how that group differs from another. Real interrogation is about finding shards of evidence in a desert, in which a vital fragment will come not from a high-level Qaeda operative, but from a midlevel functionary who spends weeks in captivity before anyone realizes his importance. In ''The Interrogators: Inside the Secret War Against Al Qaeda,'' Chris Mackey (the pseudonym of an Army interrogator) and Greg Miller, a Los Angeles Times correspondent, write that as a prisoner in Afghanistan reached for his glasses (by now long lost) when he went to examine a photograph, that ''absent-minded move'' alerted interrogators to the fact that he was ''accustomed to poring over documents.'' Interrogators can use many tools that do not involve actual physical abuse. They spread rumors among detainees, wear them down through repetitive questioning and threaten to turn them over to other intelligence services known to employ torture -- all of which cause interrogators constantly to ask themselves where, exactly, does the slippery slope toward real abuse begin? Sadly, it is no use saying torture never works, because as the French authorities learned in Algeria, as the Filipinos learned with their own Muslim insurgents and as the Dubai authorities learned with a Qaeda terrorist, it periodically does work, and in some instances can possibly avert a major attack. While it is true that the threat of torture, as Mackey and Miller report, induces more anxiety among detainees than torture itself, that threat over time will carry little weight if it becomes widely known that the jailers have no record of following through. ''Fear is often an interrogator's best ally,'' the authors note, ''but it doesn't have a long shelf life.'' A captured Qaeda manual even advises Muslim prisoners that people in the West don't ''have the stomach'' for torture, ''because they are not warriors.'' Machiavelli famously said that good men bent on doing good must know how to be bad. And because we all share a social world, he goes on, the virtue of a policy maker resides not in his moral perfection but in the communal result of his act. If one is not already ill at ease with such maxims, consider this: In the ultimate hypothetical case, if a terrorist with hard intelligence about an impending large-scale terrorist strike could be broken by torture, shouldn't it be used? That nauseating question forms the theme of ''Torture: A Collection,'' edited by Sanford Levinson, a professor of government at the University of Texas. What's most striking about these essays is that despite their abstract and theoretical content, they generally do not contradict the depiction of actual interrogators described by Mackey and Miller. The wall between the liberal campus and a conservative, utilitarian-minded military breaks down because the questions are so serious that few of this book's contributors want to engage in polemics, and few -- to their credit -- ever seem completely comfortable with their own conclusions. To follow Machiavelli further: it is not simply and crudely that the ends justify the means. It is that evil, if it is to be employed, should be used only to the minimum extent necessary, and then only to accomplish a demonstrably greater amount of good. As the Princeton professor Michael Walzer writes, ''It is important to stress Machiavelli's own commitment to the existence of moral standards.'' But knowing what that minimum extent is, and knowing with reasonable certainty that a greater amount of good will result, thwarts scholars and interrogators alike. The Harvard law professor Alan Dershowitz argues for legally sanctioning torture in ''ticking bomb'' cases. ''At bottom, my argument is not in favor of torture of any sort,'' he says. ''It is against all forms of torture without accountability.'' His rationale is that in ticking bomb cases the idea that torture in some form will not be used is illusory, and the government should not be able to walk away from responsibility for it. That, in effect, would leave the interrogators with all of the legal and moral blame. Jean Bethke Elshtain, a professor of ethics at the University of Chicago, counters that torture is so extreme that it should remain ''tabooed and forbidden,'' and that any attempt to legitimize torture even in the rarest of cases risks the slippery slope toward normalizing it. Seeking a middle ground, Miriam Gur-Arye, a criminal law professor at the Hebrew University of Jerusalem, argues that in the absence of a concrete terrorist threat, only a specific self-defense argument can justify force in an interrogation: it cannot be justified by the more general and utilitarian -- that is, Machiavellian -- argument of necessity. Interrogators themselves are not above such hairsplitting. After an intense discussion about how humane it would be to deprive prisoners of sleep, and just how much sleep deprivation constituted cruelty, Mackey came to the conclusion that ''if the interrogator followed the exact same regime -- slept, ate . . . and took breaks on the same schedule as the prisoner -- there was no way to argue'' that such treatment was cruel. There is even a name for an interrogator staying with a prisoner until one or the other of them breaks: it's called ''monstering.'' Double-teaming a prisoner, in which different interrogators take turns sleeping, was considered immoral, Mackey says. Because monstering was so hard for an interrogator to endure, it was used only when something important was at stake and the prisoner seemed close to breaking. One interrogator kept a prisoner in a booth for 29 straight hours. It was worth it, Mackey reports: the prisoner had been a translator for Osama bin Laden and disclosed a Qaeda plot to use the chemical agent ricin. But what if the prisoner hadn't confessed? Should he have been double-teamed for 48 hours and beaten? Such questions demand answers, and yet are unanswerable. My own experience covering the military suggests a different approach to the issue. As Mackey and Miller themselves note, the effectiveness of interrogators is regularly undermined by a host of problems that have nothing to do with torture. Rarely do military interrogators get all the language training they need. Their offices are understaffed. When they walk into an interrogation room they often lack vital information about the detainee that another agency in the United States government already possesses, and won't share. Embedded with Army Special Forces in Afghanistan a year ago, I was shocked by how a creaky bureaucracy was stalling the hunt for terrorists on the Pakistani frontier. An administration that dynamically addresses such problems will provide the public with a wider cushion of protection than one that stretches the boundaries of what constitutes physical abuse. No matter how wise those drawing up the guidelines are, however, the art of interrogation does not lend itself to micromanagement from above. Interrogators will forever be forced to make split-second decisions with grave life-and-death consequences. The way toward public safety and out of the moral abyss will come less from philosophy than from sturdy bureaucratic reform: correcting, for example, the broken reserve system that contributed directly to the abuses at Abu Ghraib. An interrogator armed with fluent Arabic and every scrap of intelligence the system can muster, who has mastered the emerging science of eye movements and body signals, who can act threatening as well as empathetic toward a prisoner, should not require the ultimate tool. Robert D. Kaplan, a correspondent for The Atlantic Monthly, is the author of many books, including the forthcoming ''Imperial Grunts: The American Military on the Ground.'' -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 23 05:15:10 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 23 Jan 2005 08:15:10 -0500 Subject: Commandos Get Duty on U.S. Soil as Antiterror Efforts Expand Message-ID: The New York Times January 23, 2005 Commandos Get Duty on U.S. Soil as Antiterror Efforts Expand By ERIC SCHMITT WASHINGTON, Jan. 22 - Somewhere in the shadows of the White House and the Capitol this week, a small group of super-secret commandos stood ready with state-of-the-art weaponry to swing into action to protect the presidency, a task that has never been fully revealed before. As part of the extraordinary army of 13,000 troops, police officers and federal agents marshaled to secure the inauguration, these elite forces were poised to act under a 1997 program that was updated and enhanced after the Sept. 11 attacks, but nonetheless departs from how the military has historically been used on American soil. These commandos, operating under a secret counterterrorism program code-named Power Geyser, were mentioned publicly for the first time this week on a Web site for a new book, "Code Names: Deciphering U.S. Military Plans, Programs and Operation in the 9/11 World," (Steerforth Press). The book was written by William M. Arkin, a former intelligence analyst for the Army. The precise number of these Special Operations forces in Washington this week is highly classified, but military officials say the number is very small. The special-missions units belong to the Joint Special Operations Command, a secretive command based at Fort Bragg, N.C., whose elements include the Army unit Delta Force. In the past, the command has also provided support to domestic law enforcement agencies during high-risk events like the Olympics and political party conventions, according to the Web site of GlobalSecurity.org, a research organization in Alexandria, Va. The role of the armed forces in the United States has been a contentious issue for more than a century. The Posse Comitatus Act of 1878, which restricts military forces from performing domestic law enforcement duties, like policing, was enacted after the Civil War in response to the perceived misuse of federal troops who were policing in the South. Over the years, the law has been amended to allow the military to lend equipment to federal, state and local authorities; assist federal agencies in drug interdiction; protect national parks; and execute quarantine and certain health laws. About 5,000 federal troops supported civilian agencies at the Winter Olympics in Salt Lake City three years ago. Since Sept. 11, however, military and law enforcement agencies have worked much more closely not only to help detect and defeat any possible attack, including from unconventional weapons, but also to assure the continuity of the federal government in case of cataclysmic disaster. The commandos here this week were the same type of Special Operations forces who are hunting top insurgents in Iraq and Osama bin Laden in the mountainous wilds of Afghanistan and Pakistan. But under the top-secret military plan, they are also conducting counterterrorism missions in support of civilian agencies in the United States. "They bring unique military and technical capabilities that often are centered around potential W.M.D. events," said a senior military official who has been briefed on the units' operations. A civil liberties advocate who was told about the program by a reporter said that he had no objections to the program as described to him because its scope appeared to be limited to supporting the counterterrorism efforts of civilian authorities. Mr. Arkin, in the online supplement to his book (codenames.org/documents.html), says the contingency plan, called JCS Conplan 0300-97, calls for "special-mission units in extra-legal missions to combat terrorism in the United States" based on top-secret orders that are managed by the military's Joint Staff and coordinated with the military's Special Operations Command and Northern Command, which is the lead military headquarters for domestic defense. Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military's preparations for the inauguration. Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin's characterization of the mission as "extra-legal." One of the officials said the units operated in the United States under "special authority" from either the president or the secretary of defense. Civilian and uniformed military lawyers said provisions in several federal statutes, including the Fiscal Year 2000 Defense Department Authorization Act, Public Law 106-65, permits the secretary of defense to authorize military forces to support civilian agencies, including the Federal Bureau of Investigation, in the event of a national emergency, especially any involving nuclear, chemical or biological weapons. In 1998, the Pentagon's top policy official, Walter B. Slocombe, acknowledged that the military had covert-action teams. "We have designated special-mission units that are specifically manned, equipped and trained to deal with a wide variety of transnational threats," Mr. Slocombe told the Senate Armed Services Committee. "These units, assigned to or under the operational control of the U.S. Special Operations Command, are focused primarily on those special operations and supporting functions that combat terrorism and actively counter terrorist use of W.M.D. These units are on alert every day of the year and have worked extensively with their interagency counterparts." Spokesmen for the Northern Command in Colorado Springs and the Special Operations Command in Tampa, Fla., the parent organization of the Joint Special Operations Command, declined to comment on the plan, the units involved and the mission. "At any given time, there are a number of classified programs across the government that, for national security reasons, it would be inappropriate to discuss," said Bryan Whitman, a Pentagon spokesman. "It would be irresponsible for me to comment on any classified program that may or may not exist." But the Northern Command document that mentions Power Geyser is marked "unclassified." The document states that the purpose of the Department of Defense's contingency planning for the inauguration is to provide "unity of D.O.D. effort to contribute to a safe and secure environment for the 2005 inauguration." The Northern Command missions include deterring an attack or mitigating its consequences, and coordinating with the Special Operations Command. In a telephone interview from his home in Vermont, Mr. Arkin said the military's reaction to the disclosure of the counterterrorism plan and its operating units reflected "the silliness of calling something that's obvious, classified." "I'm not revealing what they're doing or the methods of their contingency planning," he said. "I don't compromise any sensitive intelligence operations by revealing sources and methods. I don't reveal ongoing operations in specific locales." Mr. Arkin's book is a glossary of more than 3,000 code names of past and present operations, programs and weapons systems, with brief descriptions of each. Most involved secret activities, and details of many of the programs could not be immediately confirmed. The book also describes American military operations and assistance programs in scores of countries, from Afghanistan to Zimbabwe. The murky world of "special access programs" and other secret military and intelligence activities is covered in the book, too. Some code names describe highly classified research programs, like Thirsty Saber, a program that in the 1990's tried to develop a sensor to replace human reasoning. Others describe military installations in foreign countries, like Poker Bluff I, an electronic-eavesdropping collection station in Honduras in the 1980's. Many involve activities related to the survival of the president and constitutional government. The book, for instance, describes Site R, one of the undisclosed locations used by Vice President Dick Cheney since the Sept. 11 attacks. Site R is a granite mountain shelter just north of Sabillasville, Md., near the Pennsylvania border. It was built in the early 1950's to withstand a Soviet nuclear attack. The book also describes a program called Treetop, the presidential emergency successor support plan, which provides survivors of a nuclear strike or other attack with war plans, regulations and procedures to establish teams of military and civilian advisers to presidential successors. A White House spokesman declined to comment on the continuity of government activities cited in the book. People who advocate that the government declassify more of the nation's official documents said the book would fuel the debate over the balance between the public's right to know and the need to keep more military and intelligence matters secret in the campaign against terror. "This is part of an ongoing tug of war to define the boundaries of public information," said Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. "There has been a steady withdrawal of information from the public domain in the present administration, and a reluctance to disclose even the most mundane of facts." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 23 09:29:27 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 23 Jan 2005 12:29:27 -0500 Subject: Commandos Get Duty on U.S. Soil Message-ID: The New York Times January 23, 2005 Commandos Get Duty on U.S. Soil By ERIC SCHMITT WASHINGTON, Jan. 22 - Somewhere in the shadows of the White House and the Capitol this week, a small group of super-secret commandos stood ready with state-of-the-art weaponry to swing into action to protect the presidency, a task that has never been fully revealed before. As part of the extraordinary army of 13,000 troops, police officers and federal agents marshaled to secure the inauguration, these elite forces were poised to act under a 1997 program that was updated and enhanced after the Sept. 11 attacks, but nonetheless departs from how the military has historically been used on American soil. These commandos, operating under a secret counterterrorism program code-named Power Geyser, were mentioned publicly for the first time this week on a Web site for a new book, "Code Names: Deciphering U.S. Military Plans, Programs and Operation in the 9/11 World," (Steerforth Press). The book was written by William M. Arkin, a former intelligence analyst for the Army. The precise number of these Special Operations forces in Washington this week is highly classified, but military officials say the number is very small. The special-missions units belong to the Joint Special Operations Command, a secretive command based at Fort Bragg, N.C., whose elements include the Army unit Delta Force. In the past, the command has also provided support to domestic law enforcement agencies during high-risk events like the Olympics and political party conventions, according to the Web site of GlobalSecurity.org, a research organization in Alexandria, Va. The role of the armed forces in the United States has been a contentious issue for more than a century. The Posse Comitatus Act of 1878, which restricts military forces from performing domestic law enforcement duties, like policing, was enacted after the Civil War in response to the perceived misuse of federal troops who were policing in the South. Over the years, the law has been amended to allow the military to lend equipment to federal, state and local authorities; assist federal agencies in drug interdiction; protect national parks; and execute quarantine and certain health laws. About 5,000 federal troops supported civilian agencies at the Winter Olympics in Salt Lake City three years ago. Since Sept. 11, however, military and law enforcement agencies have worked much more closely not only to help detect and defeat any possible attack, including from unconventional weapons, but also to assure the continuity of the federal government in case of cataclysmic disaster. The commandos here this week were the same type of Special Operations forces who are hunting top insurgents in Iraq and Osama bin Laden in the mountainous wilds of Afghanistan and Pakistan. But under the top-secret military plan, they are also conducting counterterrorism missions in support of civilian agencies in the United States. "They bring unique military and technical capabilities that often are centered around potential W.M.D. events," said a senior military official who has been briefed on the units' operations. A civil liberties advocate who was told about the program by a reporter said that he had no objections to the program as described to him because its scope appeared to be limited to supporting the counterterrorism efforts of civilian authorities. Mr. Arkin, in the online supplement to his book (codenames.org/documents.html), says the contingency plan, called JCS Conplan 0300-97, calls for "special-mission units in extra-legal missions to combat terrorism in the United States" based on top-secret orders that are managed by the military's Joint Staff and coordinated with the military's Special Operations Command and Northern Command, which is the lead military headquarters for domestic defense. Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military's preparations for the inauguration. Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin's characterization of the mission as "extra-legal." One of the officials said the units operated in the United States under "special authority" from either the president or the secretary of defense. Civilian and uniformed military lawyers said provisions in several federal statutes, including the Fiscal Year 2000 Defense Department Authorization Act, Public Law 106-65, permits the secretary of defense to authorize military forces to support civilian agencies, including the Federal Bureau of Investigation, in the event of a national emergency, especially any involving nuclear, chemical or biological weapons. In 1998, the Pentagon's top policy official, Walter B. Slocombe, acknowledged that the military had covert-action teams. "We have designated special-mission units that are specifically manned, equipped and trained to deal with a wide variety of transnational threats," Mr. Slocombe told the Senate Armed Services Committee. "These units, assigned to or under the operational control of the U.S. Special Operations Command, are focused primarily on those special operations and supporting functions that combat terrorism and actively counter terrorist use of W.M.D. These units are on alert every day of the year and have worked extensively with their interagency counterparts." Spokesmen for the Northern Command in Colorado Springs and the Special Operations Command in Tampa, Fla., the parent organization of the Joint Special Operations Command, declined to comment on the plan, the units involved and the mission. "At any given time, there are a number of classified programs across the government that, for national security reasons, it would be inappropriate to discuss," said Bryan Whitman, a Pentagon spokesman. "It would be irresponsible for me to comment on any classified program that may or may not exist." But the Northern Command document that mentions Power Geyser is marked "unclassified." The document states that the purpose of the Department of Defense's contingency planning for the inauguration is to provide "unity of D.O.D. effort to contribute to a safe and secure environment for the 2005 inauguration." The Northern Command missions include deterring an attack or mitigating its consequences, and coordinating with the Special Operations Command. In a telephone interview from his home in Vermont, Mr. Arkin said the military's reaction to the disclosure of the counterterrorism plan and its operating units reflected "the silliness of calling something that's obvious, classified." "I'm not revealing what they're doing or the methods of their contingency planning," he said. "I don't compromise any sensitive intelligence operations by revealing sources and methods. I don't reveal ongoing operations in specific locales." Mr. Arkin's book is a glossary of more than 3,000 code names of past and present operations, programs and weapons systems, with brief descriptions of each. Most involved secret activities, and details of many of the programs could not be immediately confirmed. The book also describes American military operations and assistance programs in scores of countries, from Afghanistan to Zimbabwe. The murky world of "special access programs" and other secret military and intelligence activities is covered in the book, too. Some code names describe highly classified research programs, like Thirsty Saber, a program that in the 1990's tried to develop a sensor to replace human reasoning. Others describe military installations in foreign countries, like Poker Bluff I, an electronic-eavesdropping collection station in Honduras in the 1980's. Many involve activities related to the survival of the president and constitutional government. The book, for instance, describes Site R, one of the undisclosed locations used by Vice President Dick Cheney since the Sept. 11 attacks. Site R is a granite mountain shelter just north of Sabillasville, Md., near the Pennsylvania border. It was built in the early 1950's to withstand a Soviet nuclear attack. The book also describes a program called Treetop, the presidential emergency successor support plan, which provides survivors of a nuclear strike or other attack with war plans, regulations and procedures to establish teams of military and civilian advisers to presidential successors. A White House spokesman declined to comment on the continuity of government activities cited in the book. People who advocate that the government declassify more of the nation's official documents said the book would fuel the debate over the balance between the public's right to know and the need to keep more military and intelligence matters secret in the campaign against terror. "This is part of an ongoing tug of war to define the boundaries of public information," said Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. "There has been a steady withdrawal of information from the public domain in the present administration, and a reluctance to disclose even the most mundane of facts." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From udhay at pobox.com Sun Jan 23 03:54:11 2005 From: udhay at pobox.com (Udhay Shankar N) Date: Sun, 23 Jan 2005 17:24:11 +0530 Subject: [silk] A new Social Communication Network: Bellster Message-ID: What a cool idea! I wonder if there's a business model or two lurking in here... Udhay >this is an amazing extension of the idea initially implemented by >tpc.int. While I can't afford to give up any of my phone lines, getting a >third line just for this purpose is not a bad idea. Especially when it >would be irritating as hell to the phone company. > >One could use Internet technology to reimplement 1960s Soviet/Third World >country phone use enabling people from all over the world queue up to use >a telephone. > >---eric > > >-------- Original Message -------- >Subject: [FWD] A new Social Communication Network: Bellster >Date: Sat, 22 Jan 2005 08:42:28 -0500 >From: Jeff Pulver >Reply-To: Free World Dialup - The Future of Dialing > >To: FWD at LISTSERV.PULVER.COM > >Hi All, > >Back in the Fall of 1995, with the help of some friends, Free World Dialup >(FWD) version 1.0 happened. The original concept was to setup a computer, >modem and let a friend (or a stranger) place a call over the internet via >your computer. This was done on an experimental, non-commercial, voluntary >basis and we had quite a number of people who contributed their own time, >effort and energy to make it work. FWD was the world's first internet >telephony network and was a pioneer in the field of PC to Phone >communication services. > >Back in November 2000 I once again looked at re-creating the spirit of the >original FWD project but this time we tried to do it using the broadband >internet. After several months of work we were able to get the underlying >software to work pretty good, but our project became challenged once the >hardware devices we optimized the software for, the Cisco ATA-182 were >discontinued. We were live in beta in April 2001 when CNET ran the story: >Can a peer-to-peer phone network fly? (see: >). > >Fast forward to January, 2005 and with the beta launch of Bellster.net we >are finally able to offer a peer-to-peer network where members of the >network can share their PSTN access with each other. This "network" will >only become a network once there is a critical mass number of people who >are contributing to the success of Bellster. > >Bellster is based on a couple of underlying philosophies: > >(1) "If you Build it They will Come" -- Field of Dreams >(2) "The Love you Take is equal to the Love you Make" -- Beatles, "The >End" > >The Bellster challenge for 2005 is to find out whether or not there are >still people in the world who would let total strangers place >non-commercial phone calls for free in exchange for the ability to do the >same thing themselves. At the moment we have a handful of active nodes >around the world, and as the word of Bellster spreads, my hope is that our >network will be able to deliver calls to the PSTN all around the world. > >Bellster is based on Asterisk and operates as an IAX exchange. > >If you are interested in experimenting with Asterisk and would like to >contribute to the Bellster Social Communication Network, please feel free >to visit www.bellster.net for more information and sign up today. > >Best regards, > > Jeff > >_____________________________________________________________ >List Archives: (http://listserv.pulver.com/archives/fwd.html) >Unsubscribe: (http://tinyurl.com/mg1m) > >-- -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Sun Jan 23 13:15:07 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2005 22:15:07 +0100 Subject: Ronald McDonald's SS Message-ID: <20050123211507.GS9221@leitl.org> I'm sure in due time they'll just start calling it Strategic Support, period. http://news.yahoo.com/news?tmpl=story&cid=1802&u=/washpost/20050123/ts_washpo st/a29414_2005jan22&printer=1 Secret Unit Expands Rumsfeld's Domain Sun Jan 23, 1:14 AM ET By Barton Gellman, Washington Post Staff Writer The Pentagon (news - web sites), expanding into the CIA (news - web sites)'s historic bailiwick, has created a new espionage arm and is reinterpreting U.S. law to give Defense Secretary Donald H. Rumsfeld broad authority over clandestine operations abroad, according to interviews with participants and documents obtained by The Washington Post. The previously undisclosed organization, called the Strategic Support Branch, arose from Rumsfeld's written order to end his "near total dependence on CIA" for what is known as human intelligence. Designed to operate without detection and under the defense secretary's direct control, the Strategic Support Branch deploys small teams of case officers, linguists, interrogators and technical specialists alongside newly empowered special operations forces. Military and civilian participants said in interviews that the new unit has been operating in secret for two years -- in Iraq (news - web sites), Afghanistan (news - web sites) and other places they declined to name. According to an early planning memorandum to Rumsfeld from Gen. Richard B. Myers, chairman of the Joint Chiefs of Staff, the focus of the intelligence initiative is on "emerging target countries such as Somalia, Yemen, Indonesia, Philippines and Georgia." Myers and his staff declined to be interviewed. The Strategic Support Branch was created to provide Rumsfeld with independent tools for the "full spectrum of humint operations," according to an internal account of its origin and mission. Human intelligence operations, a term used in counterpoint to technical means such as satellite photography, range from interrogation of prisoners and scouting of targets in wartime to the peacetime recruitment of foreign spies. A recent Pentagon memo states that recruited agents may include "notorious figures" whose links to the U.S. government would be embarrassing if disclosed. Perhaps the most significant shift is the Defense Department's bid to conduct surreptitious missions, in friendly and unfriendly states, when conventional war is a distant or unlikely prospect -- activities that have traditionally been the province of the CIA's Directorate of Operations. Senior Rumsfeld advisers said those missions are central to what they called the department's predominant role in combating terrorist threats. The Pentagon has a vast bureaucracy devoted to gathering and analyzing intelligence, often in concert with the CIA, and news reports over more than a year have described Rumsfeld's drive for more and better human intelligence. But the creation of the espionage branch, the scope of its clandestine operations and the breadth of Rumsfeld's asserted legal authority have not been detailed publicly before. Two longtime members of the House Intelligence Committee, a Democrat and a Republican, said they knew no details before being interviewed for this article. Pentagon officials said they established the Strategic Support Branch using "reprogrammed" funds, without explicit congressional authority or appropriation. Defense intelligence missions, they said, are subject to less stringent congressional oversight than comparable operations by the CIA. Rumsfeld's dissatisfaction with the CIA's operations directorate, and his determination to build what amounts in some respects to a rival service, follows struggles with then-CIA Director George J. Tenet over intelligence collection priorities in Afghanistan and Iraq. Pentagon officials said the CIA naturally has interests that differ from those of military commanders, but they also criticized its operations directorate as understaffed, slow-moving and risk-averse. A recurring phrase in internal Pentagon documents is the requirement for a human intelligence branch "directly responsive to tasking from SecDef," or Rumsfeld. The new unit's performance in the field -- and its latest commander, reserve Army Col. George Waldroup -- are controversial among those involved in the closely held program. Pentagon officials acknowledged that Waldroup and many of those brought quickly into his service lack the experience and training typical of intelligence officers and special operators. In his civilian career as a federal manager, according to a Justice Department (news - web sites) inspector general's report, Waldroup was at the center of a 1996 probe into alleged deception of Congress concerning staffing problems at Miami International Airport. Navy Vice Adm. Lowell E. Jacoby, director of the Defense Intelligence Agency, expressed "utmost confidence in Colonel Waldroup's capabilities" and said in an interview that Waldroup's unit has scored "a whole series of successes" that he could not reveal in public. He acknowledged the risks, however, of trying to expand human intelligence too fast: "It's not something you quickly constitute as a capability. It's going to take years to do." Rumsfeld's ambitious plans rely principally on the Tampa-based U.S. Special Operations Command, or SOCOM, and on its clandestine component, the Joint Special Operations Command. Rumsfeld has designated SOCOM's leader, Army Gen. Bryan D. Brown, as the military commander in chief in the war on terrorism. He has also given Brown's subordinates new authority to pay foreign agents. The Strategic Support Branch is intended to add missing capabilities -- such as the skill to establish local spy networks and the technology for direct access to national intelligence databases -- to the military's much larger special operations squadrons. Some Pentagon officials refer to the combined units as the "secret army of Northern Virginia." Known as "special mission units," Brown's elite forces are not acknowledged publicly. They include two squadrons of an Army unit popularly known as Delta Force, another Army squadron -- formerly code-named Gray Fox -- that specializes in close-in electronic surveillance, an Air Force human intelligence unit and the Navy unit popularly known as SEAL Team Six. The Defense Department is planning for further growth. Among the proposals circulating are the establishment of a Pentagon-controlled espionage school, largely duplicating the CIA's Field Tradecraft Course at Camp Perry, Va., and of intelligence operations commands for every region overseas. Rumsfeld's efforts, launched in October 2001, address two widely shared goals. One is to give combat forces, such as those fighting the insurgency in Iraq, more and better information about their immediate enemy. The other is to find new tools to penetrate and destroy the shadowy organizations, such as al Qaeda, that pose global threats to U.S. interests in conflicts with little resemblance to conventional war. In pursuit of those aims, Rumsfeld is laying claim to greater independence of action as Congress seeks to subordinate the 15 U.S. intelligence departments and agencies -- most under Rumsfeld's control -- to the newly created and still unfilled position of national intelligence director. For months, Rumsfeld opposed the intelligence reorganization bill that created the position. He withdrew his objections late last year after House Republican leaders inserted language that he interprets as preserving much of the department's autonomy. Lt. Gen. William G. Boykin, deputy undersecretary for intelligence, acknowledged that Rumsfeld intends to direct some missions previously undertaken by the CIA. He added that it is wrong to make "an assumption that what the secretary is trying to say is, 'Get the CIA out of this business, and we'll take it.' I don't interpret it that way at all." "The secretary actually has more responsibility to collect intelligence for the national foreign intelligence program . . . than does the CIA director," Boykin said. "That's why you hear all this information being published about the secretary having 80 percent of the [intelligence] budget. Well, yeah, but he has 80 percent of the responsibility for collection, as well." CIA spokeswoman Anya Guilsher said the agency would grant no interviews for this article. Pentagon officials emphasized their intention to remain accountable to Congress, but they also asserted that defense intelligence missions are subject to fewer legal constraints than Rumsfeld's predecessors believed. That assertion involves new interpretations of Title 10 of the U.S. Code, which governs the armed services, and Title 50, which governs, among other things, foreign intelligence. Under Title 10, for example, the Defense Department must report to Congress all "deployment orders," or formal instructions from the Joint Chiefs of Staff to position U.S. forces for combat. But guidelines issued this month by Undersecretary for Intelligence Stephen A. Cambone state that special operations forces may "conduct clandestine HUMINT operations . . . before publication" of a deployment order, rendering notification unnecessary. Pentagon lawyers also define the "war on terror" as ongoing, indefinite and global in scope. That analysis effectively discards the limitation of the defense secretary's war powers to times and places of imminent combat. Under Title 50, all departments of the executive branch are obliged to keep Congress "fully and currently informed of all intelligence activities." The law exempts "traditional . . . military activities" and their "routine support." Advisers said Rumsfeld, after requesting a fresh legal review by the Pentagon's general counsel, interprets "traditional" and "routine" more expansively than his predecessors. "Operations the CIA runs have one set of restrictions and oversight, and the military has another," said a Republican member of Congress with a substantial role in national security oversight, declining to speak publicly against political allies. "It sounds like there's an angle here of, 'Let's get around having any oversight by having the military do something that normally the [CIA] does, and not tell anybody.' That immediately raises all kinds of red flags for me. Why aren't they telling us?" The enumeration by Myers of "emerging target countries" for clandestine intelligence work illustrates the breadth of the Pentagon's new concept. All those named, save Somalia, have allied themselves with the United States -- if unevenly -- against al Qaeda and its jihadist allies. A high-ranking official with direct responsibility for the initiative, declining to speak on the record about espionage in friendly nations, said the Defense Department sometimes has to work undetected inside "a country that we're not at war with, if you will, a country that maybe has ungoverned spaces, or a country that is tacitly allowing some kind of threatening activity to go on." Assistant Secretary of Defense Thomas O'Connell, who oversees special operations policy, said Rumsfeld has discarded the "hide-bound way of thinking" and "risk-averse mentalities" of previous Pentagon officials under every president since Gerald R. Ford. "Many of the restrictions imposed on the Defense Department were imposed by tradition, by legislation, and by interpretations of various leaders and legal advisors," O'Connell said in a written reply to follow-up questions. "The interpretations take on the force of law and may preclude activities that are legal. In my view, many of the authorities inherent to [the Defense Department] . . . were winnowed away over the years." After reversing the restrictions, Boykin said, Rumsfeld's next question "was, 'Okay, do I have the capability?' And the answer was, 'No you don't have the capability. . . . And then it became a matter of, 'I want to build a capability to be able to do this.' " Known by several names since its inception as Project Icon on April 25, 2002, the Strategic Support Branch is an arm of the DIA's nine-year-old Defense Human Intelligence Service, which until now has concentrated on managing military attachis assigned openly to U.S. embassies around the world. Rumsfeld's initiatives are not connected to previously reported negotiations between the Defense Department and the CIA over control of paramilitary operations, such as the capture of individuals or the destruction of facilities. According to written guidelines made available to The Post, the Defense Department has decided that it will coordinate its human intelligence missions with the CIA but will not, as in the past, await consent. It also reserves the right to bypass the agency's Langley headquarters, consulting CIA officers in the field instead. The Pentagon will deem a mission "coordinated" after giving 72 hours' notice to the CIA. Four people with firsthand knowledge said defense personnel have already begun operating under "non-official cover" overseas, using false names and nationalities. Those missions, and others contemplated in the Pentagon, skirt the line between clandestine and covert operations. Under U.S. law, "clandestine" refers to actions that are meant to be undetected, and "covert" refers to those for which the U.S. government denies its responsibility. Covert action is subject to stricter legal requirements, including a written "finding" of necessity by the president and prompt notification of senior leaders of both parties in the House and Senate. O'Connell, asked whether the Pentagon foresees greater involvement in covert action, said "that remains to be determined." He added: "A better answer yet might be, depends upon the situation. But no one I know of is raising their hand and saying at DOD, 'We want control of covert operations.' " One scenario in which Pentagon operatives might play a role, O'Connell said, is this: "A hostile country close to our borders suddenly changes leadership. . . . We would want to make sure the successor is not hostile." Researcher Rob Thomason contributed to this report. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Sun Jan 23 13:42:53 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2005 22:42:53 +0100 Subject: [silk] A new Social Communication Network: Bellster (fwd from udhay@pobox.com) Message-ID: <20050123214252.GB9221@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From isn at c4i.org Mon Jan 24 01:39:32 2005 From: isn at c4i.org (InfoSec News) Date: Mon, 24 Jan 2005 03:39:32 -0600 (CST) Subject: [ISN] Call for Papers - PHRACK #63 Message-ID: Forwarded from: dontreply at phrack.org [-]=====================================================================[-] +++++++++++++++++++++++++++ =: P H R A C K - F I N A L := +++++++++++++++++++++++++++ ...a glorious era comes to an end. #63 will be our last PHRACK RELEASE -- EVER... FINAL CALL FOR PAPERS * FINAL CALL FOR PAPERS * FINAL CALL FOR PAPERS ----------------------------------- Deadline: 10 July 2005 at 11:59pm http://www.phrack.org/cfp_final.txt ----------------------------------- Phrackstaff is pleased to bring you our LAST EVER CALL FOR PAPERS for the FINAL RELEASE of PHRACK. We are preparing for a hardcover and ezine release at a major hacker convention near you! We ask everyone to submit a paper. Great care will be taken to ensure that only the best articles make it into PHRACK FINAL. As usual, papers can be on any topic related to the following: - hacking - phreaking - spying - carding - cybernetics - radio - electronics - forensics - reverse engineering - cryptography - anarchy - conspiracy - world news Since 1985, PHRACK MAGAZINE has been providing the hacker community with information on operating systems, network technologies and telephony, as well as relaying features of interest for the international computer underground. PHRACK MAGAZINE is made available to the public, as often as possible, free of charge. PHRACK STAFF <--- preparing for hex2005 phrackstaff at phrack.org Post Scriptum: - Phrackstaff will keep the website running for at least 2 years after PHRACK FINAL. - The last T-Shirts are sold for just $14.95 now. Enjoy it! - More about our decision in the release. Thanks and Goodbye. [-]=====================================================================[-] _________________________________________ Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - http://www.osvdb.org/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Mon Jan 24 07:34:50 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 24 Jan 2005 10:34:50 -0500 Subject: Ronald McDonald's SS In-Reply-To: <20050123211507.GS9221@leitl.org> Message-ID: "Military and civilian participants said in interviews that the new unit has been operating in secret for two years -- in Iraq (news - web sites)," Well hell, it's doing such a good job already it should definitely be expanded! -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: Ronald McDonald's SS >Date: Sun, 23 Jan 2005 22:15:07 +0100 > >I'm sure in due time they'll just start calling it Strategic Support, >period. > >http://news.yahoo.com/news?tmpl=story&cid=1802&u=/washpost/20050123/ts_washpo >st/a29414_2005jan22&printer=1 > >Secret Unit Expands Rumsfeld's Domain > >Sun Jan 23, 1:14 AM ET > >By Barton Gellman, Washington Post Staff Writer > >The Pentagon (news - web sites), expanding into the CIA (news - web >sites)'s >historic bailiwick, has created a new espionage arm and is reinterpreting >U.S. law to give Defense Secretary Donald H. Rumsfeld broad authority over >clandestine operations abroad, according to interviews with participants >and >documents obtained by The Washington Post. > >The previously undisclosed organization, called the Strategic Support >Branch, >arose from Rumsfeld's written order to end his "near total dependence on >CIA" >for what is known as human intelligence. Designed to operate without >detection and under the defense secretary's direct control, the Strategic >Support Branch deploys small teams of case officers, linguists, >interrogators >and technical specialists alongside newly empowered special operations >forces. > >Military and civilian participants said in interviews that the new unit has >been operating in secret for two years -- in Iraq (news - web sites), >Afghanistan (news - web sites) and other places they declined to name. >According to an early planning memorandum to Rumsfeld from Gen. Richard B. >Myers, chairman of the Joint Chiefs of Staff, the focus of the intelligence >initiative is on "emerging target countries such as Somalia, Yemen, >Indonesia, Philippines and Georgia." Myers and his staff declined to be >interviewed. > >The Strategic Support Branch was created to provide Rumsfeld with >independent >tools for the "full spectrum of humint operations," according to an >internal >account of its origin and mission. Human intelligence operations, a term >used >in counterpoint to technical means such as satellite photography, range >from >interrogation of prisoners and scouting of targets in wartime to the >peacetime recruitment of foreign spies. A recent Pentagon memo states that >recruited agents may include "notorious figures" whose links to the U.S. >government would be embarrassing if disclosed. > >Perhaps the most significant shift is the Defense Department's bid to >conduct >surreptitious missions, in friendly and unfriendly states, when >conventional >war is a distant or unlikely prospect -- activities that have traditionally >been the province of the CIA's Directorate of Operations. Senior Rumsfeld >advisers said those missions are central to what they called the >department's >predominant role in combating terrorist threats. > >The Pentagon has a vast bureaucracy devoted to gathering and analyzing >intelligence, often in concert with the CIA, and news reports over more >than >a year have described Rumsfeld's drive for more and better human >intelligence. But the creation of the espionage branch, the scope of its >clandestine operations and the breadth of Rumsfeld's asserted legal >authority >have not been detailed publicly before. Two longtime members of the House >Intelligence Committee, a Democrat and a Republican, said they knew no >details before being interviewed for this article. > >Pentagon officials said they established the Strategic Support Branch using >"reprogrammed" funds, without explicit congressional authority or >appropriation. Defense intelligence missions, they said, are subject to >less >stringent congressional oversight than comparable operations by the CIA. >Rumsfeld's dissatisfaction with the CIA's operations directorate, and his >determination to build what amounts in some respects to a rival service, >follows struggles with then-CIA Director George J. Tenet over intelligence >collection priorities in Afghanistan and Iraq. Pentagon officials said the >CIA naturally has interests that differ from those of military commanders, >but they also criticized its operations directorate as understaffed, >slow-moving and risk-averse. A recurring phrase in internal Pentagon >documents is the requirement for a human intelligence branch "directly >responsive to tasking from SecDef," or Rumsfeld. > >The new unit's performance in the field -- and its latest commander, >reserve >Army Col. George Waldroup -- are controversial among those involved in the >closely held program. Pentagon officials acknowledged that Waldroup and >many >of those brought quickly into his service lack the experience and training >typical of intelligence officers and special operators. In his civilian >career as a federal manager, according to a Justice Department (news - web >sites) inspector general's report, Waldroup was at the center of a 1996 >probe >into alleged deception of Congress concerning staffing problems at Miami >International Airport. Navy Vice Adm. Lowell E. Jacoby, director of the >Defense Intelligence Agency, expressed "utmost confidence in Colonel >Waldroup's capabilities" and said in an interview that Waldroup's unit has >scored "a whole series of successes" that he could not reveal in public. He >acknowledged the risks, however, of trying to expand human intelligence too >fast: "It's not something you quickly constitute as a capability. It's >going >to take years to do." > >Rumsfeld's ambitious plans rely principally on the Tampa-based U.S. Special >Operations Command, or SOCOM, and on its clandestine component, the Joint >Special Operations Command. Rumsfeld has designated SOCOM's leader, Army >Gen. >Bryan D. Brown, as the military commander in chief in the war on terrorism. >He has also given Brown's subordinates new authority to pay foreign agents. >The Strategic Support Branch is intended to add missing capabilities -- >such >as the skill to establish local spy networks and the technology for direct >access to national intelligence databases -- to the military's much larger >special operations squadrons. Some Pentagon officials refer to the combined >units as the "secret army of Northern Virginia." > >Known as "special mission units," Brown's elite forces are not acknowledged >publicly. They include two squadrons of an Army unit popularly known as >Delta >Force, another Army squadron -- formerly code-named Gray Fox -- that >specializes in close-in electronic surveillance, an Air Force human >intelligence unit and the Navy unit popularly known as SEAL Team Six. > >The Defense Department is planning for further growth. Among the proposals >circulating are the establishment of a Pentagon-controlled espionage >school, >largely duplicating the CIA's Field Tradecraft Course at Camp Perry, Va., >and >of intelligence operations commands for every region overseas. > >Rumsfeld's efforts, launched in October 2001, address two widely shared >goals. One is to give combat forces, such as those fighting the insurgency >in >Iraq, more and better information about their immediate enemy. The other is >to find new tools to penetrate and destroy the shadowy organizations, such >as >al Qaeda, that pose global threats to U.S. interests in conflicts with >little >resemblance to conventional war. > >In pursuit of those aims, Rumsfeld is laying claim to greater independence >of >action as Congress seeks to subordinate the 15 U.S. intelligence >departments >and agencies -- most under Rumsfeld's control -- to the newly created and >still unfilled position of national intelligence director. For months, >Rumsfeld opposed the intelligence reorganization bill that created the >position. He withdrew his objections late last year after House Republican >leaders inserted language that he interprets as preserving much of the >department's autonomy. > >Lt. Gen. William G. Boykin, deputy undersecretary for intelligence, >acknowledged that Rumsfeld intends to direct some missions previously >undertaken by the CIA. He added that it is wrong to make "an assumption >that >what the secretary is trying to say is, 'Get the CIA out of this business, >and we'll take it.' I don't interpret it that way at all." > >"The secretary actually has more responsibility to collect intelligence for >the national foreign intelligence program . . . than does the CIA >director," >Boykin said. "That's why you hear all this information being published >about >the secretary having 80 percent of the [intelligence] budget. Well, yeah, >but >he has 80 percent of the responsibility for collection, as well." > >CIA spokeswoman Anya Guilsher said the agency would grant no interviews for >this article. > >Pentagon officials emphasized their intention to remain accountable to >Congress, but they also asserted that defense intelligence missions are >subject to fewer legal constraints than Rumsfeld's predecessors believed. >That assertion involves new interpretations of Title 10 of the U.S. Code, >which governs the armed services, and Title 50, which governs, among other >things, foreign intelligence. > >Under Title 10, for example, the Defense Department must report to Congress >all "deployment orders," or formal instructions from the Joint Chiefs of >Staff to position U.S. forces for combat. But guidelines issued this month >by >Undersecretary for Intelligence Stephen A. Cambone state that special >operations forces may "conduct clandestine HUMINT operations . . . before >publication" of a deployment order, rendering notification unnecessary. >Pentagon lawyers also define the "war on terror" as ongoing, indefinite and >global in scope. That analysis effectively discards the limitation of the >defense secretary's war powers to times and places of imminent combat. > >Under Title 50, all departments of the executive branch are obliged to keep >Congress "fully and currently informed of all intelligence activities." The >law exempts "traditional . . . military activities" and their "routine >support." Advisers said Rumsfeld, after requesting a fresh legal review by >the Pentagon's general counsel, interprets "traditional" and "routine" more >expansively than his predecessors. > >"Operations the CIA runs have one set of restrictions and oversight, and >the >military has another," said a Republican member of Congress with a >substantial role in national security oversight, declining to speak >publicly >against political allies. "It sounds like there's an angle here of, 'Let's >get around having any oversight by having the military do something that >normally the [CIA] does, and not tell anybody.' That immediately raises all >kinds of red flags for me. Why aren't they telling us?" > >The enumeration by Myers of "emerging target countries" for clandestine >intelligence work illustrates the breadth of the Pentagon's new concept. >All >those named, save Somalia, have allied themselves with the United States -- >if unevenly -- against al Qaeda and its jihadist allies. > >A high-ranking official with direct responsibility for the initiative, >declining to speak on the record about espionage in friendly nations, said >the Defense Department sometimes has to work undetected inside "a country >that we're not at war with, if you will, a country that maybe has >ungoverned >spaces, or a country that is tacitly allowing some kind of threatening >activity to go on." > >Assistant Secretary of Defense Thomas O'Connell, who oversees special >operations policy, said Rumsfeld has discarded the "hide-bound way of >thinking" and "risk-averse mentalities" of previous Pentagon officials >under >every president since Gerald R. Ford. > >"Many of the restrictions imposed on the Defense Department were imposed by >tradition, by legislation, and by interpretations of various leaders and >legal advisors," O'Connell said in a written reply to follow-up questions. >"The interpretations take on the force of law and may preclude activities >that are legal. In my view, many of the authorities inherent to [the >Defense >Department] . . . were winnowed away over the years." > >After reversing the restrictions, Boykin said, Rumsfeld's next question >"was, >'Okay, do I have the capability?' And the answer was, 'No you don't have >the >capability. . . . And then it became a matter of, 'I want to build a >capability to be able to do this.' " > >Known by several names since its inception as Project Icon on April 25, >2002, >the Strategic Support Branch is an arm of the DIA's nine-year-old Defense >Human Intelligence Service, which until now has concentrated on managing >military attachis assigned openly to U.S. embassies around the world. > >Rumsfeld's initiatives are not connected to previously reported >negotiations >between the Defense Department and the CIA over control of paramilitary >operations, such as the capture of individuals or the destruction of >facilities. > >According to written guidelines made available to The Post, the Defense >Department has decided that it will coordinate its human intelligence >missions with the CIA but will not, as in the past, await consent. It also >reserves the right to bypass the agency's Langley headquarters, consulting >CIA officers in the field instead. The Pentagon will deem a mission >"coordinated" after giving 72 hours' notice to the CIA. > >Four people with firsthand knowledge said defense personnel have already >begun operating under "non-official cover" overseas, using false names and >nationalities. Those missions, and others contemplated in the Pentagon, >skirt >the line between clandestine and covert operations. Under U.S. law, >"clandestine" refers to actions that are meant to be undetected, and >"covert" >refers to those for which the U.S. government denies its responsibility. >Covert action is subject to stricter legal requirements, including a >written >"finding" of necessity by the president and prompt notification of senior >leaders of both parties in the House and Senate. > >O'Connell, asked whether the Pentagon foresees greater involvement in >covert >action, said "that remains to be determined." He added: "A better answer >yet >might be, depends upon the situation. But no one I know of is raising their >hand and saying at DOD, 'We want control of covert operations.' " > >One scenario in which Pentagon operatives might play a role, O'Connell >said, >is this: "A hostile country close to our borders suddenly changes >leadership. >. . . We would want to make sure the successor is not hostile." > >Researcher Rob Thomason contributed to this report. > >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Mon Jan 24 11:47:27 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 24 Jan 2005 14:47:27 -0500 Subject: Securing Wireless Apps Webinar from Unstrung Message-ID: Should be of interest to someone on this list. -TD >Dear Colleague, > >As an industry professional, you may be interested to know about an >upcoming online event being presented by Unstrung (www.unstrung.com), the >worldwide source for analysis of the wireless economy. This free Web >seminar - " Securing Wireless Apps in Financial, Government & Military >Markets" - will evaluate recent progress in a critical market. > >Keeping information out of the hands of interlopers is an important task >for any net manager - but it's critical for those with the responsibility >for keeping financial, governmental, and military applications secure. >Security issues continue to be the main concern holding back widespread >wireless adoption in these environments. > >During this presentation we'll focus on: > >- The critical role of security in these vertical markets - why does it >matter? >- Potential effects of wireless network attacks in each market >- The diverse security demands of these three markets >- Case studies of deployments in each market and lessons learned > >Join us on Thursday, January 27, at 2:00 p.m. New York / 7:00 p.m. London >time, for this live Webinar sponsored by Bluesocket, Fortress Technologies, >and Proxim. > >Everyone who attends the Webinar will receive a free Unstrung T-shirt. >Click here for a look: > >http://img.lightreading.com/unstrung/unstrung_shirt.gif > >You can sign up for this event via this link: > >http://metacast.agora.com/link.asp?m=23288&s=4936527&l=0 > >We hope to see you there! From jamesd at echeque.com Mon Jan 24 14:51:07 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 24 Jan 2005 14:51:07 -0800 Subject: Ronald McDonald's SS In-Reply-To: References: <20050123211507.GS9221@leitl.org> Message-ID: <41F50B5B.14158.624736D@localhost> -- On 24 Jan 2005 at 10:34, Tyler Durden wrote: > "Military and civilian participants said in interviews that > the new unit has been operating in secret for two years -- in > Iraq (news - web sites)," > > Well hell, it's doing such a good job already it should > definitely be expanded! Note that the main enemy it is aimed against is the CIA, and it's existence was successfully kept secret from the CIA for this time. (For had the CIA detected it, they would have instantly leaked the information, the same way they have leaked so much other stuff.) --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG KsFrtFSMHXcDohroqAdPG4sz0/zlWutoJnTTVx33 4RrZF0Pj1rWQ7L2OUmPyd0vZu4myhO+ICGi7PHb+j From steve49152 at yahoo.ca Mon Jan 24 12:15:39 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Mon, 24 Jan 2005 15:15:39 -0500 (EST) Subject: Vive le rubber 'ose: 'The Interrogators' and 'Torture': Hard Questions In-Reply-To: Message-ID: <20050124201540.89320.qmail@web51805.mail.yahoo.com> --- "R.A. Hettinga" wrote: > > > The New York Times > > January 23, 2005 > > 'The Interrogators' and 'Torture': Hard Questions > By ROBERT D. KAPLAN [snip] What a load of shit. The reality of today is such that the "defense establishment", or rather it's personnnel will use torture, fraud, and assassination to (a) advance their Total Police State Paradise, (b) to run their spook schools, (c) to steal whatever they want, and (d) to bury the evidence of their malfeasance. They will steamroller domestic and foreign civilians and combatants indiscriminately, held in check only by virtue of the lamentable practical necessity of appearing to have valid reasons for actions taken. Because the judicial branch of government is entirely tame, and because the media is in the habit of obeying, and because there is a secret history to the military and SpookWorld that is wrapped up in the mythology of religion and superstition, there is simply no process extant to address the inequities of the present time. The only action on the front, as it were, consists of political and ideological yes-men banging the drum of conformity and assimilation: "join us and prosper; obey and serve; destroy the reality that does not support our orthodoxy". Dissent is marginalised and criminalised, although provocations are important in order to provide the fearsome spectacles necessary to encouraging fear and cultivating obedience. Too bad there are so many dirty hands. The necessity of protecting so many actual establishment terrorists from sanction, legal or otherwise, may kill billions one day. Or worse, as death isn't the worst thing that can occur to an individual... as many of you are aware. Keep up with the bullshit, folks. Continue to justify all the repressive and regressive measures. Legitimise arbitrary human rights abuses. Keep training your terrorists. Pretend you must use slaves. Keep lying to yourselves about the rightness of your approach, and the necessity of the web of deceits necessary to keeping your veil of propriety afloat. It's been clear to me for a long time that your little club is morally bankrupt, although we know that such considerations are entirely obsolete to the modern ubermench. Arguing on your terms is a losing proposition. The game was lost a long time ago: when the taboos on certain kinds of speech became entrenched. Recapitulations of traditional religious speech and action into modern forms, such as "interrogation" simply aren't enough to undo the damage. By the way, I really enjoy the drugs used today in the service of official knowledge acquisition. I sincerely hope that many more people enjoy them too. And I would be remiss if I failed to remind everyone who is a player in this part of SpookWorld to tounge the peanuts from my shit. War criminals and cowards all. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From nks-summerschool at wolfram.com Mon Jan 24 13:51:14 2005 From: nks-summerschool at wolfram.com (NKS Summer School) Date: Mon, 24 Jan 2005 15:51:14 -0600 (CST) Subject: NKS Summer School 2005 Message-ID: <20050124215114.E38DB54915@mercury.wolfram.com> The 2005 NKS Summer School will be hosted at Brown University from June 20 to July 8 and we want to make sure that the best possible candidates have a chance to apply. This is a unique opportunity for graduate students, undergraduates, postdocs, teachers, and professionals to carry out an original NKS project that pursues major educational and career objectives. Each student will work one-on-one with a project mentor and interact directly with Stephen Wolfram. This tuition-free program includes three weeks of lectures, ongoing informal discussions, and plenty of independent time for rigorous scientific research and exploration. We encourage you to apply or to refer anyone who might be interested in pursuing intensive NKS research. Professors or instructors recommending students to this program should send email to nks-summerschool at wolfram.com and let us know a little bit about each student. The deadline to apply is March 15. For more information on the 2005 NKS Summer School, go to: http://www.wolframscience.com/summerschool Sincerely, Todd Rowland, Ph.D. NKS Summer School Academic Director Catherine Boucher, Ph.D. NKS Summer School Program Director From jamesd at echeque.com Mon Jan 24 17:29:00 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 24 Jan 2005 17:29:00 -0800 Subject: Ronald McDonald's SS In-Reply-To: <20050125004334.26579.qmail@web51803.mail.yahoo.com> References: <41F50B5B.14158.624736D@localhost> Message-ID: <41F5305C.10051.6B50213@localhost> -- James A. Donald: > > Note that the main enemy it is aimed against is the CIA, > > and it's existence was successfully kept secret from the > > CIA for this time. (For had the CIA detected it, they > > would have instantly leaked the information, the same way > > they have leaked so much other stuff.) On 24 Jan 2005 at 19:43, Steve Thompson wrote: > I rather doubt that anyone outside of the CIA could really > say what they would or would not do in such a situation. They would do what they always done in recent decades - suck up to the Democrat party. (Which is a major improvement on the state department which sucks up to America's enemies.) --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG xXYVRz8r4ISHikxse8xuVwxMzucHB3T/3oeeirPa 4RMOddYiQx7wKxSQrA36cczivHFYNiqG4Zrxha+SM From steve49152 at yahoo.ca Mon Jan 24 16:43:34 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Mon, 24 Jan 2005 19:43:34 -0500 (EST) Subject: Ronald McDonald's SS In-Reply-To: <41F50B5B.14158.624736D@localhost> Message-ID: <20050125004334.26579.qmail@web51803.mail.yahoo.com> --- "James A. Donald" wrote: > -- > On 24 Jan 2005 at 10:34, Tyler Durden wrote: > > "Military and civilian participants said in interviews that > > the new unit has been operating in secret for two years -- in > > Iraq (news - web sites)," > > > > Well hell, it's doing such a good job already it should > > definitely be expanded! > > Note that the main enemy it is aimed against is the CIA, and > it's existence was successfully kept secret from the CIA for > this time. (For had the CIA detected it, they would have > instantly leaked the information, the same way they have leaked > so much other stuff.) I rather doubt that anyone outside of the CIA could really say what they would or would not do in such a situation. Recall that people in that world view deceit as much more than a skill. It's more of a way of life to them, and as a result of so many years of rounds of layerd deceit colouring their operations, the analysis of their actions is bound to fail when approached with that kind of simplicity. Oh, by the way. The last post I made in reply to you went unanswered just when I was starting to make some difficult points. Surely that was an oversight? Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From rah at shipwright.com Mon Jan 24 18:02:50 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 24 Jan 2005 21:02:50 -0500 Subject: Walter Wriston Message-ID: The Wall Street Journal January 24, 2005 REVIEW & OUTLOOK Walter Wriston January 24, 2005; Page A18 One great underlying strength of the modern American economy is its innovative and competitive financial system, and one of its architects was Walter Wriston, who died last week at age 85. As an executive with First National City Bank, and later chairman of Citicorp, he helped to create products and services that millions of Americans now take for granted, such as the certificate of deposit and the automated teller machine. Under his leadership, Citicorp became the largest American bank and one of the most profitable in the world, with a global customer base that continues to grow today. We always thought it a shame he was never Treasury Secretary, though his intellectual influence was greater than that of most who did serve in that post. After his retirement from Citicorp in 1984, he wrote widely and presciently about the way technology was transforming our age. His 1992 book, "The Twilight of Sovereignty: How the Information Revolution is Transforming Our World," was ahead of its time. He was a major supporter of the Manhattan Institute and other think-tanks that promoted free market ideas. Raised in modest Midwest circumstances, Mr. Wriston was the kind of creative and public-spirited capitalist that America is so fortunate to produce and remains one of the secrets of our prosperity. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 24 19:19:25 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 24 Jan 2005 22:19:25 -0500 Subject: Gripes About Airport Security Grow Louder Message-ID: The Wall Street Journal January 25, 2005 THE MIDDLE SEAT By SCOTT MCCARTNEY Gripes About Airport Security Grow Louder More Travelers Are Stopped For 'Secondary' Checks; A Missed Flight to Atlanta January 25, 2005 The frequency of secondary security screening at airports has increased, and complaints are soaring. Roughly one in every seven passengers is now tagged for "secondary screening" -- a special search in which an airport screener runs a metal-detecting wand around a traveler's body, then pats down the passenger and searches through bags -- according to the Transportation Security Administration. Currently, 10% to 15% of passengers are picked randomly before boarding passes are issued, the TSA says. An additional number -- the TSA won't say how many -- are selected by the government's generic profiling system, where buying a one-way ticket, paying cash or other factors can earn you extra screening. And more travelers are picked by TSA screeners who spot suspicious bulges or shapes under clothing. "It's fair to say the frequency of secondary screening has gone up," says TSA spokeswoman Amy von Walter. "Screeners have greater discretion." That may explain why passenger complaints about screening have roughly doubled every month since August. According to numbers compiled by the TSA and reported to the Department of Transportation, 83 travelers complained about screening in August, then 150 in September and 385 in October. By November, the last month reported, complaints had skyrocketed to 652. To be sure, increased use of pat-down procedures in late September after terrorists smuggled bombs aboard two planes in Russia undoubtedly boosted those numbers, though many of those complaints were categorized as "courtesy" issues, not "screening," in the data TSA reports to the DOT. There were 115 courtesy complaints filed with the DOT in September, then 690 in October. By November, the number of courtesy complaints receded to 218. Yet the increased traveler anger at secondary screening hasn't receded. Road warriors complain bitterly about the arbitrary nature of the screening -- many get singled out for one leg of a trip, but not another. For Douglas Downing, a secondary-screening problem resulted in a canceled trip. Mr. Downing was flying from Seattle to Atlanta last fall. He went through security routinely and sat at the gate an hour ahead of his flight's departure. As he boarded, a Delta Air Lines employee noticed that his boarding pass, marked with SSSS, hadn't been cleared by the TSA. He was sent back to the security checkpoint. By the time he got screened and returned to the gate, the flight had departed. Delta offered a later flight, but his schedule was so tight he had to cancel the trip. Delta did refund the ticket, even though the airline said it was the TSA's mistake not to catch the screening code. TSA officials blamed Delta. TSA screeners often blame airlines, according to frequent travelers. Ask a screener why you got picked for screening, and they often say the airline does the selection and questions should be directed to the airline. But airlines say they shouldn't be blamed, since they are only running the TSA's programs, and the TSA's Ms. von Walter concurs. "I wouldn't go so far as to say we're blaming them," she said. "Perhaps some screeners are misinformed in those cases." She also says the TSA isn't sure why screening complaints have risen so sharply since August, although the agency says it may be the result of greater TSA advertising of its "contact center" (e-mail TSA-ContactCenter at dhs.gov or call 1-866-289-9673). If you do get picked, here is how it happened. The TSA requires airlines to pick 10% to 15% of travelers at random. Airlines can "de-select" a passenger picked at random, such as a child, officials say. In addition, the government's current passenger-profiling system, called Computer Assisted Passenger Prescreening System, or CAPPS, picks out passengers. The system, which resides in or communicates with each airline's reservation computers, gives you a score based largely on how you bought your ticket. Airline officials say the TSA has changed the different weightings given various factors, and certain markets may have higher programmed rates for selectees. Passenger lists also are checked against the TSA's list of suspicious names, which has included rather common names and even names of U.S. senators. Interestingly, airline gate agents who see suspicious-looking passengers can no longer flag them for security. Some ticket-counter agents did flag several hijackers for extra security on Sept. 11, 2001, and were praised for their work in the 9/11 Commission's final report. At the time, all that meant was the airline took precautions with the hijackers' checked luggage. But because of racial-discrimination concerns, airline officials aren't allowed to single out passengers for scrutiny; only TSA screeners can do that. If picked in advance by the computer system, your boarding pass gets marked some way to identify your "selectee" status. Some airlines print "SSSS" in a corner. When you show up at the checkpoint, you should be picked out as a selectee. The TSA counts on contractors checking boarding passes and driver's licenses to steer you to the selectee line, but that is also why screeners make travelers display boarding passes several times through the gauntlet. At some airports, the TSA also does one final check of boarding passes when you leave the security area -- to check again for selectees. Once checked, the TSA marks your boarding pass so that flight attendants or airline gate agents boarding planes know you got a thorough poking and prodding. The TSA says it hopes the frequency of secondary screening will decline when it gets its new profiling system in place. "Secure Flight" will use passenger records from airlines to, it is hoped, sniff out terrorists. The system will focus on the passenger and not simply how the ticket was bought. The TSA is testing comparing airline bookings against other commercially available information as well as government databases, which has raised privacy concerns. Current testing using historical airline data is supposed to end this month. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 24 19:39:27 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 24 Jan 2005 22:39:27 -0500 Subject: Keeping Your Job Hunt Secret Is Harder Now -- But Here's How to Do It Message-ID: The Wall Street Journal January 25, 2005 MANAGING YOUR CAREER Keeping Your Job Hunt Secret Is Harder Now -- But Here's How to Do It By ERIN WHITE Staff Reporter of THE WALL STREET JOURNAL January 25, 2005 Miserable at work? Ready to jump ship? Thanks to the improving job market, the likelihood that you will find something has increased. But you may encounter an unanticipated problem: It's harder than ever to conceal a job hunt from colleagues and supervisors. Casual dress codes make your nice interview suit more conspicuous. Many employers are using monitoring software to track their employees' Web surfing, e-mails and instant messages. In addition, open-plan office layouts can complicate your efforts to conduct job-search phone calls discreetly. Don't worry. There are still plenty of ways to keep your hunt off your boss's radar screen. And the proliferation of alternate workplace arrangements -- including companies' more relaxed attitudes toward telecommuting -- can actually help your covert job search. Even if you work from home only part-time, you can take advantage of the extra privacy. Kamela Pancroft, a 40-year-old human-resources executive in Castle Rock, Colo., tried to schedule job interviews during the two days a week that she worked from home last year. After several months of searching, she got a new job in October as an HR vice president for a mortgage banker. Her old boss didn't have a clue that she had been looking. Avoiding a common pitfall, Ms. Pancroft used her home computer and private America Online e-mail account to send risumis and conduct other aspects of her search. You should never depend on your company's equipment or e-mail account when you're aiming to job hop, career counselors warn. Relatively inexpensive computer-monitoring software lets businesses track and review your office computer use. Your boss doesn't have to catch you job hunting. He can just ask the information-technology department to retrieve a record of your computer activities. Company officials probably don't review your communication constantly, but it's likely they'll do so if they think you're doing something wrong, says Donald Harris, president of HR Privacy Solutions, an employee-privacy consulting firm in New York. "What people are allowed to do [at work] in the U.S. is pretty much set by the employer," Mr. Harris cautions. By contrast, workers in Europe have stronger privacy rights on the job. When posting your risumi in a Web-site jobs database, keep your identity as secret as possible. Monster.com, for instance, allows you to hide your name and contact information. The popular Web site sends you an e-mail when someone shows interest in your risumi. Describe your employer generically rather than divulging its actual name, advises Pam Dixon, executive director of the World Privacy Forum, a San Diego-based group that studies workplace privacy issues. If you work for Procter & Gamble, for example, you could refer to it as a "large consumer-products company" in your risumi. Advance planning will solve the casual-dress dilemma. In pursuit of a horticulture research-associate position at a local university this past fall, Jonathan Ervin didn't want to don the work boots and khaki pants that he usually wore to work as a manager at a wholesale nursery. So the 31-year-old Stokesdale, N.C., resident left a suit in his car the morning of the university-job interview. At midday, he drove to a local farmers' market and hid behind a dumpster to change. He used his car's rear passenger door to "screen any areas that were not blocked" by the dumpster, he recalls. (He subsequently quit his job to conduct his search full time.) Another approach is to alter your daily routine so that your job search attracts less attention. A 30-year-old book editor in New York grew anxious several weeks ago when a nosey secretary glanced at her unusually fancy outfit -- a nice suit for a job interview that day -- and chided, "People notice things." The editor says she now wears a suit once or twice a week, hoping that when she does have an interview, the suit won't stand out as much. Despite the secretary's warning, she doesn't think her boss suspects that she's looking for a new job. You can also lower your risk of exposure by using a cellphone to make job-search contacts from an isolated part of your workplace. Mr. Ervin, for instance, placed calls from a secluded area of the nursery. When co-workers walked past him, he shooed them away. They assumed that he was conducting an important business call and shouldn't be interrupted. For the ultimate in privacy during a job search, splurge and book a hotel room near your office for the day. The unconventional arrangement makes sense if you can't work from home, dislike using a cellphone to call potential employers, and lack a private office at work. Lunchtime absences are less noticeable. "You definitely want to err on the side of discretion," says Brad Karsh, president of JobBound, a Chicago career-counseling company. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Tue Jan 25 08:17:00 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 25 Jan 2005 11:17:00 -0500 Subject: Ronald McDonald's SS In-Reply-To: <41F50B5B.14158.624736D@localhost> Message-ID: Were you pissed when you found out? -TD >From: "James A. Donald" >To: eugen at leitl.org, cypherpunks at al-qaeda.net >Subject: RE: Ronald McDonald's SS >Date: Mon, 24 Jan 2005 14:51:07 -0800 > > -- >On 24 Jan 2005 at 10:34, Tyler Durden wrote: > > "Military and civilian participants said in interviews that > > the new unit has been operating in secret for two years -- in > > Iraq (news - web sites)," > > > > Well hell, it's doing such a good job already it should > > definitely be expanded! > >Note that the main enemy it is aimed against is the CIA, and >it's existence was successfully kept secret from the CIA for >this time. (For had the CIA detected it, they would have >instantly leaked the information, the same way they have leaked >so much other stuff.) > > --digsig > James A. Donald > 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG > KsFrtFSMHXcDohroqAdPG4sz0/zlWutoJnTTVx33 > 4RrZF0Pj1rWQ7L2OUmPyd0vZu4myhO+ICGi7PHb+j From camera_lumina at hotmail.com Tue Jan 25 08:25:49 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 25 Jan 2005 11:25:49 -0500 Subject: Gripes About Airport Security Grow Louder In-Reply-To: Message-ID: More indications of an emerging 'Brazil' scenario, as opposed to a hyper-intelligent super-fascist state. -TD >From: "R.A. Hettinga" >To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net, >osint at yahoogroups.com >Subject: Gripes About Airport Security Grow Louder >Date: Mon, 24 Jan 2005 22:19:25 -0500 > > > >The Wall Street Journal > > January 25, 2005 > > THE MIDDLE SEAT > By SCOTT MCCARTNEY > > > >Gripes About Airport Security Grow Louder >More Travelers Are Stopped > For 'Secondary' Checks; > A Missed Flight to Atlanta >January 25, 2005 > >The frequency of secondary security screening at airports has increased, >and complaints are soaring. > >Roughly one in every seven passengers is now tagged for "secondary >screening" -- a special search in which an airport screener runs a >metal-detecting wand around a traveler's body, then pats down the passenger >and searches through bags -- according to the Transportation Security >Administration. > >Currently, 10% to 15% of passengers are picked randomly before boarding >passes are issued, the TSA says. An additional number -- the TSA won't say >how many -- are selected by the government's generic profiling system, >where buying a one-way ticket, paying cash or other factors can earn you >extra screening. And more travelers are picked by TSA screeners who spot >suspicious bulges or shapes under clothing. > >"It's fair to say the frequency of secondary screening has gone up," says >TSA spokeswoman Amy von Walter. "Screeners have greater discretion." > >That may explain why passenger complaints about screening have roughly >doubled every month since August. According to numbers compiled by the TSA >and reported to the Department of Transportation, 83 travelers complained >about screening in August, then 150 in September and 385 in October. By >November, the last month reported, complaints had skyrocketed to 652. > >To be sure, increased use of pat-down procedures in late September after >terrorists smuggled bombs aboard two planes in Russia undoubtedly boosted >those numbers, though many of those complaints were categorized as >"courtesy" issues, not "screening," in the data TSA reports to the DOT. >There were 115 courtesy complaints filed with the DOT in September, then >690 in October. By November, the number of courtesy complaints receded to >218. > >Yet the increased traveler anger at secondary screening hasn't receded. >Road warriors complain bitterly about the arbitrary nature of the screening >-- many get singled out for one leg of a trip, but not another. > >For Douglas Downing, a secondary-screening problem resulted in a canceled >trip. Mr. Downing was flying from Seattle to Atlanta last fall. He went >through security routinely and sat at the gate an hour ahead of his >flight's departure. As he boarded, a Delta Air Lines employee noticed that >his boarding pass, marked with SSSS, hadn't been cleared by the TSA. He was >sent back to the security checkpoint. > >By the time he got screened and returned to the gate, the flight had >departed. Delta offered a later flight, but his schedule was so tight he >had to cancel the trip. Delta did refund the ticket, even though the >airline said it was the TSA's mistake not to catch the screening code. TSA >officials blamed Delta. > >TSA screeners often blame airlines, according to frequent travelers. Ask a >screener why you got picked for screening, and they often say the airline >does the selection and questions should be directed to the airline. > >But airlines say they shouldn't be blamed, since they are only running the >TSA's programs, and the TSA's Ms. von Walter concurs. "I wouldn't go so far >as to say we're blaming them," she said. "Perhaps some screeners are >misinformed in those cases." > >She also says the TSA isn't sure why screening complaints have risen so >sharply since August, although the agency says it may be the result of >greater TSA advertising of its "contact center" (e-mail >TSA-ContactCenter at dhs.gov or call 1-866-289-9673). > >If you do get picked, here is how it happened. > >The TSA requires airlines to pick 10% to 15% of travelers at random. >Airlines can "de-select" a passenger picked at random, such as a child, >officials say. > >In addition, the government's current passenger-profiling system, called >Computer Assisted Passenger Prescreening System, or CAPPS, picks out >passengers. The system, which resides in or communicates with each >airline's reservation computers, gives you a score based largely on how you >bought your ticket. Airline officials say the TSA has changed the different >weightings given various factors, and certain markets may have higher >programmed rates for selectees. > >Passenger lists also are checked against the TSA's list of suspicious >names, which has included rather common names and even names of U.S. >senators. > >Interestingly, airline gate agents who see suspicious-looking passengers >can no longer flag them for security. Some ticket-counter agents did flag >several hijackers for extra security on Sept. 11, 2001, and were praised >for their work in the 9/11 Commission's final report. At the time, all that >meant was the airline took precautions with the hijackers' checked luggage. >But because of racial-discrimination concerns, airline officials aren't >allowed to single out passengers for scrutiny; only TSA screeners can do >that. > >If picked in advance by the computer system, your boarding pass gets marked >some way to identify your "selectee" status. Some airlines print "SSSS" in >a corner. > >When you show up at the checkpoint, you should be picked out as a selectee. >The TSA counts on contractors checking boarding passes and driver's >licenses to steer you to the selectee line, but that is also why screeners >make travelers display boarding passes several times through the gauntlet. >At some airports, the TSA also does one final check of boarding passes when >you leave the security area -- to check again for selectees. > >Once checked, the TSA marks your boarding pass so that flight attendants or >airline gate agents boarding planes know you got a thorough poking and >prodding. > >The TSA says it hopes the frequency of secondary screening will decline >when it gets its new profiling system in place. "Secure Flight" will use >passenger records from airlines to, it is hoped, sniff out terrorists. The >system will focus on the passenger and not simply how the ticket was >bought. The TSA is testing comparing airline bookings against other >commercially available information as well as government databases, which >has raised privacy concerns. Current testing using historical airline data >is supposed to end this month. > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From steve49152 at yahoo.ca Tue Jan 25 09:12:36 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Tue, 25 Jan 2005 12:12:36 -0500 (EST) Subject: Gripes About Airport Security Grow Louder In-Reply-To: Message-ID: <20050125171236.32625.qmail@web51807.mail.yahoo.com> --- Tyler Durden wrote: [airport security] > More indications of an emerging 'Brazil' scenario, as opposed to a > hyper-intelligent super-fascist state. As if. There already is a kind of intelligent super-fascist state in place thoughout much of society. My bugbears of the moment are the police and courts, so you get my take on how they are organised so as to be 'intelligent' without seeming so -- which further enables a whole lot of fraud to masqerade as process and incompetence. The super-fascist part comes about because the system avoids public accountability while also somehow evading any sort of reasonable standard of performance. What's the error rate, that is the false arrest, prosecution, and/or conviction rate of a Western countries' judiciary and police divitions? If it's even ten percent, and it's probably much higher, then there is no reason to respect the operation and perpetuation of the system. And consider how the courts deal with error. After all is said and done, the victim is expected to launch appeals at his own expense to force the system to take official notice of judicial "error". We know how dilligent the police are at bringing creativity to their investigations and arrests. Countless examples abound of fraud and abuse of processs. And the population at large carries on as if it doesn't matter. Well in my not so humble fucking opinion, if police and judicial officials in Canada (or the US, or wherever) wish to acquire respect and lend the appearance of legitimacy to their operations, then they should bloody well bring some transparent accountability to their operations and more, should take exacting pains to ensure that they conduct their affairs so as to put their integrety beyond question for anyone who examines their fucking books. And when they *do* err, they should fucking well bend over backwards to correct their god damn mistakes. AND when they catch one of their own abusing his or her position of authority that fucker should be PILLORIED for the least offense. But no, this does not and will not occur because the police and courts have had decades of self-selection in their recruiting processes, and decades of deirected evolution applied to their internal culture and processes. It is considered more proper to rule by fear, than to consider that wageing a de facto war on the civilian population as being even slightly wrong. Since it is considered *normal* for their to be a high error rate, it is only natural for the intelligent special interest groups within the government to exploit the lax standards to crushing competing groups and individuals who might pose a latent threat to the extant corrupt culture. And then there are those nasty writers who won't wedge their ideology into the narrow confines of mass consumer culture, and well there's all sorts of legal ways to deal with *that* kind of trouble-maker. And so on. Petty little tyrants have all sorts of latitude for abuse, but so do real villans like the ones directing your military contractors. State of the art in pulling the strings of government is to view (at different levels, and different levels of abstraction) departments and ministries as black boxes with adjustable inputs. Some "inputs" are more adjustable than others, of course, and there are levels of access to the "inputs", but the approach is sound. I suppose it might take a well-placed CIA agent to subtly adjust CPIC records to suit an RCMP officer's relative's influence peddling, but the nice thing about reciprocal arrangements is that they may be negotiated and traded by fascist and highly placed warmongers. And we don't care because most people are brainwashed into blindly accepting the norm of incompetent ineffiency in all official matters. Indeed, for many it's a game that is only slightly more real than arcade shoot'em-ups but much more sophisticated. Of course no individual is at all required to respect such unnecessary corruption, and I certainly do not. (Why would I, considering the marauding warmongers who have been entirely subverting my ambitions and interests for years, simply because they like the challenge.) And in continuing with the outing, I predict that God was named John by his parents, and has official carte blanche to fuck up the lives of Canadian citizens given to him by his pet dogs in the Canadian government. Gutless weasels. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From rah at shipwright.com Tue Jan 25 09:49:30 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 25 Jan 2005 12:49:30 -0500 Subject: Everyone an Exhibitionist Message-ID: The Wall Street Journal January 25, 2005 BOOKS Everyone an Exhibitionist By HEATHER MAC DONALD January 25, 2005; Page D12 In the debates over the Patriot Act and other antiterrorist measures, a group of critics has emerged who claim that the entire realm of "privacy" is in peril. But such privacy advocates, as we might call them, have a problem even bigger than the government: the public. Despite the advocates' warnings about Big Brother, Americans keep scarfing up every new consumer convenience, regardless of how much personal information is extracted in return. Cell phones, credit cards and the Internet record our tastes, purchases and movements in minute detail. And that computerized portrait does not stay put: Anyone who wants to sell us yet more goodies more efficiently can buy it. In fact, people give away personal information even when they don't have to. In 1998, hundreds of thousands of magazine readers filled out an eight-page, 700-item questionnaire about themselves just because Condi Nast was curious about its subscribers' most intimate medical problems and life-style choices. Americans clearly have a far more relaxed view of privacy than the activists who claim to speak on their behalf. Data collection gets more thorough and more common. Should we worry? Yet the doomsayers carry on. In "No Place to Hide" (Free Press, 348 pages, $26), Washington Post reporter Robert O'Harrow Jr. warns of a future in which most external aspects of our lives end up in a database, potentially available to corporations and law-enforcement officials. The cutting-edge capacities he describes for tracking individuals -- biometric face-scanners, say, or tiny radio transmitters -- are indeed sobering. But he places too much emphasis on what can go wrong with data collection and not enough on its enormous benefits. Despite its impressive scope, "No Place to Hide" presents a lopsided view of the information revolution. In fact, it offers a case study in how to generate a good privacy scare: * Refusing to balance costs and benefits. Mr. O'Harrow presents every horror story he can find about a data system gone awry. Florida authorities bar an eligible voter from voting in the 2000 presidential election in Florida after computers falsely identify him as a felon. Police accuse three innocent women of murder because the surveillance camera on an ATM had an inaccurate clock. (The error was discovered before prosecution.) Such misfirings are regrettable, and every measure should be taken to avoid them. But ATM cameras have much more often deterred or solved crimes than generated false charges. The cost to democratic legitimacy of election fraud outweighs the minimal risk that antifraud technology will disenfranchise eligible voters. Virtually every modern discovery that improves life -- from vaccines to automobiles -- carries risks; balancing those risks against the technology's benefits is a skill that privacy advocates seem to lack. * Ignoring privacy safeguards. "No Place to Hide" chronicles the rise of data warehousing companies, such as Axciom and ChoicePoint, that vacuum up every piece of information about consumers that they can find. After 9/11, these companies offered their databases to national-security agencies to prevent another attack. Since then, federal researchers have feverishly explored how to use such information to track down future terrorists. Mr. O'Harrow worries that the nascent partnership between data companies and the government will result in a surveillance state. But computer experts are just as feverishly exploring how to prevent the misuse of data, such as concealing individual identities until evidence of a crime develops. Mr. O'Harrow is silent on the promising technologies that aim to protect privacy while increasing public safety. * Living in a time warp. For privacy advocates, it's always 1968, when J. Edgar Hoover's FBI was monitoring political activists with no check on its power. But that FBI is dead and gone. In its place has arisen a risk-averse bureau that, in the years preceding 9/11, worried more about avoiding civil-liberties controversies than about preventing terrorism. The red tape that now constrains intelligence-gathering makes a repeat of Hoover's excesses unthinkable. Yet Mr. O'Harrow condemns the most imperative post-9/11 reforms -- e.g., tearing down "the Wall" that once prevented information-sharing within the antiterror community -- as a dangerous power grab. * Sticking with theory over facts. No self-respecting privacy Jeremiad can do without a reference to the Panopticon, the imaginary prison conceived by philosopher Jeremy Bentham that allows the constant surveillance of its inmates. For privacy scolds, we are already imprisoned in the Panopticon, thanks in part to anticrime video cameras on city streets and in private buildings. According to Panopticon theory, surveillance produces a cowed, inhibited society because, as Mr. O'Harrow puts it, "it chills culture and stifles dissent." As it happens, London, Baltimore, Cincinnati and Los Angeles have set up cameras in public spaces, to great fanfare. It would have been easy for Mr. O'Harrow to visit one of those cities to report on the effect. What he would have found is that, rather than skulking against walls or cowering indoors, residents engage in the same exhibitionistic behavior as before, only more so, because more people now feel safe enough to use the streets. We can be thankful that Mr. O'Harrow doesn't try to define privacy, usually an exercise in wind-baggery. It would have been useful, however, if he had disclosed his bottom line. Does he think that personal information should never be used for national security or marketing, or only under certain conditions? By the end of the book, he has criticized so many information systems -- including fingerprinting -- that he would seem to regard as unacceptable any identification method that is not 100% accurate. He sneers at background checks for prospective employees without considering whether even he might jump at the chance to run a criminal scan on a nanny for his children. In any case, it's going to take a lot more than privacy scares to persuade Americans to forgo that next nifty device -- a wristwatch, perhaps, that includes a Global Positioning System, camera and cell phone -- no matter how many consumer companies or cops might want to track its use. Ms. Mac Donald is a contributing editor of the Manhattan Institute's City Journal. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ptrei at rsasecurity.com Tue Jan 25 10:01:26 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 25 Jan 2005 13:01:26 -0500 Subject: Gripes About Airport Security Grow Louder Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776C34@rsana-ex-hq1.NA.RSA.NET> > -----Original Message----- > From: owner-cypherpunks at minder.net > [mailto:owner-cypherpunks at minder.net]On Behalf Of Steve Thompson > Sent: Tuesday, January 25, 2005 12:13 PM > To: cypherpunks at al-qaeda.net > Subject: RE: Gripes About Airport Security Grow Louder > > > --- Tyler Durden wrote: > [airport security] > > More indications of an emerging 'Brazil' scenario, as opposed to a > > hyper-intelligent super-fascist state. > > As if. > > There already is a kind of intelligent super-fascist state in place > thoughout much of society. My bugbears of the moment are the > police and > courts, so you get my take on how they are organised so as to be > 'intelligent' without seeming so -- which further enables a > whole lot of > fraud to masqerade as process and incompetence. The > super-fascist part > comes about because the system avoids public accountability while also > somehow evading any sort of reasonable standard of performance. > > What's the error rate, that is the false arrest, prosecution, and/or > conviction rate of a Western countries' judiciary and police > divitions? > If it's even ten percent, and it's probably much higher, then > there is no > reason to respect the operation and perpetuation of the system. One chilling data point. Remember a few years ago the (pro death penalty) governor of Illinois suspended all the death sentences in has state? The reason being was that with the introduction of DNA testing, 1/3 of the people on death row were found to be innocent. I don't know how many other innocents the state planned to murder, but presumably there were some cases where DNA evidence was not available. If, in a capital case, where the money to pay public defenders is usually maximally available, and the appeals process, checks, and cross-checks are the more thorough than in any non-capital prosecution, you STILL get at least a 33% error rate, then what is the wrongfull conviction rate in non-capital cases, where there are far fewer appeals, and public defenders are paid a pittance? Peter Trei From camera_lumina at hotmail.com Tue Jan 25 10:31:12 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 25 Jan 2005 13:31:12 -0500 Subject: Gripes About Airport Security Grow Louder In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776C34@rsana-ex-hq1.NA.RSA.NET> Message-ID: >If, in a capital case, where the money to pay public defenders >is usually maximally available, and the appeals process, checks, >and cross-checks are the more thorough than in any non-capital >prosecution, you STILL get at least a 33% error rate, then what >is the wrongfull conviction rate in non-capital cases, where there >are far fewer appeals, and public defenders are paid a pittance?" And of course there's the fairly obvious point that lots of those in prison "correctly" are there for drug-related "crimes". Said crimes would almost completely dissappear and drug usage would drop if many of those drugs were legalized and taxed. But God forbid that happen because what would all those policemen do for a living? Prison workers? Judges? -TD >From: "Trei, Peter" >To: "Steve Thompson" , >Subject: RE: Gripes About Airport Security Grow Louder >Date: Tue, 25 Jan 2005 13:01:26 -0500 > > > -----Original Message----- > > From: owner-cypherpunks at minder.net > > [mailto:owner-cypherpunks at minder.net]On Behalf Of Steve Thompson > > Sent: Tuesday, January 25, 2005 12:13 PM > > To: cypherpunks at al-qaeda.net > > Subject: RE: Gripes About Airport Security Grow Louder > > > > > > --- Tyler Durden wrote: > > [airport security] > > > More indications of an emerging 'Brazil' scenario, as opposed to a > > > hyper-intelligent super-fascist state. > > > > As if. > > > > There already is a kind of intelligent super-fascist state in place > > thoughout much of society. My bugbears of the moment are the > > police and > > courts, so you get my take on how they are organised so as to be > > 'intelligent' without seeming so -- which further enables a > > whole lot of > > fraud to masqerade as process and incompetence. The > > super-fascist part > > comes about because the system avoids public accountability while also > > somehow evading any sort of reasonable standard of performance. > > > > What's the error rate, that is the false arrest, prosecution, and/or > > conviction rate of a Western countries' judiciary and police > > divitions? > > If it's even ten percent, and it's probably much higher, then > > there is no > > reason to respect the operation and perpetuation of the system. > >One chilling data point. Remember a few years ago the (pro death >penalty) governor of Illinois suspended all the death sentences in >has state? The reason being was that with the introduction of DNA >testing, 1/3 of the people on death row were found to be innocent. > >I don't know how many other innocents the state planned to murder, >but presumably there were some cases where DNA evidence was not >available. > >If, in a capital case, where the money to pay public defenders >is usually maximally available, and the appeals process, checks, >and cross-checks are the more thorough than in any non-capital >prosecution, you STILL get at least a 33% error rate, then what >is the wrongfull conviction rate in non-capital cases, where there >are far fewer appeals, and public defenders are paid a pittance? > >Peter Trei From jrandom at i2p.net Tue Jan 25 13:47:44 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 25 Jan 2005 13:47:44 -0800 Subject: [i2p] weekly status notes [jan 25] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, quick weekly status update * Index 1) 0.5 status 2) sam.net 3) gcj progress 4) udp 5) ??? * 1) 0.5 status Over the past week, there's been a lot of progress on the 0.5 side. The issues we were discussing before have been resolved, dramatically simplifying the crypto and removing the tunnel looping issue. The new technique [1] has been implemented and the unit tests are in place. Next up I'm putting together more of the code to integrate those tunnels into the main router, then build up the tunnel management and pooling infrastructure. After thats in place, we'll run it through the sim and eventually onto a parallel net to burn it in before wrapping a bow on it and calling it 0.5. [1]http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/tunnel-alt.html?rev=H EAD * 2) sam.net smeghead has put together a new port of the SAM protocol to .net - c#, mono/gnu.NET compatible (yay smeghead!). This is in cvs under i2p/apps/sam/csharp/ with nant and other helpers - now all y'all .net devs can start hacking with i2p :) * 3) gcj progress smeghead is definitely on a tear - at last count, with some modifications the router is compiling under the latest gcj [2] build (w00t!). It still doesn't work yet, but the modifications to work around gcj's confusion with some inner class constructs is definitely progress. Perhaps smeghead can give us an update? [2] http://gcc.gnu.org/java/ * 4) udp Not much to say here, though Nightblade did bring up an interesting set of concerns [3] on the forum asking why we're going with UDP. If you've got similar concerns or have other suggestions on how we can address the issues I replied with, please, chime in! [3] http://forum.i2p.net/viewtopic.php?t=280 * 5) ??? Yeah, ok, I'm late with the notes again, dock my pay ;) Anyway, lots going on, so either swing by the channel for the meeting, check the posted logs afterwards, or post up on the list if you've got something to say. Oh, as an aside, I've given in and started up a blog within i2p [4]. =jr [4] http://jrandom.dev.i2p/ (key in http://dev.i2p.net/i2p/hosts.txt) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB9r1VGnFL2th344YRAvb5AJ9+Y5l9JZOo5znrnY2sunAr0lOJzgCghHpy W/EO4gPSteZWp+rBogWfB3M= =nnfw -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From George.Danezis at cl.cam.ac.uk Tue Jan 25 07:05:55 2005 From: George.Danezis at cl.cam.ac.uk (George Danezis) Date: Tue, 25 Jan 2005 15:05:55 +0000 Subject: PET 2005 Submission deadline approaching (7 Feb) and PET Award (21 Feb) Message-ID: Dear Colleagues, The submission deadline for the Privacy Enhancing Technologies workshop (PET 2005) is on the 7th February 2005. The latest CfP is appended. We also solicit nominations for the "Award for Outstanding Research in Privacy Enhancing Technologies" by February 21. For more information about suggesting a paper for the award: http://petworkshop.org/award/ Yours, George Danezis 5th Workshop on Privacy Enhancing Technologies Dubrovnik, Croatia May 30 - June 1, 2005 C A L L F O R P A P E R S http://petworkshop.org/2005/ Important Dates: Paper submission: February 7, 2005 Notification of acceptance: April 4, 2005 Camera-ready copy for preproceedings: May 6, 2005 Camera-ready copy for proceedings: July 1, 2005 Award for Outstanding Research in Privacy Enhancing Technologies Nomination period: March 4, 2004 through March 7, 2005 Nomination instructions: http://petworkshop.org/award/ ----------------------------------------------------------------------- Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior, and restrict the ability to publish or retrieve documents. Approaches to protecting individuals, groups, but also companies and governments from such profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. This 5th workshop addresses the design and realization of such privacy and anti-censorship services for the Internet and other communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present their perspectives on technological issues. As in past years, we will publish proceedings after the workshop in the Springer Lecture Notes in Computer Science series. Suggested topics include but are not restricted to: * Anonymous communications and publishing systems * Censorship resistance * Pseudonyms, identity management, linkability, and reputation * Data protection technologies * Location privacy * Policy, law, and human rights relating to privacy * Privacy and anonymity in peer-to-peer architectures * Economics of privacy * Fielded systems and techniques for enhancing privacy in existing systems * Protocols that preserve anonymity/privacy * Privacy-enhanced access control or authentication/certification * Privacy threat models * Models for anonymity and unobservability * Attacks on anonymity systems * Traffic analysis * Profiling and data mining * Privacy vulnerabilities and their impact on phishing and identity theft * Deployment models for privacy infrastructures * Novel relations of payment mechanisms and anonymity * Usability issues and user interfaces for PETs * Reliability, robustness and abuse prevention in privacy systems Stipends to attend the workshop will be made available, on the basis of need, to cover travel expenses, hotel, or conference fees. You do not need to submit a technical paper and you do not need to be a student to apply for a stipend. For more information, see http://petworkshop.org/2005/stipends.html General Chair: Damir Gojmerac (damir.gojmerac at fina.hr), Fina Corporation, Croatia Program Chairs: George Danezis (George.Danezis at cl.cam.ac.uk), University of Cambridge, UK David Martin (dm at cs.uml.edu), University of Massachusetts at Lowell, USA Program Committee: Martin Abadi, University of California at Santa Cruz, USA Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA Caspar Bowden, Microsoft EMEA, UK Jean Camp, Indiana University at Bloomington, USA Richard Clayton, University of Cambridge, UK Lorrie Cranor, School of Computer Science, Carnegie Mellon University, USA Roger Dingledine, The Free Haven Project, USA Hannes Federrath, University of Regensburg, Germany Ian Goldberg, Zero Knowledge Systems, Canada Philippe Golle, Palo Alto Research Center, USA Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein, Germany Markus Jakobsson, Indiana University at Bloomington, USA Dogan Kesdogan, Rheinisch-Westfaelische Technische Hochschule Aachen, Germany Brian Levine, University of Massachusetts at Amherst, USA Andreas Pfitzmann, Dresden University of Technology, Germany Matthias Schunter, IBM Zurich Research Lab, Switzerland Andrei Serjantov, The Free Haven Project, UK Paul Syverson, Naval Research Lab, USA Latanya Sweeney, Carnegie Mellon University, USA Matthew Wright, University of Texas at Arlington, USA Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using an 11-point font), and at most 20 pages total. Submission of shorter papers (from around 4 pages) is strongly encouraged whenever appropriate. Papers must conform to the Springer LNCS style. Follow the "Information for Authors" link at http://www.springer.de/comp/lncs/authors.html. Reviewers of submitted papers are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, names of authors and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. A preliminary version of the proceedings will be made available to workshop participants. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting. Submit your papers in Postscript or PDF format. To submit a paper, compose a plain text email to pet2005-submissions at petworkshop.org containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author (to whom we will address all subsequent correspondence). Attach your submission to this email and send it. By submitting a paper, you agree that if it is accepted, you will sign a paper distribution agreement allowing for publication, and also that an author of the paper will register for the workshop and present the paper there. Our current working agreement with Springer is that authors will retain copyright on their own works while assigning an exclusive 3-year distribution license to Springer. Authors may still post their papers on their own Web sites. See http://petworkshop.org/2004/paper-dist-agreement-5-04.html for the 2004 version of this agreement. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Paper submissions must be received by February 7. We acknowledge all submissions manually by email. If you do not receive an acknowledgment within a few days (or one day, if you are submitting right at the deadline), then contact the program committee chairs directly to resolve the problem. Notification of acceptance or rejection will be sent to authors no later than April 4 and authors will have the opportunity to revise for the preproceedings version by May 6. We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the workshop, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), (3) give brief descriptions of the presenters, and (4) indicate which presenters have confirmed their availability for the presentation if it is scheduled. Otherwise, submit your proposal by email as described above, including the designation of a contact author. The program committee will consider presentation proposals along with other workshop events, and will respond by the paper decision date with an indication of its interest in scheduling the event. The proceedings will contain 1-page abstracts of the presentations that take place at the workshop. Each contact author for an accepted panel proposal must prepare and submit this abstract in the Springer LNCS style by the "Camera-ready copy for preproceedings" deadline date. _______________________________________________ NymIP-res-group mailing list NymIP-res-group at nymip.org http://www.nymip.org/mailman/listinfo/nymip-res-group --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 25 12:08:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 25 Jan 2005 15:08:51 -0500 Subject: Sun rolls out Identity Auditor Message-ID: InfoWorld Sun rolls out Identity Auditor Software applies identity management for repeatable compliance By Cathleen Moore January 24, 2005 Sun Microsystems (Profile, Products, Articles) this week introduced identity audit and compliance software designed to give IT departments visibility into employee identity and system-access activities. The Sun Java System Identity Auditor can help with the difficult and expensive regulatory compliance requirements of reporting on systems and applications, proving internal controls, and giving auditors data on historical access privileges. "Identity - which [covers] who has access to what, who did what, and when - is essential to compliance," said Sara Gates, vice president of identify management at Sun. "The problem Identity Auditor addresses is automating compliance processes companies suffer through." Having visibility into identity and access-related activities is a key part of compliance for certain regulations, most notably Sarbanes-Oxley, said Jonathan Penn, principal analyst of identity and security at Forrester Research. "It may be that only certain systems or data are important to protect under those regulations. But it is important to have insight into who has access to what and why that access has been granted," Penn said. Sun's Identity Auditor makes it easier to implement controls through functionality focused on access-exclusion policies as well as the workflow dealing with conflicts that may arise between users' access rights and policy, Penn said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jan 25 12:59:36 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 25 Jan 2005 15:59:36 -0500 Subject: PET 2005 Submission deadline approaching (7 Feb) and PET Award (21 Feb) Message-ID: --- begin forwarded text From eugen at leitl.org Tue Jan 25 15:08:09 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 26 Jan 2005 00:08:09 +0100 Subject: [i2p] weekly status notes [jan 25] (fwd from jrandom@i2p.net) Message-ID: <20050125230809.GR1404@leitl.org> ----- Forwarded message from jrandom ----- From rah at shipwright.com Wed Jan 26 06:16:31 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jan 2005 09:16:31 -0500 Subject: Blinky's Pitch-Man Speaks: Terror's Server Message-ID: At 3:14 PM -0400 10/3/04, R. A. Hettinga wrote: >In arbitrary order (in other words, *I* chose it. :-)), and with >apologies to Toru Iwatani, by way of Michael Thomasson at >, here >it is: > > >A Proposed Nomenclature for the Four Horseman of The Infocalypse > > Horseman Color Character Nickname > >1 Terrorism Red Shadow "Blinky" >2 Narcotics Pink Speedy "Pinky" >3 Money Laundering Aqua Bashful "Inky" >4 Paedophilia Yellow Pokey "Clyde" > >It is acceptable to refer to a horseman by any of the above, i.e., >"Horseman No. 1", "The Red Horseman", "Shadow", or "Blinky". > >Apparently there was a, um, pre-deceased, dark-blue ghost, used in >Japanese tournament play, named "Kinky", I leave that particular >horseman for quibblers. ------- Technology Review Terror's Server By David Talbot Febuary 2005 NOTEBOOK Richard A. Clarke spent 11 years in senior policymaking positions at the White House, advising presidents on matters of counterterrorism and cyber security. When the Sept. 11 attacks took place he was the counterterrorism adviser to the National Security Council. He now heads Good Harbor Consulting. Clarke recently spoke with Technology Review Chief Correspondent David Talbot about terrorist exploitation of the Internet. David Talbot: How is the use of the Internet by terrorist groups changing? Richard Clarke: It's important for publicity and propaganda purposes. It is one of their best vehicles for that. It may be useful for communications, but I think they are increasingly relying on (human) couriers. There is some potential that they are using the Internet to engage in cyber-crime as a funding source. DT: Is it getting any easier to track down the location or identity of a terrorist communication? RC: You can assume all kinds of one-time identities on the Internet. The risk of course, is that a smart computer forensics team can trace back, if not to a particular house, certainly to a particular city where the communication might have come from. They've tried to get around that in the past by using cyber-cafes. But if they are effectively masking their IDs and locations by going through multiple hops and spoofing IP (internet protocol) addresses, it's more difficult. Related Stories: Two hundred two people died in the Bali, Indonesia, disco bombing of October 12, 2002, when a suicide bomber blew himself up on a tourist-bar dance floor, and then, moments later, a second bomber detonated an explosives-filled Mitsubishi van parked outside. Now, the mastermind of the attacks-Imam Samudra, a 35-year-old Islamist militant with links to al--Qaeda-has written a jailhouse memoir that offers a primer on the more sophisticated crime of online credit card fraud, which it promotes as a way for Muslim radicals to fund their activities. Law enforcement authorities say evidence collected from Samudra's laptop computer shows he tried to finance the Bali bombing by committing acts of fraud over the Internet. And his new writings suggest that online fraud-which in 2003 cost credit card companies and banks $1.2 billion in the United States alone-might become a key weapon in terrorist arsenals, if it's not already. "We know that terrorist groups throughout the world have financed themselves through crime," says Richard Clarke, the former U.S. counterterrorism czar for President Bush and President Clinton. "There is beginning to be a reason to conclude that one of the ways they are financing themselves is through cyber-crime." Online fraud would thereby join the other major ways in which terrorist groups exploit the Internet. The September 11 plotters are known to have used the In-ternet for international communications and information gathering. Hundreds of jihadist websites are used for propaganda and fund-raising purposes and are as -easily accessible as the mainstream websites of major news organizations. And in 2004, the Web was awash with raw video of hostage beheadings perpetrated by -followers of Abu Musab al-Zarqawi, the Jordanian-born terror leader operating in Iraq. This was no fringe phenomenon. Tens of millions of people downloaded the video files, a kind of vast medieval spectacle enabled by numberless Web hosting companies and Internet service providers, or ISPs. "I don't know where the line is. But certainly, we have passed it in the abuse of the Internet," says Gabriel Weimann, a professor of communications at the University of Haifa, who tracks use of the Internet by terrorist groups. Meeting these myriad challenges will require new technology and, some say, stronger self-regulation by the online industry, if only to ward off the more onerous changes or restrictions that might someday be mandated by legal authorities or by the security demands of business interests. According to Vinton Cerf, a founding father of the Internet who codesigned its protocols, extreme violent content on the Net is "a terribly difficult conundrum to try and resolve in a way that is constructive." But, he adds, "it does not mean we shouldn't do anything. The industry has a fair amount of potential input, if it is to try to figure out how on earth to discipline itself. The question is, which parts of the industry can do it?" The roadblocks are myriad, he notes: information can literally come from anywhere, and even if major industry players agree to restrictions, Internet users themselves could obviously go on sharing content. "As always, the difficult question will be, Who decides what is acceptable content and on what basis?" Some work is already going on in the broader battle against terrorist use of the Internet. Research labs are developing new algorithms aimed at making it easi-er for investigators to comb through e-mails and chat-room dialogue to uncover crimi-nal plots. Meanwhile, the industry's anti-spam efforts are providing new tools for authenticating e-mail senders using cryptography and other methods, which will also help to thwart fraud; clearly, terror-ist exploitation of the Internet adds a -national-security dimension to these efforts. The question going forward is whether the terrorist use of the medium, and the emerging responses, will help usher in an era in which the distribution of online content is more tightly controlled and tracked, for better or worse. NOTEBOOK (Continued) DT: How are efforts coming along to improve cyber-security, say, by authenticating who is sending a piece of information? RC: The more immediate reason that people in the U.S. are thinking about that is spam. Microsoft and AOL and others have formed working groups to come up with a way of having email authentication. Even thought we've passed the Can-Spam Act, (it doesn't) seem to be effective because people are able to offshore their services. There is very serious work going on to come up with authenticated email. DT: So the fight against spam is also the fight against the use of the Internet by terrorists? RC: It's relevant to counterterrorism because it would prevent a lot of cyber crime, which may be how they are funding themselves. It may also make it difficult to assume identities for on-time use communications. You do have the possibility of extending this (into chat rooms and other forums). Related Stories: The Rise of Internet Terror Today, most experts agree that the Internet is not just a tool of terrorist organizations, but is central to their operations*. Some say that al-Qaeda's online presence has become more potent and pertinent than its actual physical presence since the September 11 attacks. "When we say al-Qaeda is a global ideology, this is where it exists-on the Internet," says Michael Doran, a Near East scholar and terrorism expert at Princeton University. "That, in itself, I find absolutely amazing. Just a few years ago, an organization like this would have been more cultlike in nature. It wouldn't be able to spread around the world the way it does with the Internet." The universe of terror-related websites extends far beyond al-Qaeda, of course. According to Weimann, the number of such websites has leapt from only 12 in 1997 to around 4,300 today. (This includes sites operated by groups like Hamas and Hezbollah, and others in South America and other parts of the world.) "In seven years it has exploded, and I am quite sure the number will grow next week and the week after," says Weimann, who described the trend in his report "How Modern Terrorism Uses the Internet," published by the United States Institute of Peace, and who is now at work on a book, Terrorism and the Internet, due out later this year. These sites serve as a means to recruit members, solicit funds, and promote and spread ideology. "While the [common] perception is that [terrorists] are not well educated or very sophisticated about telecommunications or the Internet, we know that that isn't true," says Ronald Dick, a former FBI deputy assistant director who headed the FBI's National Infrastructure Protection Center. "The individuals that the FBI and other law enforcement agencies have arrested have engineering and telecommunications backgrounds; they have been trained in academic institutes as to what these capabilities are." (Militant Islam, despite its roots in puritani-cal Wahhabism, taps the well of Western liberal education: Khalid Sheikh Mohammed, the principal September 11 mastermind, was educated in the U.S. in mechanical engineering; Osama bin Laden's deputy Ayman al-Zawahiri was trained in Egypt as a surgeon.) The Web gives jihad a public face. But on a less visible level, the Internet provides the means for extremist groups to surreptitiously organize attacks and gather information. The September 11 hijackers used conventional tools like chat rooms and e-mail to communicate and used the Web to gather basic information on targets, says Philip Zelikow, a historian at the University of Virginia and the former executive director of the 9/11 Commission. "The conspirators used the Internet, usually with coded messages, as an important medium for international communication," he says. (Some aspects of the terrorists' Internet use remain classified; for example, when asked whether the Internet played a role in recruitment of the hijackers, Zelikow said he could not comment.) Finally, terrorists are learning that they can distribute images of atrocities with the help of the Web. In 2002, the Web facilitated wide dissemination of videos showing the beheading of Wall Street Journal reporter Daniel Pearl, despite FBI requests that websites not post them. Then, in 2004, Zarqawi made the gruesome tactic a cornerstone of his terror strategy, starting with the murder of the American civilian contractor Nicholas Berg-which law enforcement agents believe was carried out by Zarqawi himself. From Zarqawi's perspective, the campaign was a rousing success. Images of orange-clad hostages became a headline-news staple around the world-and the full, raw videos of their murders spread rapidly around the Web. "The Internet allows a small group to publicize such horrific and gruesome acts in seconds, for very little or no cost, worldwide, to huge audiences, in the most powerful way," says Weimann. And there's a large market for such material. According to Dan Klinker, webmaster of a leading online gore site, Ogrish.com, consumption of such material is brisk. Klinker, who says he operates from offices in Western and Eastern Europe and New York City, says his aim is to "open people's eyes and make them aware of reality." It's clear that many eyes have taken in these images thanks to sites like his. Each beheading video has been downloaded from Klinker's site several million times, he says, and the Berg video tops the list at 15 million. "During certain events (beheadings, etc.) the servers can barely handle the insane bandwidths-sometimes 50,000 to 60,000 visitors an hour," Klinker says. NOTEBOOK DT: In 2004, a number of video clips showing terrorist beheadings of western hostages in Iraq became widely available online. Is this a new concern? RC: It's an extension of what they have been doing, which is using the Internet for posting propaganda. They tend not to have their own web sites, but either post it on a chat room or bulletin board that tends to be used by people who like to view that material. Or the other thing they've done is hack their way into a site and post it. DT: Should Internet Service Providers do more to stop such material from being disseminated? RC: The small Mom-and-Pop ISP's are pretty irresponsible. But when you look at Yahoo or MSN or AOL, they have compliance staffs, enforcement staffs, people who monitor activity. In their service agreements, they make it explicit they can terminate. They are very fearful of government regulation, and the FCC has the legal authority from Congress to regulate, but it has decided not to use it. DT: Do you think this FCC posture should change? RC: It goes to the larger issue of regulating Internet content at all. I think as a mater of public policy, we've agreed, so far, we are not going to regulate Internet content, except for child pornography. You also can't engage in fraud. I'm not sure that we want to go any further. However, most of these beheadings begin on overseas servers and I don't understand why the CIA or NSA doesn't just knock off these overseas servers. Related Stories: Avoiding the Slippery Slope To be sure, Internet users who want to block objectionable content can purchase a variety of filtering-software products that attempt to block sexual or violent content. But they are far from perfect. And though a hodgepodge of Web page rating schemes are in various stages of implementation, no universal rating system is in effect-and none is mandated-that would make filters chosen by consumers more effective. But passing laws aimed at allowing tighter filtering-to say nothing of actually mandating filtering-is problematical. Laws aimed at blocking minors' -access to pornography, like the Communications Decency Act and Children's Online Protection Act, have been struck down in the courts on First Amendment grounds, and the same fate has befallen some state laws, often for good reason: the filtering tools sometimes throw out the good with the bad. "For better or worse, the courts are more concerned about protecting the First Amendment rights of adults than protecting children from harmful material," says Ian Ballon, an expert on cyberspace law and a partner at Manatt, Phelps, and Phillips in Palo Alto, CA. Pornography access, he says, "is something the courts have been more comfortable regulating in the physical world than on the Internet." The same challenges pertain to images of extreme violence, he adds. The Federal Communications Commission enforces "decency" on the nation's airwaves as part of its decades-old mission of licensing and regulating television and radio stations. Internet content, by contrast, is essentially unregulated. And so, in 2004, as millions of people watched video of beheadings on their computers, the FCC fined CBS $550,000 for broadcasting the exposure of singer Janet Jackson's breast during the Super Bowl halftime show on television. "While not flatly impossible, [Internet content] regulation is hampered by the variety of places around the world at which it can be hosted," says Jonathan Zittrain, codirector of the Berkman Center for Internet and Society at Harvard Law School--and that's to say nothing of First Amendment concerns. As Zittrain sees it, "it's a gift that the sites are up there, because it gives us an opportunity for counterintelligence." As a deterrent, criminal prosecution has also had limited success. Even when those suspected of providing Internet-based assistance to terror cells are in the United States, obtaining convictions can be difficult. Early last year, under provisions of the Patriot Act, the U.S. Department of Justice charged Sami Omar al-Hussayen, a student at the University of Idaho, with using the Internet to aid -terrorists. The government -alleged that al-Hussayen maintained websites that promoted jihadist-related ac-tivities, including funding terrorists. But his defense argued that he was simply using his skills to promote Islam and wasn't responsible for the sites' radical content. The judge reminded the jury that, in any case, the Constitution protects most speech. The jury cleared al-Hussayen on the terrorism charges but deadlocked on visa-related charges; al-Hussayen agreed to return home to his native Saudi Arabia rather than face a retrial on the visa counts. NOTEBOOK DT: What about clamping down on cyber-fraud that might be funding terror groups? RC: Internet crime including fraud and extortion is a global problem in the hundreds of millions of dollars of losses a year, if not into the billions. If one percent of Internet crime were funding Al Qaeda, that would be a lot of money. A lot of countries don't have adequately trained or resourced Internet crime squads. While the U.S. does train other countries, it doesn't do enough of it. Even after they are trained, they need a little support beyond the training. So having an international fund to provide training to poorer countries to have Internet crime squads is probably a better idea. Related Stories: Technology and ISPs But the government and private-sector strategy for combatting terrorist use of the Internet has several facets. Certainly, agencies like the FBI and the National Security Agency-and a variety of watchdog groups, such as the Site Institute, a nonprofit organization based in an East Coast location that it asked not be publicized-closely monitor jihadist and other terrorist sites to keep abreast of their public statements and internal communications, to the extent possible. It's a massive, needle-in-a-haystack job, but it can yield a steady stream of intelligence tidbits and warnings. For ex-ample, the Site Institute recently discovered, on a forum called the Jihadi Message Board, an Arabic translation of a U.S. Air Force Web page that mentioned an Ameri-can airman of Lebanese descent. According to Rita Katz, executive director of the Site Institute, the jihadist page added, in Arabic, "This hypocrite will be going to Iraq in September of this year [2004]-I pray to Allah that his cunning leads to his slaughter. I hope that he will be slaughtered the Zarqawi's way, and then [go from there] to the lowest point in Hell." The Site Institute alerted the military. Today, on one if its office walls hangs a plaque offering the thanks of the Air Force Office of Special Investigations. New technology may also give intelligence agencies the tools to sift through online communications and discover terrorist plots. For example, research suggests that people with nefarious intent tend to exhibit distinct patterns in their use of e-mails or online forums like chat rooms. Whereas most people establish a wide variety of contacts over time, those engaged in plotting a crime tend to keep in touch only with a very tight circle of people, says William Wallace, an operations researcher at Rensselaer Polytechnic Institute. This phenomenon is quite predictable. "Very few groups of people communicate repeatedly only among themselves," says Wallace. "It's very rare; they don't trust people outside the group to communicate. When 80 percent of communications is within a regular group, this is where we think we will find the groups who are planning activities that are malicious." Of course, not all such groups will prove to be malicious; the odd high-school reunion will crop up. But Wallace's group is developing an algorithm that will narrow down the field of so-called social networks to those that warrant the scrutiny of intelligence officials. The algorithm is scheduled for completion and delivery to intelligence agencies this summer. And of course, the wider fight against spam and online fraud continues apace. One of the greatest challenges facing anti-fraud forces is the ease with which con artists can doctor their e-mails so that they appear to come from known and trusted sources, such as colleagues or banks. In a scam known as "phishing," this tactic can trick recipients into revealing bank account numbers and passwords. Preventing such scams, according to Clarke, "is relevant to counterterrorism because it would prevent a lot of cyber-crime, which may be how [terrorists] are funding themselves. It may also make it difficult to assume identities for one-time-use communications." New e-mail authentication methods may offer a line of defense. Last fall, AOL endorsed a Microsoft-designed system called Sender ID that closes certain security loopholes and matches the IP (Internet Protocol) address of the server sending an inbound e-mail against a list of servers authorized to send mail from the message's purported source. Yahoo, the world's largest e-mail provider with some 40 million accounts, is now rolling out its own system, called Domain Keys, which tags each outgoing e-mail message with an encrypted signature that can be used by the recipient to verify that the message came from the purported domain. Google is using the technology with its Gmail accounts, and other big ISPs, including Earthlink, are following suit. Finally, the bigger ISPs are stepping in with their own reactive efforts. Their "terms of service" are usually broad enough to allow them the latitude to pull down objectionable sites when asked to do so. "When you are talking about an online community, the power comes from the individual," says Mary Osako, Yahoo's director of communications. "We encourage our users to send [any concerns about questionable] content to us-and we take action on every report." NOTEBOOK Fundraising & TV [Mike Bloxham] Amid all the coverage of the Tsunami and its consequences, viewers around the world have been moved by the images of devastation, loss and displacement. Many... >From Stephen to Zithromax [Simson Garfinkel] A fascinating story in The Harvard Crimson details a rather shocking security lapse in which "the confidential drug purchase histories of many Harvard students... IPCC Dissension [David Appell] A prominent member of the Intergovernmental Panel on Climate Change (IPCC) has resigned after accusing a lead author of injecting his personal opinions into... Wisconsin Professors Report on Growing Use of Games [Simson Garfinkel] According to this report recently published by three professors at the University of Wisconsin, immersive games are increasingly being used as training tools... Cars That Sense Emotions [Simson Garfinkel] ... That's what's being cooked up by the Broxburn-based firm Affective Media. Working with researchers at Edinburgh University, they've created a car that uses... > Read more posts Related Stories: Too Little, or Too Much But most legal, policy, and security experts agree that these efforts, taken together, still don't amount to a real solution. The new anti-spam initiatives represent only the latest phase of an ongoing battle. "The first step is, the industry has to realize there is a problem that is bigger than they want to admit," says Peter Neumann, a computer scientist at SRI International, a nonprofit research institute in Menlo Park, CA. "There's a huge culture change that's needed here to create trustworthy systems. At the moment we don't have anything I would call a trustworthy system." Even efforts to use cryptography to confirm the authenticity of e-mail senders, he says, are a mere palliative. "There are still lots of problems" with online security, says Neumann. "Look at it as a very large iceberg. This shaves off one-fourth of a percent, maybe 2 percent-but it's a little bit off the top." But if it's true that existing responses are insufficient to address the problem, it may also be true that we're at risk of an overreaction. If concrete links between online fraud and terrorist attacks begin emerging, governments could decide that the Internet needs more oversight and create new regulatory structures. "The ISPs could solve most of the spam and phishing problems if made to do so by the FCC," notes Clarke. Even if the Bali bomber's writings don't create such a reaction, something else might. If no discovery of a a strong connection between online fraud and terrorism is made, another trigger could be an actual act of "cyberterrorism"-the long-feared use of the Internet to wage digital attacks against targets like city power grids and air traffic control or communications systems. It could be some online display of homicide so appalling that it spawns a new drive for online decency, one countenanced by a newly conservative Supreme Court. Terrorism aside, the trigger could be a pure business decision, one aimed at making the Internet more transparent and more secure. Zittrain concurs with Neumann but also predicts an impending overreaction. Terrorism or no terrorism, he sees a convergence of security, legal, and business trends that will force the Internet to change, and not necessarily for the better. "Collectively speaking, there are going to be technological changes to how the Internet functions-driven either by the law or by collective action. If you look at what they are doing about spam, it has this shape to it," Zittrain says. And while technologi-cal change might improve online security, he says, "it will make the Internet less flexible. If it's no longer possible for two guys in a garage to write and distribute killer-app code without clearing it first with entrenched interests, we stand to lose the very processes that gave us the Web browser, instant messaging, Linux, and e-mail." A concerted push toward tighter controls is not yet evident. But if extremely violent content or terrorist use of the Internet might someday spur such a push, a chance for prekmptive action may lie with ISPs and Web hosting companies. Their efforts need not be limited to fighting spam and fraud. With respect to the content they publish, Web hosting companies could act more like their older cousins, the television broadcasters and newspaper and maga-zine editors, and exercise a little editorial judgment, simply by enforcing existing terms of service. Is Web content already subject to any such editorial judgment? Generally not, but sometimes, the hopeful eye can discern what appear to be its consequences. Consider the mysterious inconsistency among the results returned when you enter the word "beheading" into the major search engines. On Google and MSN, the top returns are a mixed bag of links to responsible news accounts, historical information, and ghoulish sites that offer raw video with teasers like "World of Death, Iraq beheading videos, death photos, suicides and crime scenes." Clearly, such results are the product of algorithms geared to finding the most popular, relevant, and well-linked sites. But enter the same search term at -Yahoo, and the top returns are profiles of the U.S. and British victims of beheading in Iraq. The first 10 results include links to biographies of Eugene Armstrong, Jack Hensley, Kenneth Bigley, Nicholas Berg, Paul Johnson, and Daniel Pearl, as well as to memorial websites. You have to load the second page of search results to find a link to Ogrish.com. Is this oddly tactful ordering the aberrant result of an algorithm as pitiless as the ones that churn up gore links elsewhere? Or is -Yahoo, perhaps in a nod to the victims' memories and their families' feelings, making an exception of the words "behead" and "beheading," treating them differently than it does thematically comparable words like "killing" and "stabbing?" Yahoo's Osako did not reply to questions about this search-return oddity; certainly, a technological explanation cannot be excluded. But it's clear that such questions are very sensitive for an industry that has, to date, enjoyed little intervention or regulation. In its response to complaints, says Richard Clarke, "the industry is very willing to covperate and be good citizens in order to stave off re-gulation." Whether it goes further and adopts a stricter editorial posture, he adds, "is a decision for the ISP [and Web hosting company] to make as a matter of good taste and as a matter of supporting the U.S. in the global war on terror." If such decisions evolve into the industrywide assumption of a more journalistic role, they could, in the end, be the surest route to a more responsible medium-one that is less easy to exploit and not so vulnerable to a clampdown. David Talbot is Technology Review's chief correspondent. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jan 26 08:17:23 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jan 2005 11:17:23 -0500 Subject: Cracks in the Chinese Wall Message-ID: The Wall Street Journal January 26, 2005 COMMENTARY Cracks in the Chinese Wall By EMILY PARKER January 26, 2005 China's leaders may have convinced themselves that the country's relatively new, albeit unbalanced, material prosperity will be enough to keep an uneasy population from peering into some of the darker corners of the country's Communist history. And the popular reaction (or lack thereof) to purged former leader Zhao Ziyang's death last week appears to prove them right at first glance. The relative tranquility does make it appear as if young Chinese, intoxicated by the opportunities of China's dizzying economic growth, don't really understand -- or care -- about what really happened at Tiananmen Square in 1989, or why Zhao's sympathies with the student protesters led to his downfall. But that is not exactly the case. Increased access to information through the Internet, which is just one of the many fruits of China's development, is producing a predicament for China's leadership. China's pragmatic leaders undoubtedly saw allowing widespread access to the Internet as necessary for growth, but hoped to rein in its power by using firewalls to block "unsavory" information. But the Internet has only endowed citizens with a heightened awareness of the amount of information that is being blocked. When Zhao died last week, his passing was mostly observed in silence. State media played down the death, if it was reported at all, and relevant Web sites were often either sterilized or blocked entirely. But some Chinese, rather than quietly observe the systematic blockage of news, turned to the few tools at their disposal, and used the Internet to both obtain and spread information. The Internet, in fact, served as a forum for Chinese to congregate and express their mourning or, more often, frustration. While many Chinese went online to pay their respects to Zhao, the anger and sadness on these sites often had little to do with the man who died. Comments extracted and translated from discussions on mainland-accessible Chinese-language Web sites in the days following Zhao's death showcase a collective lament for the limits on freedom of information in China today. These voices aren't necessarily those of dissidents in exile, or intellectuals, or even citizens who are particularly politically minded. Rather, they are the voices of ordinary Chinese who, after having reaped the fruits of greater access to information, are only more aware of the freedoms of which they are still deprived. One particularly telling message, posted on a mainland-accessible Chinese language Web site shortly after Zhao's death, sheds light on a mainlander's journey to learn the truth: "In 1989 I was only seven years old, I only have a fuzzy impression of what happened that year, as for Zhao, I don't have a very detailed understanding. . . But today, while I was eating, my grandmother said, "Zhao Ziyang died, why isn't the news or the papers reporting it?" I was curious, so I went searching on the Internet, but I found that I couldn't open many Web sites, which made me think something was strange. It was extremely difficult to even find this Web site, but after reading it, I was shocked. . . I now can't help but feel worried about the future of our country." Indeed, the sudden media silence after Zhao's death only caused many to realize that something was seriously wrong. "I'm too young, I don't understand the reasons or the results, I pay a silent tribute. This morning I couldn't connect to any overseas Web sites, and I realized that something had happened. What I really don't understand is . . . [why it's necessary to put so much effort into] blocking all overseas Web sites, it's as though they have a guilty conscience." Another said, "I live in Guangzhou, and that night I wasn't able to access two Hong Kong TV stations, so I realized immediately that something major had happened, it turns out that general secretary Zhao had died! . . . In this era, how much longer can you block information?" Anger was a common sentiment online: "Today I heard from a friend that secretary Zhao had died, I felt shocked, but what made me even more furious was [the government's] conduct. People can't forget history. . . I'm really furious!" Some cybernauts said they weren't even clear on Zhao's contribution, but were nonetheless indignant at attempts to sweep under the rug the death of a man who played such an important historical role. "Putting aside Zhao's merits and faults for the time being, we have already completely lost the right to speak, and to hear about him! What kind of world is this?" Another writer used the occasion of Zhao's death to issue a warning: "Our party blocked information on the Internet. . . and didn't allow freedom of speech. . . The party did the same thing during SARS, what was the result then?" Other netizens, as if in direct response to the pervasive stereotype that younger Chinese are ignorant or indifferent about their country's history, stepped up to act as representatives for their generation: "Under Communist Party tutelage, there aren't many young people who remember Zhao. Please allow me to represent young people by saying: . . . 'The people won't forget you, history won't forget you!'" Another appealed to other netizens to uncover the truth: "I still don't really understand, because in '89 I was only four years old, can someone senior to me please let me know what happened in that year? What is the truth? Thank you." These Web sites were not simply a forum for expressing grievances. They served another important function as well: They acted as road maps to direct curious Chinese to news sources, while creating a bridge between Chinese who were hungry for information, and those who know where to find it. In this way, the Internet links a community, just as it does elsewhere in the world for people with shared interests. In China the shared interest broke through the government's wall of silence. Someone would plead: "Is there anywhere that has a detailed report [on Zhao]? A lot of Web sites are blocked!" and those in the know would post Web addresses -- or links -- of sites that were still accessible. Others would list which mainland-accessible search engines were the most useful for getting information about Zhao, and which ones were useless. One writer, perhaps frustrated by previous encounters with blocked or "edited" Web sites, upon discovering one forthright discussion on Zhao's death, commented, "Is [this site] the last place for free expression?" Amongst all others, I found this question particularly poignant: Although the discussion thread the writer was referring to did manage to avoid censors for a whole week after Zhao's death, when I tried to open it from Hong Kong yesterday, it appeared to have vanished. The silver lining, however, is that other sites will just crop up in its place. And savvy Chinese netizens will only figure out new ways to obtain and spread information within the limited freedoms that the Internet provides. China's leaders may hope that prosperity will help justify maintaining a wall to block information. But the cracks are beginning to show. Amidst all the sadness and frustration expressed online, there was one ray of hope: "Thank you, Internet, for giving us one last place to speak!" Ms. Parker is an editorial page writer at The Asian Wall Street Journal. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jan 26 13:20:42 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jan 2005 16:20:42 -0500 Subject: Sleuthing Spyware--And Its Corporate Sponsors Message-ID: Forbes Software Sleuthing Spyware--And Its Corporate Sponsors Penelope Patsuris, 01.19.05, 5:34 PM ET Benjamin Edelman became a spyware expert before most of us had any idea what was even clogging our computers. He's currently a candidate for a doctorate in economics at Harvard University and a Harvard Law student, but his work is hardly academic. Edelman, 24, has built a cottage industry documenting the nefarious ways of the spyware and adware industries, which he contends are one and the same. His extensive Web site is packed with the kind of hard evidence--screenshots and videos--that's required to combat the deception he says has been employed by companies like Claria, 180solutions, WhenU and DirectRevenue to make a buck. Each of these companies denies any wrongdoing, except DirectRevenue, whose spokesman had no comment. Many of Edelman's opponents say his accusations are self-serving, since he has at times worked for companies suing adware outfits. Edelman has lots of litigation experience despite his young age, having consulted for and testified on behalf of organizations like the ACLU, the National Association of Broadcasters and the National Football League. In 2002 he testified on behalf of a group of media outfits, including The New York Times Co. (nyse: NYT - news - people ), The Washington Post's (nyse: WPO - news - people ) interactive unit and Dow Jones (nyse: DJ - news - people ), in their lawsuit against adware outfit Gator--now named Claria. The suit claimed, among other things, that Gator's pop-up ads were unlawfully obscuring the media companies' own online content. The suit was settled under confidential terms in February 2003. Edelman doesn't just take on the makers of spyware--he outs the big-name companies that support them. In June 2004, he posted a list of WhenU advertisers, including J.P. Morgan Chase (nyse: JPM - news - people ), Verizon Communications (nyse: VZ - news - people ), Merck (nyse: MRK - news - people ) and T-Mobile. Advertisers react to the finger-pointing with varying degrees of concern. Verizon says that it "no longer uses WhenU," while a spokesman for T-Mobile says that he hasn't received any complaints about the WhenU ads and that "WhenU is opt-in and it can be removed easily." Repeated calls to Merck and J.P. Morgan Chase were not returned. Edelman's Web page also accuses WhenU of transmitting the browsing activity of its users back to the company, a practice that he says WhenU's privacy policy specifically promises not to engage in. He also writes that WhenU has spammed search giant Google (nasdaq: GOOG - news - people ). WhenU President Avi Naider says Edelman is wrong. "In the past Mr. Edelman has made statements about WhenU that drew incorrect conclusions about WhenU and were legally inappropriate," says Naider. "We take our privacy protection very seriously." He adds that WhenU's privacy policy has been audited by Microsoft's (nasdaq: MSFT - news - people ) former chief privacy officer, Richard Purcell, who is chairman of TRUSTe, a nonprofit online-privacy organization. Perhaps what's most interesting on Edelman's Web site is a video dated Nov. 18, 2004, which depicts roughly 25 different adware programs, including 180solutions, that download via security holes onto his browser. Todd Sawicki, 180's director of marketing, says that his company is taking various steps to prevent this kind of thing from happening, but that "unfortunately, where there is money, the bad guys will follow." Edelman's biggest beef with Claria: "Their license fails to prominently disclose the fact that they are collecting and storing information about what users do online," he says. "But when you read the Claria installer, it never tells you, 'We collect information.' Instead it says, 'We show you ads that are based on where you visit.' " Claria Chief Marketing Officer Scott Eagle says the company's updated user agreement clarifies that point, but admits that the update isn't presented to many users that get Claria when they download free software like Kazaa. Indeed, Claria said in an S-1 filing with the U.S. Securities and Exchange Commission--since withdrawn--that it gets most of its users via Kazaa. Still, Eagle questions Edelman's motives, saying he's worked for companies that are suing Claria. (Edelman did work for Teleflora, which has a case against Claria, but he no longer does.) Edelman counters, "My clients don't hire me to help them with litigation against Claria because I'm a big fan." The Harvard student also takes Claria advertisers to task, posting a screen shot of a British ad for Dell (nasdaq: DELL - news - people ) that appeared on his PC via Claria when he was browsing IBM's (nyse: IBM - news - people ) Web site. Edelman notes the irony that Dell has been quite vocal about the burden that the spyware boom has placed on its own customer support. "When any issues like this come to our attention, we put an end to them," says a Dell spokeswoman. "I can tell you that today we do not do business with anyone like Claria." Edelman says he has a long list of advertisers who currently work with Claria that he hasn't posted to his site. "They're a very litigious company," he says. Maybe he'll reconsider after he gets that law degree. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From nelson at crynwr.com Wed Jan 26 21:02:37 2005 From: nelson at crynwr.com (Russell Nelson) Date: Thu, 27 Jan 2005 00:02:37 -0500 Subject: Driver's license scandals raise national security worries In-Reply-To: References: Message-ID: <16888.30189.75875.981996@desk.crynwr.com> R.A. Hettinga writes: > Similar scams have occurred around the country: > > _ In New Jersey, nine state motor vehicle employees pleaded guilty to a > scheme that involved payoffs for bogus licenses. > > _ In Illinois, a federal investigation into the trading of bribes for > driver's licenses led to dozens of convictions and the indictment of former > Gov. George Ryan on racketeering and other charges. > > _ In Virginia, more than 200 people are losing their licenses because of > suspected fraud by a former Department of Motor Vehicles worker who > allegedly sold licenses for as much as $2,500 each. This is why we need a national identification card. It's also why we don't need a national identification card. The same evidence leads to two different conclusions depending on what you had already concluded was true. Reminds me of listening to Alan Greenspan. :-) -- --My blog is at angry-economist.russnelson.com | Freedom means allowing Crynwr sells support for free software | PGPok | people to do things the 521 Pleasant Valley Rd. | +1 315-323-1241 cell | majority thinks are Potsdam, NY 13676-3213 | +1 212-202-2318 VOIP | stupid, e.g. take drugs. From rah at shipwright.com Thu Jan 27 06:43:20 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 27 Jan 2005 09:43:20 -0500 Subject: Crypto expert: Microsoft flaw is serious Message-ID: Techworld.com - 27 January 2005 Crypto expert: Microsoft flaw is serious Microsoft should sort flaw and abandon RC4 in favour of better ciphers, says PGP creator. By John E. Dunn, Techworld Cryptography expert Phil Zimmermann has said he believes the flaw discovered in Microsoft's Word and Excel encryption is serious and warrants immediate attention. "I think this is a serious flaw - it is highly exploitable. It is not a theoretical attack," said Zimmermann, referring to a flaw in Microsoft's use of RC4 document encryption unearthed recently by a researcher in Singapore. "The lay user ought to be entitled to assume that the encryption produced by Microsoft is adequate. [ ] If Microsoft wants to earn the respect of the cryptographic community and the public it must rise to the occasion by producing competent security." Microsoft has been dismissive of the seriousness of the flaw, which relates to the way it has implemented the RC4 encryption stream cipher. As explained by Hungjun Wu of the Institute of Infocomm Research, it would allow anyone able to gain access to two or more versions of the same password and encrypted document to reverse engineer the scheme used to make it secure. "Stream ciphers have to be used most carefully. Any failure to do this will result in a disastrous loss of security," Zimmermann said. "Even with a properly chosen initialisation vector, you have to run it for a while before the quality of the stream cipher is good enough to use." Contrary to Microsoft's claims that the issue was a "very low threat", he countered that gaining access to a document would not present problems for a determined hacker. "There are tools one can use to cryptanalyse messages in this way." Even if the flaw was fixed, in his view a more fundamental problem was Microsoft's use of RC4, licensed from RSA Security. "Why does Microsoft continue to use RC4 in this day and age? It has other security flaws that have been published in other papers," adding that "RC4 is a proprietary cipher and has not stood up well to peer review. They should just stop using RC4. It would be better to switch to a block cipher." When contacted Microsoft, was unable to commit to a timescale for correcting the flaw but issued the following statement by way of a spokesperson: "Microsoft is still investigating this report of a possible vulnerability in Microsoft Office. When that investigation is complete, we will take the appropriate actions to protect customers. This may include providing a security update through our monthly release process." Zimmermann, meanwhile, emphasised the need for responsible disclosure of such problems. "The best way is to quietly disclose the problem to the vendor and then allow the vendor 30 days to fix the problem. Then go public," he said. Phil Zimmermann is best-known as the creator of Pretty Good Privacy (PGP), a desktop encryption program that was powerful enough that the US authorities attempted to have its distribution stopped and Zimmermann imprisoned for writing it. The case was abandoned 1996. PGP was bought out by Network Associates, though an independent company, PGP Corporation, has since been spun out to develop its core technology. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Jan 27 06:54:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 27 Jan 2005 09:54:51 -0500 Subject: Dough-Doughs Message-ID: The New York Post DOUGH-DOUGHS By DAN MANGAN January 27, 2005 -- Two bozo bandits threw away nearly a million dollars because they didn't realize that the $900,000 worth of bonds they stole from a New Jersey home could be spent as easily as the $100,000 cash they kept, cops said. "They had no idea what they had," Ramsey Police Chief Bryan Gurney said of the teenage crooks who walked off with the 100-pound safe. "That's why I think they just got rid of them. The defendants may not have been aware . . . even how to negotiate these types of bonds." The 19-year-olds were nabbed after bragging about their caper and blowing through a quarter of the cash on adult toys, officials said. Now Gurney is afraid of setting off a treasure hunt. He believes the safe and the bearer bonds - whose detachable dividend coupons can be redeemed by anyone possessing them - are still somewhere in northern New Jersey. "We have an idea where the safe is, but we don't want to put it out because if somebody beats us to it, we're thinking we could have another theft," Gurney said. Gurney said he did not know why the owner of the burgled house, Joseph Bonaro, was keeping so much cash - mainly in $100 bills - and bonds in the small, locked safe in a closet. Bonaro, 79, declined comment at his home in the upper-middle-class town. Police believe the two New Jersey men arrested for the theft, William Kittredge of Upper Saddle River, and Dominic Puzio of Mahwah, had known the safe was there before they allegedly broke into the unoccupied home sometime between Jan. 11 and Jan. 14. The men, who have been charged with burglary and theft, were busted last Friday and later released on $10,000 bail. "All indications are that they knew where to go," Gurney said. "They went directly to where this safe was and they grabbed it." Gurney said the thieves first tried to get in the house by turning a key that had been left in the outside lock of the back door. When it broke off, he said, they went through an open window. In addition to the safe, the men swiped two watches and some coins, Gurney said. Cops nailed the culprits after getting a tip that a "couple of guys were bragging about a burglary they did, and were out buying a bunch of stuff," Gurney said. When police arrested Kittredge and Puzio, they recovered about $75,000 as well as items they allegedly bought with the loot, including a Suzuki motorcycle, a watch, golf clubs, a TV and a DVD player, cops said. Additional reporting by John Doyle -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Thu Jan 27 08:14:39 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 27 Jan 2005 11:14:39 -0500 Subject: Terrorists don't let terrorists use Skype In-Reply-To: <20050127140256.GD1404@leitl.org> Message-ID: Well, I think Skype is also truly Peer to Peer, no? It doesn't go through some centralized switch or server. That means it can only be monitored at the endpoints, even when it's unencrypted. -Emory >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: Terrorists don't let terrorists use Skype >Date: Thu, 27 Jan 2005 15:02:56 +0100 > >From: Adam Shostack >Date: Tue, 11 Jan 2005 10:48:12 -0500 >To: David Wagner >Cc: cryptography at metzdowd.com >Subject: Re: Simson Garfinkel analyses Skype - Open Society Institute >From owner-cryptography+eugen=leitl.org at metzdowd.com Thu Jan 27 01:04:39 >2005 >User-Agent: Mutt/1.4.2i > >On Mon, Jan 10, 2005 at 08:33:41PM -0800, David Wagner wrote: >| In article <41E07994.5060004 at systemics.com> you write: >| >Voice Over Internet Protocol and Skype Security >| >Simson L. Garfinkel >| > >http://www.soros.org/initiatives/information/articles_publications/articles/ >security_20050107/OSI_Skype5.pdf >| >| >Is Skype secure? >| >| The answer appears to be, "no one knows". The report accurately reports >| that because the security mechanisms in Skype are secret, it is >impossible >| to analyze meaningfully its security. Most of the discussion of the >| potential risks and questions seems quite good to me. >| >| But in one or two places the report says things like "A conversation on >| Skype is vastly more private than a traditional analog or ISDN telephone" >| and "Skype is more secure than today's VoIP systems". I don't see any >| basis for statements like this. Unfortunately, I guess these sorts of >| statements have to be viewed as blind guesswork. Those claims probably >| should have been omitted from the report, in my opinion -- there is >| really no evidence either way. Fortunately, these statements are the >| exception and only appear in one or two places in the report. > >The basis for these statements is what the other systems don't do. My >Vonage VOIP phone has exactly zero security. It uses the SIP-TLS >port, without encryption. It doesn't encrypt anything. So, its easy >to be more secure than that. So, while it may be bad cryptography, it >is still better than the alternatives. Unfortunately. > >Adam > > >--------------------------------------------------------------------- >The Cryptography Mailing List >Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com > > >----- Forwarded message from Peter Gutmann >----- > >From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) >Date: Wed, 12 Jan 2005 05:00:29 +1300 >To: daw-usenet at taverner.CS.Berkeley.EDU >Cc: cryptography at metzdowd.com >Subject: Re: Simson Garfinkel analyses Skype - Open Society Institute > >David Wagner writes: > > >>Is Skype secure? > > > >The answer appears to be, "no one knows". > >There have been other posts about this in the past, even though they use >known >algorithms the way they use them is completely homebrew and horribly >insecure: >Raw, unpadded RSA, no message authentication, no key verification, no >replay >protection, etc etc etc. It's pretty much a textbook example of the >problems >covered in the writeup I did on security issues in homebrew VPNs last year. > >(Having said that, the P2P portion of Skype is quite nice, it's just the > security area that's lacking. Since the developers are P2P people, >that's > somewhat understandable). > >Peter. > > >--------------------------------------------------------------------- >The Cryptography Mailing List >Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Thu Jan 27 11:06:53 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 27 Jan 2005 14:06:53 -0500 Subject: MPAA files new film-swapping suits Message-ID: > The MPAA's new software, "Parent File Scan," is aimed at identifying >file-swapping software applications and multimedia files on a computer, so >that--in theory--parents can evaluate whether the files on their computer >have been legally acquired and talk with children about the legalities of >peer-to-peer activity. Cheers, RAH -------- CNET News MPAA files new film-swapping suits By John Borland Story last modified Wed Jan 26 13:43:00 PST 2005 Hollywood studios filed a second round of lawsuits against online movie-swappers on Wednesday, stepping up legal pressure on the file-trading community. The Motion Picture Association of America (MPAA) also made available a new free software tool so parents can scan their computers for file-swapping programs and for movie or music files which may be copyrighted. The group said its lawsuits were targeting people across the United States, but did not say how many people were being sued. "We cannot allow people to steal our motion pictures and other products online, and we will use all the options we have available to encourage people to obey the law," MPAA Chief Executive Officer Dan Glickman said in a statement. "We had to resort to lawsuits as one option to help make that happen." After initially letting record labels take the lead, movie studios have launched their own aggressive legal campaigns against online film-trading in recent months, targeting individual computer users as well as Web site and server operators that serve as hubs of file-trading networks. The group filed its first set of lawsuits against individual computer users in November, and followed up with a worldwide campaign against the operators of BitTorrent, eDonkey and DirectConnect networks. As a result, some of the most popular Web sites that served as file-trading hubs, such as Suprnova.org and Yourceff.com have gone offline. At least one, LokiTorrent.com, has remained online and is soliciting donations from its visitors to pay for legal fees. The MPAA's new software, "Parent File Scan," is aimed at identifying file-swapping software applications and multimedia files on a computer, so that--in theory--parents can evaluate whether the files on their computer have been legally acquired and talk with children about the legalities of peer-to-peer activity. Unlike the network-monitoring software often installed in businesses or corporate networks, the MPAA-backed software does not monitor or block downloads. In practice, the software, developed by the DtecNet Software company in Denmark, casts an extremely wide net. It searches for and identifies virtually any audio or video file, including popular formats like MP3, Microsoft's Windows Media, the AAC files that Apple Computer's iTunes software often uses, or MPEG video. The software makes no distinction between legally acquired or illegally downloaded files, however--which can total in the thousands. Parent File Scan also uses a very liberal definition of file-swapping software. In a test on a CNET News.com computer, the software identified Mirc--a client for the Internet Relay Chat network, where files can be swapped, but where tens of thousands of wholly legal conversations happen every day--and Mercora, a streaming Web radio service that uses peer-to-peer technology but does not allow file swapping. The software is primarily aimed at use by parents, and does not report any information back to the MPAA or any other group, the trade association said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Jan 27 11:09:06 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 27 Jan 2005 14:09:06 -0500 Subject: US to slap tourists with RFID Message-ID: US to slap tourists with RFID Jo Best silicon.com January 26, 2005 The US Department of Homeland Security has decided to trial RFID tags in an effort to make sure only the right sort of people get across US borders. The controversial US-VISIT scheme for those visiting the US from abroad already fingerprints holidaymakers on their way into the country and is now adding RFID to the mix in order to improve border management, the department said. The trials will start at a "simulated port" in the spring and will then be extended to Nogales East and Nogales West in Arizona; Alexandria Bay in New York; and Pacific Highway and Peace Arch in Washington by the end of July. The testing phase will continue until the spring of next year. The exact way RFID will be used with the travellers is not yet known. RFID chips will be used to track both pedestrians and vehicles entering the US to automatically record when the visitors arrive and leave in the country. So far, over 400 people have been turned away from the country or arrested as a result of US-VISIT checks. US Under Secretary for Border & Transportation Security, Asa Hutchinson, said in a statement: "Through the use of radio frequency technology, we see the potential to not only improve the security of our country, but also to make the most important infrastructure enhancements to the US land borders in more than 50 years." The US government has already shown a marked fondness for the tagging technology. The US Department of Defense mandated its suppliers to use the technology, while the Food and Drug Administration is encouraging the pharmaceutical industry to use the chips in an attempt to beat counterfeiters. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Jan 27 11:32:16 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 27 Jan 2005 14:32:16 -0500 Subject: Offline ID crimes still more severe Message-ID: CNET News Offline ID crimes still more severe Story last modified Wed Jan 26 14:45:00 PST 2005 Though identity theft using the Internet seems to get all the attention, most of the financial loss linked to fraud is still from offline crime, a new study shows. Losses related to an average case of Internet-initiated fraud were $551, compared to $4,543 lost from fraud tracked back to paper statements, according to the 2005 Identity Fraud Survey conducted by the Better Business Bureau and Javelin Strategy & Research. The survey, which follows an earlier study carried out by the Federal Trade Commission in 2003, indicated that Internet-related crimes are actually less severe, less costly and not as widespread as previously thought. The amount of money lost to identity fraud in 2004 was $52.6 billion--about the same as in 2003. And the number of victims dropped to 9.3 million in 2004 from 10.1 million the year before. "This new research contradicts some common assumptions about identity-theft fraud and points to new paths of prevention. There are several steps consumers can take to improve their identity safety and protect themselves against this type of fraud," Ken Hunter, CEO of the Council of Better Business Bureaus, said in a statement. The survey said computer crimes accounted for only 11.6 percent of identity fraud in 2004 in which the cause was known. Half of those crimes stemmed from spyware, software that surreptiously tracks users online or causes ads to pop up when the consumer is online. "Our numbers show that fears about online identity fraud may be out of proportion to the relative risk, causing consumers to ignore the most glaring issues," James Van Dyke, Javelin's founder, said in a statement. "Indeed, most instances of identity fraud occur through traditional channels and are paper-based, not Internet-based." Users can protect their financial data by using updated software that protects against spyware and viruses and by and not responding to suspicious e-mail ploys that request personal data. By managing their financial accounts through a password-authenticated Web site, the report added, "consumers can reduce access to personal information on paper bills and statements that may be used to commit identity theft and fraud." Also revealing was the finding that half of those who committed the online crimes are closely related to the victim as a friend, family member or neighbor. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Thu Jan 27 06:02:56 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Jan 2005 15:02:56 +0100 Subject: Terrorists don't let terrorists use Skype Message-ID: <20050127140256.GD1404@leitl.org> From steve49152 at yahoo.ca Thu Jan 27 17:43:17 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Thu, 27 Jan 2005 20:43:17 -0500 (EST) Subject: Gripes About Airport Security Grow Louder In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776C34@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050128014317.86692.qmail@web51805.mail.yahoo.com> --- "Trei, Peter" wrote: > > > > -----Original Message----- > > From: owner-cypherpunks at minder.net > > [mailto:owner-cypherpunks at minder.net]On Behalf Of Steve Thompson > > Sent: Tuesday, January 25, 2005 12:13 PM > > To: cypherpunks at al-qaeda.net > > Subject: RE: Gripes About Airport Security Grow Louder > > > > > > --- Tyler Durden wrote: > > [airport security] > > > More indications of an emerging 'Brazil' scenario, as opposed to a > > > hyper-intelligent super-fascist state. > > > > As if. > > > > There already is a kind of intelligent super-fascist state in place > > thoughout much of society. My bugbears of the moment are the > > police and > > courts, so you get my take on how they are organised so as to be > > 'intelligent' without seeming so -- which further enables a > > whole lot of > > fraud to masqerade as process and incompetence. The > > super-fascist part > > comes about because the system avoids public accountability while also > > somehow evading any sort of reasonable standard of performance. > > > > What's the error rate, that is the false arrest, prosecution, and/or > > conviction rate of a Western countries' judiciary and police > > divitions? > > If it's even ten percent, and it's probably much higher, then > > there is no > > reason to respect the operation and perpetuation of the system. > > One chilling data point. Remember a few years ago the (pro death > penalty) governor of Illinois suspended all the death sentences in > has state? The reason being was that with the introduction of DNA > testing, 1/3 of the people on death row were found to be innocent. > > I don't know how many other innocents the state planned to murder, > but presumably there were some cases where DNA evidence was not > available. > > If, in a capital case, where the money to pay public defenders > is usually maximally available, and the appeals process, checks, > and cross-checks are the more thorough than in any non-capital > prosecution, you STILL get at least a 33% error rate, then what > is the wrongfull conviction rate in non-capital cases, where there > are far fewer appeals, and public defenders are paid a pittance? > > Peter Trei > ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From steve49152 at yahoo.ca Thu Jan 27 17:45:12 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Thu, 27 Jan 2005 20:45:12 -0500 (EST) Subject: Gripes About Airport Security Grow Louder In-Reply-To: Message-ID: <20050128014512.98815.qmail@web51802.mail.yahoo.com> --- Tyler Durden wrote: [mistake rate] > And of course there's the fairly obvious point that lots of those in > prison > "correctly" are there for drug-related "crimes". Said crimes would > almost > completely dissappear and drug usage would drop if many of those drugs > were > legalized and taxed. But God forbid that happen because what would all > those > policemen do for a living? Prison workers? Judges? Well, pot is bad. Duh. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From justin-cypherpunks at soze.net Thu Jan 27 13:59:15 2005 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 27 Jan 2005 21:59:15 +0000 Subject: MPAA files new film-swapping suits In-Reply-To: References: Message-ID: <20050127215915.GA13208@arion.soze.net> > > > Hollywood studios filed a second round of lawsuits against online > movie-swappers on Wednesday, stepping up legal pressure on the file-trading > community. As much as I'd like to be upset, they are driving innovation of p2p software. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From camera_lumina at hotmail.com Fri Jan 28 07:16:44 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 28 Jan 2005 10:16:44 -0500 Subject: MPAA files new film-swapping suits In-Reply-To: <20050127215915.GA13208@arion.soze.net> Message-ID: That's an interesting point. They seem to be "attacking" at precisely the correct rate to forcibly evolve P2P systems to be completely invulnerable to such efforts. Hum. Perhaps Tim May works for MPAA? Nah... he wasn't THAT bright, was he? -TD >From: Justin >To: cypherpunks at al-qaeda.net >Subject: Re: MPAA files new film-swapping suits >Date: Thu, 27 Jan 2005 21:59:15 +0000 > > > > > > > Hollywood studios filed a second round of lawsuits against online > > movie-swappers on Wednesday, stepping up legal pressure on the >file-trading > > community. > >As much as I'd like to be upset, they are driving innovation of p2p >software. > >-- >"War is the father and king of all, and some he shows as gods, others as >men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From steve49152 at yahoo.ca Fri Jan 28 10:59:22 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Fri, 28 Jan 2005 13:59:22 -0500 (EST) Subject: Gripes About Airport Security Grow Louder In-Reply-To: <20050128014317.86692.qmail@web51805.mail.yahoo.com> Message-ID: <20050128185922.92677.qmail@web51807.mail.yahoo.com> Speaking of mistakes.... I seem to have pasted the wrong message text when I sent my reply to Mr. Trei. I regret the unfortunate duplication and consequent waste of list bandwidth. ----------------------- --- "Trei, Peter" wrote: [mistake rate] > If, in a capital case, where the money to pay public defenders > is usually maximally available, and the appeals process, checks, > and cross-checks are the more thorough than in any non-capital > prosecution, you STILL get at least a 33% error rate, then what > is the wrongfull conviction rate in non-capital cases, where there > are far fewer appeals, and public defenders are paid a pittance? I couldn't say, but it is well known that people who are accused of a crime are given rather large incentives to plead guilty in order to avoid the lengthly trial process. This is, of course, a major point. However, there isn't much discussion about the lack of accountability for people (police, judicial officials, etc.) who themselves run afoul of "the law" and who are rarely punished at all. And of course there's the lucrative prison system with it's large union and bureaucracy. Plus, many people know about the recruiting facet of that industry in which some individuals are groomed and incentivised to become agents of the state, in one capacity or another, in exchange for freedom or lesser sentences. Insofar as the intel community is concerned, it seems from my perspective that there is no effective deterrent for violent crime since you've pretty much got to do something really stupid before they'll prosecute: like cut off your wife's head and store it in your freezer, or something equally gregarious. For people in SpookWorld, fraud, larceny, perjury, and murder are merely the tools of the trade. And don't get me started on about the cartels. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From eugen at leitl.org Fri Jan 28 07:41:57 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jan 2005 16:41:57 +0100 Subject: MPAA files new film-swapping suits In-Reply-To: References: <20050127215915.GA13208@arion.soze.net> Message-ID: <20050128154157.GB1404@leitl.org> On Fri, Jan 28, 2005 at 10:16:44AM -0500, Tyler Durden wrote: > That's an interesting point. They seem to be "attacking" at precisely the > correct rate to forcibly evolve P2P systems to be completely invulnerable > to such efforts. Not really. The P2P assm^H^H^H^H architects are reissuing new systems with holes patched reactively. There's no reason for a P2P system designed in 1996 to be water-tight to any threat model of 2010. (Strangely enough, they had IP nazis and lawyers back then, too). > Hum. Perhaps Tim May works for MPAA? Nah... he wasn't THAT bright, was he? I think he was primarily one thing: frustrated. It's hard to see the idiots win, year after year. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From mv at cdc.gov Fri Jan 28 19:04:42 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 28 Jan 2005 19:04:42 -0800 Subject: MPAA files new film-swapping suits Message-ID: <41FAFD4A.764D2AE@cdc.gov> At 04:41 PM 1/28/05 +0100, Eugen Leitl wrote: >Not really. The P2P assm^H^H^H^H architects are reissuing new systems with >holes patched reactively. There's no reason for a P2P system designed in 1996 >to be water-tight to any threat model of 2010. (Strangely enough, they had >IP nazis and lawyers back then, too). I was surprised to see that the EFF listed ADCs as endangered tech. Because the hollywood nazis regard (and damn rightly so) the analog hole as real. That a fairly stead organization as EFF would regard the desparate death-sounds of hollywood as a serious threat to such basic tech was astounding. I've had cross-compiled code (for the MMC2107) identified as a virus (and therefore erased) by an antivirus program on a PC. This only lost an hour or two of work. Imagine that your medical measurements, or kids' performances, happen to match an ADC's copy protection codes. Imagine that all your silicon belongs to us, us=hollywood=congress. Imagine that all your printing presses belong to the State, for the protection of the commercial merde. ------ "Be neither perpetrator, bystander, nor victim" ---a commentator on the 60th anniversary of Auswitz, coming to a goverment center near you ----- Uranium --the Great Equalizer From rah at shipwright.com Fri Jan 28 17:03:22 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 28 Jan 2005 20:03:22 -0500 Subject: Scientists Work on Software to Scan Arabic Message-ID: The New York Times January 27, 2005 Scientists Work on Software to Scan Arabic By THE ASSOCIATED PRESS Filed at 8:09 a.m. ET BUFFALO, N.Y. (AP) -- Computer scientists are developing software to scan Arabic documents, including handwritten ones, for specific words and phrases, filling a void that became apparent following the Sept. 11. attacks. Besides helping with intelligence gathering, the software should expand access to modern and ancient Arabic manuscripts. It will allow Arabic writings to be digitized and posted on the Web. ``The whole Internet is skewed toward people who speak English,'' said Venu Govindaraju, director of the Center for Unified Biometrics and Sensors at the University at Buffalo, where the software is being developed. Govindaraju fears that if optical character recognition software isn't developed for a particular language, ``then all the classic texts in that language will disappear into oblivion.'' Bill Young, an Arab language specialist at the University of Maryland, said the software could help scan through masses of typed pages for specific names or words, though he cautioned that handwritten Arabic presents serious challenges for computers. For instance, the word mas'uul, meaning responsible, can be written in more than one way, he said. So the software would have to be given instructions about possible variations. Govindaraju, who helped develop software to recognize handwritten addresses in English, said the Arabic software would take into account the fact that characters may take different forms depending on where within a word they appear, and that Arabic vowels are pronounced but often not written. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 28 18:58:35 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 28 Jan 2005 21:58:35 -0500 Subject: 'No Place to Hide': Nonstop Scrutiny, as Orwell Foresaw Message-ID: The New York Times January 25, 2005 BOOKS OF THE TIMES | 'NO PLACE TO HIDE' Nonstop Scrutiny, as Orwell Foresaw By MICHIKO KAKUTANI NO PLACE TO HIDE By Robert O'Harrow Jr. 348 pages. Free Press. $26. icture "Minority Report" combined with Orwell's "1984" and Francis Ford Coppola's "Conversation": in an effort to prevent future crimes and predict what certain individuals are likely to do, the government has begun working with high-tech titans to keep tabs on the populace. One company has come up with a digital identity system that has tagged every adult American with a unique code. Another company is intent on gaining control of all records - including state and local files, financial information, employee dossiers, DNA data and criminal background checks - that define our identity. In addition to iris scanners, voice analyzers and fingerprint readers, there now exist face recognition machines and cameras that can identify an individual by how he or she walks. One government group is working on infrared detectors that could register heat signals around people's eyes, indicating an autonomic "fight or flight" response; another federal agency has floated a proposal to assess risk by examining airline passengers' brain waves with "noninvasive neuro-electric sensors." This surveillance state is not a futuristic place conjured in a Philip K. Dick novel or "Matrix"-esque sci-fi thriller. It is post-9/11 America, as described in Robert O'Harrow Jr.'s unnerving new book, "No Place to Hide" - an America where citizens' "right to be let alone," as Justice Louis Brandeis of the Supreme Court once put it, is increasingly imperiled, where more and more components of our daily lives are routinely monitored, recorded and analyzed. These concerns, of course, are hardly new. Way back in 1964, in "The Naked Society," Vance Packard warned about encroachments on civil liberties and the growing threat to privacy posed by new electronic devices, and in 1971, in "The Assault on Privacy," Arthur R. Miller warned that advances in information technologies had given birth to "a new social virus - 'data-mania.' " The digital revolution of the 1990's, however, exponentially amplified these trends by enabling retailers, marketers and financial institutions to gather and store vast amounts of information about current and potential customers. And as Mr. O'Harrow notes, the terrorist attacks of Sept. 11, 2001, "reignited and reshaped a smoldering debate over the proper use of government power to peer into the lives of ordinary people." Some of the material in "No Place to Hide" is familiar from news coverage (most notably, the author's own articles about privacy and technology for The Washington Post), from a recent ABC News special (made in conjunction with Mr. O'Harrow's reporting) and from recent books like Jeffrey Rosen's "Naked Crowd: Reclaiming Security and Freedom in an Anxious Age" and Christian Parenti's "Soft Cage: Surveillance in America From Slavery to the War on Terror." Still, Mr. O'Harrow provides in these pages an authoritative and vivid account of the emergence of a "security-industrial complex" and the far-reaching consequences for ordinary Americans, who must cope not only with the uneasy sense of being watched (leading, defenders of civil liberties have argued, to a stifling of debate and dissent) but also with the very palpable dangers of having personal information (and in some cases, inaccurate information) passed from one outfit to another. Mr. O'Harrow also charts many consumers' willingness to trade a measure of privacy for convenience (think of the personal information happily dispensed to TiVo machines and Amazon.com in exchange for efficient service and helpful suggestions), freedom for security. He reviews the gargantuan data-gathering and data-mining operations already carried out by companies like Acxiom, ChoicePoint and LexisNexis. And he shows how their methods are being co-opted by the government. The Privacy Act of 1974, enacted in the wake of revelations about covert domestic spying by the F.B.I., the Army and other agencies, gave individuals new rights to know and to correct information that the government was collecting about them, but the government's current predilection for outsourcing data-gathering to private companies has changed the rules of the game. As Mr. O'Harrow notes: "Among other things, the law restricted the government from building databases of dossiers unless the information about individuals was directly relevant to an agency's mission. Of course, that's precisely what ChoicePoint, LexisNexis and other services do for the government. By outsourcing the collection of records, the government doesn't have to ensure the data is accurate, or have any provisions to correct it in the same way it would under the Privacy Act. There are no limits on how the information can be interpreted, all this at a time when law enforcement, domestic intelligence and foreign intelligence are becoming more interlinked." Privacy and civil liberties advocates have put the brakes on some government projects, like the Total Information Awareness initiative promoted by John Poindexter, the former vice admiral (of Iran-contra notoriety), and a surveillance engine known (half jokingly) as the Matrix (for the Multistate Anti-Terrorism Information Exchange) that would combine criminal and commercial records in one blindingly fast system. Yet Mr. O'Harrow points out: "The drive for more monitoring, data collection, and analysis is relentless and entrepreneurial. Where one effort ends, another begins, often with the same technology and aims. Total Information Awareness may be gone, but it's not forgotten. Other kinds of Matrix systems are already in the works." Even now, one mini-me version of Big Brother or another is monitoring Americans' daily lives, from the computer "cookies" that map our peregrinations around the Net, to the MetroCards, E-ZPasses and car-installed Global Positioning System devices that track our travels, to the security cameras that eyeball us at banks and stores. Mr. O'Harrow writes that RFID (radio frequency identification) tags will be attached soon to credit cards, bank passbooks and "anything else that will enable businesses to automatically 'know you' when you arrive," and that several organizations "are working on a standard that would enable every manufactured item in the world to be given a unique ID, at least theoretically." "Before long," he adds, "our phones, laptop computers, Palm Pilots, watches, pagers and much more will play parts in the most efficient surveillance network ever made. Forget dropping a coin into a parking meter or using a pay phone discreetly on the street. Those days are slipping by. The most simple, anonymous transactions are now becoming datapoints on the vast and growing matrix of each of our lives." It is an alarming vision of the future uncannily reminiscent of the world imagined by Orwell in "1984": a world where "you had to live - did live, from habit that became instinct - in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized." It just arrived some two decades later than Orwell predicted. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 28 19:48:18 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 28 Jan 2005 22:48:18 -0500 Subject: Le no-no Message-ID: RED HERRING | The Business of Technology Le no-no The U.S. trips up a simple plan between IBM and Lenovo. January 28, 2005 Homeland security is a cornerstone of the Bush Administration. But does halting the IBM-Lenovo deal make the United States any safer? The Committee on Foreign Investment in the United States (CFIUS) has decided to investigate the threat presented by the sale of IBM's personal computer business to China's Lenovo Group. Industry observers want to know what it is about this deal that irks the feds. "I don't know," says Jeff Moss, CEO of Black Hat, a computer security consulting firm. "It could be the loss of any manufacturing technology, any kind of proprietary technology that IBM had; but the Chinese could take a laptop apart themselves, too." Besides, most personal computers are already made in China-PC production is extremely commoditized, perhaps as much as transistors. "It is quite a stretch [to say] that the sale of the PC business to Lenovo would threaten American security," says Baizu Chen, a professor at the University of Southern California's Gordon S. Marshall School of Business. "Some senators want to make a noise. Eventually, this will pass. It's just transfer of ownership." One concern may have to do more with location than technology. The Washington Post quoted a member of the U.S.-China Economic and Security Review Commission-a Congressional panel created to watch commercial relations between the U.S. and China-as saying that Chinese computer experts could use an IBM facility in North Carolina as a base for industrial espionage. While the U.S. Treasury Department wouldn't confirm or deny the launch of the 45-day probe, IBM, which will still hold an 18.9 percent stake in the business, says it has filed the required notice with the committee and is cooperating fully. The company is confident in the process and outcome. One would hope so, given that the deal is worth $1.75 billion in cash, equity, and assumed debt. Where are the red flags? The U.S. government must demand action if a deal impacts domestic production needed for projected national defense requirements, or the capacity of domestic industries to meet national defense requirements, or the control of domestic industries by foreign citizens. The sale of IBM's money-losing PC unit doesn't quite cut it. It could be an issue of pride, say some-or perhaps cryptographic chips, say others. "Some of the IBM laptops have built-in cryptographic chips," says Pete Lindstrom, research director for Spire Securities. Mr. Lindstrom points out that if the intellectual property associated with cryptography is sold to a foreign country, one could potentially transfer a strong cryptographic capability to another country. But IBM is a multinational company, with employees across the globe. Would it really be so hard for someone to access such information? In the end, it all comes down to whom you trust. Legend Holdings owns the majority stake in Lenovo, and the Chinese government controls a large chunk of Legend. A few years ago, Global Crossing wanted to sell its telecommunications network to Hong Kong-based Hutchison Whampoa. It almost did-until the CFIUS stepped in. But that's a story IBM executives would rather not think about. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 28 20:41:34 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 28 Jan 2005 23:41:34 -0500 Subject: Lawsuit alleges 'online currency' scam Message-ID: CNET News Lawsuit alleges 'online currency' scam By Declan McCullagh Story last modified Thu Jan 27 08:47:00 PST 2005 A lawsuit claiming that a "gold backed" Internet currency scheme bilked investors out of more than $250 million can proceed against a bank implicated in it, a federal judge has ruled. At the height of its popularity, the OSGold currency boasted more than 60,000 accounts created by people drawn to promises of "high yield" investments that would provide guaranteed monthly returns of 30 percent to 45 percent. But around July 2002, the eve of the maturity date for the investment program, the company that offered the accounts suddenly ceased payouts. David Reed, who had founded the company called One Groupe International, eventually was discovered to have relocated from the United States to Cancun, Mexico. Concluding they had been fleeced, a group of OSGold investors banded together to sue Reed and 19 other defendants including two Latvian banks that allegedly lent their imprimatur to the project. It was "fronted by the sale of a nonexistent gold-backed Internet currency and was fueled by a mammoth 'Ponzi' scheme disguised as a guaranteed high-yield investment program," the OSGold investors say in court documents. U.S. District Judge Lewis Kaplan ruled on Friday that the lawsuit could proceed against the Latvian Economic Commercial Bank (Lateko), which had attempted to dismiss the charges. Kaplan, in New York, dismissed some charges against Lateko, including breach of fiduciary duty, but permitted the rest to stand. "Lateko's apparently false denials to a possibly important business partner and its continued cooperation with (Reed and other defendants) even after the scheme suspiciously began to collapse tend to show conscious disregard or recklessness and give rise to a strong inference of fraudulent intent," Kaplan wrote. Lateko's involvement began in December 2001, when it allegedly inked a deal with Reed and other defendants to provide anonymous debit cards that could be used to withdraw money from OSGold accounts from ATMs linked to the Cirrus network. Lawyers for Lateko in the New York offices of Baker & McKenzie did not respond to an interview request. Suspecting something odd was going on, some companies involved in providing gold-backed Internet currencies tried to distance themselves from OSGold early on. In May 2001, the Gold and Silver Reserve (responsible for the e-gold currency) announced it would no longer link to companies that did business with "or make reference to" OSGold. A Ponzi scheme is an illegal pyramid scheme in which some early investors are paid off with money from later investors in an attempt to make the system look legitimate. But when later investors demand their money, the fraud collapses. This type of scheme is named for 1920s-era swindler Charles Ponzi, who promised investors a 40 percent return in 90 days. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jan 28 20:42:48 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 28 Jan 2005 23:42:48 -0500 Subject: Unintended Consequences Message-ID: SecurityFocus COLUMNISTS 293 Columnists < http://www.securityfocus.com/columnists/293 > Unintended Consequences By Scott Granneman Jan 19 2005 01:11PM PT Back in the 1970s, long before the revolution that would eventually topple him from power, the Shah of Iran was one of America's best friends (he was a dictator who brutally repressed his people, but he was anti-communist, and that made him OK in our book). Wanting to help out a good friend, the United States government agreed to sell Iran the very same intaglio presses used to print American currency so that the Shah could print his own high quality money for his country. Soon enough, the Shah was the proud owner of some of the best money printing machines in the world, and beautiful Iranian Rials proceeded to flow off the presses. All things must come to an end, and the Shah was forced to flee Iran in 1979 when the Ayatollah Khomeini's rebellion brought theocratic rule to Iran. Everyone reading this undoubtedly knows the terrible events that followed: students took American embassy workers hostage for over a year as Iran declared America to be the "Great Satan," while evidence of US complicity in the Shah's oppression of his people became obvious, leading to a break in relations between the two countries that continues to worsen to this day. During the early 90s, counterfeit $100 bills began to flood the Mideast, eventually spreading around the world. Known as "superbills" or "superdollars" by the US Treasury due to the astounding quality of the forgeries, these $100 bills became a tremendous headache not only for the US and its economy, but also for people all over the world that depend on the surety of American money. Several culprits have been suggested as responsible for the superbills, including North Korea and Syria, but many observers think the real culprit is the most obvious suspect: an Iranian government deeply hostile to the United States ... and even worse, an Iranian government possessing the very same printing presses used to create American money. If you've ever wondered just why American currency was redesigned in the 1990s, now you know. In the 1970s, the US rewarded an ally with a special machine; in the 1990s, the US had to change its money because that ally was no longer an ally, and that special machine was now a weapon used to attack the US's money supply, where it really hurts. As an example of the law of unintended consequences, it's powerful, and it illustrates one of the main results of that law: that those unintended consequences can really bite back when you least expect them. Unprepared and unready Sometimes unintended consequences occur from the best of intentions. For instance, Denny's is known for being open 24 hours a day, every day, always. The story goes that in 1998, for the first time in 35 years, Denny's decided to close its doors on Christmas, but there was a big problem: since Denny's was always open, many stores didn't have locks on the doors, so they couldn't close. Likewise, email was invented in 1971 and was immediately embraced as a great way to communicate with folks all over the world. Since virtually everyone on the Net pretty much knew each other at the time, email was developed without a lot of safeguards. Spoofing the sender? Not a real issue. False headers? Why in the world would anyone want to do that? Purposely misspelled words in the subject to get past filters? First of all, what the heck are filters, and why would someone want to spell something weird to get past one? It was a more innocent age, but that innocence was lost long ago, thanks to a trickle ... no, a stream ... no, a flood, an absolutely Biblical flood of garbage, scams, lies, ads, swindles, and just plain crap. In fact, it's gotten so bad that MX Logic, an antispam vendor, now estimates that 75% of all email is spam, while in same article Postini Inc. jacks that number up to 88% of all email. Think about that: only about 1 in 10 emails is legitimate. That's truly pathetic, almost enraging, and it's finally leading (slowly, oh so slowly) to necessary changes - not in the legal system, since the CAN-SPAM Act of 2003 seems to have done virtually nothing to stem the tide - but in email infrastructure, to things like Microsoft's proposed Sender ID, Yahoo's Domain Keys, and Sender Policy Framework. Of course, at this time there's no consensus on the solution, and with patents and other contentious issues of so-called intellectual property acting as flies in the ointment, we may never reach a unified approach to the problem of spam. Naturally, that just helps the spammers. But they don't mind - they're busy helping each other. Fast forward from 1971 to 2005. Would the inventors recognize the monstrosity they innocently unleashed upon the world? Making things easier for the bad guys Bruce Schneier, in his excellent Beyond Fear, reports that drivers in Russia have made interesting choices that have not always resulted in improving their situations. Crime is a large and growing problem in Russia, and one of the biggest threats is in the area of auto theft. To combat car theft, automobile owners installed car alarms. The result? Thieves waited until the owner approached the car to turn off the alarm, and then shot him, took his keys, and drove away in the car. Round one to the bad guys. Fine. So car owners quit using alarms, and instead installed security systems that made cars virtually impossible to hotwire. Ah ha! Round two to the good guys. Not so fast - since cars were extremely difficult to hotwire, thieves turned to carjackings instead, which is far more likely to result in injury or death to the car owner. Round three to the bad guys, and once again we see how "security" sometimes serves only to make things easier for the criminals. A similar thing has popped up recently with one of my favorite bugaboos, DRM. I'm opposed to DRM for quite a number of reasons (if you're looking for an excellent list of those reasons, read Cory Doctorow's brilliant dissection of DRM), and now there's a new one: because it actually helps the bad guys. Microsoft has touted its Windows Media Player (or WMP) as an industy- and DRM-friendly app that supports so-called "protected" media files. Basically, if you try to play a DRM-laden Windows media file, WMP checks to see if you have a valid license to do so. If you do, the file plays; if you don't, WMP heads off to a web site specified by the media file to acquire and download (and often purchase) a license. But guess what? WMP doesn't check to see where it's going, or even what it's downloading, so individuals up to no good simply redirect it to sites where users end up with spyware, viruses, and other nastiness on their Windows machines. One researcher went ahead, pressed "Yes" to allow stuff to install, and then measured the results: "My computer quickly became contaminated with the most spyware programs I have ever received in a single sitting ... all told, the infection added 58 folders, 786 files, and an incredible 11,915 registry entries to my computer." Amazing. Astounding. And another example of how some supposed "security" actually makes things easier for the bad guys - and makes things far worse for the good guys (and by "good guys," I mean users, not the companies pushing DRM). Feel safer, act riskier Social scientists have noticed an interesting pattern in human behavior over the years: it seems that the more safe and secure people feel, the more likely they are to engage in risky behavior. For proof of this, look no further than the Iroquois Theater in Chicago, opened for business in November of 1903. Fires at this time were a serious threat in theaters, due to the hot lights hung all around the stage in close proximity to backdrops and sets decorated with oil paints. Not to worry, though: the managers of the Iroquois advertised that they had put into place an asbestos curtain that would drop in case of fire, protecting the audience from the flames. Additional precautions common to theaters of the time that should have been put into place - things like firemen near the stage, and readily avilable fire hoses and extinguishers - were ignored because it was believed that the asbestos curtain was the ultimate in fire safety. On 30 December 1903, a velvet curtain caught on fire as 1900 men, women, and children were packed in to see an afternoon performance of the musical "Mr. Blue Beard, Jr." The asbestos curtain was lowered, but got caught on a lamp and failed to close, exposing the crowd to flames and smoke. People rushed the doors in a panic, but the doors open inwardly, making them impossible to open. 603 people died in the fire - and the supposed asbestos curtain turned out to be a fake, since it too burned in the fire. Chicago's strict fire codes resulted from the fire, but it was a steep price to pay. Computer viruses, worms, and spyware don't compare to death and destruction, but we see the same sort of human behavior - feeling safer, acting riskier - at work. For years, anti-virus software from third-party vendors has been included with most new Windows machines, and now both AOL and Microsoft are bundling A/V software with their products. Virtually all of the A/V software included with new PCs is time limited: it's free for 3 months, or maybe 6 months, and then the user has to buy it. You and I both know that few users actually go ahead and sign up ... but many users still believe they're protected. In fact, a recent study covered in The Register illustrates this tendency. Researchers looked at the computers of 329 volunteers. Nearly all of the machines were infected with viruses, spyware, and other garbage - one fellow had 1,059 spyware and adware programs on his machine! - yet about 75% of those same users "reported believing that their PC is very secure or moderately secure". I'm not surprised. And now Microsoft is adding "free" anti-spyware to the mix. Is this a good thing? On the one hand, sure - now people will have anti-spyware on their machines, and as regular readers know, it is badly needed, given the outrageous levels of spyware out there on the Net. On the other hand, how effective is this software going to be? We've seen increasing attacks on security software over the past year; on top of that, Microsoft's other security software - like its firewall - is hardly a shining paragon in its category. Further, it appears that history will repeat itself: Microsoft's ultimate aim is to charge for its bundled anti-virus and anti-spyware as part of a new A1 security subscription service. What's the result? Users think they're protected - after all, their computer comes with anti-virus software! it comes with anti-spyware software! it's got a firewall! - but in reality they're still vulnerable. Given that mindset, why not use Internet Explorer? Why not use Outlook Express, or Outlook? Why not click on whatever appears in the web browser? Or in email? Why worry about security? They're safe and secure! It's enough to make a security pro want to take off from work and go see a mid-day show. The law of unexpected consequences is one that we simply can't afford to forget, and even though they're impossible to adequately plan for, we can minimize their effects. We have to worry about it, and we have to always ask the hard question: given this new thing foo, what are all the possible results that could happen? Brainstorm. Think out of the box. Don't be afraid to consider whatever crazy idea pops into your head. Trust me: it's never crazy enough. My British readers at least have one advantage over us Yanks: it appears that so many people in the UK are taking Prozac that the drinking water now contains traces of the drug. Wait a little longer, and security pros in the UK won't be worrying about unintended consequences: thanks to one that I would have never thought of, they'll be blissfully unconcerned about them. And on it goes. Further Reading "Iroquois Theatre Fire of 1903". Chicago Historical Society (17 February 2004). McNeil Jr., Donald G. "New C-Note Is Awaited In the Land Of Fake Bills". The New York Times (3 December 1995): 9. Scott Granneman is a senior consultant for Bryan Consulting Inc. in St. Louis. He specializes in Internet Services and developing Web applications for corporate, educational, and institutional clients. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From justin-cypherpunks at soze.net Fri Jan 28 19:27:54 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 29 Jan 2005 03:27:54 +0000 Subject: Scientists Work on Software to Scan Arabic In-Reply-To: References: Message-ID: <20050129032754.GA28250@arion.soze.net> On 2005-01-28T20:03:22-0500, R.A. Hettinga wrote: > > The New York Times > January 27, 2005 > Scientists Work on Software to Scan Arabic > By THE ASSOCIATED PRESS > > ``The whole Internet is skewed toward people who speak English,'' said Venu > Govindaraju, director of the Center for Unified Biometrics and Sensors at > the University at Buffalo, where the software is being developed. Someone give that man a brain, and a cookie. I don't live near NY. The internet has nothing to do with scanning written/printed arabic texts. He obviously intended to squeeze a complaint about the internet into an article about scanning printed/written documents. The reason the internet is "skewed" is because these idiots want others to "fix" the internet to accommodate their languages. As a result, much of the non-western-language support in software is done by westerners, and so doesn't work. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From paulvan01 at mail2world.com Sat Jan 29 03:39:21 2005 From: paulvan01 at mail2world.com (paulvan01 at mail2world.com) Date: Sat, 29 Jan 2005 04:39:21 -0700 Subject: FROM DE LOTTO NETHERLANDS INTERNATIONAL Message-ID: FROM: GOVERNMENT ACCREDITED LICENSED LOTTERY PROMOTERS. WINNING NOTICE FOR CATEGORY "A" WINNER Dear Lucky Winner, RE: BONUS LOTTERY PROMOTION PRIZE AWARDS WINNING NOTIFICATION We are pleased to inform you of the result of the just concluded annual final draws of De Lotto Netherlands International Lottery programs. The online cyber lotto draws was conducted from an exclusive list of 25,000 e-mail addresses of individual and corporate bodies picked by an advanced automated random computer search from the internet. No tickets were sold. After this automated computer ballot, your e-mail address emerged as one of two winners in the category "A" with the following: Ref Number: 35149/337-5247/LNI Batch Number:26371545-LNI/2004 Ticket Number:54866235 You as well as the other winner are therefore to receive a cash prize of 1,500,000.00. (ONE MILLION FIVE HUNDRED THOUSAN EUROS ONLY) each from the total payout. Your prize award has been insured with your e-mail address and will be transferred to you upon meeting our requirements, statutory obligations, verifications, validations and satisfactory report. To begin the claims processing of your prize winnings you are advised to contact our licensed and accredited claims agent for category "A" winners with the information below: Mr.Paul VanFrant Financial Director, Netherlands Development Finance Company, De Amsterdamse Poort Bijlmerplein 888 1102 MG Amsterdam 1000 BV Amsterdam E-mail:paulvan at mail2world.com E-mail:paulvan at walla.com Phone number +31-617-628-678 Fax number +31-847-499-712 NOTE: All winnings must be claimed not later than 20 days. After this date all unclaimed funds would be included in the next stake. Remember to quote your reference information in all correspondence. You are to keep all lotto information away from the general public especially your reference and ticket numbers. (This is important as a case of double claims will not be entertained). Anybody under the age of 18 and members of the affiliate agencies are automatically not allowed to participate in this program. Thank you and congratulations!!! Yours faithfully, Mrs. Mildred Hugo Games/Lottery Coordinator. De Lotto Netherlands International www.lotto.nl From justin-cypherpunks at soze.net Sat Jan 29 04:57:34 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 29 Jan 2005 12:57:34 +0000 Subject: Safeway Club Card Leads to Bogus Arson Arrest In-Reply-To: <20050129121624.GO1404@leitl.org> References: <20050129121624.GO1404@leitl.org> Message-ID: <20050129125734.GA28639@arion.soze.net> On 2005-01-29T13:16:24+0100, Eugen Leitl wrote: > Link: http://slashdot.org/article.pl?sid=05/01/29/030223 > Posted by: michael, on 2005-01-29 11:03:00 > > from the if-you're-innocent-you-have-nothing-to-fear dept. > [1]Richard M. Smith writes "Tukwila, Washington firefighter, Philip > Scott Lyons found out the hard way that supermarket loyalty cards come > with a huge price. Lyons was arrested last August and charged with They do not verify the information you give them. They take the sheet of paper and give you a card. Make up a name, address, and phone number. If they ever discover the fraud (not in a legal sense) and disable the card, so what? Get another one. -- "War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free." --Heraclitus (Kahn.83/D-K.53) From eugen at leitl.org Sat Jan 29 04:16:24 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 29 Jan 2005 13:16:24 +0100 Subject: Safeway Club Card Leads to Bogus Arson Arrest Message-ID: <20050129121624.GO1404@leitl.org> Link: http://slashdot.org/article.pl?sid=05/01/29/030223 Posted by: michael, on 2005-01-29 11:03:00 from the if-you're-innocent-you-have-nothing-to-fear dept. [1]Richard M. Smith writes "Tukwila, Washington firefighter, Philip Scott Lyons found out the hard way that supermarket loyalty cards come with a huge price. Lyons was arrested last August and charged with attempted arson. Police alleged at the time that Lyons tried to set fire to his own house while his wife and children were inside. According to [2]KOMO-TV and the Seattle Times, a major piece of evidence used against Lyons in his arrest [3]was the record of his supermarket purchases that he made with his Safeway Club Card. Police investigators had discovered that his Club Card was used to buy fire starters of the same type used in the arson attempt. For Lyons, the story did have a [4]happy ending. All charges were dropped against him in January 2005 because another person stepped forward saying he or she set the fire and not Lyons." References 1. http://www.ComputerBytesMan.com/ 2. http://www.komotv.com/stories/32785.htm 3. http://seattletimes.nwsource.com/html/localnews/2002055245_arson06m.html 4. http://heraldnet.com/stories/05/01/28/100loc_arson001.cfm ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From justin-cypherpunks at soze.net Sat Jan 29 04:59:28 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 29 Jan 2005 15:59:28 +0300 (MSK) Subject: Customs service seizes depleted uranium in Russia region Message-ID: <200501291259.j0TCxSuN092579@main.itar-tass.com> [print_logo_russian.gif] _________________________________________________________________ Customs service seizes depleted uranium in Russia region 28.01.2005, 13.28 MOSCOW, January 28 (Itar-Tass) - The customs service in a Volga region has seized more than 37 kilograms of depleted uranium. A spokesman at the Federal Customs Service told Itar-Tass on Friday that workers of the Orenburg customs service spotted the dangerous cargo on Wednesday during examination of a car with a radiation detector. The radiation-emitting object was a cylindrical protective container intended for remote manipulation with radioactive substances. It contained 37.5 kilograms of uranium-238, which is a depleted form. An owner of the container described it in a customs declaration as a "dumb-bell". He said he had found it at a dump and used it for exercise and sometimes straightened nails with it. Specialists are looking for the origin of the container. A criminal case on an attempt of contraband of a radioactive substance has been opened. Specialists of the Russian Agency of Atomic Energy told Itar-Tass that neither a conventional nor "dirty" bomb could be made from the confiscated amount of uranium. Uranium-238 is one of the most available elements in the earth crust. About 60,000 tonnes of uranium a year is extracted in the world. _________________________________________________________________ ) ITAR-TASS. All rights reserved. You undertake not to copy, store in any medium (including in any other website), distribute, transmit, re-transmit, broadcast, modify or show in public any part of the ITAR-TASS website without the prior written permission of ITAR-TAS. [spacer.gif] From rah at shipwright.com Sat Jan 29 18:49:40 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 29 Jan 2005 21:49:40 -0500 Subject: Woman Accused In Unusual Computer Crime Message-ID: WCAX Woman Accused In Unusual Computer Crime Burlington, Vermont -- January 27, 2005 A Burlington woman has became the first in Vermont to be charged with a bizarre computer crime. The alleged high-tech caper involved identity theft, harassment, and an attempt to make a co-worker look like a lunatic,according to police. "Yeah, I think, you know, people thought I was off my rocker for a while," said Jeanne Landau, the alleged victim. She says she was shocked and scared last fall when friends accused her of sending threatening e-mails to a co-worker. "It was disappointment and fear certainly for a little while until I figured out who had actually been doing it," added Landau. Police say the culprit is Bess Carney, 25, of Burlington. At a Thursday court hearing in Burlington, Carney was charged with false reporting of a crime, identity theft, and unauthorized access to a computer. Carney used computers at work in an attempt to harm Landau by e-mailing threats to herself, according to police reports. First she opened a Yahoo e-mail account in Landau's name and then she mailed herself threats from that phony Landau account, say police. "She was then forwarding these e-mails to mutual friends of the two parties and really making it look as though Jeanne Landau was responsible for this and that she was insane and very mentally unstable," said Sgt. Ken Tisdel, the Burlington Police detective in charge of the investigation. "I don't know the motivation behind it unfortunately," said Landau. "I think it might've started as a prank and then it spun out of control and I don't think she expected it to go this far," she added. Carney pled innocent to the charges. She was released on conditions. She declined comment as she left the courthouse and let her lawyer, Edward Kenney, do the talking to the press. "It's accurate that Bess has insisted on her innocence," said Kenney. "She pled not guilty today and I really can't get into the facts of the case at all at this point." Kenney said he may challenge the legal basis for the charges and attempt to have them dismissed. Police say this is the first computer case of its kind to be criminally charged, but more complaints are coming in. And to those who might think of doing the same thing, police warn that the culprits will be caught. " Anything that you do on that computer no matter if you've deleted it or whatever you've done, we will recover that information and we will find out if you've done this," said Detective Sgt. Tisdel -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 04:33:13 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 07:33:13 -0500 Subject: Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key Message-ID: The New York Times January 29, 2005 Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key By JOHN SCHWARTZ ALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it. Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans. All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it. An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free." The implications of the Hopkins finding go beyond stealing cars. Variations on the technology used in the chips, known as RFID for radio frequency identification, are widely used. Similar systems deduct highway tolls from drivers' accounts and restrict access to workplaces. Wal-Mart is using the technology to track inventory, the Food and Drug Administration is considering it to foil drug counterfeiting, and the medical school at the University of California, Los Angeles, plans to implant chips in cadavers to curtail unauthorized sale of body parts. The Johns Hopkins researchers say that if other radio frequency ID systems are vulnerable, the new field could offer far less security than its proponents promise. The computer scientists are not doing R.&D. for the Mafia. Aviel D. Rubin, a professor of computer science who led the team, said his three graduate students did what security experts often do: showed the lack of robust security in important devices that people use every day. "What we find time and time again is the security is overlooked and not done right," said Dr. Rubin, who has exposed flaws in electronic voting systems and wireless computer networks. David Wagner, an assistant professor of computer science at the University of California, Berkeley, who reviewed a draft of a paper by the Hopkins team, called it "great research," adding, "I see it as an early warning" for all radio frequency ID systems. The "immobilizer" technology used in the keys has been an enormous success. Texas Instruments alone has its chips in an estimated 150 million keys. Replacing the key on newer cars can cost hundreds of dollars, but the technology is credited with greatly reducing auto theft. - Early versions of in-key chips were relatively easy to clone, but the Texas Instruments chips are considered to be among the best. Still, the amount of computing the chip can do is restricted by the fact that it has no power of its own; it builds a slight charge from an electromagnetic field from the car's transmitter. Cracking the system took the graduate students three months, Dr. Rubin said. "There was a lot of trial and error work with, every once in a while, a little 'Aha!' " The Hopkins researchers got unexpected help from Texas Instruments itself. They were able to buy a tag reader directly from the company, which sells kits for $280 on its Web site. They also found a general diagram on the Internet, from a technical presentation by the company's German division. The researchers wrote in the paper describing their work that the diagram provided "a useful foothold" into the system. (The Hopkins paper, which is online at www.rfidanalysis.org, does not provide information that might allow its work to be duplicated. The researchers discovered a critically important fact: the encryption algorithm used by the chip to scramble the challenge uses a relatively short code, known as a key. The longer the code key, which is measured in bits, the harder it is to crack any encryption system. "If you were to tell a cryptographer that this system uses 40-bit keys, you'd immediately conclude that the system is weak and that you'd be able to break it," said Ari Juels, a scientist with the research arm of RSA Security, which financed the team and collaborated with it. The team wrote software that mimics the system, which works through a pattern of challenge and response. The researchers took each chip they were trying to clone and fed it challenges, and then tried to duplicate the response by testing all 1,099,511,627,776 possible encryption keys. Once they had the right key, they could answer future challenges correctly. Mr. Sabetti of Texas Instruments argues that grabbing the code from a key would be very difficult, because the chips have a very short broadcast range. The greatest distance that his company's engineers have managed in the laboratory is 12 inches, and then only with large antennas that require a power source. Dr. Rubin acknowledged that his team had been able to read the keys just a few inches from a reader, but said many situations could put an attacker and a target in close proximity, including crowded elevators. The researchers used several thousand dollars of off-the-shelf computer equipment to crack the code, and had to fill a back seat of Mr. Green's S.U.V. with computers and other equipment to successfully imitate a key. But the cost of equipment could be brought down to several hundred dollars, Dr. Rubin said, and Adam Stubblefield, one of the Hopkins graduate students, said, "We think the entire attack could be done with a device the size of an iPod." The Texas Instruments chips are also used in millions of the Speedpass tags that drivers use to buy gasoline at ExxonMobil stations without pulling out a credit card, and the researchers have shown that they can buy gas with a cracked code. A spokeswoman for ExxonMobil, Prem Nair, said the company used additional antifraud measures, including restrictions that only allow two gas purchases per day. "We strongly believe that the Speedpass devices and the checks that we have in place are much more secure than those using credit cards with magnetic stripes," she said. The team discussed its research with Texas Instruments before making the paper public. Matthew Buckley, a spokesman for RSA Security, said his company, which offers security consulting services and is developing radio frequency ID tags that resist unauthorized eavesdropping, had offered to work with Texas Instruments free of charge to address the security issues. Dr. Wagner said that what graduate students could do, organized crime could also do. "The white hats don't have a monopoly on cryptographic expertise," he said. Dr. Rubin said that if criminals did eventually duplicate his students' work, people could block eavesdroppers by keeping the key or Speedpass token in a tinfoil sheath when not in use. But Mr. Sabetti, the Texas Instruments executive, said such precautions were unnecessary. "It's a solution to a problem that doesn't exist," he said. Dan Bedore, a spokesman for Ford, said the company had confidence in the technology. "No security device is foolproof," he said, but "it's a very, very effective deterrent" to drive-away theft. "Flatbed trucks are a bigger threat," he said, "and a lot lower tech." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 04:52:37 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 07:52:37 -0500 Subject: The Doctrine That Never Died Message-ID: The New York Times January 30, 2005 OP-ED CONTRIBUTOR The Doctrine That Never Died By TOM WOLFE SURELY some bright bulb from the Council on Foreign Relations in New York or the Woodrow Wilson School of Public and International Affairs at Princeton has already remarked that President Bush's inaugural address 10 days ago is the fourth corollary to the Monroe Doctrine. No? So many savants and not one peep out of the lot of them? Really? The president had barely warmed up: "There is only one force of history that can break the reign of hatred and resentment, and expose the pretensions of tyrants ... and that is the force of human freedom.... The survival of liberty in our land increasingly depends on the success of liberty in other lands. ... America's vital interests and our deepest beliefs are now one..." when - bango! - I flashed back 100 years and 47 days on the dot to another president. George W. Bush was speaking, but the voice echoing inside my skull - a high-pitched voice, an odd voice, coming from such a great big hairy bear of a man - was that of the president who dusted off Monroe's idea and dragged it into the 20th century. "The steady aim of this nation, as of all enlightened nations," said the Echo, "should be to strive to bring ever nearer the day when there shall prevail throughout the world the peace of justice. ...Tyrants and oppressors have many times made a wilderness and called it peace. ...The peace of tyrannous terror, the peace of craven weakness, the peace of injustice, all these should be shunned as we shun unrighteous war. ... The right of freedom and the responsibility for the exercise of that right cannot be divorced." Theodore Roosevelt! - Dec. 4, 1904, announcing to Congress the first corollary to the Monroe Doctrine - an item I had deposited in the memory bank and hadn't touched since I said goodbye to graduate school in the mid-1950's! In each case what I was hearing was the usual rustle and flourish of the curtains opening upon a grandiloquent backdrop. But if there was one thing I learned before departing academe and heading off wayward into journalism, it was that these pretty preambles to major political messages, all this solemn rhetorical throat-clearing - the parts always omitted from the textbooks as superfluous - are inevitably what in fact gives the game away. Theodore Roosevelt's corollary to President James Monroe's famous doctrine of 1823 proclaimed that not only did America have the right, ` la Monroe, to block European attempts to re-colonize any of the Western Hemisphere, it also had the right to take over and shape up any nation in the hemisphere guilty of "chronic wrongdoing" or uncivilized behavior that left it "impotent," powerless to defend itself against aggressors from the Other Hemisphere, meaning mainly England, France, Spain, Germany and Italy. The immediate problem was that the Dominican Republic had just reneged on millions in European loans so flagrantly that an Italian warship had turned up just off the harbor of Santo Domingo. Roosevelt sent the Navy down to frighten off the Italians and all other snarling Europeans. Then the United States took over the Dominican customs operations and debt management and by and by the whole country, eventually sending in the military to run the place. We didn't hesitate to occupy Haiti and Nicaragua, either. Back in 1823, Europeans had ridiculed Monroe and his doctrine. Baron de Tuyll, the Russian minister to Washington, said Americans were too busy hard-grabbing and making money to ever stop long enough to fight, even if they had the power, which they didn't. But by the early 1900's it was a different story. First there was T.R. And then came Senator Henry Cabot Lodge. In 1912 Japanese businessmen appeared to be on the verge of buying vast areas of Mexico's Baja California bordering our Southern California. Lodge drew up, and the Senate ratified, what became known as the Lodge Corollary to the Monroe Doctrine. The United States would allow no foreign interests, no Other Hemispheroids of any description, to give any foreign government "practical power of control" over territory in This Hemisphere. The Japanese government immediately denied having any connection with the tycoons, and the Baja deals, if any, evaporated. Then, in 1950, George Kennan, the diplomat who had developed the containment theory of dealing with the Soviet Union after the Second World War, toured Latin America and came away alarmed by Communist influence in the region. So he devised the third corollary to the Monroe Doctrine. The Kennan Corollary said that Communism was simply a tool of Soviet national power. The United States had no choice, under the mandates of the Monroe Doctrine, but to eradicate Communist activity wherever it turned up in Latin America ... by any means necessary, even if it meant averting one's eyes from dictatorial regimes whose police force did everything but wear badges saying Chronic Wrongdoing. The historian Gaddis Smith summarizes the Lodge and Kennan Corollaries elegantly and economically in "The Last Years of the Monroe Doctrine, 1945-1993." Now, Gaddis Smith was a graduate-schoolmate of mine and very much a star even then and has remained a star historian ever since. So do I dare suggest that in this one instance, in a brilliant career going on 50 years now, that Gaddis Smith might have been ...wrong? ... that 1945 to 1993 were not the last years of the Monroe Doctrine? ... that the doctrine was more buff and boisterous than it has ever been 10 days ago, Jan. 20, 2005? But before we go forward, let's take one more step back in time and recall the curious case of Antarctica. In 1939 Franklin Roosevelt authorized the first official United States exploration of the South Pole, led by Admiral Richard E. Byrd. The expedition was scientific - but also military. The Japanese and the Germans were known to be rooting about in the ice down there, as were the Russians, the British, the Chileans, the Argentines, all of them yapping and stepping on one another's heels. Gradually it dawned on the whole bunch of them: at the South Pole the hemispheres got ... awfully narrow. In fact, there was one point, smaller than a dime, if you could ever find it, where there were no more Hemispheres at all. Finally, everybody in essence just gave up and forgot about it. It was so cold down there, you couldn't shove a shell into the gullet of a piece of artillery ... or a missile into a silo. Ah, yes, a missile. On the day in November 1961, when the Air Force achieved the first successful silo launching of an intercontinental ballistic missile, the SM-80, the Western Hemisphere part of the Monroe Doctrine ceased to mean anything at all - while the ideas behind it began to mean everything in the world. At bottom, the notion of a sanctified Western Hemisphere depended upon its separation from the rest of the world by two vast oceans, making intrusions of any sort obvious. The ICBM's - soon the Soviet Union and other countries had theirs - shrank the world in a military sense. Then long-range jet aircraft, satellite telephones, television and the Internet all, in turn, did the job socially and commercially. By Mr. Bush's Inauguration Day, the Hemi in Hemisphere had long since vanished, leaving the Monroe Doctrine with - what? - nothing but a single sphere ... which is to say, the entire world. For the mission - the messianic mission! - has never shrunk in the slightest ... which brings us back to the pretty preambles and the solemn rhetorical throat-clearing ... the parts always omitted from the textbooks as superfluous. "America's vital interests and our deepest beliefs are now one," President Bush said. He added, "From the day of our founding, we have proclaimed that every man and woman on this earth has rights, and dignity, and matchless value, because they bear the image of the maker of heaven and earth." David Gelernter, the scientist and writer, argues that "Americanism" is a fundamentally religious notion shared by an incredibly varied population from every part of the globe and every conceivable background, all of whom feel that they have arrived, as Ronald Reagan put it, at a "shining city upon a hill." God knows how many of them just might agree with President Bush - and Theodore Roosevelt - that it is America's destiny and duty to bring that salvation to all mankind. Tom Wolfe is the author, most recently, of "I Am Charlotte Simmons." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 05:15:58 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 08:15:58 -0500 Subject: Steal This Show Message-ID: The New York Times January 30, 2005 Steal This Show By LORNE MANLY and JOHN MARKOFF SAAC RICHARDS didn't think of himself as a rebel, or a shock to the well-lubricated system of the television industry. He was merely unhappy with the cable box provided by his local operator. Dismayed by the sluggish channel-changing capability and the sparsely informative program guide, he decided to build a better cable box from scratch. Today, nearly three years since Mr. Richards, a 26-year-old computer software programmer in Willoughby, Ohio, embarked on his quest, hundreds of thousands of do-it-yourself television viewers are using the free software program he wrote, MythTV, to turn desktop personal computers into customized cable boxes, complete with the ability to record shows, surf the Web and strip out unwanted commercials. The members of the MythTV community, who now do not have to pay monthly fees to rent set-top boxes or digital video recorders, have plenty of more mischievous company in trying to outwit the television industry. Millions of viewers are now watching illegal copies of television programs - even full seasons copied from popular DVD's - that are flitting about the Internet, thanks to other new programs that allow users to upload and download the large files quickly. And entrepreneurial souls are busily concocting even newer applications, including one that searches the Internet for illegal copies of any television shows you may desire and automatically downloads them to your computer. These high-tech tricks address desires that have become standard in an age of instant media gratification: the desire to watch what you want, when and how you want it. And they're turning television - traditionally beamed into homes at the convenience of the broadcast and cable networks - into something more flexible, highly portable and commercial free. Not surprisingly, the repercussions - particularly the rapidly growing number of shows available for the plucking online - terrify industry executives, who remember only too well what Napster and other file-sharing programs did to the music industry. They fret that if unchecked, rampant trading of files will threaten the riches of the relatively new and surprisingly lucrative television DVD business. It could endanger sales of television shows to international markets and into syndication. And it could further endanger what for the past 50 years has been television's economic linchpin: the 30-second commercial. Hollywood has gotten a lot of headlines in recent months for fighting the online traffic in feature films. But behind the scenes, the studios and networks are just as focused on the proliferation of television shows being downloaded. Even more quietly, the conglomerates that produce the vast majority of television shows are scrambling to beat the downloaders by offering viewers a slew of attractive new gewgaws, from video-on-demand offerings that could let viewers order up an episode of "CSI" any time they like to a device that allows viewers who tune into the middle of a live TV broadcast to restart the program instantly. "We have to try as an industry to get ahead of this and give the audience an attractive model before the illegal file-sharer providers meet their needs," said David F. Poltrack, CBS Television's executive vice president for research and planning. "The clock is ticking on this," he added. It all started with the digital video recorder. First popularized by TiVo and ReplayTV about five years ago, the DVR gave consumers a new degree of control: instead of being at the mercy of the broadcast schedule or VCR's, they could now be their own television programmers, scheduling shows at their convenience, pausing live television and skipping easily past commercials. Smith Barney estimates that though only a little more than 6 million Americans now use DVR's, by 2010 nearly half of American television households, or 58 million homes, will have them. Meanwhile, the file-sharing networks that are the scourge of the music industry began to have their way with television. Two factors slowed the spread: television isn't as expensive as recorded music, and its digitized files are significantly larger and harder to maneuver than their music equivalents. But hacking the cable box or stealing pay-cable channels like HBO is a longstanding tradition. "There is a sense of entitlement that once it hits the airwaves it's free," said Brandon Burgess, NBC Universal's executive vice president for digital media, international channels and business development. Until recently, it was hard for average viewers to act on that sense. But these days all it takes is a broadband connection and a program like BitTorrent. Created by Bram Cohen, a 29-year-old programmer in Bellevue, Wash., BitTorrent breaks files hundreds or thousands of times bigger than a song file into small pieces to speed its path to the Internet and then to your computer. On the kind of peer-to-peer site that gave the music industry night sweats, an episode of "Desperate Housewives" that some fan copied and posted on the Internet can take hours to download; on BitTorrent, it arrives in minutes. BitTorrent may sound like some obscure techno-trickery, but more than 20 million people have already downloaded the application. Each week dozens of shows are shared by hundreds of thousands of people. "The Simpsons," "Family Guy" and "Friends" top the most-popular list, but even "SpongeBob SquarePants," "Trading Spaces" and "Extreme Makeover: Home Edition" landed in the Top 20 for the week ending Jan. 16, according to Big Champagne, which measures file-sharing activity. And the technology is getting easier to use by the day. Sajeeth Cherian, a 20-year-old communications engineering senior at Carleton University in Ottawa, decided there must be a better way to find BitTorrent files on the Web after listening to the constant gripes of his roommate about how much time he was spending searching for Japanese anime. Videora was his response. Plug in what shows you want to find, and it does all the work. He's charging $22.95 for the software. "I thought this was a big idea, a bigger idea than trying to shut my roommate up," Mr. Cherian said. Although it can be used for piracy, Videora is legal, he said: "I've considered this. I wouldn't want to get my pants sued off, and this has many legitimate uses." However, Videora's illegitimate uses threaten one of the most welcome bonanzas for the television industry in recent years. Television DVD's, an afterthought in the DVD market just three years ago, were an estimated $2.3 billion-dollar business last year, according to a recent Merrill Lynch research report. They now represent nearly 15 percent of total DVD revenue, with profit margins between 40 and 50 percent. Recent hit shows like "The Simpsons" can make a profit of $15 million - a season. And those are exactly the shows traded most online, according to Big Champagne. Although older shows are not quite as lucrative, the better ones can still bring in $1 million in profit for each season, the Merrill Lynch report found. So it's no surprise that the studios and networks are emptying their vaults; "The Bob Newhart Show," "Dynasty," "The A-Team," "Moonlighting" and "Remington Steele" are just a few of the DVD's planned for release this spring. Executives at the entertainment conglomerates and the Motion Picture Association of America argue that the industry and the government have to move - fast - to establish rules by which copyrighted television programming "cannot be moved around willy-nilly," as Rick Cotton, executive vice president and general counsel of NBC Universal, puts it. Otherwise, television executives say, the very creation of television programming is placed in jeopardy. "It's very expensive to produce and market, and people will be very reluctant to provide that content if it can't be adequately secured," said John Malcolm, the senior vice president and director of worldwide antipiracy operations for the M.P.A.A. One way to protect such content, according to the industry, is through the introduction of something called the broadcast flag. The Federal Communications Commission announced in the fall of 2003 that any digitally broadcast show must include an invisible antipiracy device. This has not gone over well with viewers. Last October, nine nonprofit groups petitioned the United States Court of Appeals for the District of Columbia Circuit, arguing that the action oversteps the F.C.C.'s authority, making life more complicated for law-abiding home viewers while being "entirely ineffective at stopping any pirate." At the grass roots, the response has been more direct: a rush to buy and even build television sets and DVD recorders that sidestep the ruling. Home consumer devices, from digital televisions to DVD recorders, sold before July 1 do not have to recognize the broadcast flag. So the Electronic Frontier Foundation, a digital civil liberties organization (and one of the nine petitioners), has decided to set up what it is calling the Television Digital Liberation Front. Starting last July 29, it began holding the first of a planned series of nationwide "buildathons" to help novices build home-brew digital televisions and DVR's based on systems like the perfectly legal MythTV software. Those systems are still pretty clunky to assemble, requiring technical skills beyond the grasp of most couch potatoes, not to mention bulky, fan-noise-spewing P.C.'s. But television tinkerers are trying to smooth these experiences - for profit or not. Cecil Watson, a 32-year-old software expert in Fontana, Calif., created KnoppMyth to make the installation of MythTV as simple as possible. The MythTV movement is "picking up steam," Mr. Watson said, because it satisfies the way he wants to watch television today - and he doesn't have to pay rental fees for a cable box or a DVR if he chooses not to. "It records the shows I want to watch and I now have the choice to spend the time the way I want," he said. The build-your-own-TV advocates say they're not looking to steal content; they're just looking for a reasonable amount of flexibility to watch the same recorded program in different rooms, or on the train to work; to lend friends a TV recording the way they used to lend videotapes; to bring the same set of recordings from their city home to their vacation house. Playing the same show on different screens around the house seems reasonable, said Mr. Cotton of NBC Universal. But he added that expanding the circle much beyond that, the way future versions of the recently released TiVoToGo offering might allow one to send recorded programs over the Internet to nine other devices, including P.C.'s and laptops, was dangerously excessive. "Once you allow that much, is the technology really secure?" Mr. Cotton asked. A spokeswoman for TiVo said that the current analog version does not allow transferring files outside a home network, but that the F.C.C. has nonetheless approved the company's security measures if it rolls out a robust digital version. Ultimately, whether the television industry can avoid the disruptive fury that sideswiped the music industry - and even find lucrative ways to benefit from a digital, broadband, interconnected and portable entertainment world - will depend on how fast and flexible the conglomerates are in meeting viewers' changing desires. It will also depend on understanding the motivation behind this flurry of new activity. It's not just the thrill of the illicit, like lighting up behind a Kroger's in high school. That is "woefully inadequate to describe why millions of people steal," said Mr. Garland of Big Champagne, the online media measurement company. "People aren't essentially lawless. It takes far more motivation than that." The industry has begun experimenting, rethinking the rules by which television is disseminated. Some of the proposals, which center on video on demand, are fairly radical, going beyond the movies, news programs and N.F.L. highlights that make up today's most ambitious offerings. Mr. Poltrack of CBS said that according to his network's research, a large number of viewers would welcome the chance to pay $1 to watch each television show, if they could do it on their own schedule and with the ability to skip commercials. With commercials, they'd be willing to pay 50 cents. And because the average viewer sees only half of a show's episodes, he said, this on-demand viewing won't hurt the regular showing. A further CBS study gave viewers the chance to build their own night of television, where they could choose among a select group of pay-per-view shows in addition to the regular schedule of free programming that night. More than half of the 211 respondents chose to pay extra for at least one show. "This is the way people want television delivered," Mr. Poltrack said. Before this video-on-demand vision materializes, a bewildering thicket of contract and revenue-sharing issues among the producers, programmers and distributors of television must be overcome. Nonetheless, executives understand that they have little alternative but to push ahead. Chasing after the people trafficking in television programming can do only so much good. "You'll make more money and suffer far less from the black market if you simply create the opportunity to access content freely," said Mr. Garland of Big Champagne. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 05:38:45 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 08:38:45 -0500 Subject: SR-IX: Using the Wrong Tool in the Wrong Place Message-ID: Global Politician SR-IX: Using the Wrong Tool in the Wrong Place By Peter Gallo In the aftermath of the 9/11 terrorist attacks, the Financial Action Task Force ("FATF") expanded its brief from the fight against money laundering to include also terrorist financing, and, to this end, issued 8 'Special Recommendations' at the end of October 2001. Despite all the rhetoric and the considerable efforts since that time, however, none of this appears to have had much tangible success in achieving the stated objective of 'starving terrorists of funds.' Undeterred, on 22 October last year, the FATF issued a further Special Recommendation ("SR-IX") relating to Cash Couriers. This states: "Countries should have measures in place to detect the physical cross-border transportation of currency and bearer negotiable instruments, including a declaration system or other disclosure obligation." One cannot, of course, deny it is possible that terrorists routinely carry cash across international borders, but whether this is an area that should - or can - be addressed by additional legislation is debatable. Moreover, what not been made clear, however, is how such legislation is expected to have any material effect in the fight against terrorism, or even whether it is warranted. The manner in which SR-IX grew out of a pre-existing recommendation is itself a curious insight into the FATF's internal political machinations. What were originally #22 (relating to the reporting of cross-border cash movements) and #23 (reporting of cash transactions above a given threshold amount) in the 1996 edition of the FATF 40 Recommendations, were combined as Recommendation # 19, paragraphs 'a' and 'b' in the 2003 Revision. These, of course, related to conventional criminal money laundering. What has subsequently happened, is 19a has been removed from the 40 and published as SR-IX so it is now portrayed as an anti-terrorist measure, giving it enhanced importance. Moreover, the language that used to read "Countries should consider implementing feasible measures to detect and monitor the physical cross-border transportation of currency etc " now reads "Countries should have measures in place to detect the physical cross-border transportation of currency." First and foremost in considering such a measure, must be the practical issues of the feasibility and utility of implementing such a programme, given the benefits it would offer. The implication in this new Special Recommendation is that terrorist groups use couriers to hand carry large quantities of cash from one country to another to be used for terrorist purposes. This is, of course, not only very possible, it is quite likely that if a terrorist group were operating and traveling across an international border, they would prefer to carry cash with them rather than remit it by other means. What we do not know, however, is if this represents a significant vulnerability to the way in which terrorist operations are financed. On the contrary, the 9/11 attacks in the US, the events that have attracted most US attention on the whole subject of terrorist financing, were funded largely by remittances through the banking system. The best evidence as to the funding of the Bali bombings in 2002 appear to indicate the small amount of money needed to finance the attack was raised locally, and even it if was not, it is unlikely it was brought into Indonesia through an official border crossing point. Focusing attention on the international transportation of cash seems to ignore all the evidence that points to one fundamental conclusion; that most terrorist groups (at least in Asia) are primarily funded by local criminal activity, including extortion and kidnapping. It is entirely possible money is being smuggled into Iraq and used to fund attacks against the US forces there, but to believe that this could be prevented by introducing cash declarations on the border with either Turkey, Syria or Iran is stretching credibility. Terrorism in the Middle East may, admittedly, be funded differently from Asia, but even so; if groups in Palestine and elsewhere are being funded by donations from overseas; will a cash declaration requirement actually stop the money flow? In Asia, the borders of most concern, being the Sulu Sea between Indonesia and the Philippines, or the mountains between Afghanistan and Pakistan, already represent some of the most challenging Border Management problems in the world today. For hundreds of years, the competent authorities have been unable to prevent the flow of people across these borders. These people have a long history of carrying with them anything they chose, firearms included, along with all manner of contraband and other goods on which duty was never paid. One is at something of a loss, therefore, to understand what practical effect a cash declaration form will have. The requirement to declare cash over a given threshold amount when crossing an international border is not new. It has been a feature of the anti-money laundering legislation in the US for a number of years, but it is not possible to state with any confidence that it has put an end to cash smuggling related to crime, nor that it made it significantly harder for for criminal groups to move money across borders and or made it harder for Transnational Organised Crime groups to operate. The amounts of money required to finance terrorism are much smaller than encountered in conventional money laundering by Transnational Organised Crime groups. Why then, is it expected that making this a Special Recommendation to deal with Terrorist Financing will be any more successful in putting an end to cash smuggling used to fund terrorism? One of the most significant and salutary lessons from the US experience of Cash reporting was that the introduction of the threshold immediately gave rise to "smurfing" - the use of couriers and structured sub-threshold transactions to deposit quantities of cash into the banking system. There is an argument that the smurfing that evolved to circumvent the CTR requirement has exposed money laundering operations to a greater risk of exposure, and that the great number of individuals involved, and the multiplicity of cut-outs, front companies and nominees, at least in theory, increases the detection risk. This, however, may have resulted in the arrest and prosecution of a lot of these couriers, but it has not been spectacularly successful in bringing down the heads of the trafficking syndicates. Moreover, it is easier to identify structuring where cash is being deposited into the banking system, but it is much harder to identify in cross-border cash movements. Obviously, even if Mr X declares he is carrying $9,900 in cash, Mrs X declares she is carrying another $9,900, and a junior Ms or Mr X of the same address declare that they too are each carrying $9,900; we might conclude that the family have shared out the funds specifically to avoid triggering the mandatory report. Would that it were always so easy to make the connection! If they have different surnames and addresses, for example, identifying a structuring or smurfing scheme becomes a tad more difficult. Just because two or more passengers on the same flight may each be carrying a quantity of cash that is $5 short of the reporting threshold does not mean they are necessarily acting in a common purpose. Notwithstanding the pre-existing and mandatory US requirement that cash over the US$10,000 threshold be declared on exiting the country, one of the observations of the increased focus on anti-money laundering after the 9/11 attacks has been an increase in reports of bulk cash smuggling. It is the nature of smuggling that the people do not declare it! We should not forget that over 200 people died in Bali, in a bombing believed to have cost as little as US$10,000. Even if that money had to be hand carried in from abroad, there is no reason to suggest it would all have had to be brought in at the same time; and even in the extremely unlikely event that it did, the only difference a cash declaration threshold at the border would make would be that it required two or three people to carry it, not just one. Futhermore, that always assumes that the money was hand carried in to Indonesia, and hand carried in through an international airport past Immigration and Customs checks. The reality of the situation is that that probably never happened The further irony is that in most cases, the international borders where terrorists would prefer to hand carry cash are those same borders where local traders and businessmen do likewise. It may be simplistic to describe these as less developed or unsophisticated economies, but without even considering any corruption problems or the effectiveness of their border management, the usefulness of any cross-border cash declaration system does not appear to be assured. In more technically advanced economies, on the other hand, like Singapore or Hong Kong, it may be possible to impose and even enforce such a system, but even then, it is extremely unlikely that it would prevent terrorists operating there. Provided that any international terrorists have some degree of local support, and it is almost inconceivable that a terrorist attack could or would ever be carried out without; there are many alternative ways and means of sending money in and out of places like Singapore or Hong Kong. Admittedly, means such as money remittances, letters of credit, bank transfers or the use of a credit card all involve some interface with the financial system, but that eliminates the risk that the terrorist courier will be caught just for carrying cash. The original "Special 8" included regulation of Alternative Remittance Systems, such as door-to-door money underground banking systems such as Hawala and the Black Market Peso Exchange. Although almost impossible to eradicate, at least some degree of control over the system offers some law enforcement benefit as it creates a paper trail where none might previously have existed. To further extend the regulatory environment, however, and create a new offence of failing to declare smuggling activities, although possibly useful in prosecuting the small number of individuals caught carrying cash; is very unlikely to make it "more difficult" for terrorist organizations to move money around the world. Even if border management authorities could prevent any cash being carried or smuggled across their borders, it would not prevent money flowing in and out of the country. The point was made above, the introduction of Cash Transaction Reporting simply created a role for 'smurfs' and although, in theory, that exposed the criminal organization to an increased detection risk, most of the prosecutions were of low-level couriers not major money launderers or drug traffickers. Those syndicates always distanced the leadership from the 'smurfs' who were exposed to the risk of detection in making cash deposits. Smurfs are obviously seen as disposable, and in extreme islamist terrorism, where suicide bombing has become commonplace; the terrorist attackers themselves are disposable. They can, in that case, use credit cards and write cheques with little regard for the consequences, the practical chances of tracing funds back to a terrorist source are slim, and the chances of a cash courier being able to identify the source of the funds are even slimmer. There are two scenarios in considering the courier, he could be a member of the terrorist organization who knows he is carrying cash for a terrorist purpose; in which case he is probably very unlikely to make any voluntary declaration or disclosure that will be of any value, or he could be courier with no knowledge of the organization for whom he is carrying the money; in which case the best that one could hope for would be that he could identify the individual who gave them the job. Bankok jails are full of people who were unable to do that when arrested in possession of a suitcase full of heroin. The Recommendation addresses penalties for persons making false declarations; but the practical reality is identifying them in the first place. If the authorities are in receipt of credible intelligence to indicate that a passenger on a certain inbound flight is a courier for a terrorist organization, it should be possible to detain him under existing anti-terrorism legislation anyway. Under the existing law in most countries whose legislation already complies with the FATF 40 Recommendations, any individual carrying cash for the purpose of furthering a terrorist activity will already committing an offence, without the need for further legislation. Money intended to, say, buy materials that will be used to build a bomb - clear use of money intended to be used in connection with an indictable offence - so this would generally be covered by existing anti-money laundering legislation . If, on the other hand, the money was to be used generally to support a terrorist organization, legislation introduced to implement United Nations Security Council Resolution 1373 should already make that a criminal offence. Whether the courier is a terrorist himself or just a cash courier is irrelevant, any hopes that the Government may have that he would declare the cash it is probably fanciful. None of this, of course, addresses the threshold level, stipulated in SR-IX to be a maximum of US$15,000. One of the bigger problems associated with the use of anti-money laundering legislation against terrorist financing is the amounts of money involved. Terrorism, unfortunately, is cheap. The financial cost of an enormous terrorist atrocity such as the US$10,000 Bali bombing is so small, that it is difficult to see what possible benefit a US$15,000 declaration limit would have. Even if the threshold is set much lower, sat US$5,000; the only inconvenience that would present a terrorist organization intent on importing cash would be the need to 'smurf' it over the border in smaller amounts. It is difficult to understand how the FATF could say this additional Special Recommendation is expected to "make it tougher to move terrorist money across borders and make it harder for terrorists to operate." Will a system of cross-border cash declarations be any beneficial value at all? Curiously enough, despite all of this negative criticism, it might. It may be a total irrelevance as an anti-terrorist measure, but there are other reasons why cash is carried across borders; these include money smuggling, particularly in connection with the adjustment of balances in underground banking operations out of Taiwan, and straight-forward capital flight out of China. Of course, the downside is that these may have a negative effect on tourism or the retail sector in Hong Kong, but that was not the question. The greater danger, however, is that we focus attention in the wrong place. In order to starve terrorists of funds, (if such a thing is even possible) we need to concentrate on the source, not the application of funds. In order for the banking system to play a meaningful role; they need to share much more information with Law Enforcement than they already do, and mechanisms to lift the veil of secrecy that surrounds financial information. Even then, such actions will almost certainly result in more prosecutions for conventional money laundering, particularly relating to tax evasion, than it ever will to terrorist financing. The problem is that a lot of that tax evasion takes place with the professional support and collusion of the financial industry; so that would involve requiring the private sector to surrender themselves in order to capture a tiny minority whose involvement with the financial system may be marginal at best. None of this addresses the underlying problem; that terrorist groups are not profit motivated, they do not depend on large, and people do not join them, or support them, for financial reasons. They join them or support them for other reasons, and preventing money being carried across international borders is not going to have any impact on that whatsoever. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 07:51:15 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 10:51:15 -0500 Subject: Auto, Gas Security Chips Vulnerable, Study Finds Message-ID: Reuters Auto, Gas Security Chips Vulnerable, Study Finds Sat Jan 29, 2005 08:00 PM ET WASHINGTON (Reuters) - Tiny radio-transmitter chips that make possible high-security car keys and swipe-by gasoline passes can be cracked using cheap technology, U.S. computer experts said on Saturday. The radio-frequency ID, or RFID, system uses a relatively simple code that criminals can easily decipher, making it easier to steal a car or get a free tankful of gasoline, the team at Johns Hopkins University in Baltimore and RSA Laboratories said. "We've found that the security measures built into these devices are inadequate," said Avi Rubin, technical director of the Johns Hopkins Information Security Institute. "Millions of tags that are currently in use by consumers have an encryption function that can be cracked without requiring direct contact. An attacker who cracks the secret key in an RFID tag can then bypass security measures and fool tag readers in cars or at gas stations," Rubin said in a statement. Made by Texas Instruments (TXN.N: Quote, Profile, Research) , the RFID system studied for the report uses a device that prevents a car from starting unless both the right key and the correctly coded RFID chip are used. "The devices have been credited with significant reductions in auto theft rates, as much as 90 percent," the researchers wrote. They cited Texas Instruments, which had been told about the problem, as saying the company had received no reports of thefts due to the vulnerability. The fuel-purchase system uses a reader inside the gas pump that recognizes a key-chain tag waved nearby and automatically charges a designated credit card. More than 150 million of the Texas Instruments transponders are embedded in keys for newer vehicles built by at least three leading makers, and in more than 6 million key-chain gas tags, the researchers said. The problem is that the mathematical key used to code the verification system is too short, they said. They bought a commercial microchip costing less than $200 and programmed it to find the key for a gasoline-purchase tag. They linked 16 such chips together and cracked the key in about 15 minutes. The researchers said a metal sheath could help prevent the problem. Texas Instruments representatives were unavailable for comment. The RFID system they used is called a Digital Signature Transponder, and is distinct from the Electronic Product Code used by retailers and pharmacies for inventory control. RSA Laboratories, based in Bedford, Massachusetts, is a division of RSA Security (RSAS.O: Quote, Profile, Research). -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dave at farber.net Sun Jan 30 08:40:09 2005 From: dave at farber.net (David Farber) Date: Sun, 30 Jan 2005 11:40:09 -0500 Subject: [IP] more on Simson Garfinkel analyses Skype - Open Society Institute -- interesting set of comments djf Message-ID: ------ Forwarded Message From: David Pollak Date: Sun, 30 Jan 2005 07:44:21 -0800 To: Cc: Subject: Re: FW: [IP] more on Simson Garfinkel analyses Skype - Open Society Institute Dave, I've been following the Simson/Skype thread on IP and I've read the Columbia analysis of the Skype protocol (http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cuc s-039-04.pdf) I've known Simson for 14 or so years and have a ton of respect for his technical skills. However, I think there are some significant Skype vulnerabilities and associated legal ramifications that Simson did not discuss in his article. Security is based on trust of the parties exchanging information that they are who they claim and that the data exchanged appears to be random to an untrusted observer. While Skype's use of encryption supports the second part of the definition, it does not support the first. Because it does not support the first, it is very easy to use the Skype network to intercept communications between any user or to pose as any user. This presents a problem as against both third parties and governmental agencies. A critical part of the Skype network is the "super-nodes." According to the Columbia paper, super-nodes perform 3 functions: * Designating the login authority * Media packet forwarding * Routing user search requests Super-nodes appear to "volunteer" to perform the function. Or put another way, they are nodes that are not under the control of Skype, but they perform all the routing functions necessary to discover a user and exchange information with the user. Super nodes run on any machine running the Skype program and the machines under Skype control have no way to determine if the super nodes are running unmodified Skype code. If one were skilled in reverse engineering x86 code and one were willing to violate Skype's user agreement, one could create a Skype node that volunteered to be a super-node. It would appear to all other Skype nodes as a normal super-node. It would perform all the functions of a Skype super-node. However, it would do a little bit more. Let's call one of these super-nodes a "bad seed." The bad seed could point users to another authentication server. Thus, the user would exchange username and authentication information with a "bad relay proxy" rather than the Skype server. That permits the "bad relay proxy" to deny Skype access to a user that I designate. Okay a denial of service attack is not great stuff, but for businesses that rely of Skype (http://news.com.com/No-cost+Skype+strikes+chord+with+businesses/2100-7352_3 -5553053.html ), having the prospect of a DoS attack could be an issue. Further, the "bad relay proxy" could collect username/password challenge (I'm assuming that Skype's not sending the actual password, but performing a challenge/response method of verifying the password) data and do dictionary attacks on the passwords. This isn't a hardcore vulnerability you say. Yep... I agree. The bad seed routes some of the media requests if the two peers cannot see each other directly. Skype claims that because the packets are encrypted, the super-nodes are just routing agents. This is true unless the bad seed is part of the key exchange (see the next paragraph.) If the bad seed is part of the exchange of private AES keys that are used to encrypt the voice data, then they are able to decrypt the audio or text streams. Yikes. If a bad seed was a man in the middle of the private key exchange, then the bad seed could record your conversation with another user. Okay, that's not good. Given that any Skype node can become a super-node just by raising its hand and a skilled hacker can re-engineer a Skype node to perform bad acts, then if you connect to the Skype network, you don't know which nodes are listening in on your conversation. But wait, you say, the requirement for the above bit of scariness is doing a man-in-the-middle attack on the encryption key exchange. You're right. And here's where the Skype network is totally insecure. One function of the super-node in the Skype network is to route and respond to user search requests. If I want to connect to "other_dude" on the Skype network, my client sends out search requests to a series of super-nodes. The super-nodes either respond with the address of "other_dude" or forward the requests to other super-nodes. If one of the super-nodes is "bad seed", that node can respond that it is "other_dude." Because there is no cryptographic trust or any form of trust authority in the Skype network, any super node that returns the information about "other_dude" is trusted by my node. An aside... SSL certificates are signed by a trusted third party. That third party validates that the certificate is held by the organization that claims to hold the certificate. Using SSL insures that the party that I'm communicating with is the party that they claim to be within the bounds that I trust the signer of the SSL certificate *and* that once the connection is established that no one can understand the data exchanged with this party. That initial trust of the signed certification is a critical part of the security of the overall communication. If I do a session key exchange with an unknown party, the communication is *not* secure. This is the case with Skype. The Skype network relies on trusting the super-node. A bad seed can perform a man in the middle attack during the session key exchange by posing as the party being contacted (or forwarding the information of another compromised node) to a caller. So, my bad seed is able to route call requests to an untrusted node and do a man-in-the-middle during the key exchange and snoop into my call. The only question is how many bad seeds to you need in order to capture a significant percentage of the routing requests that go over the Skype network. My guess is that the number is in the hundreds. So, with a hundred machines located around the world, I could intercept any Skype call and record it. Pretty scary. The PSTN primarily uses pairs of copper wires to transmit voice communications from my house to the phone company central office. I can gain physical access to those copper pairs very easily as long as I have physical proximity to the location of the person I want to snoop on. It's not hard to do. Yeah, you have to paint a white van with "Verizon" or "SBC" so the police don't hassle you. But you can do it. If the government wants to do it, it's somewhat harder. The government has to get a warrant to listen to your phone conversations. Once they obtain a warrant, they present it to the phone company which makes an entry into their switch to record the call or send a real-time copy of it to the government. SIP is different. SIP supports encryption, but most SIP providers do not make use of it. The Microsoft SIP client libraries have the option of communicating with the SIP server via TLS (TLS is like SSL, but uses the same IP port for both encrypted and unencrypted traffic.) Additionally, the media portion of a SIP call can be encrypted by setting a flag in the media descriptor. While most SIP providers do not use this functionality, it's part of the SIP spec and can be turned on. Note that the machines that could play man-in-the-middle with an encrypted SIP call are controlled by your SIP provider (rather than any machine running Skype.) Thus, you can trust the security of your call as much as you trust your SIP provider. With unencrypted SIP calls, if you are able to intercept packets, then you can tap the call. Anybody on your LAN can listen into your call. This level of security is no different than anyone in your house can listen in on your phone calls and anyone in your office can probably do the same. Anyone who can intercept the packet stream outside your LAN can also listen in on the conversation. This is more of a challenge. UDP packets (the stuff that the media stream goes over) may or may not be routed through the same backbone during all parts of the conversation. There is a certain amount of security with the packets going over the backbone. The ability to snoop on an unencrypted SIP call is marginally more difficult that snooping on a PSTN call. For the government, it's more of a challenge. Because the media portion of a SIP call goes directly between the end points without going through the SIP providers network. This raises an interesting issues: http://news.com.com/2100-7352-5296417.html This is interesting for two reasons. First, SIP "telephone" companies like Vonage will have to provide a flag to allow them to intercept the media stream and decode it if the government has a warrant. Second, the government has acknowledged that SIP callers have the same expectation of privacy that copper-pair PSTN callers have. This is really important. Users of peer-to-peer file sharing programs don't have an expectation of privacy in their use of P2P programs. That's why so many folks are being sued (http://news.com.com/RIAA+files+754+new+file-swapping+suits/2110-1027_3-5494 259.html?tag=nl ) Skype touts themselves as a P2P voice communications system (http://skype.com/products/explained.html ) That means that if you use Skype, you have the same expectation of privacy as a P2P user. Given that the government has the resources to build bad seeds and that P2P users have no expectation of privacy, you can bet that there are government run Skype nodes looking for Skype communications between Osama911 and Sleeper_in_Seattle and that the government doesn't have a warrant for these activities. To conclude my long rant, the Skype network is radically insecure because it relies on untrusted super-nodes to perform trusted functions, most notably user look-up. It's easy to build a compromised super-node (a bad seed.) With a limited number of bad seeds, the communications between any users can be intercepted or denied. It's something that a person with the resources to rent 100 servers in collocation facilities around the world could do (that's about $10,000 per month investment.) Given that Skype is a P2P network and users such networks are not afforded the same expectation of privacy that users of the PSTN and other telephone networks are afforded, the government could use such a mechanism to listen to Skype-based calls and have a reasonable legal argument that they do not need a warrant to do so. That's my 2 cents. Thanks, David PS -- I was CTO and VP Engineering for an Internet security company for a number of years and I'm a member of the Rhode Island bar. Annette Hurst wrote: > > > -----Original Message----- > From: owner-ip at v2.listbox.com [mailto:owner-ip at v2.listbox.com] On Behalf Of > David Farber > Sent: Saturday, January 29, 2005 2:11 AM > To: Ip > Subject: [IP] more on Simson Garfinkel analyses Skype - Open Society Institute > > > > ------ Forwarded Message > From: "Jonathan S. Shapiro" > Date: Fri, 28 Jan 2005 22:03:48 -0500 > To: > Subject: Re: [IP] I more on Simson Garfinkel analyses Skype - Open Society > Institute > > I'm going to attempt to chime in on this, because I think Brad is saying > something that I feel is badly wrong. > > > The most important element of an encryption scheme is that there must be some > well-founded basis for a well-defined degree of confidence. The encryption may > be well done or poorly done. It may be sufficiently protective or it may not. > The thing is that the user has a right and a need to know where on the > spectrum it falls. > > The other alternative is ignorance. The first problem with this is that > *your* bad choices can have the effect of disclosing things that have negative > consequences for someone else! The second problem is that it describes the > majority of real users. > > In the case of Skype, the argument Brad is making is simply absurd. The > question is not whether something is better than nothing. The question is why > Skype chose to implement an undocumented and unqualified proprietary > encryption scheme at considerable expense rather than use one of the many > existing schemes that are well known, well characterized, and free for the > taking. > > When viewed from a business perspective, the only plausible rationale is > immediately apparent. Skype's objective isn't to protect conversations. It is > to render Skype users a captive audience by impeding interoperability. > > It is hardly a new precedent. I seem to remember AT&T trying to use allegedly > proprietary interfaces to impede the attachment of Tom Carter's Hush-a-Phone > in 1956 or so. Different method, same basic strategy. > > > Jonathan Shapiro > > On Fri, 2005-01-28 at 20:53 -0500, David Farber wrote: > > >> >> ------ Forwarded Message >> From: Brad Templeton >> Organization: http://www.templetons.com/brad >> Date: Fri, 28 Jan 2005 17:22:29 -0800 >> To: David Farber >> Cc: , >> , >> >> Subject: Re: [IP] Simson Garfinkel analyses Skype - Open Society Institute >> >> >> >>> >>> I'm sorry to pick nits, but I have to stand by my statement. No >>> matter how atrociously bad other systems may be, I don't see any >>> basis for saying that Skype is any better. It might be better, or >>> it might be just as bad. We don't know. >>> >>> >> >> While I fully agree that one can have much more confidence in a >> security system which can be independently analysed and verified as >> secure, it is exactly the attitude above, common in the security >> community, which I believe has stopped us from deploying security. >> >> "Some" security, even things like DES (which our own foundation proved >> can be crackable), poorly chosen keys, algorithms with flaws, >> protocols that are vulnerable to men in the middle, and proprietary >> encryption systems -- all of these are often declared to be "no >> better" than having no encryption at all. >> >> And so, people, buying that argument, often give us no encryption at >> all, because encryption is hard to do well, and if people keep telling >> you that you have to do it perfectly or you might as well not bother >> -- then people don't bother. >> >> The trut is, most people's threat models are not the same as a security >> consultants. They accept that if the NSA wants to man-in-the-middle >> them, the NSA is going to succeed. >> >> Skype has resisted basic efforts by skilled reverse engineers to look >> at its protocols. That doesn't mean they are secure, but it does mean >> they are secure from basic efforts. If I wanted to listen in your >> your skype call and had a tap on your ethernet, I would at least have >> to put a lot of work into it, and possibly could not do it >> at all. That is a _lot_ more than what is true with in-the-clear SIP, >> where I could slap a packet sniffer on your net and hear your call >> fairly trivially, and with certainty that I would succeed. >> >> This is, in fact, a huge difference. Encryption is really about how >> hard you make it for the attacker. Because above a certain level of >> hardness there are a lot of easier ways into your network and >> computer. >> >> So yes, let's decry that we can't verify Skype's encryption and must >> take their word that it is resistent to attack. But let's not promote >> this attitude that it is no better than nothing. >> >> ------ End of Forwarded Message >> >> >> ------------------------------------- >> You are subscribed as shap at cs.jhu.edu >> To manage your subscription, go to >> http://v2.listbox.com/member/?listname=ip >> >> Archives at: >> http://www.interesting-people.org/archives/interesting-people/ >> >> > > > > ------ End of Forwarded Message > > > ------------------------------------- > You are subscribed as annette at lostlake.org > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: http://www.interesting-people.org/archives/interesting-people/ > ------ End of Forwarded Message ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Sun Jan 30 15:35:55 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 18:35:55 -0500 Subject: [osint] UPI: Ridge backs nat'l standards for drivers' ID Message-ID: --- begin forwarded text Thread-Topic: UPI: Ridge backs nat'l standards for drivers' ID Thread-Index: AcUHIHXyaza+ayNNT0+A+C5wQDJ5cQ== To: "Shaun Waterman" From: "Shaun Waterman" Mailing-List: list osint at yahoogroups.com; contact osint-owner at yahoogroups.com Delivered-To: mailing list osint at yahoogroups.com Date: Sun, 30 Jan 2005 18:07:27 -0500 Subject: [osint] UPI: Ridge backs nat'l standards for drivers' ID Reply-To: osint at yahoogroups.com Please find below an example of UPI's continuing coverage of Homeland Security and related issues. A shorter version appeared on A2 of the Washington Times Sunday edition. I hope you find it interesting. You may link to it on the web here: http://www.upi.com/view.cfm?StoryID=20050130-010122-2442r If you have any comments or questions about this piece, need any more information about UPI products and services, or want to stop receiving these alerts, please get in touch. Thank you, Shaun Waterman UPI Homeland and National Security Editor E-mail: swaterman at upi.com Tel: 202 898 8081 Ridge backs nat'l standards for drivers' ID By Shaun Waterman UPI Homeland and National Security Editor WASHINGTON, Jan. 30 (UPI) -- Outgoing Homeland Security Secretary Tom Ridge has come out in support of national standards for driver's licenses, as proposed in several bills being pushed by Republicans in Congress. He also promised to put in place some structural changes to his department that would leave it in better shape for his successor after he departs next week, but rejected other suggested reforms. Ridge said he supported proposals for "some internal changes that will make us more effective," including the establishment of an office charged with developing the department's strategic planning and policy. The driver's license is "the most standard form of ID" across the country, Ridge said, so it made sense to "ask the states to buy into a baseline set of national standards." "As a governor, I would not have felt put upon by that," Ridge, who was governor of Pennsylvania from 1995 to 2001, said in a conference call Friday. Two bills introduced in the House, and one planned for the Senate, address the issue, which was highlighted by the Sept. 11 commission in its report last year. At present, states, through legislation or policy, can authorize motor vehicle administrators to issue licenses to whomever they wish, verifying the applicant's identity with whatever documents they decide to require. The proposals before Congress wouldn't change that, but they would establish minimum standards that states would have to meet if their licenses were to be acceptable as identity documents to the federal government -- for instance to board airplanes or get access to court buildings. And the standards would include the controversial legal presence requirement -- those applying for a license would have to prove either they were citizens or that they were lawfully in the United States. For non-citizen holders of temporary visas, the license issued would expire on the same date the visa did. Legal presence requirements have been slowly spreading since Sept. 11, 2001. All 19 of the suicide hijackers who struck that day had been able to acquire some form of license or state identification, including those who had overstayed or otherwise violated the terms of their visas. All but 10 states have some form of the requirement, according to the Coalition for a Secure Driver's License, a New York-based advocacy group. But the bills promote uniform national standards, and the free exchange of information among state vehicle licensing databases and between them and the federal government. Opponents say that is the introduction of a national ID card. Rep. F. James Sensenbrenner, R-Wis., chairman of the House Judiciary Committee said his bill -- called the Real ID Act -- "does comport with the principles of federalism" and does not impinge on states' rights. Under his law, "The states are free to issue driver's licenses and ID cards to whomever they wish to issue them, but if they wish to use the ID for federal purposes, then it does have to meet certain standards, including the standard of legal presence in the United States," he told reporters on Capitol Hill last week. He said companion legislation would be introduced in the Senate by Sen. Jon Kyl, R-Ariz. Sensenbrenner's proposals proved controversial when they were introduced as part of the Sept. 11 intelligence reform bill last year. They aroused fierce opposition from a broad coalition stretching from immigrants' rights advocates to libertarian conservatives. Even those who issue licenses have said they are uneasy about a new role as gatekeepers to a national ID system for citizens and legal aliens only, especially given the complexities of immigration law. "Our initials are D-M-V, not I-N-S," American Association of Motor Vehicle Administrators' spokesman Jason King told United Press International last year -- referring to the acronyms of the Department of Motor Vehicles and the Immigration and Naturalization Service, which was absorbed into the Department of Homeland Security in 2003. "We are the experts in driver licensing, not immigration," King said. Moreover, immigrants' rights advocates argue that by excluding undocumented migrants from the vehicle and driver-licensing system, legal presence requirements make the roads less safe even as they make the identity system more secure. Tennessee has introduced legislation it believes squares that circle. Since last July 1 last, the state has issued so-called driver certificates to anyone unable to prove legal presence, provided they can show they live in the state and can pass the driving test. The documents resemble drivers' licenses but are stamped "Not for identification" at the top. "It says we know you can drive, but we can't guarantee we know exactly who you are," said Maj. Gen. Jerry Humble, homeland security adviser to Gov. Phil Bredesen. But the Sensenbrenner bill also contains a series of provisions aimed at tightening asylum laws and making it easier to deport people suspected of links to terrorism. These two sets of provisions proved also controversial when they were introduced last year. Eventually, all three sets of proposals were stripped out of the Sept. 11 bill before it was passed. Aware that controversy over the immigration and asylum elements of the Real ID bill might complicate its passage, Rep. Tom Davis, R-Va., chairman of the House Government Reform Committee has introduced stand-alone legislation on drivers' licenses. "I think it's ... important for members to have the chance to cast separate votes on separate issues," said Davis introducing his bill last week. "It's a politically smart move," said a senior GOP congressional aide. "By separating out the issues you make it impossible for the Dems to hide behind the immigration stuff." Ridge said his successor would inherit a department that had made the United States "a lot stronger and better country," though he acknowledged that "there was much more work that needs to be done." He said that when the department was set up, "We tried to keep the staffing levels low at headquarters." As a result, there was no department-wide policy office under a senior official and a staff of about a half dozen in the secretary's office. "We dealt with (policy issues) on an ad hoc basis," said Ridge. But observers say that as a result of this Ridge became too taken up with the daily crises and threats -- "wrestling the alligators," as one state official put it -- and didn't spend enough time "looking down the river, to see what's coming next and get ready." In effect, say department officials, this has left much of the heavy lifting to the small policy office in the Border and Transportation Security directorate. With fewer than 30 staff members, that office has taken the lead in some of the most challenging issues the department has tackled, like the negotiations with the European Union over the availability of passenger data; and in some of the trickiest inter-agency tussles, such as the development of the biometric border system called US-VISIT. Despite these successes, the absence of a department-wide operation under a senior official was criticized by a series of experts at a Senate hearing last week. Department officials privately concede that there were areas of the department's activities -- particularly its relationship and work with U.S. intelligence agencies -- where almost no policy work has been done. They also note that in some areas, different points of view from with the department itself were hard to reconcile. "On a lot of immigration issues, for instance, you have different equities from the enforcement side and the (Citizenship and Immigration Services office) side," said one official. "There wasn't really a good process to resolve those kinds of disputes, except to take them to the secretary every time and obviously you can't do that." Sen. Susan Collins, R-Maine, chairwoman of the newly empowered oversight Committee for Homeland Security said the current set up had had left the department without an effective mechanism for developing either short or long term strategic policy. "I agree," Ridge said Friday. Department officials told UPI that the new office would be announced within a week or so, and would be headed by a senior official, possibly an undersecretary. One other person familiar with the administration's thinking on the issue said that Assistant Secretary Stewart Verdery, who runs the Border and Transportation Security directorate's policy office, would likely be promoted to run the new operation. ------------------------ Yahoo! Groups Sponsor --------------------~--> Give underprivileged students the materials they need to learn. Bring education to life by funding a specific classroom project. http://us.click.yahoo.com/FHLuJD/_WnJAA/cUmLAA/TySplB/TM --------------------------------------------------------------------~-> -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-osint at yahoogroups.com. -------------------------- Brooks Isoldi, editor bisoldi at intellnet.org http://www.intellnet.org Post message: osint at yahoogroups.com Subscribe: osint-subscribe at yahoogroups.com Unsubscribe: osint-unsubscribe at yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: osint-unsubscribe at yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sun Jan 30 16:51:15 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 30 Jan 2005 19:51:15 -0500 Subject: Classified Dutch military documents found on Kazaa Message-ID: The Register Biting the hand that feeds IT The Register ; Security ; Classified Dutch military documents found on Kazaa By Jan Libbenga (libbenga at yahoo.com) Published Sunday 30th January 2005 22:16 GMT At least 75 pages of highly classified information about human traffickers from the Dutch Royal Marechaussee - a service of the Dutch armed forces that is responsible for guarding the Dutch borders - have been leaked to the controversial weblog Geen Stijl (No Style). The documents, whicn contain phone numbers and tapped conversations, were found unencrypted on Kzaa, the public file sharing service. The likeliest explanation for their appearance is that a member Dutch Royal Marechaussee worked on the documents from home and unintentionally shared his entire hard drive with the rest of the world, through Kazaa. Initially, Geen Stijl (http://www.geenstijl.nl) wanted to reveal juicy details from the leaked documents, but backed off in the face of legal threats by the Public Prosecutor. The weblog says it will co-operate fully with investigators. The disclosure of the classified documents is yet another security lapse for the Dutch public prosecutor's office. In October last year, a leading Dutch prosecutor resigned after he throwing out his old PC with the rubbish. The hard disk contained hundreds of pages of confidential information about high profile crime cases, as well as his credit card number, social security number and personal tax files. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jamesd at echeque.com Mon Jan 31 05:38:34 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 31 Jan 2005 05:38:34 -0800 Subject: [IP] more on Simson Garfinkel analyses Skype - Open Society Institute -- interesting set of comments djf (fwd from dave@far In-Reply-To: <20050131114702.GD1404@leitl.org> Message-ID: <41FDC45A.7173.1576389@localhost> -- On 31 Jan 2005 at 12:47, Eugen Leitl wrote: > " Because there is no cryptographic trust or any form of > trust authority in the Skype network, any super node that > returns the information about "other_dude" is trusted by my > node. > > An aside... SSL certificates are signed by a trusted third > party. That third party validates that the certificate is > held by the organization that claims to hold the certificate. > Using SSL insures that the party that I'm communicating with > is the party that they claim to be within the bounds that I > trust the signer of the SSL certificate *and* that once the > connection is established that no one can understand the data > exchanged with this party. That initial trust of the signed > certification is a critical part of the security of the > overall communication. If I do a session key exchange with an > unknown party, the communication is *not* secure. This is the > case with Skype. Our experience of trust authorities is that they do not work. The overhead of complying with the trust authority is too great. Users do not do it, or they do it wrong. Phishing is a man in the middle attack, and SSL certificates do not prevent it. SSH provides cryptographic trust without a trusted authority. So it works. SSL does not work, because no end users have certificates, the costs of dealing with a trusted authority being too great, and because no one checks server certificates except for merely formal compliance. > The Skype network relies on trusting the super-node. A bad > seed can perform a man in the middle attack during the > session key exchange by posing as the party being contacted > (or forwarding the information of another compromised node) > to a caller. So, my bad seed is able to route call requests > to an untrusted node and do a man-in-the-middle during the > key exchange and snoop into my call. The only question is how > many bad seeds to you need in order to capture a significant > percentage of the routing requests that go over the Skype > network. My guess is that the number is in the hundreds. So, > with a hundred machines located around the world, I could > intercept any Skype call and record it. Pretty scary. You could intercept any one of them, but if you intercepted a lot of them, you would be detected. Not that I am defending the skype network, but your argument seems to be that the trouble with the skype network is that it did not follow the wise and highly successful example of SSL. Skype's encryption sucks, but it is better than SSL, and better than nothing. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG nsA35QEf54sCT4O3+ya3rXz/7POCQhClk12+GIfH 4ZXr9FoBLh7NawF7on2x2YR5V8MEcm1eKaYjBPd3I From eugen at leitl.org Mon Jan 31 03:47:02 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jan 2005 12:47:02 +0100 Subject: [IP] more on Simson Garfinkel analyses Skype - Open Society Institute -- interesting set of comments djf (fwd from dave@farber.net) Message-ID: <20050131114702.GD1404@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Mon Jan 31 10:00:52 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 13:00:52 -0500 Subject: I.D. Maryland Public Safety Initiative Message-ID: Maryland Governor Robert L. Ehrlich, Jr. ~ 2005 Press Release ~ PRESS RELEASE Office of the Governor FOR IMMEDIATE RELEASE: Monday, January 24, 2005 Governor Ehrlich Launches "I.D. MARYLAND" Public Safety Initiative Smart Cars, DNA Database, Information Technology Top Priorities ANNAPOLIS - Governor Robert L. Ehrlich, Jr., today introduced a broad plan to strengthen Maryland's public safety and homeland security strategies to meet the new threats facing Maryland and its critical infrastructure. Governor Ehrlich's plan includes new technology investments in "Smart Cars" and information technology while expanding access to fingerprint identification and DNA databases. "We have no more fundamental obligation in government than to ensure the safety of our citizens," said Governor Ehrlich. "This multi-faceted new plan empowers law enforcement and criminal justice officials to keep our citizens safe with state-of-the-art technology and real time information sharing systems. This plan is also big step forward in our efforts to protect Maryland's roads, tunnels, airports and harbors from the threats of the 21st century." Governor Ehrlich's plan includes: Smart Car Project: Governor Ehrlich invests $7.5 million in the Maryland State Police "Smart Car" Project, giving troopers direct, real time access to criminal databases. Information Technology: The Governor will invest $20.6 million in a major public safety information technology initiative to better respond to requests for statewide criminal record checks for identifications, investigations, gun purchases and bail hearings. Fingerprint Systems: Governor Ehrlich invests $12.5 million to improve the State's fingerprint identification system by replacing obsolete equipment and expanding storage capacity. Additionally, the Governor has requested $1.6 million to upgrade arrest booking systems and extend the "Live Scan" electronic fingerprinting system throughout the State. Finally, Governor Ehrlich will recommend approval of the National Crime Prevention and Privacy Compact, allowing Maryland secure access to the National Fingerprint File. Governor Ehrlich will also propose two pieces of legislation: DNA Database: First, the Governor will propose a plan to expand the State's capability to collect DNA samples from convicted felons and enter those samples into the national DNA database. Law enforcement agencies must build capacity to collect and analyze DNA samples that can help close cold cases, convict the guilty and exonerate the innocent. Communications Systems: Second, he will submit legislation to reduce bureaucracy and improve information technology and communications systems planning between state and local agencies. This plan will improve communications between governments to immediately get accurate data to first responders. Additionally, The Governor's Office of Homeland Security, Maryland Military Department, and Maryland State Police, will work with the FBI, U.S. Attorney, and other public safety entities, to support to the Maryland Coordination and Analysis Center - the first joint federal, state and local intelligence and data collection/analysis center in the nation. View a PDF of the posters from today's press event. read more press releases -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 31 10:05:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 13:05:28 -0500 Subject: Transaction law sound, says e-gold Message-ID: Australian IT Transaction law sound, says e-gold Simon Hayes FEBRUARY 01, 2005 INTERNET currencies are capable of catching money launderers and terrorist financiers without additional financial transactions reporting legislation, the backers of a major global payments system have argued. E-gold founder Douglas Jackson said his financial system, in which value is guaranteed by gold deposits, was "always getting beaten up" over money-laundering concerns. He was responding to moves by the federal Government to update the Financial Transactions Reports Act to include payment systems such as PayPal and e-gold, which escape regulation because they are not categorised as "cash dealers". The legislation, expected soon as an exposure Bill, is designed to plug holes identified last year during an inquiry by the joint committee of the Australian Crime Commission. Dr Jackson, who is chairman of e-gold's US owner Gold and Silver Reserve, said he did not oppose more regulation, but existing laws were adequate. "There are already all sorts of regs to cover people accepting money payments," he said. "It's hard to see what additional need there is." Gold and Silver Reserve does not transfer payments from cash or to cash. The only way to build a balance in an account is by "earning" it, for example by selling an item online. "If you try to be sneaky and provide incorrect contact information for your account, and you think you are anonymous, the moment you have value in your account it's discovered," Dr Jackson said. "We commonly receive court orders for someone who has done something that's naughty, and we are yet to find a case where the guys aren't nailed, and we love doing that." Dr Jackson, a radiation oncologist, left medicine to found Gold and Silver Reserve in 1996. His fellow director is Baltimore lawyer Barry Downey. "Our approach is radically different from PayPal," Dr Jackson said. "E-gold is organised more like a currency in its own right. What we're trying to achieve is freedom from default risk. "We're not opposed to regulation but often we're the round peg in the square hole. There's concern that internet payment systems can hide the proceeds of crime, but with gold it makes no sense." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 31 10:15:53 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 13:15:53 -0500 Subject: Digital evidence: Today's fingerprints Message-ID: CNN Digital evidence: Today's fingerprints Electronic world increasingly being used to solve crimes By Michael Coren CNN Monday, January 31, 2005 Posted: 11:04 AM EST (1604 GMT) (CNN) -- Police and prosecutors are fashioning a new weapon in their arsenal against criminals: digital evidence. The sight of hard drives, Internet files and e-mails as courtroom evidence is increasingly common. "Digital evidence is becoming a feature of most criminal cases," said Susan Brenner, professor of law and technology at the University of Dayton School of Law, in an e-mail response for this article. "Everything is moving in this direction." Digital evidence may play a significant role in the trial of pop superstar Michael Jackson on charges of child molestation. Computers were among the items authorities in California seized during their search of Jackson's Neverland Ranch in November 2003. Once the territory of child pornography and computer fraud, digital evidence figures into every crime that can leave an electronic trail. The changing world of technology is challenging courts to keep pace with new laws addressing potential evidence and preserving privacy, legal analysts say. Police officials say that the U.S. war on terrorism may create a shortage of digital analysts at the local law enforcement level. In the wired world, almost every crime intersects with the digital realm at one time or another. "Digital evidence is simply a number of rows of ones and zeros ... whenever a computer is used to facilitate a crime," said Fred Demma, an expert on computer crime at the U.S. Air Force's computer research laboratory in Rome, New York. Laptops, digital cameras, phones and hard drives provide mountains of raw data for experts to sift through, part of the expanding field of computer forensics. A single file, credit card purchase or stray e-mail message can provide the proof that clinches a case. "It's incredibly important," said Jeffrey Toobin, senior legal analyst for CNN. "Data such as e-mail has become indispensable, particularly in the prosecution of white-collar crime." Digital search Law enforcement officials hope to become as technologically savvy as the criminals they pursue. "In modern day era of crime ... what you're going to find is a room full of computers, telephone lines and a network address and that's about it," Demma said. "In many cases, that's what you start with." That may be enough, some investigators say. The NYPD's computer crime squad, founded in 1995, has taken on a wide range of criminal activity -- from pedophilia to corporate espionage -- using a team of technicians and specially trained detectives. Every year, it has put more and more people behind bars, said John Otero, the squad's commanding officer. "If I were to tell you we are 100 percent caught up to the bad guys, I'd be lying," said. Otero. "We're always in a catch-up situation. The key is to be so close to their tail they don't have the chance to breathe ." One section of Otero's 32-member squad scours the Internet for potential child molesters, drug dealers and others who may engage in illegal activities. Another investigates suspicious activity by setting up electronic wiretaps and sifting through data logs that detectives can investigate within hours -- the shelf life for many electronic clues. In one recent case, the NYPD seized a computer of a child pornographer, assumed his identity and continued the ruse to launch 43 spinoff investigations and arrests across Europe and North America. "Ultimately, it's still an investigation and it comes down to good police work," Otero said. "All NYPD is using are the tools available to us to keep up with these guys." Legal strategy Law governing digital evidence still lags behind the reality of cyber-crime. There are few legal precedents to guide judges who often have little experience in the mercurial world of digital technology. "It makes life difficult ... because law changes very slowly," said the University of Dayton's Brenner. "We have judges who did not grow up with computers and so many do not understand the technology and issues it raises." There is also a bottleneck of highly trained personnel to comb through evidence. Police report an acute shortage of detectives and lawyers trained in electronic police work. "Part of the biggest obstacles we've had to overcome is having to get savvy lawyers and judges to understand what we do," Otero said. The fight against terrorism means people with these skills will remain at a premium, potentially depriving smaller police departments of such personnel. The demand is only likely to increase as the volume of cases with digital evidence increases, according to the Department of Justice. "Cyber-crime is obviously something that is a national priority," said Steve Bunnell, chief of the criminal division at the U.S. attorney's office in Washington, D.C., which recently established a cyber-crime division. "Computer crimes are something that crosses borders. ...There is really a premium on getting the right and left hand working together," Bunnell said. Courtrooms and universities are welcoming more lawyers specializing in electronic crime. They are setting the stage for the evolution of "cyber-law" as the debate over digital evidence -- and what limits may be put on it -- is raging among legal scholars and law enforcement, Brenner said. "Our search and seizure laws evolved in a bricks and mortar era and therefore are not well suited for a digital environment," she said. Police must now re-evaluate how they obtain evidence. Information obtained in an electronic search can be thrown out if it violates the Fourth Amendment's protection against unreasonable searches and seizures. But how far does protection extend on a computer hard drive? What about e-mails and files sent over the Internet? Some judges at the state and federal level have restricted the conduct of electronic searches by law enforcement, insisting officers follow certain procedures or methodologies. Police and prosecutors disagree, arguing that a judge can only issue warrants, not dictate its terms. "This is a new issue," Brenner said. "In the real world, police go execute a warrant to find stolen tires ... and bring them back, end of story. "In digital searches, police search for a computer, find the computer, bring it back and then subject the data on it to various kinds of searches." The thorny questions about privacy and the sanctity of personal data loom as digital technology is inextricably linked to our daily lives. Brenner predicts we will need to revisit the laws designed during an earlier, simpler age. "I'm not sure you can say we 'choose' to use technology today," she said. "And I think the situation will only become that much worse." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 31 10:42:00 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 13:42:00 -0500 Subject: Carnivore redux Message-ID: CNET News Carnivore redux By Declan McCullagh Story last modified Mon Jan 31 04:00:00 PST 2005 Robert Corn-Revere clearly remembers the day he became the first person to tell the world about the FBI surveillance system once known as Carnivore. Corn-Revere, a partner at the Davis Wright Tremaine law firm, had been fighting on EarthLink's behalf to keep a government surveillance device off the company's network in late 1999. A short while later, though, a federal magistrate judge sided with the FBI against the Atlanta-based Internet provider. Worried about the privacy impact, Corn-Revere revealed the existence of Carnivore in testimony before a House of Representatives subcommittee on April 6, 2000. "They were using a technology called Etherpeek, which was off the shelf," Corn-Revere told me last Friday. "When we challenged it, they said, 'We're not using that. That would be wrong. We have our own software developed. It's called Carnivore.'" (Etherpeek is a Windows surveillance utility from WildPackets that can decode protocols used with e-mail, Web browsing and instant messaging.) Now history is repeating itself. A flurry of press reports this month noted that the FBI has ceased using Carnivore, which had been renamed DCS1000. But not all of them mentioned that the government is hardly calling a halt to Internet wiretaps--instead, it's simply buying its surveillance tools from private companies again. The total number of "electronic" wiretaps has stayed between 4 percent and 8 percent of all reported wiretaps each year. A review of the government's self-reported wiretap statistics from 2000 to 2003, the most recent data available, shows that the total number of "electronic" wiretaps has stayed between 4 percent and 8 percent of all reported wiretaps each year. (In 2003, for instance, there were 1,442 reported non-terrorism wiretaps in total that intercepted 4.3 million communications or conversations.) That figure, though, is an underestimate. First, it doesn't cover terrorism-related wiretaps, which spiked after Sept. 11, 2001, and last year surpassed the general category for the first time. Second, it doesn't count illegal wiretaps, such as the hundreds unlawfully performed by the Los Angeles Police Department starting in 1985. Third, those numbers don't include "pen register" and "trap and trace" devices, which tend to be about five to six times as popular as traditional wiretaps. Those awkward names, which hail from the days of analog phone taps, refer to capturing only the addresses of Web sites visited and IDs of e-mail and instant messaging correspondents rather than the complete content of the communication. Translated: The concept of Carnivore isn't going away. If anything, police surveillance of the Internet is increasing over time. The good ole days? Whatever its flaws, Carnivore offered one undeniable benefit: It had been the subject of intense scrutiny. Former House Majority Leader Dick Armey, for instance, carefully monitored how the Justice Department was using it. "I respectfully ask that you consider the serious constitutional questions Carnivore has raised and respond with how you intend to address them," Armey wrote to Attorney General John Ashcroft in June 2001. "This is an issue of great importance to the online public." At one point, political pressure had grown so great that Attorney General Janet Reno reluctantly ordered an outside review of how Carnivore had been used. The review concluded that Carnivore didn't snatch more from networks than it should, but it had "no auditing" and "significant deficiencies in protection for the integrity of the information it collects." Whatever its flaws, Carnivore offered one undeniable benefit: It had been the subject of intense scrutiny. A group of well-known technologists, including Steven Bellovin of AT&T Labs and Peter Neumann of SRI International, reviewed that report, prepared by IIT Research Institute. Their own conclusions: "Serious technical questions remain about the ability of Carnivore to satisfy its requirements for security, safety and soundness." The public and the press also were more interested a few years ago. CNET News.com published dozens of articles. A Nexis search turned up 1,334 matches for FBI and Carnivore or DCS1000 between July 2000 and July 2001. But the same search for between July 2003 and July 2004 reported only 45 articles. Unfortunately, the public knows virtually nothing about how the FBI is conducting Internet eavesdropping today. We don't know the name of its interception technology. We don't know if it vacuums up far more conversations than it should when attached to a network. We don't know if it creates a security risk by permitting secure portions of an Internet provider's network to be accessed from afar. We don't know if it has benefited from any of the outside technical review that Carnivore did. "The need for oversight these days is much greater than when the FBI picked particularly bad names for its surveillance projects," said Marc Rotenberg, director of the Electronic Privacy Information Center. "There's a lot of money slushing around the federal government's dark budgets." He's right. Congress should demand more public accountability from the Bush administration. Otherwise, we might end up fondly reminiscing about the good ole days of Carnivore. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 31 10:43:35 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 13:43:35 -0500 Subject: Congress proposes tax on all Net, data connections Message-ID: CNET News Congress proposes tax on all Net, data connections By Declan McCullagh Story last modified Fri Jan 28 15:50:00 PST 2005 An influential congressional committee has dropped a political bombshell by suggesting that a tax originally created to pay for the Spanish American War could be extended to all Internet and data connections this year. The committee, deeply involved in writing U.S. tax laws, unexpectedly said in a report Thursday that the 3 percent telecommunications tax could be revised to cover "all data communications services to end users," including broadband; dial-up; fiber; cable modems; cellular; and DSL, or digital subscriber line, links. Currently, the 3 percent excise tax applies only to traditional telephone service. But because of technological convergence and the dropping popularity of landlines, the Joint Committee on Taxation concluded in its review of tax law reforms that it might make sense to extend the 100-year old levy to new technologies. The committee did not take a position on whether Congress should approve such an extension and simply listed it as an "option." "We need to avoid starting down a path of overtaxing nascent forms of communication." --Jonathan Zuck, president, Association for Competitive Technology "Cellular phones are being manufactured that may operate using VoIP through Wi-Fi access, as well as through more traditional means," the tax committee's report says. "As voice phone service migrates to using Internet Protocol, there may be no way to distinguish 'packets' of voice and 'packets' of data." VoIP refers to voice over Internet Protocol, or making telephone calls through a broadband connection. The congressional report comes not long after the Internal Revenue Service and Treasury Department said they were considering how the Spanish American War tax should be reinterpreted "to reflect changes in technology" used in "telephonic or telephonic quality communications." Tech companies including Microsoft, Intel and Skype slammed that idea in a September letter, asking the IRS to "refrain from any attempt to extend the excise tax to VoIP services." The discussion in the tax committee's report, however, ventures far beyond VoIP. "Extending the tax to all communications requires taxing Internet access, bandwidth capacity, and the transmission of cable and satellite television," it says. Technology trade associations were instantly critical. "We need to be careful in trying to stretch a taxation system this old to be a catchall for all modern technology," said Jonathan Zuck, president of the Association for Competitive Technology. "We need to avoid starting down a path of overtaxing nascent forms of communication." Congress enacted the so-called "luxury" excise tax at 1 cent a phone call to pay for the Spanish American War back in 1898, when only a few thousand phone lines existed in the country. It was repealed in 1902, but was reimposed at 1 cent a call in 1914 to pay for World War I and eventually became permanent at a rate of 3 percent in 1990. Thursday's report, titled "Options to Improve Tax Compliance and Reform Tax Expenditures," is a broad review of tax law and proposes a number of ways--such as reforming the taxation of overseas corporations--to boost the federal government's bottom line by up to about $400 billion over the next decade. It lists three different telecommunications tax options, one of which would cover all data communications. A second choice would extend the excise tax to cell phones and perhaps VoIP. The third would clearly levy the charge on VoIP, including Internet-only phone calls using services such as Skype that do not touch the public telephone network. "It is not necessary that the voice communications service provide" that capability, the report says. James Maule, who teaches tax law at Villanova University and edits a related blog, said the more extreme taxation option may be a way for committee members to make the others "look a bit more palatable. There's some psychology going on." "The odds of something happening in 2005 that amends the tax law is extremely high," Maule said, referring to President Bush's promise to revise the tax code. "I suspect that (one of these options) is going to be tacked on." A few years ago, the U.S. House of Representatives voted overwhelmingly to repeal the excise tax, but the Senate never acted on the measure. Members of the Joint Committee on Taxation include Sens. Charles Grassley, R-Iowa; Orrin Hatch, R-Utah; Max Baucus, D-Mont.; John Rockefeller, D-W.Va.; and representatives Bill Thomas, R-Calif.; and Charles Rangel, D-N.Y. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Jan 31 11:34:41 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Mon, 31 Jan 2005 14:34:41 -0500 Subject: Diebold completes e-voting printer prototype Message-ID: Wherein Dieblod remembers, hey, presto, they're a cash-register company after all... Cheers, RAH ------- USA Today Diebold completes e-voting printer prototype NORTH CANTON, Ohio (AP) - Diebold said Thursday it has completed a prototype printer designed for use with touch-screen electronic voting machines, allowing voters to print, review and verify ballot selections. "Voter verified paper receipts are something new," said David Bear, a spokesman for subsidiary Diebold Election Systems in McKinney, Texas. "No other type of voting provides a receipt for voters. But some states are asking for it, so we needed to develop a product that meets standards for functionality," he said. Voters can view their selections, but will not be able to remove the printout. The voter's printed selections would be placed into a secure enclosure, stored and numbered with a security tag. The printer weighs less than three pounds. The printer will be submitted to independent testing authorities to ensure that it meets federal standards as a prerequisite to certification in states, Bear said. The printer would be an optional component to any new or existing Diebold AccuVote TSx touch-screen voting machine. Bear said a per-unit cost and a time frame for possible sale are not yet determined. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Mon Jan 31 13:30:31 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 31 Jan 2005 16:30:31 -0500 Subject: Le no-no In-Reply-To: Message-ID: Huh? There are IBM laptops with dedicated crypto chips? Although I don't claim to be any kind of an expert, I think this has to be wrong. Anyone know any different? What may exist is some kind of FPGA crypo code, but even that I doubt. (There's also the logical problem that the article writer seems to have missed: When one company buys another company they don't just buy that company's inventory and stuff, they buy the intellectual property. Who gives a crap if they own the chips if they also own the algorithm.) -TD >From: "R.A. Hettinga" >To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net, >osint at yahoogroups.com >Subject: Le no-no >Date: Fri, 28 Jan 2005 22:48:18 -0500 > > > >RED HERRING | The Business of Technology > >Le no-no > >The U.S. trips up a simple plan between IBM and Lenovo. >January 28, 2005 > >Homeland security is a cornerstone of the Bush Administration. But does >halting the IBM-Lenovo deal make the United States any safer? The Committee >on Foreign Investment in the United States (CFIUS) has decided to >investigate the threat presented by the sale of IBM's personal computer >business to China's Lenovo Group. > >Industry observers want to know what it is about this deal that irks the >feds. "I don't know," says Jeff Moss, CEO of Black Hat, a computer security >consulting firm. "It could be the loss of any manufacturing technology, any >kind of proprietary technology that IBM had; but the Chinese could take a >laptop apart themselves, too." > >Besides, most personal computers are already made in China-PC production is >extremely commoditized, perhaps as much as transistors. "It is quite a >stretch [to say] that the sale of the PC business to Lenovo would threaten >American security," says Baizu Chen, a professor at the University of >Southern California's Gordon S. Marshall School of Business. "Some senators >want to make a noise. Eventually, this will pass. It's just transfer of >ownership." > >One concern may have to do more with location than technology. The >Washington Post quoted a member of the U.S.-China Economic and Security >Review Commission-a Congressional panel created to watch commercial >relations between the U.S. and China-as saying that Chinese computer >experts could use an IBM facility in North Carolina as a base for >industrial espionage. > >While the U.S. Treasury Department wouldn't confirm or deny the launch of >the 45-day probe, IBM, which will still hold an 18.9 percent stake in the >business, says it has filed the required notice with the committee and is >cooperating fully. The company is confident in the process and outcome. One >would hope so, given that the deal is worth $1.75 billion in cash, equity, >and assumed debt. > >Where are the red flags? The U.S. government must demand action if a deal >impacts domestic production needed for projected national defense >requirements, or the capacity of domestic industries to meet national >defense requirements, or the control of domestic industries by foreign >citizens. The sale of IBM's money-losing PC unit doesn't quite cut it. > >It could be an issue of pride, say some-or perhaps cryptographic chips, say >others. "Some of the IBM laptops have built-in cryptographic chips," says >Pete Lindstrom, research director for Spire Securities. Mr. Lindstrom >points out that if the intellectual property associated with cryptography >is sold to a foreign country, one could potentially transfer a strong >cryptographic capability to another country. > >But IBM is a multinational company, with employees across the globe. Would >it really be so hard for someone to access such information? In the end, it >all comes down to whom you trust. Legend Holdings owns the majority stake >in Lenovo, and the Chinese government controls a large chunk of Legend. A >few years ago, Global Crossing wanted to sell its telecommunications >network to Hong Kong-based Hutchison Whampoa. It almost did-until the CFIUS >stepped in. But that's a story IBM executives would rather not think about. > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From crawdad at fnal.gov Mon Jan 31 15:53:39 2005 From: crawdad at fnal.gov (Matt Crawford) Date: Mon, 31 Jan 2005 17:53:39 -0600 Subject: Effort to Speed Airport Security Is Going Private In-Reply-To: References: Message-ID: <547E99C0-73E3-11D9-8B2A-000A95A0BF96@fnal.gov> On Jan 12, 2005, at 15:39, R.A. Hettinga wrote: > Mr. Brill and others have been pushing for TSA to privatize the > program, I'm betting that the government legislates a trivial limit on the liability of such companies for any mistakes they make. From macavity at well.com Mon Jan 31 14:47:57 2005 From: macavity at well.com (Will Morton) Date: Mon, 31 Jan 2005 22:47:57 +0000 Subject: Le no-no In-Reply-To: References: Message-ID: <838c4d6401165415bf5e3b80e27b1b3a@well.com> He might be talking about the TCPA chip on the Thinkpad: http://www.research.ibm.com/gsal/tcpa/ Pretty sweet piece of kit, but based on an open standard IIRC so dunno how natsec could apply here. W On 31 Jan 2005, at 21:30, Tyler Durden wrote: > Huh? There are IBM laptops with dedicated crypto chips? Although I > don't claim to be any kind of an expert, I think this has to be wrong. > Anyone know any different? > > What may exist is some kind of FPGA crypo code, but even that I doubt. > > (There's also the logical problem that the article writer seems to > have missed: When one company buys another company they don't just buy > that company's inventory and stuff, they buy the intellectual > property. Who gives a crap if they own the chips if they also own the > algorithm.) > > -TD > >> From: "R.A. Hettinga" >> To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net, >> osint at yahoogroups.com >> Subject: Le no-no >> Date: Fri, 28 Jan 2005 22:48:18 -0500 >> >> > a=11201§or=Industries> >> >> RED HERRING | The Business of Technology >> >> Le no-no >> >> The U.S. trips up a simple plan between IBM and Lenovo. >> January 28, 2005 >> >> Homeland security is a cornerstone of the Bush Administration. But >> does >> halting the IBM-Lenovo deal make the United States any safer? The >> Committee >> on Foreign Investment in the United States (CFIUS) has decided to >> investigate the threat presented by the sale of IBM's personal >> computer >> business to China's Lenovo Group. >> >> Industry observers want to know what it is about this deal that irks >> the >> feds. "I don't know," says Jeff Moss, CEO of Black Hat, a computer >> security >> consulting firm. "It could be the loss of any manufacturing >> technology, any >> kind of proprietary technology that IBM had; but the Chinese could >> take a >> laptop apart themselves, too." >> >> Besides, most personal computers are already made in China-PC >> production is >> extremely commoditized, perhaps as much as transistors. "It is quite a >> stretch [to say] that the sale of the PC business to Lenovo would >> threaten >> American security," says Baizu Chen, a professor at the University of >> Southern California's Gordon S. Marshall School of Business. "Some >> senators >> want to make a noise. Eventually, this will pass. It's just transfer >> of >> ownership." >> >> One concern may have to do more with location than technology. The >> Washington Post quoted a member of the U.S.-China Economic and >> Security >> Review Commission-a Congressional panel created to watch commercial >> relations between the U.S. and China-as saying that Chinese computer >> experts could use an IBM facility in North Carolina as a base for >> industrial espionage. >> >> While the U.S. Treasury Department wouldn't confirm or deny the >> launch of >> the 45-day probe, IBM, which will still hold an 18.9 percent stake in >> the >> business, says it has filed the required notice with the committee >> and is >> cooperating fully. The company is confident in the process and >> outcome. One >> would hope so, given that the deal is worth $1.75 billion in cash, >> equity, >> and assumed debt. >> >> Where are the red flags? The U.S. government must demand action if a >> deal >> impacts domestic production needed for projected national defense >> requirements, or the capacity of domestic industries to meet national >> defense requirements, or the control of domestic industries by foreign >> citizens. The sale of IBM's money-losing PC unit doesn't quite cut it. >> >> It could be an issue of pride, say some-or perhaps cryptographic >> chips, say >> others. "Some of the IBM laptops have built-in cryptographic chips," >> says >> Pete Lindstrom, research director for Spire Securities. Mr. Lindstrom >> points out that if the intellectual property associated with >> cryptography >> is sold to a foreign country, one could potentially transfer a strong >> cryptographic capability to another country. >> >> But IBM is a multinational company, with employees across the globe. >> Would >> it really be so hard for someone to access such information? In the >> end, it >> all comes down to whom you trust. Legend Holdings owns the majority >> stake >> in Lenovo, and the Chinese government controls a large chunk of >> Legend. A >> few years ago, Global Crossing wanted to sell its telecommunications >> network to Hong Kong-based Hutchison Whampoa. It almost did-until the >> CFIUS >> stepped in. But that's a story IBM executives would rather not think >> about. >> >> -- >> ----------------- >> R. A. Hettinga >> The Internet Bearer Underwriting Corporation >> 44 Farquhar Street, Boston, MA 02131 USA >> "... however it may deserve respect for its usefulness and antiquity, >> [predicting the end of the world] has not been found agreeable to >> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > -- Memefeeder put out : out put P: +44 (0)77 9630 8632 F: +44 (0)87 0762 0660 From DaveHowe at gmx.co.uk Mon Jan 31 17:11:38 2005 From: DaveHowe at gmx.co.uk (Dave Howe) Date: Tue, 01 Feb 2005 01:11:38 +0000 Subject: Le no-no In-Reply-To: References: Message-ID: <41FED74A.3040702@gmx.co.uk> Tyler Durden wrote: > Huh? There are IBM laptops with dedicated crypto chips? Although I don't > claim to be any kind of an expert, I think this has to be wrong. Anyone > know any different? well, certainly some thinkpads have encryption of the hard drive; if you take the hard drive out and try to read it on another system, you find the drive contains garbage - if and only if you have a bios and startup password set. the same password is used for both startup access and drive encryption. I suspect it is more that they are looking for a reason to block this sale, and this is the first one they thought of. exactly why they would like to do this is beyond me - possibly MS would like IBM to still be tied to them by Windows contracts, or possibly just someone in government doesn't like the idea of "THE IBM PC" being a chinese company.