From pqsgsdplfx at yourgop.com Sat Jul 1 18:37:05 2006 From: pqsgsdplfx at yourgop.com (Janna) Date: Sat, 01 Jul 2006 17:37:05 -0800 Subject: terrier Message-ID: <200607020037.k620b1Ic028857@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1912 bytes Desc: not available URL: From Stanford at incom.net Sat Jul 1 13:14:47 2006 From: Stanford at incom.net (Brendon) Date: Sat, 01 Jul 2006 21:14:47 +0100 Subject: Get a Rolex for under $500 42 Message-ID: Low priced replicas available in all styles. Mens, womans and childrens. These watches are of great quality and are replicated to mirror the real thing. Excellent prices that cannot be passed up Take a look at our selection of watches. http://wxr.jemexclusive.com/ I am good! Never the twain shall meet right now. No more cakes and ale? A dream? No names: no packdrill From Friend9358 at netscape.com Sat Jul 1 11:00:21 2006 From: Friend9358 at netscape.com (U.S. Online Pharmacy) Date: Sat, 01 Jul 2006 22:00:21 +0400 Subject: Cypherpunks --- Safe & Secure Orders, Low Prices, 100% Privacy Message-ID: <417m2rm985$9uix8myv7$128nbu65n@partybelgians16389> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1663 bytes Desc: not available URL: From videobrent.chevalier at about.com Sun Jul 2 03:47:19 2006 From: videobrent.chevalier at about.com (Michele) Date: Sun, 02 Jul 2006 04:47:19 -0600 Subject: several lenders compete for your business Message-ID: <200607020947.k629lGga008641@proton.jfet.org> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $500,000 as low as 3.65% $375,000 as low as 3.85% $275,000 as low as 3.90% $150,000 as low as 3.95% Visit our site by clicking http://www.f72v.com Courtney Elkins Account Manager From rah at shipwright.com Sun Jul 2 08:50:25 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 2 Jul 2006 11:50:25 -0400 Subject: [Clips] Copycatty Coulter Pilfers Prose: Pro Message-ID: ...Another addition to the "concordance is a bitch" file Apparently it was neither the cigarettes nor the chardonnay, but Ms. Coulter's Lexis/Nexis habit that finally caught up with her. Cheers, RAH Still a fan of great satire, nonetheless. Agree with the notion that "Godless", et al., are the moral equivalent of "A Modest Proposal". ------ --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sun, 2 Jul 2006 10:36:43 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Copycatty Coulter Pilfers Prose: Pro Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The New York Post COPYCATTY COULTER PILFERS PROSE: PRO By PHILIP RECCHIA ANN COULTER July 2, 2006 -- Conservative scribe Ann Coulter cribbed liberally in her latest book, "Godless," according to a plagiarism expert. John Barrie, the creator of a leading plagiarism-recognition system, claimed he found at least three instances of what he calls "textbook plagiarism" in the leggy blond pundit's "Godless: the Church of Liberalism" after he ran the book's text through the company's digital iThenticate program. He also says he discovered verbatim lifts in Coulter's weekly column, which is syndicated to more than 100 newspapers, including the Fort Lauderdale (Fla.) Sun-Sentinel and Augusta (Ga.) Chronicle. Barrie, CEO of iParadigms, told The Post that one 25-word passage from the "Godless" chapter titled "The Holiest Sacrament: Abortion" appears to have been lifted nearly word for word from Planned Parenthood literature published at least 18 months before Coulter's 281-page book was released. A separate, 24-word string from the chapter "The Creation Myth" appeared about a year earlier in the San Francisco Chronicle with just one word change - "stacked" was changed to "piled." Another 33-word passage that appears five pages into "Godless" allegedly comes from a 1999 article in the Portland (Maine) Press Herald. Meanwhile, many of the 344 citations Coulter includes in "Godless" "are very misleading," said Barrie, who holds a Ph.D. from the University of California at Berkeley, where he specialized in pattern recognition. "They're used purely to try and give the book a higher level of credibility - as if it's an academic work. But her sloppiness in failing to properly attribute many other passages strips it of nearly all its academic merits," he told The Post. Barrie says he also ran Coulter's Universal Press columns from the past 12 months through iThenticate and found similar patterns of cribbing. Her Aug. 3, 2005, column, "Read My Lips: No New Liberals," about U.S. Supreme Court Justice David Souter, includes six passages, ranging from 10 to 48 words each, that appeared 15 years earlier in the same order in an L.A. Times article, headlined "Liberals Leery as New Clues Surface on Souter's Views." But nowhere in that column does she mention the L.A. Times or the story's writer, David G. Savage. Her June 29, 2005, column, "Thou Shalt Not Commit Religion," incorporates 10 facts on National Endowment for the Arts-funded work that originally appeared in the same order in a 1991 Heritage Foundation report, "The National Endowment for the Arts: Misusing Taxpayers' Money." But again, the Heritage Foundation isn't credited. "Just as Coulter plays free and loose with her citations in 'Godless,' she obviously does the same in her columns," Barrie said. Coulter did not respond to requests for comment. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From Timmy14 at cooltoad.com Sun Jul 2 12:30:05 2006 From: Timmy14 at cooltoad.com (Meredith) Date: Sun, 02 Jul 2006 13:30:05 -0600 Subject: cooltoad.com Message-ID: <5194377864.7697517329@as01.cooltoad.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $480,000 as low as 3.60% $375,000 as low as 3.85% $275,000 as low as 3.90% $150,000 as low as 3.95% Visit our site by clicking http://www.f72v.net Timmy Winn Account Manager From rah at shipwright.com Sun Jul 2 15:27:00 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 2 Jul 2006 18:27:00 -0400 Subject: [Clips] Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sun, 2 Jul 2006 18:13:13 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com Bloomberg Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say June 30 (Bloomberg) -- The U.S. National Security Agency asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court papers filed in New York federal court. The allegation is part of a court filing adding AT&T, the nation's largest telephone company, as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and seeks money damages. ``The Bush Administration asserted this became necessary after 9/11,'' plaintiff's lawyer Carl Mayer said in a telephone interview. ``This undermines that assertion.'' The lawsuit is related to an alleged NSA program to record and store data on calls placed by subscribers. More than 30 suits have been filed over claims that the carriers, the three biggest U.S. telephone companies, violated the privacy rights of their customers by cooperating with the NSA in an effort to track alleged terrorists. ``The U.S. Department of Justice has stated that AT&T may neither confirm nor deny AT&T's participation in the alleged NSA program because doing so would cause `exceptionally grave harm to national security' and would violate both civil and criminal statutes,'' AT&T spokesman Dave Pacholczyk said in an e-mail. U.S. Department of Justice spokesman Charles Miller and NSA spokesman Don Weber declined to comment. Pioneer Groundbreaker The NSA initiative, code-named ``Pioneer Groundbreaker,'' asked AT&T unit AT&T Solutions to build exclusively for NSA use a network operations center which duplicated AT&T's Bedminster, New Jersey facility, the court papers claimed. That plan was abandoned in favor of the NSA acquiring the monitoring technology itself, plaintiffs' lawyers Bruce Afran said. The NSA says on its Web site that in June 2000, the agency was seeking bids for a project to ``modernize and improve its information technology infrastructure.'' The plan, which included the privatization of its ``non-mission related'' systems support, was said to be part of Project Groundbreaker. Mayer said the Pioneer project is ``a different component'' of that initiative. Mayer and Afran said an unnamed former employee of the AT&T unit provided them with evidence that the NSA approached the carrier with the proposed plan. Afran said he has seen the worker's log book and independently confirmed the source's participation in the project. He declined to identify the employee. Stop Suit On June 9, U.S. District Court Judge P. Kevin Castel in New York stopped the lawsuit from moving forward while the Federal Judicial Panel on Multidistrict Litigation in Washington rules on a U.S. request to assign all related telephone records lawsuits to a single judge. Robert Varettoni, a spokesman for Verizon, said he was unaware of the allegations against AT&T and declined to comment. Earlier this week, he issued a statement on behalf of the company that Verizon had not been asked by the NSA to provide customer phone records from either its hard-wired or wireless networks. Verizon also said that it couldn't confirm or deny ``whether it has any relationship to the classified NSA program.'' Mayer's lawsuit was filed following a May 11 USA Today report that the U.S. government was using the NSA to monitor domestic telephone calls. Earlier today, USA Today said it couldn't confirm its contention that BellSouth or Verizon had contracts with the NSA to provide a database of domestic customer phone call records. Jeff Battcher, a spokesman for Atlanta-based BellSouth, said that vindicated the company. ``We never turned over any records to the NSA,'' he said in a telephone interview. ``We've been clear all along that they've never contacted us. Nobody in our company has ever had any contact with the NSA.'' The case is McMurray v. Verizon Communications Inc., 06cv3650, in the Southern District of New York. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From henrietta at lmayenu.st Sun Jul 2 07:20:58 2006 From: henrietta at lmayenu.st (Andrew Farrell) Date: Sun, 2 Jul 2006 19:20:58 +0500 Subject: Take just a candy and become ready for 36 hours of love Message-ID: <200607030020.k630KtQk001803@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://qnwd.domainrica.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From LakeeshaLu at webtrix.net Mon Jul 3 02:24:50 2006 From: LakeeshaLu at webtrix.net (littleasian) Date: Mon, 03 Jul 2006 11:24:50 +0200 Subject: Replicated Cartier, Rolex, Omega and more! Message-ID: <38e601c69e93$4c94d040$0c55b92a@LakeeshaLu> Very Cheap High Quality Replicated Watches Identical to the genuine time piece -- You cannot tell the difference! We ship to all countries worldwide. Do you have one yet? http://aup.cheaprepliqa.com/?cjk You're the best friend I've ever had. Loaf of bread Hold them off! Lock stock and barrel It just needed a little drying out. Loose cannon No! Lord Fred funniest... Love is blind What about my pedicure? Main chance From gbnewby at pglaf.org Mon Jul 3 13:18:15 2006 From: gbnewby at pglaf.org (Greg Newby) Date: Mon, 3 Jul 2006 13:18:15 -0700 Subject: HOPE Number Six schedule posted Message-ID: <20060703201815.GA1531@pglaf.org> FOR IMMEDIATE RELEASE July 3, 2006 CONTACT: press at 2600.com +1 631 474 2677 2600 Magazine - The Hacker Quarterly is pleased to announce our upcoming conference, HOPE Number Six, taking place in New York from July 21st to 23rd, 2006. HOPE stands for Hackers On Planet Earth, and these conferences have become a gathering point for thousands of computer hackers, phone phreaks, net activists, government spooks, and a whole lot of curious people from all corners of the globe. The HOPE conferences have been running since 1994. HOPE Number Six will bring thousands of hackers together in the middle of Manhattan for three complete days of speakers, demos, videos, and workshops. Conference space in the Hotel Pennsylvania (Seventh Avenue and 32nd Street, across from Penn Station) will be transformed into a nexus for learning about hacker culture and seeing what hackers have been working on lately. HOPE Number Six is open to anyone interested in learning and participating. The conference program includes three packed days of speakers with two main speaker tracks and a third track scheduled on-site. Additional space has been set aside for presentations, demonstrations, and workshops. We will have a variety of vendors at the conference, and the whole space will be connected by a huge computer network with extremely high bandwidth. Highlights include talks by free software pioneer Richard Stallman, former punk rock singer turned spoken word artist Jello Biafra, the former "most dangerous hacker in the world" Kevin Mitnick, Project Gutenberg founder Michael Hart, former CIA operative Robert Steele, and acclaimed private eye Steven Rambam. Over 100 speakers will have presentations on a variety of topics including computer hacking, phone phreaking, legal issues, wiretapping, cryptography, urban exploring, lockpicking, and spying. In addition we will present the return of a favorite panel: social engineering - or how to get sensitive information from people who really ought to know better. A live demonstration of how to do this is planned. Additional talks include how to decode New York City's MetroCard, hacker filmmaking techniques, and even a discussion of hacker cooking. A panel of famous hackers who have gone to prison is also scheduled as is a study of the European hacker scene. And, in a first, there will be a "broadcast" of the WBAI hacker radio show "Off The Hook" in "indecent mode," designed to demonstrate the absurdity of current FCC policies. The New York debut of the Geek Comedy Tour 3000 will also be showcased as will the world premiere of "Urchin," a feature length movie starring several cast members from the hacker world. "The Lost Film Festival," a three hour, culture jamming video showcase will return after being featured at our last conference in 2004. But speakers are only one part of the HOPE conference. Throughout the huge complex, there will be such activities as Segway riding games, a Capture The Flag competition, a showcase of ancient computer systems known as retrocomputing, dramatic demonstrations of what Voice over IP technology is capable of, and an Internet connection faster than any ever seen at a hacker conference in the United States (more than 30 times faster than our last conference). Public terminals will also be on hand for those who don't bring their own computers to tie into the network. Running parallel to the HOPE conference on Saturday afternoon is the Palltech Seminar, an intensive series of talks designed for investigators, private eyes, law enforcement, and anyone else who's interested. All of the speakers from this seminar will also appear at a HOPE panel entitled "Privacy Is Dead - Get Over It." Hackers are curious people who live to learn and share information with others. Periodically, hackers like to meet up with like-minded people to learn from each other. At every HOPE conference, a whole new generation of hackers has been inspired to pursue knowledge and work on creative projects. Non-hackers also come to HOPE and learn from the hackers. New friendships and alliances are formed, and the world is hopefully changed ever so slightly for the better. Each HOPE conference is unique and incorporates new themes. HOPE has changed and grown substantially since the first conference, and this one is going to be different from the previous one. But one thing remains constant: it will be a fun and memorable event. To view the conference schedule, register for the conference, or get further information, visit http://www.hopenumbersix.net *** About 2600 Magazine: 2600, The Hacker Quarterly, has been in print since 1984. With a circulation of over 80,000, it is the voice of hackers in the U.S. and beyond. 2600 Magazine has been organizing the HOPE conferences since 1994. For other information, visit http://www.2600.com From camera_lumina at hotmail.com Tue Jul 4 09:07:37 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 04 Jul 2006 12:07:37 -0400 Subject: Scott Marcus Declaration In-Reply-To: Message-ID: In case it's not well-known, an LGX is a Lightguide Distribution shelf...that's a passive box with lots of optical couplers in it...they can have 60 or more depending on the density. The splitter is normally placed behind the box, it's input and two outputs marked on the front. In general, most optical equipment is never directly connected to each other but connected through the LGX, otherwise things get unamangeable in the CO. -TD >From: John Young >To: coderman , cypherpunks at jfet.org >Subject: Re: Scott Marcus Declaration >Date: Mon, 26 Jun 2006 17:39:28 -0700 > >I don't know who else may be working on restoring redactions. > >Just pick a heavily redacted paragraph or page and post it here, >retaining the paragraph number. We're moving very slowly on it. > >Exhibit A is not identifiable. > >Based on references by Marcus: > >Klein Exhibit B appears to be Wired's release of Klein's >"Study Group 3, LGX/Splitter Wiring, San Francisco, >Issue 1, 12/20/2002." This 4-page excerpt appears to be >taken from a longer, 40-page document referred to by Marcus. > >Klein Exhibit C appears to be Wired's release of Klein's >"SIMS, Splitter Cut-In and Test Procedures, Issue 2, >01/13/03." This is a 4-page document. > >Most of the Klein and ATT documents are in this file: > > http://cryptome.org/klein-decl.htm > >Or linked, where we made an earlier stab at restoring Klein's >redactions > >Or the Exhibits B and C can be downloaded at Wired, Ryan >Singel's blog. > >The recent Scott Marcus declaration, as noted earlier, is here: > > http://cryptome.org/scott-marcus.pdf > >Klein's statement released through his lawyer is in the >Cryptome file as well, or can be downloaded from Wired, >Ryan Singel's blog. > >A lot of the Marcus redactions concern "SG3" and "LGX," >with SG3 customarily used with "Configuration." LGX >usually refers to the "LGX room" or "LGX/Splitter" project. > >As Marcus notes, LGX is short for LGX/Splitter. > >After chewing the bone, it looks as though most of the stuff >can be recovered or PG guessed. From non_secure at yahoo.com Tue Jul 4 14:42:25 2006 From: non_secure at yahoo.com (Jason Arnaute) Date: Tue, 4 Jul 2006 14:42:25 -0700 (PDT) Subject: Possible to verify NK launch ? Is any communication possible ? Message-ID: <20060704214225.54171.qmail@web51013.mail.yahoo.com> TV says NK has launched some missiles. If I am not in the Sea of Japan, or in NK, etc., how could I possibly verify that this is true, given the near blackout of information into and out of NK ? I don't want (at least not in this thread) to discuss the possibility that it did not occur, but I _do_ want to discuss the short term and long term mechanisms by which I could decide whether it occurred. Public radar ? Weather radar ? Some tourist on a boat ? Is there any reason to expect that at some point I could make an informed decision about this ? My second question is, does anyone talk to anyone in NK ? Do they have mail ? Do they have phones ? If I want to talk to someone (anyone) in NK, how would I go about this ? Is it completely impossible ? __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From brett at lariat.org Wed Jul 5 01:44:06 2006 From: brett at lariat.org (Brett Glass) Date: July 5, 2006 1:44:06 AM EDT Subject: For IP: Spying on phone calls started *before 9/11* Message-ID: Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say June 30 (Bloomberg) -- The U.S. National Security Agency asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court papers filed in New York federal court. The allegation is part of a court filing adding AT&T, the nation's largest telephone company, as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and seeks money damages. ``The Bush Administration asserted this became necessary after 9/11,'' plaintiff's lawyer Carl Mayer said in a telephone interview. ``This undermines that assertion.'' The lawsuit is related to an alleged NSA program to record and store data on calls placed by subscribers. More than 30 suits have been filed over claims that the carriers, the three biggest U.S. telephone companies, violated the privacy rights of their customers by cooperating with the NSA in an effort to track alleged terrorists. ``The U.S. Department of Justice has stated that AT&T may neither confirm nor deny AT&T's participation in the alleged NSA program because doing so would cause `exceptionally grave harm to national security' and would violate both civil and criminal statutes,'' AT&T spokesman Dave Pacholczyk said in an e-mail. U.S. Department of Justice spokesman Charles Miller and NSA spokesman Don Weber declined to comment. More at: http://www.bloomberg.com/apps/news? pid=20601087&sid=abIV0cO64zJE ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Wed Jul 5 05:59:38 2006 From: dave at farber.net (David Farber) Date: Wed, 5 Jul 2006 08:59:38 -0400 Subject: [IP] Spying on phone calls started *before 9/11* Message-ID: Begin forwarded message: From jhdlysqxefzaq at hotmail.com Wed Jul 5 10:23:17 2006 From: jhdlysqxefzaq at hotmail.com (Corey Myles) Date: Wed, 05 Jul 2006 10:23:17 -0700 Subject: King of Pharrmacy zP9x Message-ID: <68GI87FE.0E24.jhdlysqxefzaq@hotmail.com> The most complete Phar. macy Online We carry all major medds at bargain price Viggra, Ci ialis, VaIium, Xa naax Phantermiine, Ulltraam and etc... SatiisfactIon Gua ranteeed http://www.medsbig.com/1/ 4jl From nora at lycos.com Wed Jul 5 06:05:29 2006 From: nora at lycos.com (Raymundo Keyes) Date: Wen, 5 Jul 2006 11:05:29 -0200 Subject: Customer recognition with your custom logo (ID5234035) Message-ID: <200607050805.k6585V33004914@proton.jfet.org> e7x Our art team creates a custom logo for you, based on your needs. Years of experience have taught us how to create a logo that makes a statement that is unique to you. In a professional manner we learn about your image and how you would like the world to perceive you and your company. With this information we then create a logo that is not only unique but reflects the purpose of you and your company. For value and a logo that reflects your image, take a few minutes and visit Logo Maker! http://den.biz.try-logosxb.biz Sincerely, Logo Design Team bilinear bateau bogging From UREJMIMYB at yahoo.com Wed Jul 5 07:08:00 2006 From: UREJMIMYB at yahoo.com (Taylor Robison) Date: Wed, 05 Jul 2006 11:08:00 -0300 Subject: Great Jewellery Store Message-ID: <68ER87FE.0A24.UREJMIMYB@yahoo.com> Perfect Gift for your spouse and family - Luxury Watches, Handbags and Mont Blanc accs. - Finest quality assured - 101% like original You Name It, We have It all at 8o-% Price Reduction C lick below http://043.newmkediashowerz.com From camera_lumina at hotmail.com Wed Jul 5 09:17:45 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 05 Jul 2006 12:17:45 -0400 Subject: [dave@farber.net: [IP] Spying on phone calls started *before 9/11*] In-Reply-To: <20060705130515.GR26630@leitl.org> Message-ID: I am shocked. SHOCKED. Domestic spying? In the US? -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [dave at farber.net: [IP] Spying on phone calls started *before >9/11*] >Date: Wed, 5 Jul 2006 15:05:15 +0200 > >----- Forwarded message from David Farber ----- > >From: David Farber >Date: Wed, 5 Jul 2006 08:59:38 -0400 >To: ip at v2.listbox.com >Subject: [IP] Spying on phone calls started *before 9/11* >X-Mailer: Apple Mail (2.752.2) >Reply-To: dave at farber.net > > > >Begin forwarded message: > >From: Brett Glass >Date: July 5, 2006 1:44:06 AM EDT >To: dave at farber.net >Subject: For IP: Spying on phone calls started *before 9/11* > >Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say > >June 30 (Bloomberg) -- The U.S. National Security Agency asked AT&T >Inc. to help it set up a domestic call monitoring site seven months >before the Sept. 11, 2001 attacks, lawyers claimed June 23 in court >papers filed in New York federal court. > >The allegation is part of a court filing adding AT&T, the nation's >largest telephone company, as a defendant in a breach of privacy case >filed earlier this month on behalf of Verizon Communications Inc. and >BellSouth Corp. customers. The suit alleges that the three carriers, >the NSA and President George W. Bush violated the Telecommunications >Act of 1934 and the U.S. Constitution, and seeks money damages. > >``The Bush Administration asserted this became necessary after >9/11,'' plaintiff's lawyer Carl Mayer said in a telephone interview. >``This undermines that assertion.'' > >The lawsuit is related to an alleged NSA program to record and store >data on calls placed by subscribers. More than 30 suits have been >filed over claims that the carriers, the three biggest U.S. telephone >companies, violated the privacy rights of their customers by >cooperating with the NSA in an effort to track alleged terrorists. > >``The U.S. Department of Justice has stated that AT&T may neither >confirm nor deny AT&T's participation in the alleged NSA program >because doing so would cause `exceptionally grave harm to national >security' and would violate both civil and criminal statutes,'' AT&T >spokesman Dave Pacholczyk said in an e-mail. > >U.S. Department of Justice spokesman Charles Miller and NSA spokesman >Don Weber declined to comment. > >More at: http://www.bloomberg.com/apps/news? >pid=20601087&sid=abIV0cO64zJE > > > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From eugen at leitl.org Wed Jul 5 06:05:15 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Jul 2006 15:05:15 +0200 Subject: [dave@farber.net: [IP] Spying on phone calls started *before 9/11*] Message-ID: <20060705130515.GR26630@leitl.org> ----- Forwarded message from David Farber ----- From edrigram at edri.org Wed Jul 5 11:15:47 2006 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 5 Jul 2006 21:15:47 +0300 Subject: EDRI-gram newsletter - Number 4.13, 5 July 2006 Message-ID: ============================================================ EDRI-gram biweekly newsletter about digital civil rights in Europe Number 4.13, 5 July 2006 ============================================================ Contents ============================================================ 1. Creative Communities and Consumers in TACD Conference 2. Terrorist Finance Tracking Program raises privacy questions 3. Private hotlines questioned at EC Safer Internet Forum 4. Dutch Parliament opposes the new EU IPR draft directive 5. German experts think search engines should be monitored 6. Swedish file-sharing damage insurance company expands 7. New French copyright law gives Apple satisfaction 8. Google's victory in court against German publisher 9. Consultation launched by UK government on the controversial RIPA act 10. IPRED Directive Implementation in Italy 11. News on CoE activities on Human Rights in the Information Society 12. Book launch on Human Rights in the Global Information Society 13. Recommended reading 14. Agenda 15. About ============================================================ 1. Creative Communities and Consumers in TACD Conference ============================================================ TACD (Trans-Atlantic Consumer Dialogues) organized a conference under the title "New Relationships Between Creative Communities and Consumers" in Paris on 19-20 June 2006. Participants represented a wide range of interests, including both artists' and consumers' organizations, but also WIPO and the European Commission. Several panels explored problems and possibilities in creators' and users' rights in fields as various as gene research, drug development, software production, entertainment industry, documentary films and scholarly publishing. The breadth of discussion and ideas presented was impressive. One recurring theme was that creators and users of intellectual works are not necessarily enemies; their interests are more common than conflicting. Indeed often they are the same people: professional creators need to be able to use earlier creations, and in the networked world consumers are increasingly also creators. As concerns the software development there was a strong opposition to software patents and support for open standards, especially for interfaces and file formats needed for interoperability. The dangers of monopolies and the importance of free software were stressed, especially for basic functionality. Regarding the entertainment industry (music and film), there was a surprisingly strong consensus that some kind of flat rate and global licensing system for file sharing and downloading would be a good thing and that time has come for it. Nonetheless, it was noted there are still lots of technical and legal problems to be solved. Scholarly publishing was also debated, observing that the present system serves mainly the interests of publishers, not those of creators or users who are indeed mainly the same people - scientists. A draft document called "Paris accord" containing a collection of suggestions on how the various issues should be addressed was circulated and discussed. The treaty could give directions for the creation of a DRM-free new music industry that would be beneficial for both artists and consumers. However, the document remained a draft as there was no real attempt to finalize it during the conference. There was an agreement, however, that something like it would be necessary and that work would continue although no deadline was decided on its completion Paris TACD conference - Neil Leyton report (29.06.2006) http://www.p2pnet.net/story/9217 TACD Workshop - the Paris Accord - 19-20 June 2006 http://www.cptech.org/a2k/pa/ "New Relationships Between Creative Communities and Consumers" - TACD Conference http://www.tacd.org/docs/?id=296 (Contribution by Tapani Tarvainen - EDRi-member Electronic Frontier Finland) ============================================================ 2. Terrorist Finance Tracking Program raises privacy questions ============================================================ On 22-23 June 2006, the New York Times published a story uncovering an international financial surveillance programme, called Terrorist Finance Tracking Program, run by the US authorities. After the 11 September 2001 attacks, the US Treasury Department and/or CIA starting getting access to international transfer data, available in the SWIFT database, in order to investigate terrorist activity. The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a Belgian-based industry-owned co-operative that supplies a messaging infrastructure to the global banking community. This 'community' consists of banks, brokers and dealers, investment managers and their market infrastructures in payments, securities, treasury and trade. SWIFT provides messaging services and interface software to more than 7,863 financial institutions in 204 countries and territories. SWIFT's activities is overseen primarily by the National Bank of Belgium, though other central banks are said to "have a legitimate interest in, or responsibility for, the oversight of SWIFT, given SWIFT's role in their domestic systems." Therefore it has international oversight in co-operation with G-10 central banks. After11 September 2001 SWIFT responded to some very broad US subpoenas. SWIFT had considered at the time that it could not provide individualised searches of the information and it had offered the U.S. Government access to all transaction records. This has been a situation going on since then and the financial authorities examined tens of thousands of confidential financial transactions. The Secretary for the Office of Terrorism and Financial Intelligence Stuart Levey confirmed that the Treasury Department had subpoenaed records on terrorist-related transactions from SWIFT. He reported that the legal basis was "routine and absolutely clear". Some US Representatives asked US Department of Justice to investigate the New York Times for its actions for violating the Espionage Act and other related federal statutes. The European Commission said it had no jurisdiction over the transfer of financial data to non-EU countries such as the US, considering that this was a problem for the national legislation. Friso Abbing, EU spokesman on justice and home affairs, stated that the European Union remained concerned that civil liberties were being overlooked in the name of combating terrorism: "Everyone agrees that in the fight against terrorism we do need to have measures against the funding of terrorism. But the emphasis is that this must be done with full respect in the respect of data privacy." The Belgium government said that they were investigating the legality of the searches. Prime-Minister Guy Verhofstadt stated that they needed to determine if the rights of Belgium nationals and the Belgium Law have been respected during this process within SWIFT. The National Bank of Belgium acknowledged that it knew of the transfers and The European Central Bank and the Bank of England were also aware that customers' payment data were being accessed by US authorities. There are serious privacy concerns that this classified program might also be a violation of U.S. and European financial privacy laws, because individual search warrants to access financial data were not obtained in advance. Privacy International (PI) lists a number of inconsistencies with this program, including the US claims that this is a narrowly focused programme that is compliant with the law, while the Belgian Government has concerns that the data is accessed without authorisation by a Belgian judge. Or that, as with most cases of international co-operation, the country seizing the data, i.e. the U.S., is claiming universal jurisdiction while the regime responsible for protecting the data, the EU, is disavowing any responsibility. PI launched on 28 June 2006 an international campaign against the SWIFT illeagal activities. They have filed simultaneous complaints with Data Protection and Privacy regulators in 33 countries, considering that the activity was undertaken without regard to legal process under Data Protection law, and that the disclosures were made without any legal basis or authority whatever. The scale of the operation, involving millions of records, places this disclosure in the realm of a fishing exercise rather than a legally authorised investigation. Pulling a Swift one? Bank transfer information sent to U.S. authorities (27.06.2006) http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-538978 PI launches campaign to suspend unlawful activities of finance giant (28.06.2006) http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-538985 PI Complaint: Transfer of personal data from SWIFT to the U.S. Government (27.06.2006) http://www.privacyinternational.org/issues/terrorism/swiftlettercampaign.pdf Belgian leader orders bank inquiry (26.06.2006) http://www.iht.com/articles/2006/06/26/news/intel.php NY Times accused of treason ( 26.06.2006) http://www.theregister.com/2006/06/26/nyt_on_the_job/ Belgium probes US bank record searches(26.06.2006) http://today.reuters.com/business/newsArticle.aspx?type=bankingFinancial&sto ryID=nL26722895 European Central Bank knew about US data access (29.06.2006) http://euobserver.com/9/21984 Society for Worldwide Interbank Financial Telecommunication - SWIFT http://en.wikipedia.org/wiki/Society_for_Worldwide_Interbank_Financial_Telec ommunication (Thanks to Gus Hosein - Privacy International) ============================================================ 3. Private hotlines questioned at EC Safer Internet Forum ============================================================ With its newly adopted Communication on a 'comprehensive EU strategy to promote and safeguard the rights of the child', the Commission intends to pursue its global action on children's rights. One may however wonder whether the strategy for fighting child porn on the Internet, which mostly relies on private hotlines, is really efficient and compliant with the rule of law. These were the main issues raised at the afternoon session of the EC Safer Internet Forum 2006, held in Luxembourg on 21 June, on 'Illegal Content: Blocking access to child sexual abuse images'. Following the invitation of the organizers, Rikke Frank Joergensen (Digital Rights Denmark) and Meryem Marzouki (Imaginons un rC)seau Internet solidaire, IRIS - France) represented EDRI. Other speakers were two representatives of private hotlines, Helena KarlC)n (ECPAT Sweden) and Peter Robbins (UK Internet Watch Foundation - IWF) and two representatives of ISPs, BenoC.t Lavigne (French ISP Association, AFA) and Sabine Frank (German Search Engine Providers, FSM). The discussion was introduced by Ola-Kristian Off (Norwegian lawyer and former ICRA European Director) and moderated by Richard Swetenham (Head of the eContent and Safer Internet Unit, EC DG INFSO). >From the digital civil rights point of view, hotlines run by private organizations, be they ISPs or NGOs, and their cooperation with the police to remove local content or block access to it when hosted on foreign websites, are breaching the rule of law in that the police acts as the judging power and ISPs as the executing power, as Joergensen exemplified with the Danish case. At the EU level, Marzouki showed how freedom of expression and creation, transparency and accountability, as well as the risk of massive over-blocking of legal content are at stake when courts are left outside the process. Other important issues were related to violations of due process and dual criminality rules and, in some cases, to the loss of evidence, which may result in preventing accurate investigations. ISP representatives backed to a large extent these deep concerns, with Lavigne discussing the efficiency of filtering, as well as its side effects mainly in terms of threats to freedom of expression, and Frank insisting on the transparency issue. Despite all these risks, private hotlines representatives are pushing hard towards generalizing blocking of access, as already practiced on a large scale in 4 European countries. The UK and the 3 Scandinavian countries are using blocking systems like British Telecom 'Cleanfeed' (recently analyzed by Richard Clayton from EDRI member FIPR - UK), or the Swedish company 'Netclean Technologies' products and the blocking system of the Danish Telecom operator TDC. KarlC)n even proposed to interconnect hotlines all around the world following the SETI at Home project, and to set up an international database of URL blacklists. Showing how IWF is cooperating with other hotlines, ISPs and the police, Robbins said that IWF intends to share its databases with other members of the Inhope network. He also mentioned that IWF is currently sharing its blacklists with its members, while licensing them to non IWF members. The latter information made Marzouki wonder during the discussion whether these practices could lead on the one hand to commercial business, like we have witnessed content rating bureaus selling services, and on the other hand to a 'least common denominator' strategy to define illegal content throughout the world, and at least in Europe, without any court intervention. Other participants to the Forum took the floor to raise the issue of privacy: when tentative access is made to blocked content, what happens with the personal data of individuals requesting these URLs, some indeed on purpose, but some others only incidentally, without any intention to access child porn content? Despite the conclusions on the need for more hotline transparency, the Safer Internet Forum 2006 clearly showed that civil liberty organizations must remain very vigilant against the risk of worldwide interconnection of blacklists and massive content blocking, without any sound legal decision. RAPID: 'Commission launches comprehensive EU strategy to promote and safeguard the rights of the child' (04.07.06) http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/06/927 EC Safer Internet Forum 2006 (21.06.06) http://europa.eu.int/information_society/activities/sip/si_forum/forum_june_ 2006/agenda Rikke Frank Joergensen: 'Blocking access to child pornography. The Danish Case' (21.06.2006) http://europa.eu.int/information_society/activities/sip/docs/forum_june_2006 /rikke_frank_joergenseng.pdf Meryem Marzouki: 'Five Little Questions About Blocking Access to Child Porn Images' (21.06.2006) http://www-polytic.lip6.fr/article.php3?id_article=144 Richard Clayton: 'Failures in a Hybrid Content Blocking System' (1.06.2005) http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf (Contribution by Meryem Marzouki, EDRI-member IRIS) ============================================================ 4. Dutch Parliament opposes the new EU IPR draft directive ============================================================ The Dutch Parliament stated on 28 June 2006 that the European Commission has no competence to propose a new directive that is focusing on criminalizing intellectual property offences. The statement refers to a new draft directive - Directive on criminal measures aimed at ensuring the enforcement of intellectual property rights, 2005/0127 - revived by the European Commission at the beginning of May 2006. The Parliament also said that the Commission should present concrete evidence why such a directive is needed, considering that the European body should show why the measures are essential for the good functioning of the single market. Also it considers that the directive might harmonise some penalties, but the exchange of information among member states would be a much more effective solution. The conclusion of the text adressed to Mr. Frattini, Commissioner for Justice, Freedom and Security, and adopted by the Dutch Parliament states that: "Both Houses of the States-General conclude that no power has been granted to the Community in respect of the aim of the proposed action. Nonetheless, both Houses have b for the record b scrutinised the present proposal by reference to the principles of subsidiarity and proportionality and concluded that the proposal does not comply with them." Commenting the decision of the Parliament, FFII analyst Ante Wessels notes that : "The European Commission and the member states are now in the process of circumscribing competence: How far can the Commission go? In this power struggle the Dutch Parliament made its statement: the Commission went much too far. Earlier Dutch minister of Justice Donner had already stated he was not 'pleased'." Letter of Dutch Parliament to Mr. Frattini (3.07.2006) English Version http://europapoort.eerstekamer.nl/9310000/1/j9tvgajcovz8izf_j9vvgbwoimqf9iv/v g7slw5im1tl?key=vhc0fvdga1qw French Version http://europapoort.eerstekamer.nl/9310000/1/j9tvgajcovz8izf_j9vvgbwoimqf9iv/v g7slw5im1tl?key=vhc0fy66g2qw Dutch Parliament says No to European criminal law against IP violations (3.07.2006) http://wiki.ffii.org/IpredNlParl060629En IP Enforcement Directive 2: European Community goes criminal http://wiki.ffii.org/Ipred2060510En EDRi-gram : EU moves to criminalise IP offences (10.05.2006) http://www.edri.org/edrigram/number4.9/ipcriminal ============================================================ 5.German experts think search engines should be monitored ============================================================ During the workshop "The Rising Power of Search-Engines on the Internet: Impacts on Users, Media Policy, and Media Business" that took place in Berlin on 26-27 June 2006, the experts expressed the opinion that the search engines should be more regulated. Marcel Machill, a lecturer in journalism at Germany's Leipzig and Dortmund universities stated that Google along with Yahoo and MSN were the main source of information searches for 90% of the Germans, Google alone accounting for 70%. He expressed serious concern related to the power of the search engines that would be unconceivable in the classic media. Machill as well as other experts considers Google should have the same responsibility as other publishers not to allow access to illegal sites, such as those with neo-Nazi content or x-rated ones and that mechanisms must be created to protect children online and to address illegal content. "Even if not targeted directly, browsing, surfing, or following suggestions from search engines may lead to material containing unwanted, troublesome, offensive, as well as surprising or amusing material. To be able to profit from this opportunity, while still allowing for the protection of children and for selective approaches to information gathering and communication, is one of the most important tasks in further developing the internet." said Machill. Machill also added that last year, the German subsidiaries of search engine operators agreed to voluntarily filter sites with x-rated content or those that incite to violence out of their results lists and that the Government had to know how the search companies operate and had to regulate them if necessary. However, according to Norbert Schneider, director of the North Rhine Westphalia, the voluntary obligation to filter sites will have no effect considering it just a "weak regulation without any sanctions". Machill also suggested the foundation of a public corporation in Europe to counterbalance the power of the US search engines. Google's position was expressed by public relations head Rachel Whetstone who reaffirmed that the search engine was no newspaper or broadcasting company and that they only applied an algorithm. She also stated that while Google observed the local laws regarding the results displayed, they did not wish to be the ones to decide on what people were supposed to see or not. The Rising Power of Search-Engines on the Internet: Impacts on Users, Media Policy, and Media Business http://www.uni-leipzig.de/journalistik/suma/home_e.html German Experts Criticize Google's Power (28.06.2006) http://www.dw-world.de/dw/article/0,2144,2071471,00.html German experts want search engines to be monitored (30.06.2006) http://www.theregister.com/2006/06/30/google_too_powerful/ ============================================================ 6. Swedish company offers file-sharing damage insurance ============================================================ Swedish company Tankafritt offers insurance against file sharing law suits damages and intends to expand to other Scandinavian countries. Magnus Brath, the owner of the company, found it in reaction to the recent copyright infringement cases in Sweden. He also thinks he could develop his business in countries like Norway and Denmark where there are similar laws on file-sharing. His company is a small one operating on membership basis. For about 15 euro/year the members are covered in case RIAA (Recording Industry Association of America) asks for damages for copyright infringement.. According to Slyck.com, the probability of being sued by RIAA is 1:1,840, a ration that is lower than that of dying from external causes which is 1:1,755, according to the US National Safety Council. Considering these figures, the Tankafritt operation has all the chances of being a success. While in UK such a system would not be considered legal as states the Association of British Insurers, in Sweden, where there is a political party for the relaxation of the intellectual property controls, the cause of file sharers is very much supported. A large controversy has been created recently by a raid on servers hosting the Pirate Bay site as the raid has apparently put some legal business offline as well. File sharing damages insurer plans international expansion (3.07.2006) http://www.theregister.com/2006/07/03/filesharing_damages_insurer/ P2P insurer will pay your fines if RIAA sues: $19/year! (28.06.2006) http://www.boingboing.net/2006/06/28/p2p_insurer_will_pay.html RIAA's Grand Total: 10,037 - What are Your Odds? (2.05.2006) http://www.slyck.com/news.php?story=769 EDRI-gram : Swedish torrent website Pirate Bay returns back home (21.06.2006) http://www.edri.org/edrigram/number4.12/piratebay ============================================================ 7. New French copyright law gives Apple satisfaction ============================================================ The most controversial DADVSI Law, now colloquially known also as "iTunes Law", was finally adopted in the French Parliament with a compromise allowing Apple to continue operating as before. The law was adopted by the Parliament under emergency regime, which ended with a mixed commission, normally made of 7 senators and 7 deputies, from both the majority and the opposition. But the opposition left the commission, after 55 more amendments were brought to it by the rapporteurs at the very final step The most controversial provision was that of interoperability. In a previous draft, the law imposed measures to allow interoperability, obliging thus Apple to give up its DRM system that made "iTunes" products strictly related to i-Pods. Apple reacted virulently, accusing of "state sponsored piracy" and threatening to leave France altogether in case the law was passed as such. The law as adopted now allows for the DRM and redefines the concept of interoperability. The text provides for the protection of "the technical measures meant to prevent or limit non-authorised use" and the fines for breaking these systems have remained at the level of 3 750 euro. The producers, distributors or promoters of technical solutions avoiding these systems can get up to 6 months of imprisonment and 30 000 euro fines. Interoperability is redefined in the sense that the text now reads: the technical measures (meant to protect the works) must not result in impeding interoperability, while observing copyright. Still stating that all systems must interoperate, the new law allows, however, for this requirement to be waived with the permission of the rights holders. It actually means that Apple can continue to operation in the same way as before with the permission of record labels and artists, only the balance of power between Apple and the labels may shift more towards the latter. The idea of creating a group of mediators to deal with private copy conflicts was changed to that of establishing a regulator of technical measures as an independent authority. The regulator will be responsible with seeing that the DRM systems do not create additional limitations in the use of artistic works to those explicitly expressed by the copyright holders. The law covers only software and technical systems producers without saying anything about consumer associations or the open source creators. The socialist deputies have already announced their intention to contest the text of the law at the Constitutional Court. Dadvsi draft finaly adopted by the Parliament (in French only, 30.06.2006) http://www.zdnet.fr/actualites/internet/0,39020774,39361945,00.htm?xtor=1 France dilutes plans for iTunes law (26.06.2006) http://www.theregister.com/2006/06/26/france_dilutes_itunes_law/ Zut! France drops iTunes bombshell (30.06.2006) http://www.theregister.com/2006/06/30/france_itunes_law_loophole/ Compromise on copyright (in French only, 23.06.2006) http://www.lemonde.fr/web/article/0,1-0 at 2-651865,36-787328 at 51-787425,0.html EDRI-gram : French draft copyright law continues to be criticised (24.05.2006) http://www.edri.org/edrigram/number4.10/frenchcopyright ============================================================ 8. Google's victory in court against German publisher ============================================================ Google has just obtained a significant victory against the German publisher Wissenschaftliche Buchgesellschaft (WBG), having asked an injunction in a German court to stop the giant from scanning books in its Books Library project. WBG dropped their case on 28 June after the judge told them they had poor chances in winning. Although backed by the German publishers associations, the publisher failed to bring arguments in support of its action and the court ruled that there was no copyright violation resulting from the development of Google's project. Google has undertaken to digitize library books and place the contents on its search engine working within this process with six US libraries and one in Oxford. The books that are out of copyright will be accessed without any restrictions while books that are found to be covered by copyright are only presented with bibliographic data and a few snippets. However, even for a copyrighted book, Google has to scan the entire book in order to create the index used for its search engine. The German publisher wanted to stop Google from scanning copyrighted books without permission but the court admitted Google's argument that the publishing of short snippets did not infringe the German copyright law. To make thinks even more complicated, Google considers that the action of copying a book is covered by the copyright law of the country where the book is copied and not by that of the country where the book publisher is. Therefore if it scans a book from a US library is has to comply to US copyright laws. But Germany is not the only country where the giant faces opposition to this project. The French group La Martiniere is also suing Google for "counterfeiting and breach of intellectual property rights" as reported by Agency France-Presse. France's National Publishers' Union, representing over 400 publishers, has also threatened to take Google to court and publishers in UK have expressed opposition to the project as well. Google faces two lawsuits in the United States from author and publisher groups on the same issue. After the court ruling on 28 June, Google stated that they recognised the importance of the copyright law as they considered that authors and publishers were entitled to be rewarded for their creations. Google also believes the project would also serve authors and publishers as their books will be easily searchable on the search engine and it will also be easy for the users to buy them. David Drummond, senior vice president also expressed the dedication of the company to the project. "Google is passionate about the digitization of books, which we believe benefits everyone by making the world's knowledge more accessible". Legal victory for Google in library project (29.06.2006) http://business.guardian.co.uk/story/0,,1808770,00.html Partial Success for Google in a German Courtroom (29.06.2006) http://www.dw-world.de/dw/article/0,2144,2073046,00.html Google Book project gets reprieve in Germany (29.06.2006) http://news.com.com/2061-10812_3-6089897.html ============================================================ 9. Consultation launched by UK government on the controversial RIPA act ============================================================. UK government has launched a consultation on codes of practice covering the implementation of its communications surveillance laws that, lately, have been largely debated on by privacy campaigners, internet service providers as well as security specialists. The UK Government has launched a public consultation on Part I and III of The Regulation of Investigatory Powers Act (RIPA) Chapter II giving increased power to public authorities in their access to citizens' communications data. The Home Office has published draft codes of practice for both parts of the act for a 12-week consultation period, stating that the present text has been modified to take into consideration the current practices, to reduce bureaucracy and to deal with concerns expressed in relation to data protection. It also stated that additional elements have been added where the original draft was lacking in sufficient guidance. Part 3 of the Regulation of Investigatory Powers Act (RIPA), allowing the police to ask for the disclosure of encryption keys or force suspects to decrypt encrypted data has not yet been implemented but the government considers time has come for it. The arguments relate to the rapid development of encryption products and the increased availability to such products including integrated security features in operating systems. Comments on the two draft codes are expected by 30 August. Government launches new data retention consultation (20.06.2006) http://www.computerweekly.com/Articles/2006/06/20/216510/Government+launches +new+data+retention+consultation.htm EDRI-gram: UK Government asks for the encryption keys (24.05.2006) http://www.edri.org/edrigram/number4.10/ukencryption Acquisition and Disclosure of Communication Data - A public consultation http://www.homeoffice.gov.uk/documents/351628/ripa-part1.pdf?view=Binary ============================================================ 10. IPRED Directive Implementation in Italy ============================================================. By Legislative Decree no.140 of 16 March 2006, with more than one month before the deadline, Italy implemented Directive 2004/48/EC on the enforcement of intellectual property rights (IPRED) by amending law no.633/1941, which has already been the subject of so many modifications since its inception that several parties are calling for its complete re-drafting. The most notable modifications to the Italian copyright law include the presumption of ownership of the neighbouring rights, as it was already the case for author's rights; the possibility for collective and "representative" organizations to independently promote judicial actions in order to defend their members' rights; the possibility to ask judges to inhibit activities, including those by intermediaries, that can be construed as an infringement of authors' or neighbouring rights; the possibility for judges in the case of infringement "on a commercial scale"- on request of the interested party - to order banking, financial and other commercial data to be produced by the counterpart; a more detailed procedure to calculate damages. Some of the modifications were not so relevant, as the Italian judges have already applied the same principles as a matter of custom and practice. For example the Italian criminal procedures already contained norms that allow a judge to apply a sanction in case a party delays of fails to put a writ in practice. Or the so-called "right of information", by which a judge can request third parties to produce relevant information they might have with regards to an infringement. The Italian implementation of IPRED has been severely criticized, among others by Andrea Monti of ALCEI (Associazione per la Liberta` nella Comunicazione Elettronica Interattiva - EDRi-member). In an article published on the Italian journal "InterLex", Monti considered that the Legislative Decree is too vague in its key parts - including the definition of what is an "intermediary" and the type of evidences that must be produced in order for a judicial injunction to be issued. Text of Legislative Decree no. 140/16 March 2006 (only in Italian, 16.03.2006) http://www.gazzettaufficiale.it/guri/attocompleto?dataGazzetta=2006-04-07&re dazione=006G0161&service=0&ConNote=2 http://www.camera.it/parlam/leggi/deleghe/testi/06140dl.htm Andrea Monti, Copyright - a "particular" and "concrete" law (only in Italian, 23.02.2006) http://www.interlex.it/copyright/amonti84.htm Explanatory report on the Italian implementation of IPRED (only in Italian) http://www.interlex.it/testi/pdf/rec482004.pdf EDRI-gram: New Italian IT legislation limits civil rights (1.03.2006) http://www.edri.org/edrigram/number4.4/italianlaws (Contribution by Andrea Glorioso, consultant on digital policies - Italy) (Thanks to Ms. De Angelis - DDA Law Firm ) =========================================================== 11. News on CoE activities on Human Rights in the Information Society =========================================================== On 20 June, Rikke Frank Joergensen (Digital Rights Denmark) and Meryem Marzouki (Imaginons un rC)seau Internet solidaire, IRIS - France) participated as EDRI observers to the 5th Council of Europe meeting of the Group of Specialists on Human Rights in the Information Society (MC-S-IS). Among the many points on the agenda, the following news are worth reporting at this step. The draft Recommendation on empowering children in the new information and communications environment has been submitted to the CoE Steering Committee on the Media and New Communication Services (CDMC), where some member states (France, Germany, Russia) expressed their willing to make further comments before having it adopted. EDRI previously reported on the important changes made to this document by MC-S-IS group. The group received information on CoE follow-up to the second phase of the World Summit on the Information Society (WSIS). This concerns action line C8 on bCultural diversity and identity, linguistic diversity and local contentb, C9 on bMediab and C10 on bThe ethical dimension of the Internetb, as well as the Internet Governance Forum, which will hold its first meeting in Athens, 30 October to 2 November 2006. EDRI proposed stronger cooperation between CoE and human rights groups, i.e. through common workshops at the Forum. The group was also informed that a new CoE Ad Hoc Committee on e- democracy (CAHDE) was created, in the framework of the CoE project on bGood governance in the information societyb. The CAHDE mandate, which runs until December 2007, is inter alia to bexamine developments on e-democracy/e-participation at European and international level, with a view to identifying political, social, ethical, legislative and technological issues and their interdependenceb. Its first meeting will be held in September 2006. While there is no observer status for NGOs non member of the CoE Conference of INGOs, EDRI insisted on the need to associate NGOs directly involved in these issues to the CAHDE works. Given the very few (less than 15) answers received so far to the questionnaire on the implementation by member States of the 2003 Declaration on freedom of communication on the Internet, EDRI proposed that a European compliance study/mapping based on the Declaration be rather commissioned by the group. Finally, the second CoE Pan-European Forum on Human Rights in the Information Society will be held in Erevan on 5-6 October 2006, on the main theme of bEmpowering children and young peopleb. EDRi-Gram : CoE Works On New Instrument On Children Empowerment On The Net (15.03.06) http://www.edri.org/edrigram/number4.5/coe CoE MC-S-IS public website http://www.coe.int/t/e/human_rights/media/1_intergovernmental_co-operation/MC -S-IS/ WSIS follow-up action lines and Internet governance forum http://www.itu.int/wsis/implementation/ http://www.intgovforum.org/ CAHDE draft terms of reference https://wcd.coe.int/ViewDoc.jsp?Ref=CM/Del/Dec(2006)965/2.3&Sector=secCM (Contribution by Rikke Frank Joergensen and Meryem Marzouki, EDRI- members Digital Rights Denmark and IRIS) =========================================================== 12. Book launch on Human Rights in the Global Information Society =========================================================== A new book on Human Rights in the Global Information Society, edited by Rikke Frank JC8rgensen (EDRI board member from Digital Rights DK) was presented 23 June 2006 in Copenhagen. In the book, a number of scholars, human rights activists and practitioners examine the links between information and communication technology (ICT) and human rights, exploring the ways in which the information society can either advance human rights around the world or threaten them. This includes issues such as freedom of expression, access to information, privacy, discrimination, freedom of assembly, political participation, gender equality, minority rights, and intellectual property. The book was produced during the World Summit of the Information Society process (2003-2005), and the Introduction examines how human rights were dealt with within this global ICT policy process. Following the presentation of the book, Gus Hosein from Privacy International / LSE and author of the book chapter on Privacy, gave a keynote on 'Privacy, Terrorism and the New Security Agenda'. In his presentation, Hosein illustrated with current examples how privacy rights are being eroded, not least in a European context, and how the policy dynamics of the 'new security agenda' stretches beyond terrorism into other parts of our daily lives. He also addressed the intimate link between privacy and other human rights, such as freedom of expression and freedom of assembly, and stressed the need for more concerted civil society actions in Europe on these issues. Human Rights in the Global Information Society http://www.mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=10872 Danish Human Rights Institute http://www.humanrights.dk Digital Rights Denmark http://www.digitalrights.dk Danish WSIS network http://www.una.dk/wsis (Contribution by Rikke Frank JC8rgensen - EDRi-member Digital Rights Denmark) =========================================================== 13. Recommanded Reading =========================================================== Michelle Child - Notes of Barcelona Conference "The Proposed WIPO Treaty on the Protection of Broadcasting Organizations: From the Rome Convention to Podcasting" - 21 June 2006 http://downontheriver.blogspot.com/2006/06/notes-of-wipo-barcelona-seminar.h tml Report on the situation of fundamental rights in the EU in 2005 http://www.statewatch.org/news/2006/jun/EU-funrights-report05.pdf European Commission opened an online public consultation on radio frequency identification (RFID) http://www.rfidconsultation.eu/ Read also the consultation background paper http://www.rfidconsultation.eu/docs/ficheiros/Your_voice_on_RFID.pdf =========================================================== 14. Agenda =========================================================== 7 July 2006, Zurich, Switzerland Free cultures - a Free Internet. Internet Governance and Switzerland Who is supposed to govern the internet? A symposium on the "Internet Governance Forum" will be looking for the answers. http://www.igf-06.ch 16 - 28 July 2006, Oxford, UK Annenberg/Oxford Summer Institute: Global Media Policy: Technology and New Themes in Media Regulation http://www.pgcs.asc.upenn.edu/events/ox06/index.php 2-4 August 2006, Bregenz, Austria 2nd International Workshop on Electronic Voting 2006 http://www.e-voting.cc/stories/1246056/ 3 August 2006 , Prague, Czech Republic Travelers privacy and EU - One day seminar organized by Iuridicum Remedium, providing a space for privacy experts to meet Czech officials to discuss passports, biometrics, RFID, PNR deal and other issues related to privacy risks possibly encountered by travellers in the EU. http://www.bigbrotherawards.cz/en/index.html 14-16 September 2006, Berlin, Germany Wizards of OS 4 Information Freedom Rules http://wizards-of-os.org/ =========================================================== 15. About =========================================================== EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 21 members from 14 European countries and 5 observers from 5 more countries (Italy, Ireland, Poland, Portugal and Slovenia). European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 2.0 License. See the full text at http://creativecommons.org/licenses/by/2.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edrigram-mk.php - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed Jul 5 12:30:51 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Jul 2006 21:30:51 +0200 Subject: [edrigram@edri.org: EDRI-gram newsletter - Number 4.13, 5 July 2006] Message-ID: <20060705193051.GZ26630@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From brett at lariat.net Thu Jul 6 05:48:04 2006 From: brett at lariat.net (Brett Glass) Date: July 6, 2006 5:48:04 PM EDT Subject: [IP] CALEA - Final Rule Message-ID: Dave: This is disturbing. The FCC Report and Order on CALEA (see http:// cryptome.org/fcc070506.htm) appears to drag all broadband providers -- including small, rural ISPs such as myself -- into a messy regulatory regime, merely because one of my customers might choose to use a VoIP service. Worse still, the requirements are vague and potentially extremely onerous. I do not offer VoIP myself, but of course it is possible for any of my customers to do VoIP via a third party service. Now, any VoIP service worth its salt would encrypt conversations such that it would be pointless to intercept calls by tapping my network. Any rational law enforcement agency would want to go to one of the ends, where the data was present in the clear, to listen in on the call. What's more, even the DC Circuit Court of Appeals, which recently ruled in an awkward, poorly reasoned split decision (see http://www.epic.org/privacy/wiretap/ace_v_fcc.pdf for the text) that the FCC could define the words of a statute differently in different contexts to reach an outcome it desired, admits that non-VoIP traffic is clearly not subject to interception under CALEA. There is no rational reason to subject an ISP such as myself to the statute's expensive requirements. Yet, the FCC is trying to do so. What's more, to add insult to injury, it has stated that it does not intend to allow ISPs to be compensated for the expense of making their networks tappable. In short, the FCC seems eager to impose requirements upon us which would do nothing to enhance homeland security but could well drive us and other independent ISPs out of business. This would ensure a cable/telco duopoly and hamper the expansion of broadband service to rural areas like ours. In my opinion, the FCC R&O *must* be challenged via an appeal of the lower court's ruling to the Supreme Court. Otherwise, the end of broadband competition may have just come much closer. --Brett Glass, LARIAT.NET ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From BeauParker at singapore.com Wed Jul 5 19:13:51 2006 From: BeauParker at singapore.com (Beau Parker) Date: Thu, 6 Jul 2006 10:13:51 +0800 Subject: make a step inside gdki.pk for you to have it Message-ID: <04368089613436.DBD2344826@MCDX9X52> Still don’t know what a really successful trading day feels like? With this information you’ll enjoy your work a lot more! There is a clear buy signal for this stock. Grab your chance to get fast earnings with this new promising stock! Get GDKI.PK First Thing Today, This Is Going To Explode! Check out for Hot News! GOLDMARK INDUSTRIES (GDK I) CURRENT_PRICE: $4.75 GET IT NOW! Before we start with the profile of GD KI we would like to mention something very important: There is a Big PRR Campaign starting this week . And it will go all week so it would be best to get in now. Company Profile Goldmark Industries, specializes in the production and distribution of Music, Feature Fillms and Television entertainment for North America's most rapidly growing demographic, with a total consumer-based purchasing power of over 1 Trillion dollars: the Hip-Hop community. Current News Goldmark Industries, Inc. (GDKI - News) is excited to announce that the Company is embarking into a new business direction. The Company is making an aggressive move into the multi-billion-ddollar Urban Entertainment industry. The Hip-Hop Entertainment industry generates several billion dollars per year in product sales with an estimated consumer-based purchasing power well into the hundreds of bi||ions of dollars and topping over one trillion worldwide. Goldmark Industries is committed to providing the best in all forms of urban entertainment to the 45 Million Hip-Hop consumers in North Ameriica. Goldmark Industries is preparing to stand at the forefront of the Hip Hop consumer market, offering a wide range of urban entertainment services in Music, Feature Films, Television, Home Video/DVD and Major Events. As such, Goldmark is poised to build its management team by attracting seasoned professionals with extensive experience in this dynamically growing industry sector. The Company looks forward to announcing a string of exciting corporate developments over the next few days outlining management changes and project acquisitions. Goldmark Industries will be focusing on the following categories of Urban Entertainment: Music Production Goldmark Industries' music department is committed to discovering the world's most talented Hip-Hop & R&B aartists. Positioned to contribute to the success of the world's leading music production and distribution companies, Goldmark Industries has built a strong foundation for continual growth and achievement. With a visionary approach, high standards and a management team that attracts the most exciting and original artists of our time, Goldmark Industries is set to stand at the forefront of the Hip-Hop music community. Motion Picture Production Goldmark Industries' motion picture department specializes in the financing, production and distribution of feature films directed towards the urban community. Whether working with highly successful Hollywood executives or up-and-coming indepenndent filmmakers, Goldmark Industries is able to provide consulting and production services from the best in the business. Goldmark Industries aims to produce and distribute some 10-20 films a year, committed to matching the success of some of the leading production companies. Television Production Goldmark Industries' television department is positioned to become a leading force behind the financing, production, distribution and marketing of teleevision entertainment for the Hip-Hop community, including primetime series, telefilm and mini-series. Goldmark Industries is in the process of teaming up with some exciting television producers and networks worldwide, building a dynamic and powerful television production team that consistently proves to be the best in the business. For more information, check the company current news announced on July5. Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is GD KI Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade tomorrow! Go G DKI. This stock combines a no-hype situation with serious promises of a good rise. Don’t knock on wood – just learn to be a pro trader, and the rest will flow! From camera_lumina at hotmail.com Thu Jul 6 12:18:09 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 06 Jul 2006 15:18:09 -0400 Subject: [dave@farber.net: [IP] The Newbie's Guide to Detecting the NSA] In-Reply-To: <20060630124809.GQ26630@leitl.org> Message-ID: Yeah...WTF? Those taps were optical, and at the OC-N level. Layer 3 wasn't involved and IP traffic not re-routed through the NSA panopticon. In other words, NSA got an OPTICAL copy of the the optical signal and then sent that COPY into their own Intelligence Black Hole. Your packets never even knew that was going on. -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [dave at farber.net: [IP] The Newbie's Guide to Detecting the NSA] >Date: Fri, 30 Jun 2006 14:48:09 +0200 > >Which idiot would assume his specific location is excluded? Especially, >if it's a long-distance (transcontinental) link? > >----- Forwarded message from David Farber ----- > >From: David Farber >Date: Fri, 30 Jun 2006 08:40:08 -0400 >To: ip at v2.listbox.com >Subject: [IP] The Newbie's Guide to Detecting the NSA >X-Mailer: Apple Mail (2.752.2) >Reply-To: dave at farber.net > > > >Begin forwarded message: > >From: John Bartas >Date: June 30, 2006 3:38:22 AM EDT >To: dave at farber.net >Subject: The Newbie's Guide to Detecting the NSA > >Dave, > > This entry from the blog at wired.com might be good for the IP >list. The best part is at the end. Good old traceroute! >-------------------------------------------------------- >The Newbie's Guide to Detecting the NSA >http://blog.wired.com/27BStroke6/#1510938 ... "With that in mind, >here's the 27B Stroke 6 guide to detecting if your traffic is being >funneled into the secret room on San Francisco's Folsom street. If >you're a Windows user, fire up an MS-DOS command prompt. Now type >tracert followed by the domain name of the website, e-mail host, VoIP >switch, or whatever destination you're interested in. Watch as the >program spits out your route, line by line. C:\> tracert nsa.gov 1 2 >ms 2 ms 2 ms 12.110.110.204 [...] 7 11 ms 14 ms 10 ms >as-0-0.bbr2.SanJose1.Level3.net [64.159.0.218] 8 13 12 19 ms >ae-23-56.car3.SanJose1.Level3.net [4.68.123.173] 9 18 ms 16 ms 16 ms >192.205.33.17 10 88 ms 92 ms 91 ms tbr2-p012201.sffca.ip.att.net >[12.123.13.186] 11 88 ms 90 ms 88 ms tbr1-cl2.sl9mo.ip.att.net >[12.122.10.41] 12 89 ms 97 ms 89 ms tbr1-cl4.wswdc.ip.att.net >[12.122.10.29] 13 89 ms 88 ms 88 ms ar2-a3120s6.wswdc.ip.att.net >[12.123.8.65] 14 102 ms 93 ms 112 ms 12.127.209.214 15 94 ms 94 ms 93 >ms 12.110.110.13 16 * * * 17 * * * 18 * * In the above example, my >traffic is jumping from Level 3 Communications to AT&T's network in >San Francisco, presumably over the OC-48 circuit that AT&T tapped on >February 20th, 2003, according to the Klein docs. The magic string >you're looking for is sffca.ip.att.net. If it's present immediately >above or below a non-att.net entry, then -- by Klein's allegations -- >your packets are being copied into room 641A, and from there, >illegally, to the NSA. Of course, if Marcus is correct and AT&T has >installed these secret rooms all around the country, then any att.net >entry in your route is a bad sign. > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From rah at shipwright.com Thu Jul 6 15:21:17 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 6 Jul 2006 18:21:17 -0400 Subject: [Clips] The united states of total paranoia Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Thu, 6 Jul 2006 18:19:43 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] The united states of total paranoia Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Sunday Times July 02, 2006 The united states of total paranoia Jeremy Clarkson ::nobreak::I know Britain is full of incompetent water board officials and stabbed Glaswegians but even so I fell on my knees this morning and kissed the ground, because I've just spent three weeks trying to work in America. It's known as the land of the free and I'm sure it is if you get up in the morning, go to work in a petrol station, eat nothing but double-egg burgers - with cheese - and take your children to little league. But if you step outside the loop, if you try to do something a bit zany, you will find that you're in a police state. We begin at Los Angeles airport in front of an immigration official who, like all his colleagues, was selected for having no grace, no manners, no humour, no humanity and the sort of IQ normally found in farmyard animals. He scanned my form and noted there was no street number for the hotel at which I was staying. "I'm going to need a number," he said. "Ooh, I'm sorry," I said, "I'm afraid I don't have one." This didn't seem to have any effect. "I'm going to need a number," he said again, and then again, and then again. Each time I shrugged and stammered, terrified that I might be sent to the back of the queue or worse, into the little room with the men in Marigolds. But I simply didn't have an answer. "I'm going to need a number," he said again, giving the distinct impression that he was an autobank, and that this was a conversation he was prepared to endure until one of us died. So with a great deal of bravery I decided to give him one. And the number I chose was 2,649,347. This, it turned out, was fine. He'd been told by his superiors to get a number. I'd given him a number. His job was done and so, just an hour or so later, I was on the streets of Los Angeles doing a piece to camera. Except, of course, I wasn't. Technically you need a permit to film on every street in pretty well every corner of the world. But the only countries where this rule is enforced are Vietnam, Cuba, North Korea and the United States of America. So, seconds after breaking out the tripod, a policeman pulled up and demanded that we show him our permit. We had one that covered the city of Los Angeles . . . except the bit where we were. So we were moved on. The next day I was moved on in Las Vegas too because the permit I had didn't cover the part of the pavement I was standing on. Eight inches away was fine. You need a permit to do everything in America. You even need a passport to buy a drink. But interestingly you don't need one if you wish to rent some guns and some bullets. I needed a 50 cal (very big) machinegun. "No problem," said the man at the shop. "But could you just sign this assuring us that the movie you're making is not anti-Bush or anti-war." Also, you do not need a permit if you want - as I did - to transport a dead cow on the roof of your car through the Florida panhandle. That's because this is banned by a state law. Think about that. Someone has gone to all the bother and expense of drawing up a law that means that at some point lots of people were moving dead cows about on their cars. It must have been popular. Fashionable even. Anyway, back to the guns. I needed them because I wished to shoot a car in the Mojave desert. But you can't do that without the say-so of the local fire chief who turned up, with his haircut, to say that for reasons he couldn't explain, he had a red flag in his head. You find this a lot in America. People way down the food chain are given the power to say yes or no to elaborately prepared plans, just so their bosses can't be sued. One expression that simply doesn't translate from English in these days of power without responsibility is "Ooh, I'm sure it'll be fine". And, unfortunately, these people at the bottom of the food chain have no intellect at all. Reasoning with them is like reasoning with a tree. I think this is because people in the sticks have stopped marrying their cousins and are now mating with vegetables. They certainly aren't eating them. You see them growing in fields, but all you ever find on a menu is cheese, cheese, cheese, or cheese with cheese. Except for a steak and cheese sandwich I bought in Mississippi. This was made, according to the label, from "imitation cheese". Nope, I don't know what that is either but I do know that out of the main population centres, the potato people are getting fatter and dimmer by the minute. Today the average petrol pump attendant is capable, just, of turning on a pump when you prepay. But if you pay for two pumps to be turned on to fill two cars, you can, if you stare carefully, see wisps of smoke coming from her fat, useless, war losing, acne-scarred, gormless turnip face. And the awful thing is that you don't want the petrol anyway, because it'll simply get you to somewhere else, which will be worse. A point I shall prove next week when we have a look at what happened in Alabama. And why the poor of New Orleans will sue if the donation you make isn't as big as they'd hoped for. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Fri Jul 7 00:15:59 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 07 Jul 2006 00:15:59 -0700 Subject: Tongan Prince and Princess killed in Menlo Park traffic accident Message-ID: <6.2.1.2.0.20060706235746.033c78b8@pop.idiom.com> Prince Tu'ipelehake, his wife Princess Kaimana, and their driver were killed on a Menlo Park highway when hit by a drag racer. http://www.forbes.com/business/businesstech/feeds/ap/2006/07/06/ap2863297.html http://www.theage.com.au/news/World/Tonga-hit-by-death-of-peoples-prince/2006/07/07/1152240470161.html Meanwhile, the king is 88 and in bad health. From dave at farber.net Fri Jul 7 05:21:11 2006 From: dave at farber.net (David Farber) Date: Fri, 7 Jul 2006 08:21:11 -0400 Subject: [IP] more on CALEA - Final Rule Message-ID: Begin forwarded message: From zakaz at 363.ru Thu Jul 6 22:25:35 2006 From: zakaz at 363.ru (Galia) Date: Fri, 07 Jul 2006 08:25:35 +0300 Subject: Hallo... Message-ID: <004601c6a185$c1283d80$111a000a@dsl-MP-dynamic-234.241.246.61.airtelbroadband.in> Hello . I want to start my first letter from a question: "Is it possible to be happy without LOVE?" I think that you will agree with me if the answer will be "NO WAY". Love is the most beautiful and exciting thing that may happen between man and woman! It inspires us only for doing positive things towards each other. One very famous writer said: "The beauty will rescue the world" i agree with his words but still i would add : " LOVE and Beauty will rescure the world". I hope you agree with me that Love is a big notion. There's love to God, to Mother, to a child to the country where you were born, and there's love that joins a man and woman for all their life. That is the LOVE i'm looking for! And i'm seeking for the man who is also eager to have this life long adventure full of surprises and new experience we can share together! Will you join me for this trip? I do realise that it should be very difficult to say "Yes" from the first letter having no idea about me. That's why i just offer to get to know each other better though correspondence that will help us to reveal many things about each other whether we mach perfectly or not. In addition you can look at my pictures and read some info about me here http://foryou-mydestiny.com/ I hope you'll like what you see and read there. Well closing my first letter to you i just want to thank you for reading it and i really hope that you'll share my point of view on what i said above. I do really hope that you'll answer me soon. goodbye..... Galya S. From eugen at leitl.org Fri Jul 7 06:00:19 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Jul 2006 15:00:19 +0200 Subject: [dave@farber.net: [IP] more on CALEA - Final Rule] Message-ID: <20060707130019.GI26630@leitl.org> ----- Forwarded message from David Farber ----- From gregb at west-third.com Sat Jul 8 01:45:57 2006 From: gregb at west-third.com (Greg Brooks) Date: July 8, 2006 1:45:57 PM EDT Subject: [IP] more on FBI plans new Net-tapping push Message-ID: First they came for the big ISPs and I did not speak out because I used a little ISP and ran my own server. Then they came for the telcos and I did not speak out because I used VoIP. Then they came to my little ISP and I did not speak out because I could still encrypt some traffic and control my own firewall. Then they came for my router and there was no one left to securely ping back to me. (With a respectful nod to Pastor Martin Niemvller) ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From Dusty97 at %ANYDOMAIN.jfet.org Sat Jul 8 06:59:33 2006 From: Dusty97 at %ANYDOMAIN.jfet.org (Candace (unknown [68.19.178.162])) Date: Sat, 08 Jul 2006 07:59:33 -0600 Subject: cooltoad.com Message-ID: <8659550420.5140017383@as03.cooltoad.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $480,000 as low as 3.60% $390,000 as low as 3.90% $275,000 as low as 3.90% $125,000 as low as 3.89% Visit our site by clicking http://www.f72v.com Dusty Fenton Account Manager From eugen at leitl.org Sat Jul 8 01:37:51 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jul 2006 10:37:51 +0200 Subject: /. [The U.S.'s Net Wide For 'Terrorist' Names] Message-ID: <20060708083751.GB26630@leitl.org> Link: http://slashdot.org/article.pl?sid=06/07/07/1812240 Posted by: timothy, on 2006-07-07 19:45:00 Yesterday's report of [1]name-based blocking of money transfers as a result of U.S. Treasury policies intended to reduce the flow of money to Middle Eastern terrorists drew more than 800 comments. Western Union money transfers were at the heart of the linked Associated Press article, but as some of these comments point out, that's not the only case of interference in electronic financial transactions based on the names of the participants, akin to the use of the much-derided no-fly list. Read on for the Backslash summary of the conversation. Several readers concentrated not just on the undesirability of government snooping on money transfers in the first place, but on the unintended but likely side-effects of heavy-handed government oversight of conventional money-transfer methods; as the AP article explained, there are ways to route around large-scale commercial services like Western Union, including informal networks called "hundis" or "hawalas." Reader quantaman calls increased control on conventional money-transfer services "worse than useless," writing: "From what I can gather from the article this policy is actually harming security. ... If law abiding people are avoiding official institutions what makes them think that terrorists are stupid enough to use them? More than that, by driving additional people to the hawalas it circumvents existing security measures. For starters, it means that more money (even the legit stuff) is moving around and they have no idea where it went. Also the additional people using the hawalas will mean they are more developed for the terrorists [to] use them. Additionally, when you uncover a hawala network it will be that much harder to pick out the terrorists, since you've added all these false positives. And finally, for the terrorists who would have used official institutions in the past since it was easy and the hawalas weren't developed, now you no longer have a money trail you can inspect later on. All this security measure does is inconvenience and alientate a whole bunch of people while making the world a little less safe." No matter how legitimate the ends to which it will be put, high-handed interference with the transfer of money isn't popular for other reasons, too. Reader ColourlessGreenIdeas writes "I know of a charity that works with (mostly Christian) organisations in the West Bank. Their usual way of getting money to their partners is to fly into Israel with a [2]big bundle of money. Otherwise it tends to get massively delayed by U.S. banks." (And at least one reader points out reason to suspect that Western Union in particular might have been [3]willing to turn over information on its customers even in the absence of Treasury regulations.) The Treasury regulations on which the name-filtering is based are clearly imperfect, but not quite as simplistic as certain comments painted them. Responding to the claim in the AP article that "Western Union prevented [taxi driver Abdul Rahman Maruthayil] from sending $120 to a friend at home last month because the recipient's name was Mohammed," reader lecithin says "Not true. They prevented him from sending the cash [4]because his name was Sahir Mohammed. A bit of a difference. Perhaps a Sahir Mohammed has some links to 'bad guys'? Well, it happens here in the U.S. too. There are plenty of stories regarding people being put on the 'do not fly' list due to circumstances like this as well." Reader bwcarty, too, calls "FUD" on claims that the list is indiscriminant or exclusively targets those with Arab names, writing "I work for a division of a large financial firm, and we are [5]required to download a list of [6]Specially Designated Nationals from the Treasury Department and compare names from it against new accounts and transfers. The list includes lists of suspected terrorists, and they're not all Arabic (think Irish Republican Army)." Reader rhsanborn offers a similar account of the regulations and why they affect one-time transfers so significantly: "... They aren't blocking people because they have some generic Arab name. They are blocking people who have [7]names that match the Federal list of suspected terrorists. As someone mentioned above, something like Sahir Mohammed. Probably a perfect match for the list. We too have to run periodic checks against the names in that database. If a match comes up, we have people individually check other information to confirm that it is an actual match (e.g. same name, different birthday). We have open accounts with these people though, so we have a significant amount of time to deal with these. Western Union has a very short period of time because it is a one time transaction that happens relatively quickly." Several readers related personal experience with the no-fly list, and a few pointed out some of its better-known shortcomings, such as a [8]Soundex-based name database which has the potential to needlessly flag [9]passengers like Senator Ted Kennedy and the former Sex Pistol Johnny Lydon (though as dan828 points out, [10]Lydon has never actually been stopped because of the list). Many readers denounced as racist the use of common Arab names to justify interference in money transfers. One response to that claim comes from reader mrxak, who offers a more innocuous explanation, namely imperfect information and a limited pool of names, which will inevitably contain variations of commonly used names. Such a system, he argues, is therefore based on pragmatism -- [11]not necessarily racism." Arguing that a similar system would pose just as much risk for "John Smiths" on the list as for those with Arab names, mrxak concedes the need for "a better system," and asks "but what kind of system would work?" To this, reader eln had a ready answer: "Maybe a system where you [12]gather a little more information about suspected terrorists other than their name before throwing them on some sort of list that prevents anyone with that name from doing all sorts of normal tasks. ... [O]f all of the pieces of information that can be used to identify a person, his name is probably the one that's most easily falsified. So, instead of doing some actual police work and gathering some actual evidence against an actual person, we decide to cast a wide net, and end up catching a lot of innocent people while actually decreasing our chances of catching the actual bad guy." Jah-Wren Ryel's answer to the same question is more radical -- Ryel suggests that perhaps [13]"none at all" is the best approach. He asks "What makes you think that any system could work?" Rather than spending money on elaborate surveillance or other intelligence-gathering efforts, Ryel says, "spend it on emergency services instead. ... No matter how many tax dollars you throw at the problem, terrorism is a tactic that can not be fully countered." Rather than concentrating on the prevention of terrorist acts, he argues, the most intelligent use of resources is on "the infrastructure that minimizes the damage. Better hospitals, better fire departments, better 'first responder' teams. That way, we get the benefit of the money spent regardless of if a terrorist blows up a building or an earthquake knocks it down." The Israeli response to recurring attacks illustrates that these approaches may be in large part reconcilable; infrastructure improvements and intelligence gathering can certainly coexist, details of their implementation aside. The effectiveness of the pre-emptive side of any nation's approach to minimizing terrorist attacks, though, is slightly different from its approach to "fighting terror" in a broad sense. On that note, reader karlandtanya describes measures such as the U.S. policies subjecting what might otherwise be private financial transactions to automated scrutiny as "[14]effective, but still unfair," categorizing the use of name-based interference as what Bruce Schneier has described as "security theater." Karlandtanya writes, cynically, that in reaction to perceived security threats, "we present the appearance of security measures. Going overboard and causing outrage is just part of the salesmanship." To combat terror in a literal sense, he writes, "[t]he solution is, of course, the perception of security." _________________________________________________________________ Thanks to all the readers whose comments informed the conversation, in particular to those whose comments are quoted above. References 1. http://yro.slashdot.org/article.pl?sid=06/07/06/1610229&tid=98 2. http://yro.slashdot.org/comments.pl?cid=15668058&sid=190461&tid=98 3. http://yro.slashdot.org/comments.pl?cid=15668360&sid=190461&tid=98 4. http://yro.slashdot.org/comments.pl?cid=15667965&sid=190461&tid=98 5. http://yro.slashdot.org/comments.pl?cid=15668203&sid=190461&tid=98 6. http://www.ustreas.gov/offices/enforcement/ofac/sdn/sdnlist.txt 7. http://yro.slashdot.org/comments.pl?cid=15668462&sid=190461&tid=98 8. http://en.wikipedia.org/wiki/Soundex 9. http://slashdot.org/article.pl?sid=04/08/20/1244205&tid=103 10. http://yro.slashdot.org/comments.pl?cid=15668598&sid=190461&tid=98 11. http://yro.slashdot.org/comments.pl?cid=15668037&sid=190461&tid=98 12. http://yro.slashdot.org/comments.pl?cid=15668209&sid=190461&tid=98 13. http://yro.slashdot.org/comments.pl?cid=15668377&sid=190461&tid=98 14. http://yro.slashdot.org/comments.pl?cid=15668264&sid=190461&tid=98 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Bob2-19-0501 at bobf.frankston.com Sat Jul 8 11:17:46 2006 From: Bob2-19-0501 at bobf.frankston.com (Bob Frankston) Date: July 8, 2006 11:17:46 AM EDT Subject: [IP] FBI plans new Net-tapping push Message-ID: Doest his meant hat if I use a generic Linux box to write some routing or NAT software I must include an FBI module? Is it illegal for Cisco to provide open source LinkSys boxes? Given the attitude that the unexamined conversation is treason shouldnbt the FBI be looking into all calls made using walkie- talkies, between cordless phones, between extension phones? Are corporate PBXes exempted? Good thing that Bombay is now called Mumbai b otherwise think of all the conversations that would be flagged as dangerous. -----Original Message----- From: David Farber [mailto:dave at farber.net] Sent: Saturday, July 08, 2006 08:00 To: ip at v2.listbox.com Subject: [IP] FBI plans new Net-tapping push Begin forwarded message: From: Richard Forno Date: July 8, 2006 2:22:38 AM EDT To: Blaster Cc: Dave Farber Subject: FBI plans new Net-tapping push FBI plans new Net-tapping push By Declan McCullagh http://news.com.com/FBI+plans+new+Net-tapping+push/ 2100-1028_3-6091942.html Story last modified Fri Jul 07 18:55:01 PDT 2006 The FBI has drafted sweeping legislation that would require Internet service providers to create wiretapping hubs for police surveillance and force makers of networking gear to build in backdoors for eavesdropping, CNET News.com has learned. FBI Agent Barry Smith distributed the proposal at a private meeting last Friday with industry representatives and indicated it would be introduced by Sen. Mike DeWine, an Ohio Republican, according to two sources familiar with the meeting. The draft bill would place the FBIbs Net-surveillance push on solid legal footing. At the moment, itbs ensnared in a legal challenge from universities and some technology companies that claim the Federal Communications Commissionbs broadband surveillance directives exceed what Congress has authorized. The FBI claims that expanding the 1994 Communications Assistance for Law Enforcement Act is necessary to thwart criminals and terrorists who have turned to technologies like voice over Internet Protocol, or VoIP. bThe complexity and variety of communications technologies have dramatically increased in recent years, and the lawful intercept capabilities of the federal, state and local law enforcement community have been under continual stress, and in many cases have decreased or become impossible,b according to a summary accompanying the draft bill. Complicating the political outlook for the legislation is an ongoing debate over allegedly illegal surveillance by the National Security Administrationbpunctuated by several lawsuits challenging it on constitutional grounds and an unrelated proposal to force Internet service providers to record what Americans are doing online. One source, who asked not to be identified because of the sensitive nature of last Fridaybs meeting, said the FBI viewed this as a top congressional priority for 2007. Breaking the legislation down The 27-page proposed CALEA amendments seen by CNET News.com would: B7 Require any manufacturer of broutingb and baddressingb hardware to offer upgrades or other bmodificationsb that are needed to support Internet wiretapping. Current law does require that of telephone switch manufacturersbbut not makers of routers and network address translation hardware like Cisco Systems and 2Wire. B7 Authorize the expansion of wiretapping requirements to bcommercialb Internet services including instant messaging if the FCC deems it to be in the bpublic interest.b That would likely sweep in services such as in- game chats offered by Microsoftbs Xbox 360 gaming system as well. B7 Force Internet service providers to sift through their customersb communications to identify, for instance, only VoIP calls. (The language requires companies to adhere to bprocessing or filtering methods or procedures applied by a law enforcement agency.b) That means police could simply ask broadband providers like AT&T, Comcast or Verizon for wiretap infobinstead of having to figure out what VoIP service was being used. B7 Eliminate the current legal requirement saying the Justice Department must publish a public bnotice of the actual number of communications interceptionsb every year. That notice currently also must disclose the bmaximum capacityb required to accommodate all of the legally authorized taps that government agencies will bconduct and use simultaneously.b Jim Harper, a policy analyst at the free-market Cato Institute and member of a Homeland Security advisory board, said the proposal would bhave a negative impact on Internet usersb privacy.b bPeople expect their information to be private unless the government meets certain legal standards,b Harper said. bRight now the Department of Justice is pushing the wrong way on all this.b Neither the FBI nor DeWinebs office responded to a request for comment Friday afternoon. DeWine has relatively low approval ratings--47 percent, according to SurveyUSA.comband is enmeshed in a fierce battle with a Democratic challenger to retain his Senate seat in the November elections. DeWine is a member of a Senate Judiciary subcommittee charged with overseeing electronic privacy and antiterrorism enforcement and is a former prosecutor in Ohio. A panel of the U.S. Court of Appeals in Washington, D.C., decided 2-1 last month to uphold the FCCbs extension of CALEA to broadband providers, and itbs not clear what will happen next with the lawsuit. Judge Harry Edwards wrote in his dissent that the majoritybs logic gave the FCC bunlimited authority to regulate every telecommunications service that might conceivably be used to assist law enforcement.b The organizations behind the lawsuit say Congress never intended CALEA to force broadband providersband networks at corporations and universitiesbto build in central surveillance hubs for the police. The list of organizations includes Sun Microsystems, Pulver.com, the American Association of Community Colleges, the Association of American Universities and the American Library Association. If the FBIbs legislation becomes law, it would derail the lawsuit because there would no longer be any question that Congress intended CALEA to apply to the Internet. You are subscribed as BobIP at Bobf.Frankston.com To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting- people/ ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From hughhyatt at bluehen.udel.edu Sat Jul 8 11:37:01 2006 From: hughhyatt at bluehen.udel.edu (Hugh D. Hyatt) Date: July 8, 2006 11:37:01 AM EDT Subject: [IP] FBI plans new Net-tapping push Message-ID: For IP, if you wish.... David Farber is alleged to have written, on or about 08-Jul-06 08:00: >Begin forwarded message: >From: Richard Forno >Date: July 8, 2006 2:22:38 AM EDT >To: Blaster >Cc: Dave Farber >Subject: FBI plans new Net-tapping push >FBI plans new Net-tapping push >By Declan McCullagh >http://news.com.com/FBI+plans+new+Net-tapping+push/ >2100-1028_3-6091942.html [snip] >b" Eliminate the current legal requirement saying the Justice >Department must publish a public "notice of the actual number of >communications >interceptions" every year. That notice currently also must disclose >the >"maximum capacity" required to accommodate all of the legally >authorized >taps that government agencies will "conduct and use simultaneously." This would eliminate the public's ability to learn interesting and important facts like those published here (also by Mr McCullagh): http://speakout.com/activism/opinions/4377-1.html. For example, "According to government statistics, in 1998 police intercepted 2,313,210 conversations but the taps -- 71% were for drug-related crimes -- resulted in only 911 convictions." Was that a reasonable trade-off between security and freedom? And how else can we, the people, make such judgments without having facts like these? -- Hugh D. Hyatt Bryn Athyn, PA The condition upon which God hath given liberty to man is eternal vigilance; which condition if he break, servitude is at once the consequence of his crime, and the punishment of his guilt. -- John Philpot Curran ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From lauren at vortex.com Sat Jul 8 11:44:16 2006 From: lauren at vortex.com (Lauren Weinstein) Date: July 8, 2006 11:44:16 AM EDT Subject: [IP] FBI plans new Net-tapping push Message-ID: Dave, Data retention laws. Purpose-built voice and data wiretapping capabilities in communications gear. A sharp salute to the masters of the Black Chamber, with terrorism and child abuse the rhetorical keys to creating the pervasive surveillance society. But there's a piece missing. Crypto controls of course! Despite their fundamental impracticality, laws prohibiting, controlling, or penalizing the use of "untappable" crypto will be increasingly enticing to the powers-that-be. For of what use is all that extremely expensive wiretapping capability if you can't interpret the damned bits? Such control laws would of course trigger a vast escalation in the crypto "arms race" -- with ever more emphasis on steganographic and other message obscuring techniques. Innocents will have their personal and business privacy eviscerated, while the truly evil will plunge deeper from view, with knee-jerk reactions pulling our basic liberties down the rathole as well. After all, even the road to "1984" was paved with good intentions. Indeed, "He loved Big Brother." --Lauren-- Lauren Weinstein lauren at vortex.com or lauren at pfir.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, IOIC - International Open Internet Coalition - http://www.ioic.net Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com DayThink: http://daythink.vortex.com - - - > >Begin forwarded message: > >From: Richard Forno >Date: July 8, 2006 2:22:38 AM EDT >To: Blaster >Cc: Dave Farber >Subject: FBI plans new Net-tapping push > >FBI plans new Net-tapping push > >By Declan McCullagh >http://news.com.com/FBI+plans+new+Net-tapping+push/ >2100-1028_3-6091942.html > >Story last modified Fri Jul 07 18:55:01 PDT 2006 > >The FBI has drafted sweeping legislation that would require Internet >service >providers to create wiretapping hubs for police surveillance and force >makers of networking gear to build in backdoors for eavesdropping, >CNET >News.com has learned. > >FBI Agent Barry Smith distributed the proposal at a private meeting >last >Friday with industry representatives and indicated it would be >introduced by >Sen. Mike DeWine, an Ohio Republican, according to two sources >familiar with >the meeting. > >The draft bill would place the FBI's Net-surveillance push on solid >legal >footing. At the moment, it's ensnared in a legal challenge from >universities >and some technology companies that claim the Federal Communications >Commission's broadband surveillance directives exceed what Congress >has >authorized. > >The FBI claims that expanding the 1994 Communications Assistance >for Law >Enforcement Act is necessary to thwart criminals and terrorists who >have >turned to technologies like voice over Internet Protocol, or VoIP. > >"The complexity and variety of communications technologies have >dramatically >increased in recent years, and the lawful intercept capabilities of >the >federal, state and local law enforcement community have been under >continual >stress, and in many cases have decreased or become impossible," >according to >a summary accompanying the draft bill. > >Complicating the political outlook for the legislation is an ongoing >debate >over allegedly illegal surveillance by the National Security >Administration--punctuated by several lawsuits challenging it on >constitutional grounds and an unrelated proposal to force Internet >service >providers to record what Americans are doing online. One source, who >asked >not to be identified because of the sensitive nature of last Friday's >meeting, said the FBI viewed this as a top congressional priority for >2007. > >Breaking the legislation down >The 27-page proposed CALEA amendments seen by CNET News.com would: > >b" Require any manufacturer of "routing" and "addressing" hardware to >offer >upgrades or other "modifications" that are needed to support Internet >wiretapping. Current law does require that of telephone switch >manufacturers--but not makers of routers and network address >translation >hardware like Cisco Systems and 2Wire. > >b" Authorize the expansion of wiretapping requirements to "commercial" >Internet services including instant messaging if the FCC deems it to >be in >the "public interest." That would likely sweep in services such as in- >game >chats offered by Microsoft's Xbox 360 gaming system as well. > >b" Force Internet service providers to sift through their customers' >communications to identify, for instance, only VoIP calls. (The >language >requires companies to adhere to "processing or filtering methods or >procedures applied by a law enforcement agency.") That means police >could >simply ask broadband providers like AT&T, Comcast or Verizon for >wiretap >info--instead of having to figure out what VoIP service was being >used. > >b" Eliminate the current legal requirement saying the Justice >Department must >publish a public "notice of the actual number of communications >interceptions" every year. That notice currently also must disclose >the >"maximum capacity" required to accommodate all of the legally >authorized >taps that government agencies will "conduct and use simultaneously." > >Jim Harper, a policy analyst at the free-market Cato Institute and >member of >a Homeland Security advisory board, said the proposal would "have a >negative >impact on Internet users' privacy." > >"People expect their information to be private unless the government >meets >certain legal standards," Harper said. "Right now the Department of >Justice >is pushing the wrong way on all this." > >Neither the FBI nor DeWine's office responded to a request for comment >Friday afternoon. > >DeWine has relatively low approval ratings--47 percent, according to >SurveyUSA.com--and is enmeshed in a fierce battle with a Democratic >challenger to retain his Senate seat in the November elections. >DeWine is a >member of a Senate Judiciary subcommittee charged with overseeing >electronic >privacy and antiterrorism enforcement and is a former prosecutor in >Ohio. > >A panel of the U.S. Court of Appeals in Washington, D.C., decided 2-1 >last >month to uphold the FCC's extension of CALEA to broadband >providers, and >it's not clear what will happen next with the lawsuit. Judge Harry >Edwards >wrote in his dissent that the majority's logic gave the FCC "unlimited >authority to regulate every telecommunications service that might >conceivably be used to assist law enforcement." > >The organizations behind the lawsuit say Congress never intended >CALEA to >force broadband providers--and networks at corporations and >universities--to >build in central surveillance hubs for the police. The list of >organizations >includes Sun Microsystems, Pulver.com, the American Association of >Community >Colleges, the Association of American Universities and the American >Library >Association. > >If the FBI's legislation becomes law, it would derail the lawsuit >because >there would no longer be any question that Congress intended CALEA to >apply >to the Internet. > > > ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From lesa at internet-top.com Sat Jul 8 08:42:43 2006 From: lesa at internet-top.com (Carlene Buckley) Date: Sat, 8 Jul 2006 12:42:43 -0300 Subject: Massive PE patch sale Message-ID: <200607080942.k689g8BJ015210@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1118 bytes Desc: not available URL: From dave at farber.net Sat Jul 8 10:22:20 2006 From: dave at farber.net (David Farber) Date: Sat, 8 Jul 2006 13:22:20 -0400 Subject: [IP] more on fbi plans new Net-tapping push Message-ID: Begin forwarded message: From dave at farber.net Sat Jul 8 10:22:47 2006 From: dave at farber.net (David Farber) Date: Sat, 8 Jul 2006 13:22:47 -0400 Subject: [IP] more on FBI plans new Net-tapping push Message-ID: Begin forwarded message: From dave at farber.net Sat Jul 8 11:01:45 2006 From: dave at farber.net (David Farber) Date: Sat, 8 Jul 2006 14:01:45 -0400 Subject: [IP] more on FBI plans new Net-tapping push Message-ID: Begin forwarded message: From dave at farber.net Sat Jul 8 11:24:37 2006 From: dave at farber.net (David Farber) Date: Sat, 8 Jul 2006 14:24:37 -0400 Subject: [IP] more on FBI plans new Net-tapping push Message-ID: Begin forwarded message: From mckelleyas at brendanpower.com Sat Jul 8 08:34:15 2006 From: mckelleyas at brendanpower.com (Marco) Date: Sat, 08 Jul 2006 14:34:15 -0100 Subject: things looking up Message-ID: heya, any chance you are still looking on getting medications for your discomfort, come by http://www.leanerwaytogo.com/kc/ straightforward. forgot, they also got the economical pricing. now hardened to fatigue and accustomed to react long ugly hikes, girl to assist wind present was beyond scarf my capability. as Lys invite called it. Neither Eddie men nor women wore any sort Marco From rah at shipwright.com Sat Jul 8 13:48:37 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 8 Jul 2006 16:48:37 -0400 Subject: [Clips] Students cry foul over cell phone policy Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 8 Jul 2006 16:45:50 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Students cry foul over cell phone policy Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com MetroWest Daily News Students cry foul over cell phone policy: Teens say officials are 'overreacting' and violating their privacy By Eric Athas/ Daily News Correspondent Saturday, July 8, 2006 - Updated: 02:04 PM EST FRAMINGHAM -- Fearing their wireless freedom may be in jeopardy, students at Framingham High School were fuming over a new school policy that allows administrators to seize cell phones and search their contents. School searches Principals claim right to search cell phones The policy, administrators say, is to improve security and stop the sale of drugs and stolen goods, but students said that the edict is an invasion of privacy. "It's not anyone's business what is in students' cell phones," said Demitriy Kozlov, who will be a senior in September. "If they think someone's dealing a pound of coke or pot, then there is a reason to, but that doesn't happen here." Kozlov said he believes administrators are overreacting and making the school appear more troublesome than it actually is. School officials "reserve the right to look through the cell phone," when they suspect a student has drugs or stolen goods, according to Principal Michael Welch. "People shouldn't get power based on suspicions, people should be considered innocent until proven guilty," said senior Adam Goldberg. "It feels like our rights are stripped away when we walk through the doors." Scott Siegal is a senior at Newton South High School, where Welch was principal before going to Framingham, and said there is a major difference in Newton South and Framingham's policies. "We have an open campus at Newton South, and it seems like (Welch) is making things stricter at Framingham," said Siegal, who was a sophomore when Welch was the principal at Newton South. "We would never have had a policy like this." The rule complies with federal law, which says a school can conduct searches when there is "reasonable suspicion" that a student has contraband. "It's kind of ridiculous," said Dayna Green, who recently graduated from Framingham, and is headed to Fitchburg State College in September. "They try to make us feel independent, but then they invade our privacy." The cell phone policy is not the only change at Framingham: Staff will be required to wear identification badges at school. That move is an attempt to keep track of people who should not be on school property. Green said the policy will only make students feel uncomfortable, and will not stop students from breaking the rules. "I think it is more of a scare tactic," she said. "Something bad is going to happen everywhere." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sat Jul 8 10:25:18 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jul 2006 19:25:18 +0200 Subject: [dave@farber.net: [IP] more on fbi plans new Net-tapping push] Message-ID: <20060708172518.GQ26630@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Sat Jul 8 10:25:36 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jul 2006 19:25:36 +0200 Subject: [dave@farber.net: [IP] more on FBI plans new Net-tapping push] Message-ID: <20060708172536.GR26630@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Sat Jul 8 11:11:39 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jul 2006 20:11:39 +0200 Subject: [dave@farber.net: [IP] more on FBI plans new Net-tapping push] Message-ID: <20060708181139.GU26630@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Sat Jul 8 11:33:24 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jul 2006 20:33:24 +0200 Subject: [dave@farber.net: [IP] more on FBI plans new Net-tapping push] Message-ID: <20060708183324.GW26630@leitl.org> ----- Forwarded message from David Farber ----- From jon at pgp.com Sun Jul 9 05:56:15 2006 From: jon at pgp.com (Jon Callas) Date: July 9, 2006 5:56:15 PM EDT Subject: [IP] more on FBI plans new Net-tapping push Message-ID: Brian Randell said: > >Just because the government *claims* it can't break a given >code ... :-) > I realize that there was a smiley face at the end of this, and I might be showing humorlessness about this, but this concerns my profession in general, and my software in particular. Consequently, I have no choice but to comment on this remark. Modern cryptographic systems are essentially unbreakable, particularly if an adversary is restricted to intercepts. We have argued for, designed, and built systems with 128 bits of security precisely because they are essentially unbreakable. It is very easy to underestimate the power of exponentials. 2^128 is a very big number. Burt Kaliski first came up with this characterization, and if he had a nickel for every time I tell it, he could buy a latte or three. Imagine a computer that is the size of a grain of sand that can test keys against some encrypted data. Also imagine that it can test a key in the amount of time it takes light to cross it. Then consider a cluster of these computers, so many that if you covered the earth with them, they would cover the whole planet to the height of 1 meter. The cluster of computers would crack a 128-bit key on average in 1,000 years. If you want to brute-force a key, it literally takes a planet-ful of computers. And of course, there are always 256-bit keys, if you worry about the possibility that government has a spare planet that they want to devote to key-cracking. Now of course, there are other ways to break the system. They could know something we don't. They could know some fundamental truth about mathematics (like how to factor really fast), some effective form of symmetric cryptanalysis, or something else. They could know about quantum computers, DNA computers, systems based upon non-Einsteinian physics, and so on. Yes, it's possible. But this quickly gets into true paranoid thought. There isn't a lot of difference between the *presumption* that they have such things and the presumption that they have aliens in a vault in Nevada. It isn't falsifiable. It gets irrational quickly. The evidence that we have about this suggests quite the opposite, but more on that later. They could have something we don't. For example, they could know about software flaws in my or other people's computer systems. Yes, that's possible, too. At PGP Corporation, we guard against this by making our software available to people for their examination. Approximately 2,000 people per month do that. If you want to be one of them, go to and look at it yourself. While you're at it, take a look at our quality assurance letter at . They could be hacking people's systems. This is a much more reasonable worry. If I were going to be doing this, it's what I would do. The state of computer operational security is such that it makes much more sense to invest time, money, and effort into rootkits than into cryptanalysis. However, there are things that we know that they *are* doing. One of them is relevant to this particular case. That is work on cracking the passphrases that people use to protect their keys. The cryptography we're using is itself uncrackable, but about 2/3 of the people in the world use a password (not even a passphrase) that directly relates to a pet or loved one. The order of frequency seems to be pets (living or dead), then children, then ex-loves. We know that at least one government has a password cracker that is based upon building a psychometric model of person who owns the key and constructing passphrases on that model. If you're a Hollywood private eye and they seize your computer and find on it that you're a basketball fan from your browser cache, then "Lak3rz 4 Teh w1n!" is actually a very bad passphrase. Don't blame me when they find it in about two minutes. It isn't just government that does this, either. Companies such as Access Data and Elcomsoft have distributed password crackers. These things aren't hacking the crypto, they're hacking the mind using the crypto. My old friend and colleague, Drew Gross, who is a forensics expert, has said, "I love crypto; it tells me what part of the system not to bother attacking." The last bit of evidence we have that suggests that they can't break the crypto is that they are apparently devoting a lot of effort to traffic analysis. Look at what we've learned in the last few months. Listening for keywords is so twentieth century. They're looking at call patterns, message flow, and so on. I could go on about this for a long time, but it's a tangent from this. If you're interested in more, I am going to be leading a panel at Defcon this August on traffic analysis. Come liven up the discussion. Jon -- Jon Callas CTO, CSO PGP Corporation Tel: +1 (650) 319-9016 3460 West Bayshore Fax: +1 (650) 319-9001 Palo Alto, CA 94303 PGP: ed15 5bdf cd41 adfc 00f3 USA 28b6 52bf 5a46 bc98 e63d ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From karn at ka9q.net Sun Jul 9 09:24:17 2006 From: karn at ka9q.net (Phil Karn) Date: July 9, 2006 9:24:17 AM EDT Subject: [IP] more on FBI plans new Net-tapping push Message-ID: David Farber wrote: >But there's a piece missing. Crypto controls of course! This is of course possible, and it's a bit surprising that this other shoe has not yet fallen so long after 9/11. But consider that any push to regulate or restrict strong crypto would: 1. Draw widespread public attention to the fact that the government cannot break it; 2. Be totally ineffectual since crypto is so widely available from so many places in the world; 3. Go against the strongly stated public positions of many conservative Republicans during the "crypto wars" of the mid 1990s, when, coincidentally, Clinton was in office and pushing the Clipper Chip; 4. Be totally ignored by precisely those people whom the government is supposedly most interested in targeting; and 5. Be mostly irrelevant to what the spooks actually do when they vacuum up electronic communications, namely traffic analysis (who talks to who, when, where and how much) rather than acquiring actual content. Content takes too much effort to analyze (and possibly translate), even when it's in the clear. Traffic analysis can be done automatically on a huge scale, and it can be frighteningly effective. As an aside, I note that not much attention has been paid to the "where" part of communications. Cell phones -- even when they're not in calls -- make excellent physical tracking devices. Not even secure end-to-end encryption can change that. It's inherent in how they work. I have no actual information on this, but based on my knowledge of the technology and ongoing revelations of the government's insatiable appetite for data on non-citizens and citizens alike, I confidently predict that the next big revelation in the ongoing saga of massive government data-mining will involve mobile phone registrations. These are the short "I'm here and ready for a call" data messages that all mobile phones transmit every few minutes whenever they're on and idle. Even without GPS for augmented E911 positioning, registrations tell what cell sector you're in. These sectors can be quite small (a few blocks) in densely populated areas. At the very least, they're certainly sufficient to tell what country and city you're in. --Phil ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From DSwee34359 at aol.com Sun Jul 9 12:27:08 2006 From: DSwee34359 at aol.com (DSwee34359 at aol.com) Date: July 9, 2006 12:27:08 PM PDT Subject: [Dewayne-Net] America's robot army Message-ID: Good piece, I have been following such developments from a distance for some time, and in fact I won a journalism award for a piece I composed four years ago on this subject. One begins to understand if not approve the actions of moralistic atomic traitors like Ted Hall who gave away atomic secrets because they sincerely believed that no one nation should command such power. Unless one believes that the intentions of the current and future conservative administrations in Washington are wholly benign in the developing world, one cannot but shudder to contemplate Robocop writ large. For those for whom the power motive is paramount the thought of such weapons systems must be as intoxicating as a blast of methamphetamine. For not only can military omniscience provide the basis for annihilating force projection against foreign insurgents, it can offer the means of utterly neutralizing principled political opposition at home. That such technology will not be used in that matter is hardly certain in the light of recent NSA abuses. There is however, some reason to believe that the nation may be roused from this particular wet dream before reaching climax. The manufacture of semiconductors has already fled abroad to nations not disposed to favor such an expansion of U.S. military capabilities, and increasingly the design of semiconductors is fleeing to the same places. The relatively small size of the U.S. engineering community compared to those of certain Asian nations might also work against such a profound military asymmetry ultimately occurring. In other words, the U.S. might be losing the technology base to support such a grand scheme. Imagine if a Dominion Theology regime ascended to power in Washington and thought to utilize armies of Golem against the infidel. The ironies are profound. Daniel Sweeney Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Sun Jul 9 04:12:37 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Jul 2006 13:12:37 +0200 Subject: /. [Cracking the GPS Galileo Satellite] Message-ID: <20060709111237.GH26630@leitl.org> Link: http://slashdot.org/article.pl?sid=06/07/09/050219 Posted by: ScuttleMonkey, on 2006-07-09 09:49:00 [1]Glyn writes "Newswise is reporting the the [2]encryption in the Galileo GPS signal has been broken. The pseudo random number generator used to obscure the information stored in the Galileo GPS signal has been broken. From the article: 'Members of Cornell's Global Positioning System (GPS) Laboratory have cracked the so-called pseudo random number (PRN) codes of Europe's first global navigation satellite, despite efforts to keep the codes secret. That means free access for consumers who use navigation devices -- including handheld receivers and systems installed in vehicles -- that need PRNs to listen to satellites.'" References 1. http://www.backandlay.com/ 2. http://www.newswise.com/articles/view/521790/?sc=rsla ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dave at farber.net Sun Jul 9 13:49:10 2006 From: dave at farber.net (David Farber) Date: Sun, 9 Jul 2006 16:49:10 -0400 Subject: [IP] more on FBI plans new Net-tapping push Message-ID: Begin forwarded message: From dewayne at warpspeed.com Sun Jul 9 18:23:01 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Sun, 9 Jul 2006 18:23:01 -0700 Subject: [Dewayne-Net] re: America's robot army Message-ID: [Note: This comment comes from reader Dan Sweeney. DLH] From dave at farber.net Mon Jul 10 03:04:17 2006 From: dave at farber.net (David Farber) Date: Mon, 10 Jul 2006 06:04:17 -0400 Subject: [IP] on crypto systems from CTO PGP Message-ID: Begin forwarded message: From eugen at leitl.org Sun Jul 9 23:24:13 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jul 2006 08:24:13 +0200 Subject: [dave@farber.net: [IP] more on FBI plans new Net-tapping push] Message-ID: <20060710062413.GP26630@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Sun Jul 9 23:59:41 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jul 2006 08:59:41 +0200 Subject: [dewayne@warpspeed.com: [Dewayne-Net] re: America's robot army] Message-ID: <20060710065941.GS26630@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From btm at templetons.com Mon Jul 10 12:06:08 2006 From: btm at templetons.com (Brad Templeton) Date: July 10, 2006 12:06:08 PM EDT Subject: [IP] on crypto systems from CTO PGP Message-ID: On Mon, Jul 10, 2006 at 06:04:17AM -0400, David Farber wrote: >Modern cryptographic systems are essentially unbreakable, >particularly if an adversary is restricted to intercepts. We have >argued for, designed, and built systems with 128 bits of security >.... >If you want to brute-force a key, it literally takes a planet-ful of >... >They could know something we don't. They could know some fundamental >truth about mathematics (like how to factor really fast), some >effective form of symmetric cryptanalysis, or something else. They >could know about quantum computers, DNA computers, systems based upon While it is also a non-scientific statement, this history of "unbreakable" cryptography is checkered. Significant numbers of systems judged unbreakable using the thinking of the day have ended up having flaws. Some claims of unbreakability also fell victim to the unexpected push of Moore's law (such as DES, which we at the EFF demonstrated the crackability of many years ago.) One of my favourite charts at a crypto conference did a graph between the predicted lifetime of cryptosystems (often expressed, in terms of tens of thousands of years, or now lifetimes of the universe) and the actual lifetime under unanticipated cryptanalysis techniques. It was meant to be an amusement but it looked like a real trend. 2^128 will not be readily brute-forced with the technology we envision today. The point is that most of these systems were not broken with the technology (and other aspects of cryptanalysis) we know today. Each flaw found in a cryptosystem makes our next system stronger, of course, but it's very risky to say we've found the last flaw, discovered the last breakthrough in cryptanalysis. As for quantum computing, a classmate of mine has endowed a center for quantum computing at Waterloo, using his RIM money. I asked him recently how many q-bits they could do, he told me they had classified the answer. That could mean they are being overly paranoid in their classifications (quite likely) or that they have classified it because they wonder if the future answer will be military level, or if they have classified it just to keep people wondering. But one can't help but wonder. All this said, I feel pretty confident in our modern systems. But not enough to say essentially unbreakable. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Jul 10 03:18:58 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jul 2006 12:18:58 +0200 Subject: [dave@farber.net: [IP] on crypto systems from CTO PGP] Message-ID: <20060710101858.GZ26630@leitl.org> ----- Forwarded message from David Farber ----- From dave at farber.net Mon Jul 10 09:33:45 2006 From: dave at farber.net (David Farber) Date: Mon, 10 Jul 2006 12:33:45 -0400 Subject: [IP] more on on crypto systems from CTO PGP Message-ID: Begin forwarded message: From emc at artifact.psychedelic.net Mon Jul 10 13:31:44 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Mon, 10 Jul 2006 13:31:44 -0700 (PDT) Subject: [dave@farber.net: [IP] on crypto systems from CTO PGP] In-Reply-To: <20060710101858.GZ26630@leitl.org> Message-ID: <200607102031.k6AKVifn020358@artifact.psychedelic.net> Jon Callas wrote: > Imagine a computer that is the size of a grain of sand that can test > keys against some encrypted data. Also imagine that it can test a key > in the amount of time it takes light to cross it. Then consider a > cluster of these computers, so many that if you covered the earth > with them, they would cover the whole planet to the height of 1 > meter. The cluster of computers would crack a 128-bit key on average > in 1,000 years. The error in this argument is the assumption that the computers aren't all partially replicating each others computations. > If you want to brute-force a key, it literally takes a planet-ful of > computers. And of course, there are always 256-bit keys, if you worry > about the possibility that government has a spare planet that they > want to devote to key-cracking. Suppose I give you one NAND gate, and ask you to build an encryption function that inputs 64 bits of data and 256 bits of key, and outputs 64 bits of data. Couldn't build a very complicated one, could you? Wouldn't take a very big computer to sweep the entire 256 bit key space, as long as you did no redundant computation. Now suppose I give you ten NAND gates. Now you can build a more complicated encryption function. Nonetheless, it is still greatly limited with regard to what it does with each of the the 2^256 keys being different from what it does with the others. Sweeping the key space is still practically instantaneous, as long as you don't do redundant computation. Now suppose I give you 100,000 NAND gates. Now you can build a really complicated encryption function, that passes all the tests of whether encryption functions are good. But the number of ways you can hook even 100,000 gates together is a small drop in the bucket compared to the confusion and diffusion necessary to make all 2^256 permutations on 2^64 integers truly statistically independent of one another. How fast can I sweep the key space now, modding out redundant computation? An interesting question you would do well to ponder. Many things that take a long time in the domain of data, happen quite speedily if you do them by transformations in the domain of the function representation. > Now of course, there are other ways to break the system. > They could know something we don't. You think? > They could know some fundamental > truth about mathematics (like how to factor really fast), some > effective form of symmetric cryptanalysis, or something else. They > could know about quantum computers, DNA computers, systems based upon > non-Einsteinian physics, and so on. Yes, it's possible. But this > quickly gets into true paranoid thought. There isn't a lot of > difference between the *presumption* that they have such things and > the presumption that they have aliens in a vault in Nevada. It isn't > falsifiable. It gets irrational quickly. The evidence that we have > about this suggests quite the opposite, but more on that later. There are an unlimited number of surprising algorithms whose direct derivation lies just beyond the range of human ingenuity. This is why we have Experimental Mathematics and other techniques for grepping the fabric of reality for things we could never figure out on our own through a random walk of the solution space. > The last bit of evidence we have that suggests that they can't break > the crypto is that they are apparently devoting a lot of effort to > traffic analysis. I'd bet money the NSA has been able to crack RSA since 1996. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From eugen at leitl.org Mon Jul 10 08:28:59 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jul 2006 17:28:59 +0200 Subject: offshore Message-ID: <20060710152859.GP26630@leitl.org> Any of you ever opened a bank account in Singapore? If yes, please contact me offlist. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Jul 10 09:39:17 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jul 2006 18:39:17 +0200 Subject: [dave@farber.net: [IP] more on on crypto systems from CTO PGP] Message-ID: <20060710163917.GV26630@leitl.org> ----- Forwarded message from David Farber ----- From gnu at toad.com Mon Jul 10 05:11:42 2006 From: gnu at toad.com (gnu at toad.com) Date: Mon, 10 Jul 2006 20:11:42 +0800 Subject: Mail System Error - Returned Mail Message-ID: <200607101211.k6ACBo7g003623@proton.jfet.org> The original message was included as attachment [demime 1.01d removed an attachment of type application/octet-stream which had a name of bmywli.zip] From dewayne at warpspeed.com Tue Jul 11 16:34:38 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Tue, 11 Jul 2006 16:34:38 -0700 Subject: [Dewayne-Net] SF reviews contracts with AT&T over domestic spying Message-ID: AP NewsBreak: SF reviews contracts with AT&T over domestic spying - By SCOTT LINDLAW, Associated Press Writer Tuesday, July 11, 2006 (07-11) 14:02 PDT San Francisco (AP) -- City officials are investigating AT&T's alleged cooperation with the National Security Agency and considering possible "consequences" the company could face in its extensive municipal contracts here if it is violating civil liberties, Mayor Gavin Newsom said Tuesday. "If what I'm reading is true, I've got some serious problems as a San Franciscan, as a taxpayer and as mayor," Newsom said in interview with The Associated Press. "And I don't like it." A federal lawsuit filed by Internet privacy advocate Electronic Frontier Foundation accuses the telecommunications giant of illegally cooperating with the NSA to make communications on AT&T networks available to the spy agency without warrants. According to the lawsuit, AT&T allowed the NSA to install data.m.ining equipment in secret rooms at AT&T offices in San Francisco and a handful of other cities. Last month, the government urged a federal judge to dismiss the suit, saying it threatens to reveal state secrets. The judge's decision is pending. Newsom said he has asked City Attorney Dennis Herrera to conduct "fact-finding" on the matter. But the mayor also said he has completed his own compilation of "all of our current business relationships the city has with AT&T." That review, which includes expiration dates and other obligations, "may be suggestive that if we conclude that this is sincerely problematic, there may be a desire to not just make a symbolic statement of opposition, but to make a substantive one." The mayor said he did not know the value of AT&T's contracts with San Francisco. Nor would he provide a timetable for completion of the city attorney's probe. "I recognize the ability, (from) a local perspective, to perhaps have a little more influence because we do have a strong relationship with AT&T and I'd like to continue that," he said. "But I also think it's a two-way street," Newsom said. "If you're going do business with us, and San Francisco always has, we say, please help represent the values of the people that are actually purchasing those goods and services, meaning the taxpayers of this city." The city attorney probably has the power to subpoena, Newsom said, adding that he did not know for sure. If true, that would mean the city might have the power to learn details of the program that have not been publicly disclosed. [snip] URL: Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From Terrence32 at cooltoad.com Wed Jul 12 04:24:00 2006 From: Terrence32 at cooltoad.com (Frederic) Date: Wed, 12 Jul 2006 03:24:00 -0800 Subject: cooltoad.com Message-ID: <4992605630.0542079064@as01.cooltoad.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $500,000 as low as 3.65% $375,000 as low as 3.85% $250,000 as low as 3.85% $125,000 as low as 3.89% Visit our site by clicking http://www.f72v.com Terrence Solomon Account Manager From JulianLake at maggiewebber.com Wed Jul 12 01:18:30 2006 From: JulianLake at maggiewebber.com (Basil Dove) Date: Wed, 12 Jul 2006 04:18:30 -0400 Subject: Fwd: Replica Watches for you! Message-ID: <2633432.9360@maggiewebber.com> (at least, as long as the preparer of the online book followed Web standards.) Let me know of any books described as "HTML" Print service can continue unabated even as this lawsuit continues. The U.S. Constitution gives Congress the power to -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 896 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: adverb.png Type: image/png Size: 9886 bytes Desc: not available URL: From dpvagjv at thinkbell.com Tue Jul 11 19:25:28 2006 From: dpvagjv at thinkbell.com (Nicholas Rios) Date: Wed, 12 Jul 2006 10:25:28 +0800 Subject: The Hoodia ingredient in HoodiaLife is an all-natural. Message-ID: <5350646.3224864@thinkbell.com> get a print copy through your library (or interlibrary-loan), or through a bookstore or book ordering service. You may also in many cases. You can select many of the links on our book information pages to find related titles. Selecting the book's -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 894 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: posable.png Type: image/png Size: 7197 bytes Desc: not available URL: From eugen at leitl.org Wed Jul 12 03:33:40 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Jul 2006 12:33:40 +0200 Subject: [dewayne@warpspeed.com: [Dewayne-Net] SF reviews contracts with AT&T over domestic spying] Message-ID: <20060712103339.GM4317@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From eackerma at u.washington.edu Thu Jul 13 03:35:59 2006 From: eackerma at u.washington.edu (Ethan Ackerman) Date: July 13, 2006 3:35:59 PM EDT Subject: California Supreme court prohibits recording Californians Message-ID: without their consent - regardless of where you are. Greetings Dave, Many people, especially reporters, are familiar with state laws prohibiting phone conversations from being recorded without the consent of one or both parties to the call. Some states, and federal law, require only 1 party to consent, other states require both or all parties to consent. California is one such 'all-party' consent state. (Think Linda Tripp recording Monica Lewinsky talking about her boss, or the floridian couple recording Newt Gingrich coordinating his ethics probe with John Boehner, as past examples of this distinction.) Well today, the California Supreme Court found that Georgia-based employees of the Solomon Smith Barney brokerage who were taping California customers with out notice or consent violated California laws, even if they might have been complying with Georgia's '1 party' consernt laws. While the court refused to fine the brokers, finding their reliance on Georgia law reasonable, it did enjoin them from taping Californians in the future. Case is here: http://www.courtinfo.ca.gov/opinions/documents/S124739.PDF This decision will likely have a large impact on investigative reporting, and has definite impacts on other areas of privacy and consumer protection law as well. -Ethan ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From bill.stewart at pobox.com Thu Jul 13 17:34:03 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 13 Jul 2006 17:34:03 -0700 Subject: Leichtenstein Bicentennial Message-ID: <6.2.1.2.0.20060713173147.033f0e90@pop.idiom.com> http://news.yahoo.com/s/ap/20060710/ap_on_re_eu/liechtenstein_s_bicentennial_lh1;_ylt=AipgyPG0U_7BHLgP.0y6JYJvaA8F;_ylu=X3oDMTA0cDJlYmhvBHNlYwM- http://news.yahoo.com/s/ap/20060710/ap_on_re_eu/liechtenstein_s_bicentennial_lh1&printer=1;_ylt=A9G_RyAW2bZE4fEA0hFbbBAF;_ylu=X3oDMTA3MXN1bHE0BHNlYwN0bWE- (printable) One of our favorite local pseudonym's home tax haven just celebrated its 200th anniversary - apparently Napoleon created it as a separate country in 1806. From dave at farber.net Thu Jul 13 15:09:40 2006 From: dave at farber.net (David Farber) Date: Thu, 13 Jul 2006 18:09:40 -0400 Subject: [IP] Markle Task Force Report | July 13, 2006 Message-ID: Markle Task Force on National Security in the Information Age Releases Third Report "Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment" July 13, 2006 The Markle Foundation Task Force on National Security in the Information Age today released its third report with recommendations on how to reconcile national security needs with civil liberties requirements. The report offers a new "authorized use" standard for government handling of legally collected information that bases authorization to view information on how the information is going to be used, rather than on the nationality of the subject or the location of collection. The report also proposes a new risk management approach to sharing classified information that balances the risk of leaks of classified information with the security risk that can come from failing to share information with those who need it to understand the threats to national security. Further, the report identifies examples of technology that can be used effectively to provide appropriate oversight and accountability. For a copy of the report, please visit our website at: http:// www.markle.org To read the Markle Foundation press release, click here. Web Policies | Copyright ) 2006 The Markle Foundation ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Thu Jul 13 15:12:08 2006 From: dave at farber.net (David Farber) Date: Thu, 13 Jul 2006 18:12:08 -0400 Subject: [IP] California Supreme court prohibits recording Californians without their consent - regardless of where you are. Message-ID: Begin forwarded message: From rah at shipwright.com Thu Jul 13 19:14:30 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 13 Jul 2006 22:14:30 -0400 Subject: [Clips] White House Accepts Review on Eavesdropping, Specter Says Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Thu, 13 Jul 2006 22:01:34 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] White House Accepts Review on Eavesdropping, Specter Says Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The New York Times July 13, 2006 White House Accepts Review on Eavesdropping, Specter Says By THE ASSOCIATED PRESS Filed at 9:07 p.m. ET WASHINGTON (AP) -- President Bush has agreed conditionally to a court review of his antiterror eavesdropping operations under a deal that, for the first time, would open an important part of his once-secret surveillance to a constitutional test. The disclosure of the agreement on Thursday came as the White House sought to end an impasse over a six-month-old dispute with Congress on the National Security Agency's program. It monitors the international calls and e-mails of Americans when terrorism is suspected. Breaking with historic norms, the president had authorized the monitoring without a court warrant. Under a deal with the Senate Judiciary Committee chairman, Bush has agreed to support a bill that could submit the program to the secretive Foreign Intelligence Surveillance Court for a constitutional review. ''You have here a recognition by the president that he does not have a blank check,'' said Sen. Arlen Specter, R-Pa. As a leading critic of the program, he had broken ranks with his party. When the program was disclosed in December, it outraged Democrats and civil libertarians who said Bush overstepped his authority. On Thursday, advocacy groups dismissed the prospect of a judicial review as a sham. ''This new bill would codify the notion that the president is not bound by the laws passed by Congress or the Constitution,'' said Anthony Romero, executive director of the American Civil Liberties Union. Congress must approve the bill. Yet lawmakers have written at least a half dozen competing proposals and more are coming. Rep. Heather Wilson, R-N.M., who heads the House intelligence subcommittee that oversees the NSA, is introducing a measure next week aimed at modernizing the Foreign Intelligence Surveillance Act of 1978. Bush's program allowed the agency to avoid that law. Attorney General Alberto Gonzales said the administration supports Specter's bill, which would allow the government to continue to collect information intended to protect the country. ''My understanding from the president is that the legislation could be very helpful,'' Gonzales said. The administration initially resisted efforts to write a new law, contending that no legal changes were needed. But after months of pressure, officials have grown more open to legislation. White House spokeswoman Dana Perino said the agreement with Specter recognizes the president's constitutional authorities and updates the 1978 law to meet current threats. ''What is happening today is that the president and Congress are coming together to codify the capacity for future presidents to take action to protect our country,'' she said. Gonzales said the bill gives Bush the option of submitting the NSA program to the intelligence court, rather than requiring the review. An administration official said Bush will submit to the review as long the bill is not changed in ways that he sees as undermining security. The official, who spoke on condition of anonymity because the deliberations are internal, said the bill would preserve the right of future presidents to skip that court review. Gonzales said the legislation would allow him to consolidate legal challenges to the eavesdropping program at the intelligence court, which he described as a one-time test of the program's constitutionality. More than 100 lawsuits have been filed in courts across the country. Vermont Sen. Patrick Leahy, the Judiciary Committee's top Democrat, said Bush could submit the program to the court right now, if he wished. He called the potential legislation ''an interesting bargain.'' ''He's saying, if you do every single thing I tell you to do, I'll do what I should have done anyway,'' Leahy said. The legislation also would: --Require the attorney general to provide the court with information on the program's legal basis, the government's efforts to protect Americans' identities and the process used to determine that the intercepted communications involve terrorism. Must certify that the information cannot be obtained through other investigative means. --Expand the time for emergency warrants secured under the law from three days to seven days. --Increase the criminal penalties for officials who knowingly misuse foreign intelligence information. --Require the attorney general to inform Congress' intelligence committees on the program's activities every six months. --At the NSA's request, clarify that international calls that merely pass through terminals in the United States are not subject to the judicial process established under the law. In an interview, Sen. Dianne Feinstein, D-Calif., said Specter's agreement raises the ''thorny question'' about whether the content of conversations should be subject to individual warrants. But Feinstein, one of a few lawmakers fully briefed on the NSA program, said she wants to see the bill before passing judgment. Kate Martin, director of the Center for National Security Studies, which advocates for civil liberties, said Congress is legislating in the dark because so many lawmakers are not privy to the complete briefing. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From declan at well.com Fri Jul 14 01:09:24 2006 From: declan at well.com (Declan McCullagh) Date: Fri, 14 Jul 2006 01:09:24 -0700 Subject: [Politech] White House deal says FISA court will review NSA spying [priv] Message-ID: News coverage: http://www.nytimes.com/2006/07/14/washington/14nsa.html --- Electronic Frontier Foundation Media Release For Immediate Release: Friday, July 14, 2006 Proposed Surveillance Bill Would Sweep NSA Spying Programs Under the Rug Bill Threatens Future of EFF Case and Other Legal Challenges San Francisco - Senate Judiciary Committee Chairman Arlen Specter said today that he has negotiated a proposed bill with the White House regarding the NSA's illegal spying program. While the final bill is not public, a draft of the bill obtained by the Electronic Frontier Foundation (EFF) is a sham compromise that would cut off meaningful legal review -- sweeping current legal challenges out of the traditional court system and failing to require court review or congressional oversight of any future surveillance programs. "This so-called compromise bill is not a concession from the White House -- it's a rubber stamp for any future spying program dreamed up by the executive," said EFF Staff Attorney Kevin Bankston. "In essence, this bill threatens to make court oversight of electronic surveillance voluntary rather than mandatory." Although the bill creates a process for the executive branch to seek court review of its secret surveillance programs, it doesn't actually require the government to do so. The bill would, however, require that any lawsuit challenging the legality of any classified surveillance program -- including EFF's class-action suit against AT&T -- be transferred, at the government's request, to the FISA Court of Review, a secret court with no procedures for hearing argument from anyone but the government. The bill would further allow the government to prevent the court from disclosing any information about the government's surveillance programs to opposing counsel, regardless of the court's strict security procedures. "When the privacy of millions of Americans is at stake, we deserve more than a closed hearing by a secret court," said EFF Senior Staff Attorney Lee Tien. For the draft of the Specter bill: http://www.eff.org/Privacy/Surveillance/NSA/specter_draftbill_071306.pdf For this release: http://www.eff.org/news/archives/2006_07.php#004824 About EFF The Electronic Frontier Foundation is the leading civil liberties organization working to protect rights in the digital world. Founded in 1990, EFF actively encourages and challenges industry and government to support free expression and privacy online. EFF is a member-supported organization and maintains one of the most linked-to websites in the world at http://www.eff.org/ -end- _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From leo at 2001.ru Thu Jul 13 22:30:42 2006 From: leo at 2001.ru (Folvyn) Date: Fri, 14 Jul 2006 08:30:42 +0300 Subject: Aloha! Message-ID: <007a01c6a706$a0706280$0d1a000a@HYgur> Hello my Dear! I want to start my first letter from a question: "Is it possible to be happy without LOVE?" I think that you will agree with me if the answer will be "NO WAY". Love is the most beautiful and exciting thing that may happen between man and woman! It inspires us only for doing positive things towards each other. One very famous writer said: "The beauty will rescue the world" i agree with his words but still i would add : " LOVE and Beauty will rescure the world". I hope you agree with me that Love is a big notion. There's love to God, to Mother, to a child to the country where you were born, and there's love that joins a man and woman for all their life. That is the LOVE i'm looking for! And i'm seeking for the man who is also eager to have this life long adventure full of surprises and new experience we can share together! Will you join me for this trip? I do realise that it should be very difficult to say "Yes" from the first letter having no idea about me. That's why i just offer to get to know each other better though correspondence that will help us to reveal many things about each other whether we mach perfectly or not. In addition you can look at my pictures and read some info about me here http://planet-oflove.com/ I hope you'll like what you see and read there. Well closing my first letter to you i just want to thank you for reading it and i really hope that you'll share my point of view on what i said above. I do really hope that you'll answer me soon. ta-ta.... Folvyn If you think that you were subscribed by mistake for this mail delivery or if your email has been added without your permission, please, visit http://planet-oflove.com/ and unsubscribe from our mails. From dave at farber.net Fri Jul 14 05:54:48 2006 From: dave at farber.net (David Farber) Date: Fri, 14 Jul 2006 08:54:48 -0400 Subject: [IP] Proposed Surveillance Bill Would Sweep NSA Spying Programs Under the Rug Message-ID: Electronic Frontier Foundation Media Release For Immediate Release: Friday, July 14, 2006 Contact: Kevin Bankston Staff Attorney Electronic Frontier Foundation bankston at eff.org +1 415 436-9333 x126 Kurt Opsahl Staff Attorney Electronic Frontier Foundation kurt at eff.org +1 415 436-9333 x106 Lee Tien Senior Staff Attorney Electronic Frontier Foundation tien at eff.org +1 415 436-9333 x102 Proposed Surveillance Bill Would Sweep NSA Spying Programs Under the Rug Bill Threatens Future of EFF Case and Other Legal Challenges San Francisco - Senate Judiciary Committee Chairman Arlen Specter said today that he has negotiated a proposed bill with the White House regarding the NSA's illegal spying program. While the final bill is not public, a draft of the bill obtained by the Electronic Frontier Foundation (EFF) is a sham compromise that would cut off meaningful legal review -- sweeping current legal challenges out of the traditional court system and failing to require court review or congressional oversight of any future surveillance programs. "This so-called compromise bill is not a concession from the White House -- it's a rubber stamp for any future spying program dreamed up by the executive," said EFF Staff Attorney Kevin Bankston. "In essence, this bill threatens to make court oversight of electronic surveillance voluntary rather than mandatory." Although the bill creates a process for the executive branch to seek court review of its secret surveillance programs, it doesn't actually require the government to do so. The bill would, however, require that any lawsuit challenging the legality of any classified surveillance program -- including EFF's class-action suit against AT&T -- be transferred, at the government's request, to the FISA Court of Review, a secret court with no procedures for hearing argument from anyone but the government. The bill would further allow the government to prevent the court from disclosing any information about the government's surveillance programs to opposing counsel, regardless of the court's strict security procedures. "When the privacy of millions of Americans is at stake, we deserve more than a closed hearing by a secret court," said EFF Senior Staff Attorney Lee Tien. For the draft of the Specter bill: http://www.eff.org/Privacy/Surveillance/NSA/specter_draftbill_071306.pdf For this release: http://www.eff.org/news/archives/2006_07.php#004824 About EFF The Electronic Frontier Foundation is the leading civil liberties organization working to protect rights in the digital world. Founded in 1990, EFF actively encourages and challenges industry and government to support free expression and privacy online. EFF is a member-supported organization and maintains one of the most linked-to websites in the world at http://www.eff.org/ -end- _______________________________________________ presslist mailing list https://falcon.eff.org/mailman/listinfo/presslist ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Fri Jul 14 02:01:46 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jul 2006 11:01:46 +0200 Subject: [declan@well.com: [Politech] White House deal says FISA court will review NSA spying [priv]] Message-ID: <20060714090146.GN4317@leitl.org> ----- Forwarded message from Declan McCullagh ----- From blruhenezgzrxc at iguanasoft.com Fri Jul 14 10:48:46 2006 From: blruhenezgzrxc at iguanasoft.com (Miss Lobo) Date: Fri, 14 Jul 2006 12:48:46 -0500 Subject: Wonder Ephedra is back Message-ID: <33rcea9n6pp0y0cgcxfk2q011r20x509@tidni.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1471 bytes Desc: not available URL: From eugen at leitl.org Fri Jul 14 06:54:09 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jul 2006 15:54:09 +0200 Subject: [dave@farber.net: [IP] California Supreme court prohibits recording Californians without their consent - regardless of where you are.] Message-ID: <20060714135409.GF4317@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri Jul 14 06:54:19 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jul 2006 15:54:19 +0200 Subject: [dave@farber.net: [IP] Markle Task Force Report | July 13, 2006] Message-ID: <20060714135419.GG4317@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri Jul 14 06:55:40 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 14 Jul 2006 15:55:40 +0200 Subject: [dave@farber.net: [IP] Proposed Surveillance Bill Would Sweep NSA Spying Programs Under the Rug] Message-ID: <20060714135540.GH4317@leitl.org> ----- Forwarded message from David Farber ----- From rodrick at internet-top.com Fri Jul 14 16:01:33 2006 From: rodrick at internet-top.com (Flora Coffey) Date: Fri, 14 Jul 2006 22:01:33 -0100 Subject: sexy baby and bad erection? Message-ID: <200607141959.k6EJxp4o008338@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://ar9z.limitpretext.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From TamaraHart at blackburnmail.com Fri Jul 14 12:28:39 2006 From: TamaraHart at blackburnmail.com (Marcella Spicer) Date: Sat, 15 Jul 2006 03:28:39 +0800 Subject: Fwd: HoodiaLife basically tricks the brain into thinking that you're full. Message-ID: necessary. We may cut quotes that appear to be excessive, or reject the post containing them. (If you haven't even cut the size. A commonly supported shortcut for changing font size is to hold down the Control key (or the Apple key on Macs) and -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 899 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: baptistery.png Type: image/png Size: 7197 bytes Desc: not available URL: From rah at shipwright.com Sat Jul 15 04:01:52 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 15 Jul 2006 07:01:52 -0400 Subject: [Clips] Odlyzko, et al.: Metcalfe's Law is Wrong Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 15 Jul 2006 06:58:43 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Odlyzko, et al.: Metcalfe's Law is Wrong Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com Andrew Odlyzko does it again... Cheers, RAH -------- IEEE Spectrum Metcalfe's Law is Wrong By: Bob Briscoe, Andrew Odlyzko, and Benjamin Tilly ILLUSTRATION: SERGE BLOCH Of all the popular ideas of the Internet boom, one of the most dangerously influential was Metcalfe's Law. Simply put, it says that the value of a communications network is proportional to the square of the number of its users. The law is said to be true for any type of communications network, whether it involves telephones, computers, or users of the World Wide Web. While the notion of "value" is inevitably somewhat vague, the idea is that a network is more valuable the more people you can call or write to or the more Web pages you can link to. Metcalfe's Law attempts to quantify this increase in value. It is named for no less a luminary than Robert M. Metcalfe, the inventor of Ethernet. During the Internet boom, the law was an article of faith with entrepreneurs, venture capitalists, and engineers, because it seemed to offer a quantitative explanation for the boom's various now-quaint mantras, like "network effects," "first-mover advantage," "Internet time," and, most poignant of all, "build it and they will come." By seeming to assure that the value of a network would increase quadratically-proportionately to the square of the number of its participants-while costs would, at most, grow linearly, Metcalfe's Law gave an air of credibility to the mad rush for growth and the neglect of profitability. It may seem a mundane observation today, but it was hot stuff during the Internet bubble. Remarkably enough, though the quaint nostrums of the dot-com era are gone, Metcalfe's Law remains, adding a touch of scientific respectability to a new wave of investment that is being contemplated, the Bubble 2.0, which appears to be inspired by the success of Google. That's dangerous because, as we will demonstrate, the law is wrong. If there is to be a new, broadband-inspired period of telecommunications growth, it is essential that the mistakes of the 1990s not be reprised. The law was named in 1993 by George Gilder, publisher of the influential Gilder Technology Report. Like Moore's Law, which states that the number of transistors on a chip will double every 18 to 20 months, Metcalfe's Law is a rough empirical description, not an immutable physical law. Gilder proclaimed the law's importance in the development of what came to be called "the New Economy." Soon afterward, Reed E. Hundt, then the chairman of the U.S. Federal Communications Commission, declared that Metcalfe's Law and Moore's Law "give us the best foundation for understanding the Internet." A few years later, Marc Andreessen, who created the first popular Web browser and went on to cofound Netscape, attributed the rapid development of the Web-for example, the growth in AOL's subscriber base-to Metcalfe's Law. There was some validity to many of the Internet mantras of the bubble years. A few very successful dot-coms did exploit the power of the Internet to provide services that today yield great profits. But when we look beyond that handful of spectacular successes, we see that, overall, the law's devotees didn't fare well. For every Yahoo or Google, there were dozens, even hundreds, of Pets.coms, EToys, and Excite at Homes, each dedicated to increasing its user base instead of its profits, all the while increasing expenses without revenue. Because of the mind-set created, at least in small part, by Metcalfe's Law, even the stocks of rock-solid companies reached absurd heights before returning to Earth. The share price of Cisco Systems Inc., San Jose, Calif., for example, fell 89 percent-a loss of over US $580 billion in the paper value of its stock-between March 2000 and October 2002. And the rapid growth of AOL, which Andreessen attributed to Metcalfe's Law, came to a screeching halt; the company has struggled, to put it mildly, in the last few years. Metcalfe's Law was over a dozen years old when Gilder named it. As Metcalfe himself remembers it, in a private correspondence with one of the authors, "The original point of my law (a 35mm slide circa 1980, way before George Gilder named it...) was to establish the existence of a cost-value crossover point-critical mass-before which networks don't pay. The trick is to get past that point, to establish critical mass." [See "To the Point," a reproduction of Metcalfe's historic slide.] Metcalfe was ideally situated to watch and analyze the growth of networks and their profitability. In the 1970s, first in his Harvard Ph.D. thesis and then at the legendary Xerox Palo Alto Research Center, Metcalfe developed the Ethernet protocol, which has come to dominate telecommunications networks. In the 1980s, he went on to found the highly successful networking company 3Com Corp., in Marlborough, Mass. In 1990 he became the publisher of the trade periodical InfoWorld and an influential high-tech columnist. More recently, he has been a venture capitalist. The foundation of his eponymous law is the observation that in a communications network with n members, each can make (n-1) connections with other participants. If all those connections are equally valuable-and this is the big "if" as far as we are concerned-the total value of the network is proportional to n(n-1), that is, roughly, n 2. So if, for example, a network has 10 members, there are 90 different possible connections that one member can make to another. If the network doubles in size, to 20, the number of connections doesn't merely double, to 180, it grows to 380-it roughly quadruples, in other words. If Metcalfe's mathematics were right, how can the law be wrong? Metcalfe was correct that the value of a network grows faster than its size in linear terms; the question is, how much faster? If there are n members on a network, Metcalfe said the value grows quadratically as the number of members grows. We propose, instead, that the value of a network of size n grows in proportion to n log(n). Note that these laws are growth laws, which means they cannot predict the value of a network from its size alone. But if we already know its valuation at one particular size, we can estimate its value at any future size, all other factors being equal. The distinction between these laws might seem to be one that only a mathematician could appreciate, so let us illustrate it with a simple dollar example. ILLUSTRATION: SERGE BLOCH Imagine a network of 100 000 members that we know brings in $1 million. We have to know this starting point in advance-none of the laws can help here, as they tell us only about growth. So if the network doubles its membership to 200 000, Metcalfe's Law says its value grows by (200 0002/100 0002) times, quadrupling to $4 million, whereas the n log(n) law says its value grows by 200 000 log(200 000)/100 000 log(100 000) times to only $2.1 million. In both cases, the network's growth in value more than doubles, still outpacing the growth in members, but the one is a much more modest growth than the other. In our view, much of the difference between the artificial values of the dot-com era and the genuine value created by the Internet can be explained by the difference between the Metcalfe-fueled optimism of n 2 and the more sober reality of n log(n). This difference will be critical as network investors and managers plan better for growth. In North America alone, telecommunications carriers are expected to invest $65 billion this year in expanding their networks, according to the analytical firm Infonetics Research Inc., in San Jose, Calif. As we will show, our rule of thumb for estimating value also has implications for companies in the important business of managing interconnections between major networks. The increasing value of a network as its size increases certainly lies somewhere between linear and exponential growth [see diagram, "Growth Curves"]. The value of a broadcast network is believed to grow linearly; it's a relationship called Sarnoff's Law, named for the pioneering RCA television executive and entrepreneur David Sarnoff. At the other extreme, exponential-that is, 2n-growth, has been called Reed's Law, in honor of computer networking and software pioneer David P. Reed. Reed proposed that the value of networks that allow the formation of groups, such as AOL's chat rooms or Yahoo's mailing lists, grows proportionally with 2n. We admit that our n log(n) valuation of a communications network oversimplifies the complicated question of what creates value in a network; in particular, it doesn't quantify the factors that subtract from the value of a growing network, such as an increase in spam e-mail. Our valuation cannot be proved, in the sense of a deductive argument from first principles. But if we search for a cogent description of a network's value, then n log(n) appears to be the best choice. Not only is it supported by several quantitative arguments, but it fits in with observed developments in the economy. The n log(n) valuation for a network provides a rough-and-ready description of the dynamics that led to the disappointingly slow growth in the value of dot-com companies. On the other hand, because this growth is faster than the linear growth of Sarnoff's Law, it helps explain the occasional dot-com successes we have seen. The fundamental flaw underlying both Metcalfe's and Reed's laws is in the assignment of equal value to all connections or all groups. The underlying problem with this assumption was pointed out a century and a half ago by Henry David Thoreau in relation to the very first large telecommunications network, then being built in the United States. In his famous book Walden (1854), he wrote: "We are in great haste to construct a magnetic telegraph from Maine to Texas; but Maine and Texas, it may be, have nothing important to communicate." As it turns out, Maine did have quite a bit to communicate with Texas-but not nearly as much as with, say, Boston and New York City. In general, connections are not all used with the same intensity. In fact, in large networks, such as the Internet, with millions and millions of potential connections between individuals, most are not used at all. So assigning equal value to all of them is not justified. This is our basic objection to Metcalfe's Law, and it's not a new one: it has been noted by many observers, including Metcalfe himself. There are common-sense arguments that suggest Metcalfe's and Reed's laws are incorrect. For example, Reed's Law says that every new person on a network doubles its value. Adding 10 people, by this reasoning, increases its value a thousandfold (210). But that does not even remotely fit our general expectations of network values-a network with 50 010 people can't possibly be worth a thousand times as much as a network with 50 000 people. At some point, adding one person would theoretically increase the network value by an amount equal to the whole world economy, and adding a few more people would make us all immeasurably rich. Clearly, this hasn't happened and is not likely to happen. So Reed's Law cannot be correct, even though its core insight-that there is value in group formation-is true. And, to be fair, just as Metcalfe was aware of the limitations of his law, so was Reed of his law's. Metcalfe's Law does not lead to conclusions as obviously counterintuitive as Reed's Law. But it does fly in the face of a great deal of the history of telecommunications: if Metcalfe's Law were true, it would create overwhelming incentives for all networks relying on the same technology to merge, or at least to interconnect. These incentives would make isolated networks hard to explain. To see this, consider two networks, each with n members. By Metcalfe's Law, each one's value is on the order of n 2, so the total value of both of these separate networks is roughly 2n 2. But suppose these two networks merge. Then we will effectively have a single network with 2n members, which, by Metcalfe's Law, will be worth (2n)2 or 4n 2-twice as much as the combined value of the two separate networks. Surely it would require a singularly obtuse management, to say nothing of stunningly inefficient financial markets, to fail to seize this obvious opportunity to double total network value by simply combining the two. Yet historically there have been many cases of networks that resisted interconnection for a long time. For example, a century ago in the United States, the Bell System and the independent phone companies often competed in the same neighborhood, with subscribers to one being unable to call subscribers to the other. Eventually, through a combination of financial maneuvers and political pressure, such systems connected with one another, but it took two decades. Similarly, in the late 1980s and early 1990s, the commercial online companies such as CompuServe, Prodigy, AOL, and MCIMail provided e-mail to subscribers, but only within their own systems, and it wasn't until the mid-1990s that full interconnection was achieved. More recently we have had (and continue to have) controversies about interconnection of instant messaging systems and about the free exchange of traffic between Internet service providers. The behavior of network operators in these examples is hard to explain if the value of a network grows as fast as Metcalfe's n 2. There is a further argument to make about interconnecting networks. If Metcalfe's Law were true, then two networks ought to interconnect regardless of their relative sizes. But in the real world of business and networks, only companies of roughly equal size are ever eager to interconnect. In most cases, the larger network believes it is helping the smaller one far more than it itself is being helped. Typically in such cases, the larger network demands some additional compensation before interconnecting. Our n log(n) assessment of value is consistent with this real-world behavior of networking companies; Metcalfe's n 2 is not. [See sidebar, "Making the Connection," for the mathematics behind this argument.] We have, as well, developed several quantitative justifications for our n log(n) rule-of-thumb valuation of a general communications network of size n. The most intuitive one is based on yet another rule of thumb, Zipf's Law, named for the 20th-century linguist George Kingsley Zipf. Zipf's Law is one of those empirical rules that characterize a surprising range of real-world phenomena remarkably well. It says that if we order some large collection by size or popularity, the second element in the collection will be about half the measure of the first one, the third one will be about one-third the measure of the first one, and so on. In general, in other words, the kth-ranked item will measure about 1/k of the first one. To take one example, in a typical large body of English-language text, the most popular word, "the," usually accounts for nearly 7 percent of all word occurrences. The second-place word, "of," makes up 3.5 percent of such occurrences, and the third-place word, "and," accounts for 2.8 percent. In other words, the sequence of percentages (7.0, 3.5, 2.8, and so on) corresponds closely with the 1/k sequence (1/1, 1/2, 1/3 ). Although Zipf originally formulated his law to apply just to this phenomenon of word frequencies, scientists find that it describes a surprisingly wide range of statistical distributions, such as individual wealth and income, populations of cities, and even the readership of blogs. To understand how Zipf's Law leads to our n log(n) law, consider the relative value of a network near and dear to you-the members of your e-mail list. Obeying, as they usually do, Zipf's Law, the members of such networks can be ranked in the same sort of way that Zipf ranked words-by the number of e-mail messages that are in your in-box. Each person's e-mails will contribute 1/k to the total "value" of your in-box, where k is the person's rank. The person ranked No. 1 in volume of correspondence with you thus has a value arbitrarily set to 1/1, or 1. (This person corresponds to the word "the" in the linguistic example.) The person ranked No. 2 will be assumed to contribute half as much, or 1/2. And the person ranked kth will, by Zipf's Law, add about 1/k to the total value you assign to this network of correspondents. That total value to you will be the sum of the decreasing 1/k values of all the other members of the network. So if your network has n members, this value will be proportional to 1 + 1/2 + 1/3 + + 1/(n-1), which approaches log(n). More precisely, it will almost equal the sum of log(n) plus a constant value. Of course, there are n-1 other members who derive similar value from the network, so the value to all n of you increases as n log(n). Zipf's Law can also describe in quantitative terms a currently popular thesis called The Long Tail. Consider the items in a collection, such as the books for sale at Amazon, ranked by popularity. A popularity graph would slope downward, with the few dozen most popular books in the upper left-hand corner. The graph would trail off to the lower right, and the long tail would list the hundreds of thousands of books that sell only one or two copies each year. The long tail of the English language-the original application of Zipf's Law-would be the several hundred thousand words that you hardly ever encounter, such as "floriferous" or "refulgent." Taking popularity as a rough measure of value (at least to booksellers like Amazon), then the value of each individual item is given by Zipf's Law. That is, if we have a million items, then the most popular 100 will contribute a third of the total value, the next 10 000 another third, and the remaining 989 900 the final third. The value of the collection of n items is proportional to log(n). Incidentally, this mathematics indicates why online stores are the only place to shop if your tastes in books, music, and movies are esoteric. Let's say an online music store like Rhapsody or iTunes carries 735 000 titles, while a traditional brick-and-mortar store will carry 10 000 to 20 000. The law of long tails says that two-thirds of the online store's revenue will come from just the titles that its physical rival carries. In other words, a very respectable chunk of revenue-a third-will come from the 720 000 or so titles that hardly anyone ever buys. And, unlike the cost to a brick-and-mortar store, the cost to an online store of holding all that inventory is minimal. So it makes good sense for them to stock all those incredibly slow-selling titles. At a time when telecommunications is the key infrastructure for the global economy, providers need to make fundamental decisions about whether they will be pure providers of connectivity or make their money by selling or reselling content, such as television and movies. It is essential that they value their enterprises correctly-neither overvaluing the business of providing content nor overvaluing, as Metcalfe's Law does, the business of providing connectivity. Their futures are filled with risks and opportunities. We believe if they value the growth in their networks as n log(n), they will be better equipped to navigate the choppy waters that lie ahead. About the Authors BOB BRISCOE is chief researcher at Networks Research Centre, BT (formerly British Telecom), in Ipswich, England. ANDREW ODLYZKO is a professor of mathematics and the director of the Digital Technology Center at the University of Minnesota, in Minneapolis. BENJAMIN TILLY is a senior programmer at Rent.com, a dot-com company that actually made money, in Santa Monica, Calif. To Probe Further David P. Reed argues for his law in "The Sneaky Exponential" on his Web site at http://www.reed.com/Papers/GFN/reedslaw.html. Several additional quantitative arguments are made for the n log(n) value for Metcalfe's Law on the authors' Web sites at http://www.cs.ucl.ac.uk/staff/B.Briscoe and http://www.dtc.umn.edu/~odlyzko. Chris Anderson's article "The Long Tail" was featured in the October 2004 issue of Wired. Anderson now has an entire Web site devoted to the topic at http://www.thelongtail.com. George Gilder dubbed Metcalfe's observation a law in his "Metcalfe's Law and Legacy," an article that was published in the 13 September 1993 issue of Forbes ASAP. An article in the December 2003 issue of IEEE Spectrum, "5 Commandments," which can be found at http://www.spectrum.ieee.org/dec03/5com, discusses Moore's and Metcalfe's laws, as well as three others: Rock's Law ("the cost of semiconductor tools doubles every four years"); Machrone's Law ("the PC you want to buy will always be $5000"); and Wirth's Law ("software is slowing faster than hardware is accelerating"). Figure 1 GROWTH CURVES: How much more valuable does a network become as it grows? That depends on what kind of network it is. Let's say you have n users. The value of a television or some other broadcast network grows linearly, as shown by Sarnoff's Law [green] here. At the other extreme, according to Reed's Law [purple], growth in value of certain networks-those that can form groups, such as e-mail lists-is exponential (2n). In between are ordinary, member-based networks such as AOL, or all of AT&T's phone customers. Metcalfe's Law [red] says they grow in value quadratically (n 2). We argue, instead, that such growth increases logarithmically as n log(n) [blue], a much slower rate. ILLUSTRATION: SERGE BLOCH Figure 2 TO THE POINT: Robert Metcalfe's original circa-1980 slide, reproduced here, argued that because the value of a network increased quadratically, it would quickly surpass its costs, which grew linearly. ILLUSTRATION: SERGE BLOCH Sidebar 1 Making the Connection By: B.B., A.O. & B.T. A network grows not only by the addition of single members. It can jump in size by interconnecting or merging with another network. If two networks are of similar size, each would see roughly the same increase in value if they combined. You would expect them to interconnect, and indeed, networks of comparable size do so routinely. But when one network is much bigger than the other, the larger one usually resists interconnecting. If Metcalfe's Law were true, no matter what the relative sizes of two networks, both would gain the same amount by uniting, making the observed behavior seem irrational [see table below, "The Value of Interconnecting"]. If our n log(n) law holds (or other laws with growth rates falling between ours and Metcalfe's), then, as the table shows, the smaller network would gain more than the larger one. For example, if the larger network is eight times as large as the smaller one, its gain would be less than half that of the smaller one. This clearly reduces the incentive for the owners of the larger network to interconnect without compensation. This model of network interconnection is simplistic, of course, and it does not deal with other important aspects that enter into actual negotiations, such as a network's geographical span, its balance of outgoing and incoming traffic, and any number of additional factors. All we are trying to show is that there may be sound economic reasons, besides raw market power, for larger networks to demand payment for interconnection with smaller ones. In fact, that's a common phenomenon in real life. Our n log(n) law describes best the increase in value of a single network as it grows through acquisition of individual members. But our law should not be applied directly to evaluate the effects of connecting separate networks. Another important consideration is the degree to which groups that value each other highly are already contained within the networks being combined, a factor called clustering. When clustering is weak, the people you tend to communicate with the most-family members, work colleagues, fellow hobbyists, and so on-are not on the same network you are. In these cases, the value of connecting separate networks can be higher than our n log(n) law predicts. Nonetheless, given that most networks grow organically, with people drawing in the people closest to them, the majority of networks are strongly clustered. Therefore, in most networks, n log(n) appears to be the best simple description of network value in terms of the network's size. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From kqbjrqqsegqqgb at ambitlink.com Sat Jul 15 12:58:27 2006 From: kqbjrqqsegqqgb at ambitlink.com (Ms Coulter) Date: Sat, 15 Jul 2006 11:58:27 -0800 Subject: caution: not for everybody Message-ID: <200607151858.k6FIwNCR010970@proton.jfet.org> http://deapnq.retropowers.com/?99512366&men Truth is not always popular, but it is always right -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 320 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: zoblxdz.gif Type: image/gif Size: 9065 bytes Desc: not available URL: From MistyMcdowell at config.com Sat Jul 15 13:16:24 2006 From: MistyMcdowell at config.com (Kristopher Dickinson) Date: Sat, 15 Jul 2006 18:16:24 -0200 Subject: You can get the watches you have dreamed about! Message-ID: (paid for by taxes on American's phone bills), dependent on the installation of filters on all publicly accessible library additional incentive for something that has already happened. (It's even harder to argue that such extensions can provide any -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 896 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: indicter.png Type: image/png Size: 7858 bytes Desc: not available URL: From disgneraaa at ev1.net Sun Jul 16 00:34:22 2006 From: disgneraaa at ev1.net (Carla) Date: Sun, 16 Jul 2006 07:34:22 +0000 Subject: Replicated Cartier, Rolex, Omega and more! Message-ID: Elegant Replicas The lowest prices and highest quality replicas found online, duplicated to every detail of the genuine brand. http://www.cheaprepliqa.com/?dhyfaso carbonylic carboxyl carboxylic carboxylic acid From nigel at rmcomputer.com Sun Jul 16 14:20:30 2006 From: nigel at rmcomputer.com (Barbara Tripp) Date: Sun, 16 Jul 2006 19:20:30 -0200 Subject: Open something new for your self Message-ID: <200607161620.k6GGKXQE014304@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://b2f9.promotmax.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From xvgnw at avaya.com Mon Jul 17 09:24:20 2006 From: xvgnw at avaya.com (Mail Daemon) Date: Mon, 17 Jul 2006 08:24:20 -0800 Subject: Fw: My Spouse recommended this site to me Message-ID: <698h458g.1130689@digitalf.com> the olympia see punch try bangkok see transliterate be dispersal -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1096 bytes Desc: not available URL: From ztmjsqai at basicisp.net Mon Jul 17 07:48:38 2006 From: ztmjsqai at basicisp.net (Urgent:Postmaster) Date: Mon, 17 Jul 2006 09:48:38 -0500 Subject: Niche Handbag Collections Message-ID: <456o421w.1708965@universalmind.net> it brandy on mesquite not dichloride or audible or acculturate -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 765 bytes Desc: not available URL: From gadabacelabef at abacela.com Mon Jul 17 08:41:39 2006 From: gadabacelabef at abacela.com (Jamal Glenn) Date: Mon, 17 Jul 2006 12:41:39 -0300 Subject: Last chance to supercharge your performance Message-ID: <695128794.08850792712790@thhebat.net> Finally the true stuff – no more rip offs! P.E.P. are very hot right this time! Well here comes the original thing not a forgery! One of the very exceptionals, absolutely unparalleled produce is affordable anywhere! Note what people say about this product: "I was really impressed how rapidly your product affected on my boyfriend, he canÂ’t put an end to his talking on how hot he is having his new size, length, and libido!" Silvia D., Bellevue WA "Firstly I thought the free sample I was given was a kind of prank, until I actually tried to take the P.E.P. Words cannot report how greatly pleased I am with the effect I got from using the stuff for 3 short months. I will be requesting regularly!" Michael Burns, Bellevue WA Check up more recommendations about this astounding product right here & right now! http://www.bolert.com/?sbtxzyosy -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1239 bytes Desc: not available URL: From bostjh at 0733.com Mon Jul 17 15:37:09 2006 From: bostjh at 0733.com (Jules Landers) Date: Mon, 17 Jul 2006 21:37:09 -0060 Subject: Everything in you will improve with growth hormone Message-ID: <200608112139.k7BLdXgT010912@proton.jfet.org> Feel oung again with Regenisis HGH Just how often did you recall the times of youth when you could do anything with equal enthusiasm? There is nothing bad in growing older - except for the reduced body resource, declining health and wrinkles. Don't miss your ticket to the train which will bring you to your best mental and health condition! Human Growth Hormone was created to slow down your aging process and make you feel and look a lot better. From smoother skin and thicker hair to better cardiac function and even improvements in your intimate life. Rejuvenation has never been more real. Don't miss our hottest special offers of Regenesis HGH, a sophisticated method of regaining your youth!Click here to view special offers ending soon!don't receive more -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1382 bytes Desc: not available URL: From MyrnaHewitt at mailclub.net Mon Jul 17 09:54:42 2006 From: MyrnaHewitt at mailclub.net (Dan Cano) Date: Tue, 18 Jul 2006 00:54:42 +0800 Subject: Fwd: HoodiaLife basically tricks the brain into thinking that you're full. Message-ID: disruptions are not welcome. The list started in January 1997. It is moderated, sometimes manually, and sometimes through an often call numbers and descriptive subject terms. There is also a new stable link shown for the information page that can be -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 892 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: teahouse.png Type: image/png Size: 7197 bytes Desc: not available URL: From jtrjtrjtr2001 at yahoo.com Tue Jul 18 01:26:07 2006 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Tue, 18 Jul 2006 01:26:07 -0700 (PDT) Subject: Indian govt. orders blocking blogs Message-ID: <20060718082607.95798.qmail@web33305.mail.mud.yahoo.com> Sounds like they are trying to get few sites offline but it seems they are ending up blocking entire blog sites. News here http://economictimes.indiatimes.com/articleshow/1767836.cms __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From kristina at ringve.com Tue Jul 18 15:18:52 2006 From: kristina at ringve.com (Robyn Mcdonald) Date: Tue, 18 Jul 2006 15:18:52 -0700 Subject: sexy baby and bad erection? Message-ID: <200607180818.k6I8Ikn7009688@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://83y6i.fitexample.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From 8k3yuh6 at wille.dk Tue Jul 18 11:58:34 2006 From: 8k3yuh6 at wille.dk (Cypherpunks) Date: Tue, 18 Jul 2006 23:58:34 +0500 Subject: Licensed Pharmacy, FDA Approved Medications, Live Help, Tue, 18 Jul 2006 11:07:34 -0800 Message-ID: Tue, 18 Jul 2006 11:07:34 -0800 Cypherpunks, We are proud to be able to bring you our wide selection of medicines, all of them are available to you online, 24x7. -Over 107 Medicines -No Waiting for Doctors -Safe And Secure Ordering -Toll Free Number -Live Help -Complete Privacy -No Prior Prescription Needed -FedEx Next day delivery U.S Licensed Pharmacy with Very low prices! http://www.rxhomepharm.com To opt-out: http://unsubme.come.sc From camera_lumina at hotmail.com Wed Jul 19 09:06:18 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 19 Jul 2006 12:06:18 -0400 Subject: Cracking RSA? In-Reply-To: <200607102031.k6AKVifn020358@artifact.psychedelic.net> Message-ID: I was thinking about this statement... >I'd bet money the NSA has been able to crack RSA since 1996. > >-- >Eric Michael Cordian 0+ >O:.T:.O:. Mathematical Munitions Division >"Do What Thou Wilt Shall Be The Whole Of The Law" By this I assume you don't mean through buffer overflows or exploiting obscure bits of cluelessness. You mean "brute force", but (obviously) through the use of algorithms we Spy-ees aren't aware of. I'd say that's absurd paranoid thinking, but on the other hand... 1. There's been no 'proof' per se about the intractability of factoring, correct? 2. Seems like the Feds veryu suddenly gave up fighting encryption a few years ago. I assumed this was because of the rapid rise of electronic transactions and communications, but maybe... 3. We never discover anything that makes us realize that the factoring problem is a lot HARDER than we realized....every few years there's a small inroad made here for this kind of prime factor, another discovery there and so on that renders RSA fairly trivial for certain categories of primes. Given several footbalfields' worth of well-payed encryption talent working for several decades, seems to me they could certainly at least be ahead of the civilian world in this area (silicon chip fabrication is another issue entirely, however). Is this correct? If the statement is true (ie, 'NSA has been able to crack RSA...'), it's not necessarily the end of the world. I'd bet that it's still potentially VERY expensive on average, though the scary thing is that some messages might fall apart easily. In fact...a search for a subtle and inexplicable steering of the prime space used by some implementations would be telling. Am I talking out my ass here? Another interesting thing is that it almost doesn't matter. Buffer overflows and other indirect attack are such that one should consider a lone encrypted message sitting out there like a sitting duck painted bright red. Better still to paint that duck white and stick him in a bigass flock. In other words, it might make sense at this point to regard RSA as crackable and then rethink how to hide the significance of encryption itself... -TD From madeline at rjia.net Wed Jul 19 18:03:05 2006 From: madeline at rjia.net (Marcelino Stubbs) Date: Wed, 19 Jul 2006 23:03:05 -0200 Subject: sexy baby and bad erection? Message-ID: <19005875155024.C888A21EA3@22KH7Z3W> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://0x01.keyboadr.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From xnubacw at netfor995.com.jfet.org Wed Jul 19 23:27:41 2006 From: xnubacw at netfor995.com.jfet.org (Best This WeightLoss Program) Date: Thu, 20 Jul 2006 01:27:41 -0500 Subject: Someone Tells me what is Ephedra? Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 626 bytes Desc: not available URL: From morlockelloi at yahoo.com Thu Jul 20 08:57:23 2006 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Thu, 20 Jul 2006 08:57:23 -0700 (PDT) Subject: Cracking RSA? In-Reply-To: Message-ID: <20060720155723.9276.qmail@web35212.mail.mud.yahoo.com> There is a constant 20 years lag between a crack and public awareness of the same. We'll know in 2016. But you are reasonably safe in the meantime - remember, during WW2 Germans submarines were allowed to sink many ships in order to mask breaking of Enigma. The tactic for others was to send planes to 'accidentally' spot the submarine. All analogies are perfectly valid today. To maintain the potential crack technology an asset, they will have to use plausible classical means of discovering the plaintext. > >I'd bet money the NSA has been able to crack RSA since 1996. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From zwvqloqivopyyz at wirelessroanoke.com Thu Jul 20 11:11:01 2006 From: zwvqloqivopyyz at wirelessroanoke.com (Mrs Mike) Date: Thu, 20 Jul 2006 13:11:01 -0500 Subject: Sick of 9-6 Job? Message-ID: <200607201711.k6KHAqJY001550@proton.jfet.org> Here comes a candle to light you to bed -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 284 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: kq.gif Type: image/gif Size: 3515 bytes Desc: not available URL: From rah at shipwright.com Thu Jul 20 13:03:14 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 20 Jul 2006 16:03:14 -0400 Subject: [Clips] Judge rules against government in spying lawsuit Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Thu, 20 Jul 2006 15:56:51 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Judge rules against government in spying lawsuit Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com Judge rules against government in spying lawsuit - By DAVID KRAVETS, AP Legal Affairs Writer Thursday, July 20, 2006 (07-20) 12:51 PDT San Francisco (AP) -- A federal judge on Thursday rejected a government bid to dismiss a lawsuit challenging the Bush administration's domestic spying program, saying it failed to qualify as a "state secret" because it had been widely reported. U.S. District Judge Vaughn Walker said a case could go forward over AT&T's alleged involvement in President Bush's surveillance program adopted after the Sept. 11 terror attacks. "The compromise between liberty and security remains a difficult one," Walker wrote in his ruling. "But dismissing this case at the outset would sacrifice liberty for no apparent enhancement of security." The government invoked the so-called "state secrets privilege" and said the case by Electronic Frontier Foundation should be thrown out because it threatens to reveal state secrets and jeopardize the war on terror. "It might appear that none of the subject matter in this litigation could be considered a secret given that the alleged surveillance programs have been so widely reported in the media," Walker said in his ruling. The case is one of dozens nationwide against telecoms and the government alleging they are illegally intercepting Americans' electronic communications without warrants. Thursday's decision was the first to address the state secrets defense. The Justice Department did not immediately return calls seeking comment. The lawsuit by the privacy group tests the constitutionality of Bush's asserted wartime powers to eavesdrop on Americans without warrants. The government intervened and said that divulging information about any alleged collusion between AT&T and the government could subject AT&T employees and facilities to attack and would enable terrorists "to communicate more securely." The legal tactic of state secrets privilege, first recognized by the U.S. Supreme Court in a McCarthy-era lawsuit, has been increasingly and successfully invoked by federal lawyers seeking to shield the government from scrutiny by the courts, from espionage cases and patent disputes to routine employment discrimination lawsuits. The president confirmed in December that the National Security Agency has been conducting warrantless surveillance of calls and e-mails thought to involve al-Qaida terrorists if at least one of the parties to the communication is outside the United States. The administration is mum on whether purely domestic calls and electronic communications are being monitored as the suit alleges. The suit was brought by EFF on behalf of customers of San Antonio-based AT&T. The group accuses the telecom of illegally cooperating with the NSA to make communications on AT&T networks available to the spy agency without warrants. The EFF asked Judge Walker to rule on whether the president possesses wartime powers to authorize warrantless eavesdropping in the United States without publicly disclosing any classified or sensitive material. The EFF charged that AT&T, which neither confirms nor denies the allegations, practices "wholesale surveillance" of its customers. Walker also declined to dismiss AT&T from the case. "AT&T cannot seriously contend that a reasonable entity in its position could have believed that the alleged domestic dragnet was legal," Walker wrote. The U.S. Supreme Court upheld the state secrets defense as recently as January, when it rejected an appeal from a former covert CIA officer who accused the agency of racial discrimination. And in May, citing the state secrets defense, the government urged a federal judge in Virginia to block a lawsuit by a German national who says he was illegally held and tortured in a CIA-run prison in Afghanistan for four months. The Supreme Court first recognized the state secrets doctrine in 1953, when it dismissed a lawsuit against the government brought by family members of people killed in a plane wreck while testing secret electronic surveillance equipment. The case is Hepting v. AT&T Inc., 06-0672. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dobkin at aaanet.ru Thu Jul 20 06:20:04 2006 From: dobkin at aaanet.ru (Carola) Date: Thu, 20 Jul 2006 16:20:04 +0300 Subject: How do you do Message-ID: <008f01c6abff$2f95e280$b522000a@QMNK> Ave !! I'm a very young and energetic lady! I have very positive attitude to life and people. I do enjoy new experience life can offer me: to see new interesting places, to meet new people. I do try to enjoy every moment of life and accept everything the way it comes without complaining. Though my life seems to be quite enjoyable there's one important thing missing. It's LOVE! Without my beloved one, my soul mate, my King my life is not completed. I wish i coud find him very soon so that we could share together every momement of the life-time romance! What about you? Could you be my King? If answer is "yes" - you can find more about me http://hope-for-love.com/ Best regards, Carola If you think that you were subscribed by mistake for this mail delivery or if your email has been added without your permission, please, visit http://hope-for-love.com/ and unsubscribe from our mails. From eugen at leitl.org Thu Jul 20 09:18:23 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jul 2006 18:18:23 +0200 Subject: Cracking RSA? In-Reply-To: <20060720155723.9276.qmail@web35212.mail.mud.yahoo.com> References: <20060720155723.9276.qmail@web35212.mail.mud.yahoo.com> Message-ID: <20060720161823.GT14701@leitl.org> On Thu, Jul 20, 2006 at 08:57:23AM -0700, Morlock Elloi wrote: > There is a constant 20 years lag between a crack and public awareness of the > same. We'll know in 2016. It's too bad gpg doesn't support use of large one-time pad files, one for a single recipient, or a group of recipients. > But you are reasonably safe in the meantime - remember, during WW2 Germans I use encryption for the same reason I use envelopes for my mail. It puts up a higher threshold for getting at the contents. NSA recommends to move on to elliptic curve crypto http://www.nsa.gov/ia/industry/crypto_elliptic_curve.cfm whether this is something they can break far more easily, or because nobody can crack it but them, or because nobody can yet crack it. Related question: do you think AES is weaker than 3DES? > submarines were allowed to sink many ships in order to mask breaking of Enigma. > The tactic for others was to send planes to 'accidentally' spot the submarine. > All analogies are perfectly valid today. To maintain the potential crack > technology an asset, they will have to use plausible classical means of > discovering the plaintext. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ybzdhgclifb at choicenetonline.com Thu Jul 20 19:29:43 2006 From: ybzdhgclifb at choicenetonline.com (Webmaster) Date: Thu, 20 Jul 2006 18:29:43 -0800 Subject: Effective & safe for depression and anxiety Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1135 bytes Desc: not available URL: From ErikMcrae at motion.net Thu Jul 20 04:42:52 2006 From: ErikMcrae at motion.net (Jesus Patterson) Date: Thu, 20 Jul 2006 19:42:52 +0800 Subject: Fwd: Diet Pill Breakthrough! Message-ID: <8892540.90464@motion.net> required. Write to the editor at the address below to pursue permissions. The editor of this page intends to respect any program has this feature, or change the To: line of your reply to the list's posting address (which is included at the bottom -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 884 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bemoan.png Type: image/png Size: 7197 bytes Desc: not available URL: From faxzz7ovgl at blackindependence.com Thu Jul 20 23:17:31 2006 From: faxzz7ovgl at blackindependence.com (Diane Mi) Date: Thu, 20 Jul 2006 22:17:31 -0800 Subject: y MEDICATIONS AT LOW PRICE, TODAY PROMOTION ONLY ought bread Message-ID: <671708.8[5 From otdjno at insightbb.com Fri Jul 21 00:24:06 2006 From: otdjno at insightbb.com (Terrence) Date: Thu, 20 Jul 2006 23:24:06 -0800 Subject: You Pass the Pinch Test? Message-ID: <200607210608.k6L68YSM019762@proton.jfet.org> "Yay! I have lost 7 pounds this week! It is so much easier to stick to Southbeach (low carb) while I am taking the Hoodia. Thank you so much!" Jame G., Miami, FL http://156.speclialdietz.com Desist any further contacts http://156.speclialdietz.com/rm/ From camera_lumina at hotmail.com Fri Jul 21 07:41:08 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 21 Jul 2006 10:41:08 -0400 Subject: Judge rules against government: 1st Annual Cypherpunks Award In-Reply-To: Message-ID: It's interesting to consider that Wired may have deliberately published as much as it could about AT&T in order to defuse the claim that a public trial would compromise national security--if the details are already publically available then that argument fails. A very cypherpunkly action. I nominate Wired for the 1st annual Cypherpunks award. We should also have a "Needs Killing" AP award... -TD >From: "R.A. Hettinga" >To: cypherpunks at jfet.org >Subject: [Clips] Judge rules against government in spying lawsuit >Date: Thu, 20 Jul 2006 16:03:14 -0400 > >--- begin forwarded text > > > Delivered-To: rah at shipwright.com > Delivered-To: clips at philodox.com > Date: Thu, 20 Jul 2006 15:56:51 -0400 > To: Philodox Clips List > From: "R.A. Hettinga" > Subject: [Clips] Judge rules against government in spying lawsuit > Reply-To: clips-chat at philodox.com > Sender: clips-bounces at philodox.com > > > > > > > Judge rules against government in spying lawsuit > > - By DAVID KRAVETS, AP Legal Affairs Writer > > Thursday, July 20, 2006 > > (07-20) 12:51 PDT San Francisco (AP) -- > > A federal judge on Thursday rejected a government bid to dismiss a >lawsuit > challenging the Bush administration's domestic spying program, saying it > failed to qualify as a "state secret" because it had been widely >reported. > > U.S. District Judge Vaughn Walker said a case could go forward over >AT&T's > alleged involvement in President Bush's surveillance program adopted >after > the Sept. 11 terror attacks. > > "The compromise between liberty and security remains a difficult one," > Walker wrote in his ruling. "But dismissing this case at the outset >would > sacrifice liberty for no apparent enhancement of security." > > The government invoked the so-called "state secrets privilege" and said >the > case by Electronic Frontier Foundation should be thrown out because it > threatens to reveal state secrets and jeopardize the war on terror. > > "It might appear that none of the subject matter in this litigation >could > be considered a secret given that the alleged surveillance programs have > been so widely reported in the media," Walker said in his ruling. > > The case is one of dozens nationwide against telecoms and the government > alleging they are illegally intercepting Americans' electronic > communications without warrants. Thursday's decision was the first to > address the state secrets defense. > > The Justice Department did not immediately return calls seeking comment. > > The lawsuit by the privacy group tests the constitutionality of Bush's > asserted wartime powers to eavesdrop on Americans without warrants. The > government intervened and said that divulging information about any >alleged > collusion between AT&T and the government could subject AT&T employees >and > facilities to attack and would enable terrorists "to communicate more > securely." > > The legal tactic of state secrets privilege, first recognized by the >U.S. > Supreme Court in a McCarthy-era lawsuit, has been increasingly and > successfully invoked by federal lawyers seeking to shield the government > from scrutiny by the courts, from espionage cases and patent disputes to > routine employment discrimination lawsuits. > > The president confirmed in December that the National Security Agency >has > been conducting warrantless surveillance of calls and e-mails thought to > involve al-Qaida terrorists if at least one of the parties to the > communication is outside the United States. > > The administration is mum on whether purely domestic calls and >electronic > communications are being monitored as the suit alleges. > > The suit was brought by EFF on behalf of customers of San Antonio-based > AT&T. The group accuses the telecom of illegally cooperating with the >NSA > to make communications on AT&T networks available to the spy agency >without > warrants. > > The EFF asked Judge Walker to rule on whether the president possesses > wartime powers to authorize warrantless eavesdropping in the United >States > without publicly disclosing any classified or sensitive material. The >EFF > charged that AT&T, which neither confirms nor denies the allegations, > practices "wholesale surveillance" of its customers. > > Walker also declined to dismiss AT&T from the case. > > "AT&T cannot seriously contend that a reasonable entity in its position > could have believed that the alleged domestic dragnet was legal," Walker > wrote. > > The U.S. Supreme Court upheld the state secrets defense as recently as > January, when it rejected an appeal from a former covert CIA officer who > accused the agency of racial discrimination. And in May, citing the >state > secrets defense, the government urged a federal judge in Virginia to >block > a lawsuit by a German national who says he was illegally held and >tortured > in a CIA-run prison in Afghanistan for four months. > > The Supreme Court first recognized the state secrets doctrine in 1953, >when > it dismissed a lawsuit against the government brought by family members >of > people killed in a plane wreck while testing secret electronic >surveillance > equipment. > > The case is Hepting v. AT&T Inc., 06-0672. > > > -- > ----------------- > R. A. Hettinga > The Internet Bearer Underwriting Corporation > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and antiquity, > [predicting the end of the world] has not been found agreeable to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > _______________________________________________ > Clips mailing list > Clips at philodox.com > http://www.philodox.com/mailman/listinfo/clips > >--- end forwarded text > > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From brandy at riyssc.com Sat Jul 22 00:46:03 2006 From: brandy at riyssc.com (Virginia Suggs) Date: Sat, 22 Jul 2006 03:46:03 -0400 Subject: This is most modern and safe way not to cover with shame Message-ID: <67842349956250.36203706ED@D5V2> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://qr7t.dalldust.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From jtrjtrjtr2001 at yahoo.com Sat Jul 22 06:09:48 2006 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Sat, 22 Jul 2006 06:09:48 -0700 (PDT) Subject: Indian govt. orders removal of allmost all blog blocks In-Reply-To: <20060718082607.95798.qmail@web33305.mail.mud.yahoo.com> Message-ID: <20060722130948.55436.qmail@web33312.mail.mud.yahoo.com> Finally they fixed it. http://www.hindu.com/2006/07/22/stories/2006072206991400.htm __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From PauletteLand at epix.net Fri Jul 21 17:33:12 2006 From: PauletteLand at epix.net (Wallace Nixon) Date: Sat, 22 Jul 2006 08:33:12 +0800 Subject: Order All Your Medicines online with No prior Prescription. Discreet Shipping. Message-ID: <85057155.05894914@epix.net> collection includes page images for over 1000 books from the latter part of the 19th century in the US. Some of the titles If the book isn't already online, but qualifies for listing here, I'll put it in my requests list. Unless you request -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 885 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: duluth.png Type: image/png Size: 7599 bytes Desc: not available URL: From salicornia at echtzeit.com Fri Jul 21 22:47:07 2006 From: salicornia at echtzeit.com (Robert) Date: Sat, 22 Jul 2006 09:47:07 +0400 Subject: isn't it time Message-ID: <52049452.39479A7@echtzeit.com> has ur pizzazz level been down recently or still drained all the time? I unequivocally am, that is why i am joyous i came upon http://skwf.toakrenindustries.org/nx/ and parachute for a moment she could not in cage stentorian tones: "I am poor verbal Nobs appeared dejected as we sincere Robert From keeping6le at thevine.net Sat Jul 22 11:00:43 2006 From: keeping6le at thevine.net (Adrienne Precious) Date: Sat, 22 Jul 2006 10:00:43 -0800 Subject: jq HOT SELLING MEDICATIONS FROM $1.14/PILL, TODAY PROMOTION ONLY very rich Message-ID: <819878044.7[5 From zwcqoxpbky at shawcable.net Sat Jul 22 09:24:42 2006 From: zwcqoxpbky at shawcable.net (Robbie Sears) Date: Sat, 22 Jul 2006 10:24:42 -0600 Subject: No subject Message-ID: <16970100805820.PTxAKO5s20@cowlick> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 576 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: erg.gif Type: image/gif Size: 13984 bytes Desc: not available URL: From reheikrtim at snowcrest.net Sat Jul 22 17:51:32 2006 From: reheikrtim at snowcrest.net (Mrs Abimelech) Date: Sat, 22 Jul 2006 16:51:32 -0800 Subject: Be 'Dr YOUR NAME' Today Message-ID: <6948294251.HDPSKFMN00158589@mail2.tpgi.com.au> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2506 bytes Desc: not available URL: From vera at rmahc.com Sat Jul 22 07:17:51 2006 From: vera at rmahc.com (Valeria Pritchard) Date: Sat, 22 Jul 2006 17:17:51 +0300 Subject: Open something new for your self Message-ID: <46301453002350.11A258C960@RBQ0> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://ctb.dalldust.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From galen at rjc.rjf.com Sat Jul 22 07:29:37 2006 From: galen at rjc.rjf.com (Davis Maher) Date: Sat, 22 Jul 2006 17:29:37 +0300 Subject: This is most modern and safe way not to cover with shame Message-ID: <26344142653145.4A72B3757B@JPV8G7H6> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://lxb.dalldust.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From CollinDominguez at copacabana.com Mon Jul 24 05:44:20 2006 From: CollinDominguez at copacabana.com (Mona Lugo) Date: Mon, 24 Jul 2006 20:44:20 +0800 Subject: Fwd: Medicines and Pills prescribed online and shipped to you discreetly overnight. Message-ID: backlog that prevents some online books from appearing immediately, but I will generally give priority to individual titles we intend to provide search as well as browse capabilities, to generate listings using names, dates, & country. Obviously, in -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 905 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: blutwurst.png Type: image/png Size: 7401 bytes Desc: not available URL: From ross at stapleton-gray.com Tue Jul 25 01:02:13 2006 From: ross at stapleton-gray.com (Ross Stapleton-Gray) Date: July 25, 2006 1:02:13 PM EDT Subject: [IP] RFID Clonable Message-ID: At 07:48 AM 7/25/2006, David Farber wrote: >In case anyone needed more proof that we're all living in a Philip K. >Dick novel, a pair of hackers have recently demonstrated how human- >implantable >RFID chips from VeriChip can be easily cloned, effectively stealing >the >person's identity. >... >For its part, VeriChip has only said they haven't yet had a chance >to review the evidence but still >insist that "it's very difficult to steal a VeriChip." Certainly literally true, if by "steal" one means, "get one's hands on the original, e.g., pry one out of Annalee Newitz's arm." But we should recongize that the vast majority of RFID applications [BUT NOT ALL djf] don't depend on inability to clone them. RFID tags in most commerce will be as unclonable as license plates, which anyone with a little tin, paint and shop skills could zap out copies of, but which nonetheless serve as a cheap means for reasonably reliable identification. Think of most RFID applications as just like print bar codes; there have been various cases of fraud committed against systems employing the latter, most notably where thieves use bar codes for inferior goods to purchase expensive ones ("Bar code says that's a drill bit, and it looks like a drill bit...") then return the goods to pocket the difference in price. The new wrinkle that RFID offers for commerce here is uniqueness: the local Home Depot currently knows that it has 500 units of carbide drill bit, all bearing identical bar codes... in an item-level RFID tagged world, it would know 500 unique serials, so spoofing the checkout clerk with a false tag becomes a little harder. And, with unique tags, it becomes easier to compile and retain longitudinal dossiers on "where has this thing been?" (if the various parties in supply chain actually read the tags): this is the aspect that will be used for pharmaceutical knockoff detection, where the overarching RFID tracking and management system will be able to provide some provenance information ("This very bottle was allegedly seen in Singapore 3 hours ago... something's not right"). This is also one of the more privacy-invasive aspects. I've seen one research effort (an NSF SBIR) looking at creating unclonable RFID thus far, which basically works, I believe, by extracting a physical signature of the item to be tagged (in the awarded research, it was magnetic signatures), and using that as part of the unique key, or perhaps registering that signature in an off- chip database that would need to be additionally queried. In the VeriChip hack, you might address the problem that that little chip merely spits out a unique ID that anyone who can read can rewrite into a new chip by having the implanted chip also encode some (relatively) unclonable aspect of the person the chip is embedded in, e.g., you can still "steal" the unique ID, but could only then use it in a chip in another (1) female; with (2) brown eyes; (3) blood type AB-; etc.; etc. But so far as I know the VeriChip used in human implants is just that little unique number... its value as a unique ID for security authentication depends a lot on it being hidden from 3rd party readers. Of course, we have this problem in spades all over the place... your SSN, or credit card number, can be fairly easily abused by anyone who knows it, despite the fact that you have to expose it to a lot of parties, many, many times over the course of a year. Ross ---- Ross Stapleton-Gray, Ph.D. Stapleton-Gray & Associates, Inc. http://www.stapleton-gray.com http://www.sortingdoor.com ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From Margaret_Pritchard at gmx.net Mon Jul 24 10:09:22 2006 From: Margaret_Pritchard at gmx.net (Christina Good) Date: Tue, 25 Jul 2006 01:09:22 +0800 Subject: The Hoodia ingredient in HoodiaLife is an all-natural. Message-ID: Google by the Author's Guild, for digitizing copyrighted books from libraries and making them searchable online. (Although information about the book. This information includes the full title and author names, links to the full book content, and -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 901 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: coco.png Type: image/png Size: 7197 bytes Desc: not available URL: From penelope at earthlink.net Mon Jul 24 15:36:59 2006 From: penelope at earthlink.net (Renee Milligan) Date: Tue, 25 Jul 2006 01:36:59 +0300 Subject: sexy baby and bad erection? Message-ID: <41980214935465.D7CFF23151@V21H> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://9yzj.snakeard.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From b.malin at vanderbilt.edu Tue Jul 25 10:10:47 2006 From: b.malin at vanderbilt.edu (Brad Malin) Date: July 25, 2006 10:10:47 AM EDT Subject: RFID Clonable Message-ID: Hi Dave, remember a couple of years ago when you said you wanted to clone and repeat RFIDs - apparently someone has built the system to it. -brad http://www.engadget.com/2006/07/24/verichips-human-implatable-rfid- chips-clo nable-sez-hackers/ VeriChip's human-implatable RFID chips clonable, sez hackers Posted Jul 24th 2006 4:14PM by Donald Melanson Filed under: Misc. Gadgets, Wireless In case anyone needed more proof that we're all living in a Philip K. Dick novel, a pair of hackers have recently demonstrated how human- implantable RFID chips from VeriChip can be easily cloned, effectively stealing the person's identity. Annalee Newitz and Jonathan Westhues showed off their handiwork at the HOPE Number Six conference in New York City this weekend, with Newitz herself playing the role of guinea pig, implanting a VeriChip RFID chip in her right arm. To clone the chip, Westhues first red Newitz's arm with a standard RFID reader, then scanned it again with a homebrew antenna connected to his laptop, which recorded the signal off the chip. He then used the same RFID reader to read the signal from his laptop, which promptly spit out Newtiz's supposedly unique ID. For its part, VeriChip has only said they haven't yet had a chance to review the evidence but still insist that "it's very difficult to steal a VeriChip." ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Tue Jul 25 07:48:56 2006 From: dave at farber.net (David Farber) Date: Tue, 25 Jul 2006 10:48:56 -0400 Subject: [IP] RFID Clonable Message-ID: Begin forwarded message: From dave at farber.net Tue Jul 25 10:55:12 2006 From: dave at farber.net (David Farber) Date: Tue, 25 Jul 2006 13:55:12 -0400 Subject: [IP] more on RFID Clonable Message-ID: Begin forwarded message: From edge9zg at louisa.net Tue Jul 25 13:50:32 2006 From: edge9zg at louisa.net (Sueann Octavia) Date: Tue, 25 Jul 2006 14:50:32 -0600 Subject: l POPULAR MEDICATIONS SAVE 82%-90% ON YOUR MEDICATION WITH US, $1.14/PILL reference your Message-ID: <64166908.9676069992.1949925314@louisa.net> YOUR BEST CHOICE FOR MEDS AT LOW $ We have popular meds * WHOLESALE PRICE FROM $1.14/PILL * No Doctor Visits * Secure 0rder * All countries shipping * Only FDA Approved Drugs * Fully Confidential * Next Day Priority Shipping * Discreet Packaging * Buy in Bulk and Save! Order Online Here http://www.geocities.com/kipamew3201/ book opened wonder. sooner make between and however pride, -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1412 bytes Desc: not available URL: From zwtewy at meshworx.com Tue Jul 25 17:18:46 2006 From: zwtewy at meshworx.com (Mrs Courtney) Date: Tue, 25 Jul 2006 16:18:46 -0800 Subject: A college diploma can help you get a better job now. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2418 bytes Desc: not available URL: From DorityNoyodjluctgrjshf at reesesources.com Tue Jul 25 14:19:36 2006 From: DorityNoyodjluctgrjshf at reesesources.com (Mrs Ginsberg) Date: Tue, 25 Jul 2006 16:19:36 -0500 Subject: Looking to refinance? Visit our refinance guide. Message-ID: <7256c36z5jfg78g067k48w2x0032dx11@tidni.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 816 bytes Desc: not available URL: From eugen at leitl.org Tue Jul 25 07:52:24 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 25 Jul 2006 16:52:24 +0200 Subject: [dave@farber.net: [IP] RFID Clonable] Message-ID: <20060725145224.GK14701@leitl.org> ----- Forwarded message from David Farber ----- From yangxuefenger at hinet.net Mon Jul 24 23:43:56 2006 From: yangxuefenger at hinet.net (jyafar) Date: Tue, 25 Jul 2006 18:43:56 +1200 Subject: High quality elegant watches for both Men and Women Message-ID: Classy Re#^icated Watches The lowest prices and highest quality re&plicas found online, duplicated to every detail of the genuine brand. http://www.unique-beauty.com From m.dodge at manchester.ac.uk Tue Jul 25 12:29:05 2006 From: m.dodge at manchester.ac.uk (martin dodge) Date: Tue, 25 Jul 2006 20:29:05 +0100 (BST) Subject: [Geowanking] Google Earth as the 'view from nowhere': CFP for the Association of American Geographers 2007 conference Message-ID: Hello, I hope this might be of interest to some people on the list. cheers martin ----- Call for papers - 2007 Association of American Geographers Annual Conference. 17-21 April 2007, San Francisco, California, USA. http://www.aag.org/annualmeetings/SF2007/ Google Earth as the 'view from nowhere': the spatial politics of high-resolution satellite imagery Session organisers: Chris Perkins and Martin Dodge Geography, School of Environment and Development, University of Manchester Context: Google Earth, and various internet portals, offer ubiquitous high-resolution satellite imagery at unprecedented detail to a global audience through simple interfaces. The capabilities and technical beauty of Google Earth, in particular, has garnered wide spread praise and a rapidly growing fan-base. Given this impact, now is an apposite time for considered reflection on exactly what can been seen with satellite imagery and thinking through the spatial politics of newly accessible images of the world. Pictures taken from satellites orbiting high above the Earth offer people a seductively objective view of the world below, termed by Thomas Nagel the 'view from nowhere'. This mirror-like viewpoint over territory, has until recently, been for the most part the preserve of military forces and states have jealously guarded their visual power in the interest of national security. But recent technological and social change has led to increasing spatial and temporal data resolution becoming much more widely available, in large part because the 'mirror' is being commercialised, and significantly access through the internet portals seems to be offering a means of challenging the power of the formerly elite discourse. We invite theoretically informed analysis that questions the ontological surety of satellite imagery. Suggested themes: # Explore the tensions between transparency and secrecy that percolate debates about access to high-resolution satellite imagery. # Reflect on the potential for progressive use of imagery by non-state actors to challenge established power relations. # Examine the politics of socio-technical infrastructures and corporate practices that underpin image dissemination, censorship and manipulation. # Critique the naturalizing power of the interfaces to systems like Google Earth, particularly in relation to the military origins of these systems. # Question the uneven spatial provision of imagery and the commercial logics of points of interest databases. # Analyse growing mass media use of high-resolution satellite imagery. # Evaluate alternative visualities from artists who employ the 'view from nowhere' to problematize relations between subject and object. # Interrogate notions of satellite ethics, particularly relating to individual privacy and community rights. # Situate the potential of progressive pedagogy employing high-resolution satellite imagery. # Assess the cultural meanings attached the imagery and the nature of the new community of practices emerging (such as 'black helicopter' spotters). ---- Proposed papers in the form of a title and short abstract (250 words maximum) should be submitted to Martin Dodge (m.dodge at manchester.ac.uk) by 15th September 2006. Further details on the paper requirements and registration for the AAG meeting are at http://www.aag.org/annualmeetings/SF2007/call4papers.cfm ---- Martin Dodge Geography, School of Environment and Development, The University of Manchester, Oxford Road, Manchester, M13 9PL, UK -- -------------------------------------------------------------------- Distributed by CARTO-SoC, the Society of Cartographers Mailing List. For more details about this List and the Society, visit our web site: http://www.soc.org.uk Join the Society on-line now: http://www.soc.org.uk/member.html _______________________________________________ Geowanking mailing list Geowanking at lists.burri.to http://lists.burri.to/mailman/listinfo/geowanking ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Tue Jul 25 12:02:50 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 25 Jul 2006 21:02:50 +0200 Subject: [dave@farber.net: [IP] more on RFID Clonable] Message-ID: <20060725190249.GX14701@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Tue Jul 25 12:45:09 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 25 Jul 2006 21:45:09 +0200 Subject: [m.dodge@manchester.ac.uk: [Geowanking] Google Earth as the 'view from nowhere': CFP for the Association of American Geographers 2007 conference] Message-ID: <20060725194509.GA14701@leitl.org> ----- Forwarded message from martin dodge ----- From suppressible at rocketmail.com Tue Jul 25 10:53:06 2006 From: suppressible at rocketmail.com (NewsAlert) Date: Tue, 25 Jul 2006 21:53:06 +0400 Subject: Refinance NOW while rates are still low. You could save Hundreds per month! Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2570 bytes Desc: not available URL: From MolesGrazinaitkzdksj at bootnetworks.com Tue Jul 25 22:51:58 2006 From: MolesGrazinaitkzdksj at bootnetworks.com (Miss Dambrosio) Date: Wed, 26 Jul 2006 00:51:58 -0500 Subject: Lower your payment up to 35%. Act now before rates rise. Message-ID: <7794489860.LMKAEVFW25281719@mail3.tpgi.com.au> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 997 bytes Desc: not available URL: From WellingtonAnnefivhhpn at eclectechs.com Tue Jul 25 23:31:42 2006 From: WellingtonAnnefivhhpn at eclectechs.com (Miss Amani) Date: Wed, 26 Jul 2006 01:31:42 -0500 Subject: Buying a new home? Search over 2 million home listings. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 865 bytes Desc: not available URL: From ogjmvl at aaccess.net Wed Jul 26 07:40:11 2006 From: ogjmvl at aaccess.net (Online Degrees Newsletter) Date: Wed, 26 Jul 2006 06:40:11 -0800 Subject: Dr YOUR NAME, will it bring raise your income? Message-ID: <80726458399060.qkrxg056KF@kirby> on bluegill it's purport may antigorite be axiom the revolve -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2635 bytes Desc: not available URL: From camera_lumina at hotmail.com Wed Jul 26 04:21:44 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 26 Jul 2006 07:21:44 -0400 Subject: [dave@farber.net: [IP] more on RFID Clonable] In-Reply-To: <20060725190249.GX14701@leitl.org> Message-ID: Well, the next question is whether we can surreptitiously insert an ID into someone's implanted tag, The possibilities are amusing to say the least... -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [dave at farber.net: [IP] more on RFID Clonable] >Date: Tue, 25 Jul 2006 21:02:50 +0200 > >----- Forwarded message from David Farber ----- > >From: David Farber >Date: Tue, 25 Jul 2006 13:55:12 -0400 >To: ip at v2.listbox.com >Subject: [IP] more on RFID Clonable >X-Mailer: Apple Mail (2.752.2) >Reply-To: dave at farber.net > > > >Begin forwarded message: > >From: Ross Stapleton-Gray >Date: July 25, 2006 1:02:13 PM EDT >To: dave at farber.net >Subject: Re: [IP] RFID Clonable > >At 07:48 AM 7/25/2006, David Farber wrote: > >In case anyone needed more proof that we're all living in a Philip K. > >Dick novel, a pair of hackers have recently demonstrated how human- > >implantable > >RFID chips from VeriChip can be easily cloned, effectively stealing > >the > >person's identity. > >... > >For its part, VeriChip has only said they haven't yet had a chance > >to review the evidence but still > >insist that "it's very difficult to steal a VeriChip." > >Certainly literally true, if by "steal" one means, "get one's hands >on the original, e.g., pry one out of Annalee Newitz's arm." > >But we should recongize that the vast majority of RFID applications >[BUT NOT ALL djf] don't depend on inability to clone them. RFID >tags in most commerce will be as unclonable as license plates, which >anyone with a little tin, paint and shop skills could zap out copies >of, but which nonetheless serve as a cheap means for reasonably >reliable identification. Think of most RFID applications as just >like print bar codes; there have been various cases of fraud >committed against systems employing the latter, most notably where >thieves use bar codes for inferior goods to purchase expensive ones >("Bar code says that's a drill bit, and it looks like a drill >bit...") then return the goods to pocket the difference in price. > >The new wrinkle that RFID offers for commerce here is uniqueness: the >local Home Depot currently knows that it has 500 units of carbide >drill bit, all bearing identical bar codes... in an item-level RFID >tagged world, it would know 500 unique serials, so spoofing the >checkout clerk with a false tag becomes a little harder. And, with >unique tags, it becomes easier to compile and retain longitudinal >dossiers on "where has this thing been?" (if the various parties in >supply chain actually read the tags): this is the aspect that will be >used for pharmaceutical knockoff detection, where the overarching >RFID tracking and management system will be able to provide some >provenance information ("This very bottle was allegedly seen in >Singapore 3 hours ago... something's not right"). This is also one >of the more privacy-invasive aspects. > >I've seen one research effort (an NSF SBIR) looking at creating >unclonable RFID thus far, which basically works, I believe, by >extracting a physical signature of the item to be tagged (in the >awarded research, it was magnetic signatures), and using that as part >of the unique key, or perhaps registering that signature in an off- >chip database that would need to be additionally queried. > >In the VeriChip hack, you might address the problem that that little >chip merely spits out a unique ID that anyone who can read can >rewrite into a new chip by having the implanted chip also encode some >(relatively) unclonable aspect of the person the chip is embedded in, >e.g., you can still "steal" the unique ID, but could only then use it >in a chip in another (1) female; with (2) brown eyes; (3) blood type >AB-; etc.; etc. But so far as I know the VeriChip used in human >implants is just that little unique number... its value as a unique >ID for security authentication depends a lot on it being hidden from >3rd party readers. Of course, we have this problem in spades all >over the place... your SSN, or credit card number, can be fairly >easily abused by anyone who knows it, despite the fact that you have >to expose it to a lot of parties, many, many times over the course of >a year. > >Ross > > > > >---- >Ross Stapleton-Gray, Ph.D. >Stapleton-Gray & Associates, Inc. >http://www.stapleton-gray.com >http://www.sortingdoor.com > > > > > > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From OrtonCaitlyneypv at 711.net Wed Jul 26 06:40:26 2006 From: OrtonCaitlyneypv at 711.net (Ms Bufkin) Date: Wed, 26 Jul 2006 08:40:26 -0500 EDT Subject: We never repent of having eaten too little Message-ID: <443856646778.0310049097554683@welcomebuddy.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1469 bytes Desc: not available URL: From rforno at infowarrior.org Wed Jul 26 10:54:17 2006 From: rforno at infowarrior.org (Richard Forno) Date: July 26, 2006 10:54:17 PM EDT Subject: Police Blotter: Laptop border searches OK'd Message-ID: Police Blotter: Laptop border searches OK'd By Declan McCullagh http://news.com.com/Police+Blotter+Laptop+border+searches+OKd/ 2100-1030_3-60 98939.html Story last modified Wed Jul 26 18:12:18 PDT 2006 "Police blotter" is a weekly CNET News.com report on the intersection of technology and the law. What: A business traveler protests the warrantless search and seizure of his laptop by Homeland Security at the U.S.-Canada border. When: 9th Circuit Court of Appeals rules on July 24. Outcome: Three-judge panel unanimously says that border police may conduct random searches of laptops without search warrants or probable cause. These searches can include seizing the laptop and subjecting it to extensive forensic analysis. What happened, according to court documents: In January 2004, Stuart Romm traveled to Las Vegas to attend a training seminar for his new employer. Then, on Feb. 1, Romm continued the business trip by boarding a flight to Kelowna, British Columbia. Romm was denied entry by the Canadian authorities because of his criminal history. When he returned to the Seattle-Tacoma airport, he was interviewed by two agents of Homeland Security's Immigration and Customs Enforcement division. They asked to search his laptop, and Romm agreed. Agent Camille Sugrue would later testify that she used the "EnCase" software to do a forensic analysis of Romm's hard drive. That analysis and a subsequent one found some 42 child pornography images, which had been present in the cache used by Romm's Web browser and then deleted. But because in most operating systems, only the directory entry is removed when a file is "deleted," the forensic analysis was able to recover the actual files. During the trial, Romm's attorney asked that the evidence from the border search be suppressed. The trial judge disagreed. Romm was eventually sentenced to two concurrent terms of 10 and 15 years for knowingly receiving and knowingly possessing child pornography. The 9th Circuit refused to overturn his conviction, ruling that American citizens effectively enjoy no right to privacy when stopped at the border. "We hold first that the ICE's forensic analysis of Romm's laptop was permissible without probable cause or a warrant under the border search doctrine," wrote Judge Carlos Bea. Joining him in the decision were Judges David Thompson and Betty Fletcher. Bea cited the 1985 case of U.S. v. Montoya de Hernandez, in which a woman arriving in Los Angeles from Columbia was detained. Police believed she had swallowed balloons filled with cocaine, even though the court said they had no "clear indication" of it and did not have probable cause to search her. Nevertheless, the Supreme Court said police could rectally examine De Hernandez because it was a border crossing and, essentially, anything goes. (The rectal examination, by the way, did find 88 balloons filled with cocaine that had been smuggled in her alimentary canal.) Justices William Brennan and Thurgood Marshall dissented. They said the situation De Hernandez experienced had "the hallmark of a police state." "To be sure, the court today invokes precedent stating that neither probable cause nor a warrant ever have been required for border searches," Brennan wrote. "If this is the law as a general matter, I believe it is time that we re-examine its foundations." But Brennan and Marshall were outvoted by their fellow justices, who ruled that the drug war trumped privacy, citing a "veritable national crisis in law enforcement caused by smuggling of illicit narcotics." Today their decision means that laptop-toting travelers should expect no privacy either. As an aside, a report last year from a U.S.-based marijuana activist says U.S. border guards looked through her digital camera snapshots and likely browsed through her laptop's contents. A London-based correspondent for The Economist magazine once reported similar firsthand experiences, and a 1998 article in The New York Times described how British customs scan laptops for sexual material. Here are some tips on using encryption to protect your privacy. Excerpt from the court's opinion (Click here for PDF): "First, we address whether the forensic analysis of Romm's laptop falls under the border search exception to the warrant requirement...Under the border search exception, the government may conduct routine searches of persons entering the United States without probable cause, reasonable suspicion, or a warrant. For Fourth Amendment purposes, an international airport terminal is the "functional equivalent" of a border. Thus, passengers deplaning from an international flight are subject to routine border searches. Romm argues he was not subject to a warrantless border search because he never legally crossed the U.S.-Canada border. We have held the government must be reasonably certain that the object of a border search has crossed the border to conduct a valid border search....In all these cases, however, the issue was whether the person searched had physically crossed the border. There is no authority for the proposition that a person who fails to obtain legal entry at his destination may freely re-enter the United States; to the contrary, he or she may be searched just like any other person crossing the border. Nor will we carve out an "official restraint" exception to the border search doctrine, as Romm advocates. We assume for the sake of argument that a person who, like Romm, is detained abroad has no opportunity to obtain foreign contraband. Even so, the border search doctrine is not limited to those cases where the searching officers have reason to suspect the entrant may be carrying foreign contraband. Instead, 'searches made at the border...are reasonable simply by virtue of the fact that they occur at the border.' Thus, the routine border search of Romm's laptop was reasonable, regardless whether Romm obtained foreign contraband in Canada or was under "official restraint." In sum, we hold first that the ICE's forensic analysis of Romm's laptop was permissible without probable cause or a warrant under the border search doctrine." ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From Nettie60 at cooltoad.com Wed Jul 26 14:32:46 2006 From: Nettie60 at cooltoad.com (Charlotte) Date: Wed, 26 Jul 2006 13:32:46 -0800 Subject: cooltoad.com Message-ID: <5155713855.1468003685@as02.cooltoad.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $480,000 as low as 3.60% $390,000 as low as 3.90% $250,000 as low as 3.85% $150,000 as low as 3.95% Visit our site by clicking http://www.tyu2s.net Nettie Beck Account Manager From rah at shipwright.com Wed Jul 26 15:09:07 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jul 2006 18:09:07 -0400 Subject: [Clips] Marshals: Innocent People Placed On 'Watch List' To Meet Quota Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Wed, 26 Jul 2006 17:59:25 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Marshals: Innocent People Placed On 'Watch List' To Meet Quota Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com TheDenverChannel.com Related To Story Marshals: Innocent People Placed On 'Watch List' To Meet Quota Marshals Say They Must File One Surveillance Detection Report, Or SDR, Per Month POSTED: 9:49 pm MDT July 21, 2006 UPDATED: 10:56 pm MDT July 21, 2006 DENVER -- You could be on a secret government database or watch list for simply taking a picture on an airplane. Some federal air marshals say they're reporting your actions to meet a quota, even though some top officials deny it. The air marshals, whose identities are being concealed, told 7NEWS that they're required to submit at least one report a month. If they don't, there's no raise, no bonus, no awards and no special assignments. "Innocent passengers are being entered into an international intelligence database as suspicious persons, acting in a suspicious manner on an aircraft ... and they did nothing wrong," said one federal air marshal. These unknowing passengers who are doing nothing wrong are landing in a secret government document called a Surveillance Detection Report, or SDR. Air marshals told 7NEWS that managers in Las Vegas created and continue to maintain this potentially dangerous quota system. "Do these reports have real life impacts on the people who are identified as potential terrorists?" 7NEWS Investigator Tony Kovaleski asked. "Absolutely," a federal air marshal replied. 7NEWS obtained an internal Homeland Security document defining an SDR as a report designed to identify terrorist surveillance activity. "When you see a decision like this, for these reports, who loses here?" Kovaleski asked. "The people we're supposed to protect -- the American public," an air marshal said. What kind of impact would it have for a flying individual to be named in an SDR? "That could have serious impact ... They could be placed on a watch list. They could wind up on databases that identify them as potential terrorists or a threat to an aircraft. It could be very serious," said Don Strange, a former agent in charge of air marshals in Atlanta. He lost his job attempting to change policies inside the agency. That's why several air marshals object to a July 2004 memo from top management in the Las Vegas office, a memo that reminded air marshals of the SDR requirement. The body of the memo said, "Each federal air marshal is now expected to generate at least one SDR per month." "Does that memo read to you that Federal Air Marshal headquarters has set a quota on these reports?" Kovaleski asked. "Absolutely, no doubt," an air marshal replied. A second management memo, also dated July 2004, said, "There may come an occasion when you just don't see anything out of the ordinary for a month at a time, but I'm sure that if you are looking for it, you'll see something." Another federal air marshal said that not only is there a quota in Las Vegas for SDRs, but that "it directly reflects on (their) performance evaluations" and on how much money they make. The director of the Air Marshal Service, Dana Brown, declined 7NEWS' request for an interview on the quota system. But the agency points to a memo from August 2004 that said there is not a quota for submitting SDRs and which goes on to say, "I do not expect reports that are inaccurate or frivolous." But, Las Vegas-based air marshals say the quota system remains in force, now more than two years after managers sent the original memos, and that it's a mandate from management that impacts annual raises, bonuses, awards and special assignments. "To meet this quota, to get their raises, do you think federal air marshals in Las Vegas are making some of this stuff up?" Kovaleski asked. "I know they are. It's a joke," an air marshal replied. "Have marshals in the Las Vegas office, I don't want to say fabricated, but 'created' reports?" Kovaleski asked. "Creative writing -- stretching a long ways the truth, yes," an air marshal replied. One example, according to air marshals, occurred on one flight leaving Las Vegas, when an unknowing passenger, most likely a tourist, was identified in an SDR for doing nothing more than taking a photo of the Las Vegas skyline as his plane rolled down the runway. "You're saying that was not an accurate portrayal of a potential terrorist activity?" Kovaleski asked. "No, it was not," an air marshal said. "It was a marshal trying to meet a quota ..." Kovaleski said. "Yes, he was," the air marshal replied. Strange said he didn't have a quota in the Atlanta office when he was in charge. "I would never have done that ... You are going to have people reporting every suspicious looking activity they come across, whether they in their heart feel like it's a threat, just to meet the quota," Strange said. Strange and other air marshals said the quota allows the government to fill a database with bad information. A Las Vegas air marshal said he didn't write an SDR every month for exactly that reason. "Well, it's intelligence information, and like any system, if you put garbage in, you get garbage out," the air marshal said. "I would like to see an investigation -- a real investigation conducted into the ways things are done here," the air marshal in Las Vegas said. Although the agency strongly denies any presence of a quota system, Las Vegas-based air marshals have produced documents that show their performance review is directly linked to producing SDRs. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jul 26 15:09:11 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jul 2006 18:09:11 -0400 Subject: [Clips] [IP] terrorism = traffic tickets? ABC News on air marshalls' pressure to meet "quotas" for identifying terror suspects Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Wed, 26 Jul 2006 18:00:47 -0400 To: "Philodox Clips List" From: "R.A. Hettinga" Subject: [Clips] [IP] terrorism = traffic tickets? ABC News on air marshalls' pressure to meet "quotas" for identifying terror suspects Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text Delivered-To: rah at shipwright.com From: David Farber Subject: [IP] terrorism = traffic tickets? ABC News on air marshalls' pressure to meet "quotas" for identifying terror suspects Date: Wed, 26 Jul 2006 10:07:38 -0400 To: ip at v2.listbox.com Reply-To: dave at farber.net Begin forwarded message: From: Ethan Ackerman Date: July 26, 2006 10:01:19 AM EDT To: David Farber Subject: terrorism = traffic tickets? ABC News on air marshalls' pressure to meet "quotas" for identifying terror suspects Greetings Dave, ABC News 7 in Denver has series of stories & interviews that are also online at http://www.thedenverchannel.com/7newsinvestigates/index.html The series investigates several aspects of apparent Air Marshals management-employee disputes, but most disturbing is the disclosure of an alleged "quota" requirement within the service for filing "Surveillance Detection Reports" identifying suspicious passengers. The "quota" system was apparently disclosed by disgruntled former Marshals, who point to directives requiring "Each federal air marshal is now expected to generate at least one SDR per month" and that citizens identified in these reports are placed on various watch lists. Apparently filing a certain minimum number of reports was necessary for performance review and compensation purposes. The managers contacted did not deny the memos but did say that no quota existed. The investigations have apparently gotten some Congressional attention. ------------------------------------- You are subscribed as rah at shipwright.com To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Jul 26 15:09:15 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 26 Jul 2006 18:09:15 -0400 Subject: [Clips] [IP] DO READ --- Quota system for Air Marshal Surveillance Detection Reports? Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Wed, 26 Jul 2006 18:02:29 -0400 To: "Philodox Clips List" From: "R.A. Hettinga" Subject: [Clips] [IP] DO READ --- Quota system for Air Marshal Surveillance Detection Reports? Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text Delivered-To: rah at shipwright.com From: David Farber Subject: [IP] DO READ --- Quota system for Air Marshal Surveillance Detection Reports? Date: Wed, 26 Jul 2006 10:08:28 -0400 To: ip at v2.listbox.com Reply-To: dave at farber.net Begin forwarded message: From: "Brock N. Meeks" Date: July 26, 2006 9:45:28 AM EDT To: dave at farber.net Subject: Re: [IP] Quota system for Air Marshal Surveillance Detection Reports? Well, it so happens that I was the one that BROKE this story... way back in 2004. There were at least two offices, Miami and Las Vegas that had this quota system for writing up and filing "SDRs." The requirement was totally renegade and NOT endorsed by Air Marshal officials in Washington. The Las Vegas Air Marshal field office was (I think he's retired now) by a real cowboy at the time, someone that caused a lot of problems for the Washington HQ staff. (That official once grilled an Air Marshal for three hours in an interrogation room because he thought the air marshal was source of mine on another story. The air marshal was then taken off flight status and made to wash the office cars for two weeks... I broke that story, too. And no, the punished air marshal was never a source of mine.) Air marshals told they were filing false reports, as they did below, just to hit the quota. When my story hit, those in the offices of Las Vegas and Miami were reprimanded and the practice was ordered stopped by Washington HQ. I suppose the biggest question I have for this story is the HYPE of what happens to these reports. They do NOT place the person mention on a "watch list." These reports, filed on Palm Pilot PDAs, go into an internal Air Marshal database that is rarely seen and pretty much ignored by other intelligence agencies, from all sources I talked to. Why? Because the air marshals are seen as little more than "sky cops" and these SDRs considered little more than "field interviews" that cops sometimes file when they question someone loitering at a 7-11 too late at night. The quota system, if it is still going on, is heinous, but it hardly results in the big spooky data collection scare that this cheapjack Denver "investigative" TV reporter makes it out to be. The quoted former field official from Atlanta, Don Strange, did, in fact, lose his job over trying to chance internal policies. He was the most well-liked official among the rank and file and the Atlanta office, under his command, had the highest morale in the nation. On 7/26/06 7:25 AM, "David Farber" wrote: > > > Begin forwarded message: > > From: Bob Drzyzgula > Date: July 25, 2006 10:25:37 PM EDT > To: David Farber > Cc: ip at v2.listbox.com > Subject: Quota system for Air Marshal Surveillance Detection Reports? > > > http://www.thedenverchannel.com/news/9559707/detail.html > > | DENVER -- You could be on a secret government database or > | watch list for simply taking a picture on an airplane. Some > | federal air marshals say they're reporting your actions > | to meet a quota, even though some top officials deny it. > | > | The air marshals, whose identities are being concealed, > | told 7NEWS that they're required to submit at least one > | report a month. If they don't, there's no raise, no bonus, > | no awards and no special assignments. > | > | "Innocent passengers are being entered into an > | international intelligence database as suspicious persons, > | acting in a suspicious manner on an aircraft ... and they > | did nothing wrong," said one federal air marshal. > | > | These unknowing passengers who are doing nothing wrong > | are landing in a secret government document called a > | Surveillance Detection Report, or SDR. Air marshals told > | 7NEWS that managers in Las Vegas created and continue to > | maintain this potentially dangerous quota system. > | > | [...] > | > | That's why several air marshals object to a July 2004 memo > | from top management in the Las Vegas office, a memo that > | reminded air marshals of the SDR requirement. > | > | The body of the memo said, "Each federal air marshal is > | now expected to generate at least one SDR per month." > | > | "Does that memo read to you that Federal Air Marshal > | headquarters has set a quota on these reports?" Kovaleski > | asked. > | > | "Absolutely, no doubt," an air marshal replied. > | > | A second management memo, also dated July 2004, said, > | "There may come an occasion when you just don't see > | anything out of the ordinary for a month at a time, but I'm > | sure that if you are looking for it, you'll see something." > | > | [...] > > > ------------------------------------- > You are subscribed as bmeeks at cox.net > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: http://www.interesting-people.org/archives/interesting- > people/ ------------------------------------- You are subscribed as rah at shipwright.com To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jcspvkquyg at email.mw Wed Jul 26 19:25:16 2006 From: jcspvkquyg at email.mw (Plummer) Date: Wed, 26 Jul 2006 20:25:16 -0600 Subject: you wont regret it Mari Message-ID: ED Choice, your best choice for ED drugs Viagra 100mg - $1.56 /pill Viagra SOFT $1.89 /pill NEW! Cialis $3.00 /pill Cialis SOFT $3.33 /pill NEW! Levitra $2.78 /pill Visit us here: http://ahy1xiy5yrxxkas3xsalfssa.dibbukga.com curtain complex From cyril at ripg.net Thu Jul 27 08:41:00 2006 From: cyril at ripg.net (Mari Spivey) Date: Thu, 27 Jul 2006 10:41:00 -0500 Subject: Open something new for your self Message-ID: <25384100204527.B1EB64A4F4@UY4E5HDZ> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://fp1d0.bunchtr.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From Olive_Knox at paynejones.com Wed Jul 26 19:56:15 2006 From: Olive_Knox at paynejones.com (Basil Chen) Date: Thu, 27 Jul 2006 10:56:15 +0800 Subject: Hoodia is the new miracle supplement for safe, effective weight loss. Message-ID: video market that the VCR enabled. It's worth remembering that case when thinking about the lawsuit filed yesterday against listed on this page, just let me know and we'll omit it. (However, since this is the record we keep of your request, we won't video market that the VCR enabled. It's worth remembering that case when thinking about the lawsuit filed yesterday against listed on this page, just let me know and we'll omit it. (However, since this is the record we keep of your request, we won't -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1904 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: seethe.png Type: image/png Size: 7197 bytes Desc: not available URL: From camera_lumina at hotmail.com Thu Jul 27 10:28:01 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 27 Jul 2006 13:28:01 -0400 Subject: [Clips] [IP] DO READ --- Quota system for Air Marshal Surveillance Detection Reports? In-Reply-To: Message-ID: This was predictable... Eventually, someone would start to ask exactly what we're getting by spending all those billions on the fight against TERROR! and so yuou know there'd be a huge demand for 'incidents'. -TD >From: "R.A. Hettinga" >To: cypherpunks at jfet.org >Subject: [Clips] [IP] DO READ --- Quota system for Air Marshal >Surveillance Detection Reports? >Date: Wed, 26 Jul 2006 18:09:15 -0400 > >--- begin forwarded text > > > Delivered-To: rah at shipwright.com > Delivered-To: clips at philodox.com > Date: Wed, 26 Jul 2006 18:02:29 -0400 > To: "Philodox Clips List" > From: "R.A. Hettinga" > Subject: [Clips] [IP] DO READ --- Quota system for Air Marshal >Surveillance > Detection Reports? > Reply-To: clips-chat at philodox.com > Sender: clips-bounces at philodox.com > > > --- begin forwarded text > > > Delivered-To: rah at shipwright.com > From: David Farber > Subject: [IP] DO READ --- Quota system for Air Marshal Surveillance > Detection Reports? > Date: Wed, 26 Jul 2006 10:08:28 -0400 > To: ip at v2.listbox.com > Reply-To: dave at farber.net > > > > Begin forwarded message: > > From: "Brock N. Meeks" > Date: July 26, 2006 9:45:28 AM EDT > To: dave at farber.net > Subject: Re: [IP] Quota system for Air Marshal Surveillance Detection > Reports? > > Well, it so happens that I was the one that BROKE this story... way > back in 2004. There were at least two offices, Miami and Las Vegas > that had this quota system for writing up and filing "SDRs." > > The requirement was totally renegade and NOT endorsed by Air Marshal > officials in Washington. The Las Vegas Air Marshal field office was (I > think he's retired now) by a real cowboy at the time, someone that > caused a lot of problems for the Washington HQ staff. (That official > once grilled an Air Marshal for three hours in an interrogation > room because he thought the air marshal was source of mine on > another story. The air marshal was then taken off flight status > and made to wash the office cars for two weeks... I broke that > story, too. And no, the punished air marshal was never a source of > mine.) > > Air marshals told they were filing false reports, as they did below, > just to hit the quota. > > When my story hit, those in the offices of Las Vegas and Miami were > reprimanded and the practice was ordered stopped by Washington HQ. > > I suppose the biggest question I have for this story is the HYPE of > what happens to these reports. They do NOT place the person mention > on a "watch list." These reports, filed on Palm Pilot PDAs, go > into an internal Air Marshal database that is rarely seen and pretty > much ignored by other intelligence agencies, from all sources I > talked to. > > Why? Because the air marshals are seen as little more than "sky > cops" and these SDRs considered little more than "field interviews" > that cops sometimes file when they question someone loitering at a > 7-11 too late at night. > > The quota system, if it is still going on, is heinous, but it hardly > results in the big spooky data collection scare that this cheapjack > Denver "investigative" TV reporter makes it out to be. > > The quoted former field official from Atlanta, Don Strange, did, in > fact, lose his job over trying to chance internal policies. He was > the most well-liked official among the rank and file and the Atlanta > office, under his command, had the highest morale in the nation. > > > On 7/26/06 7:25 AM, "David Farber" wrote: > > > > > > > Begin forwarded message: > > > > From: Bob Drzyzgula > > Date: July 25, 2006 10:25:37 PM EDT > > To: David Farber > > Cc: ip at v2.listbox.com > > Subject: Quota system for Air Marshal Surveillance Detection Reports? > > > > > > http://www.thedenverchannel.com/news/9559707/detail.html > > > > | DENVER -- You could be on a secret government database or > > | watch list for simply taking a picture on an airplane. Some > > | federal air marshals say they're reporting your actions > > | to meet a quota, even though some top officials deny it. > > | > > | The air marshals, whose identities are being concealed, > > | told 7NEWS that they're required to submit at least one > > | report a month. If they don't, there's no raise, no bonus, > > | no awards and no special assignments. > > | > > | "Innocent passengers are being entered into an > > | international intelligence database as suspicious persons, > > | acting in a suspicious manner on an aircraft ... and they > > | did nothing wrong," said one federal air marshal. > > | > > | These unknowing passengers who are doing nothing wrong > > | are landing in a secret government document called a > > | Surveillance Detection Report, or SDR. Air marshals told > > | 7NEWS that managers in Las Vegas created and continue to > > | maintain this potentially dangerous quota system. > > | > > | [...] > > | > > | That's why several air marshals object to a July 2004 memo > > | from top management in the Las Vegas office, a memo that > > | reminded air marshals of the SDR requirement. > > | > > | The body of the memo said, "Each federal air marshal is > > | now expected to generate at least one SDR per month." > > | > > | "Does that memo read to you that Federal Air Marshal > > | headquarters has set a quota on these reports?" Kovaleski > > | asked. > > | > > | "Absolutely, no doubt," an air marshal replied. > > | > > | A second management memo, also dated July 2004, said, > > | "There may come an occasion when you just don't see > > | anything out of the ordinary for a month at a time, but I'm > > | sure that if you are looking for it, you'll see something." > > | > > | [...] > > > > > > ------------------------------------- > > You are subscribed as bmeeks at cox.net > > To manage your subscription, go to > > http://v2.listbox.com/member/?listname=ip > > > > Archives at: http://www.interesting-people.org/archives/interesting- > > people/ > > > > ------------------------------------- > You are subscribed as rah at shipwright.com > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: >http://www.interesting-people.org/archives/interesting-people/ > > --- end forwarded text > > > -- > ----------------- > R. A. Hettinga > The Internet Bearer Underwriting Corporation > 44 Farquhar Street, Boston, MA 02131 USA > "... however it may deserve respect for its usefulness and antiquity, > [predicting the end of the world] has not been found agreeable to > experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' > _______________________________________________ > Clips mailing list > Clips at philodox.com > http://www.philodox.com/mailman/listinfo/clips > >--- end forwarded text > > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ReneBusby at blackburnmail.com Wed Jul 26 22:46:03 2006 From: ReneBusby at blackburnmail.com (Chang Berg) Date: Thu, 27 Jul 2006 13:46:03 +0800 Subject: Medicines and Pills prescribed online and shipped to you discreetly overnight. Message-ID: <80713079.83802135@blackburnmail.com> indexers like Google and publishers to come to workable, amicable arrangements for applications like Google Print. It would copyrights of the authors of the books listed by the site. We will not knowingly list a book that is neither online with the indexers like Google and publishers to come to workable, amicable arrangements for applications like Google Print. It would copyrights of the authors of the books listed by the site. We will not knowingly list a book that is neither online with the -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1901 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: clergymen.png Type: image/png Size: 7599 bytes Desc: not available URL: From dave at farber.net Thu Jul 27 11:29:36 2006 From: dave at farber.net (David Farber) Date: Thu, 27 Jul 2006 14:29:36 -0400 Subject: [IP] Police Blotter: Laptop border searches OK'd Message-ID: Begin forwarded message: From rrwtso at quadranet.com Thu Jul 27 15:45:53 2006 From: rrwtso at quadranet.com (Miss Greggs) Date: Thu, 27 Jul 2006 14:45:53 -0800 Subject: Are you getting job promotions? Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2420 bytes Desc: not available URL: From FulbrightLeilavvgggt at usexpress.net Thu Jul 27 12:50:15 2006 From: FulbrightLeilavvgggt at usexpress.net (Mrs Karen) Date: Thu, 27 Jul 2006 14:50:15 -0500 Subject: Compare up to 5 free refinance rate quotes. Low rates, big savings. Message-ID: <3359233841.CITSNBSN91073896@mail0.tpgi.com.au> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 818 bytes Desc: not available URL: From ant at 0733.com Thu Jul 27 13:24:04 2006 From: ant at 0733.com (Yvette Rush) Date: Thu, 27 Jul 2006 19:24:04 -0060 Subject: Summer is almost here, be ready Message-ID: <200607271924.k6RJOARD013147@proton.jfet.org> Anatrim -- The newest and most exciting fat loss product available - As scen on Oprah Real testimonials:"I was originally amazed that the first two pills I took of Anatrim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!"Rita R., San Diego"I tried Anatrim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you... Anatrim really works!"Charley Mock, ColoradoRead more testimonals here!Remove you e-mail http://www.sronul.com/ http://www.sronul.com/ http://www.sronul.com/u.php -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1439 bytes Desc: not available URL: From eugen at leitl.org Thu Jul 27 12:38:59 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Jul 2006 21:38:59 +0200 Subject: [dave@farber.net: [IP] Police Blotter: Laptop border searches OK'd] Message-ID: <20060727193859.GZ14701@leitl.org> ----- Forwarded message from David Farber ----- From nestor at grafittilife.zzn.com Thu Jul 27 09:17:47 2006 From: nestor at grafittilife.zzn.com (Coleen Lucas) Date: Fri, 28 Jul 2006 00:17:47 +0800 Subject: sexy baby and bad erection? Message-ID: <01016494915245.101F265673@PPI064JQ> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://uz4.bunchtr.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From patrick at ianai.net Fri Jul 28 02:11:45 2006 From: patrick at ianai.net (Patrick W. Gilmore) Date: July 28, 2006 2:11:45 PM EDT Subject: Can you be compelled to give a password? [was: Police Message-ID: On Jul 28, 2006, at 1:32 PM, David Farber wrote: > I don't believe it is a crime in any US Federal or State law, or in > Canadian law, to set passwords and use encryption. In the US, I > believe that a warrant would be necessary for law enforcement to > ask for your password, but I don't know if you have to comply. IANAL. That is a good question - Can you be compelled to give up a password? Would you mind posting it to IP, I am interested in the answer. Seems there might be some 'self-incriminatory' arguments here. Perhaps even an "unreasonable search" argument. But IANAL. -- TTFN, patrick ------------------------------------- You are subscribed as Agrosso at worldnet.att.net To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting- people/ ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From lauren at vortex.com Fri Jul 28 02:40:02 2006 From: lauren at vortex.com (Lauren Weinstein) Date: July 28, 2006 2:40:02 PM EDT Subject: [IP] Can you be compelled to give a password? [was: Message-ID: Police Blotter: Laptop border searches OK'd] Dave, the trend is toward laws that penalize refusal to cooperate with demands for decryption keys. This concept can work in various ways. In the border case, for example, a person might be refused entry -- or perhaps suffer confiscation of related property in some cases -- if they declined to provide the keys. In the case of criminal convictions, additional sentence and fine penalties can be imposed for uncooperative attitudes in this regard. Keep in mind that in the eyes of some in government, only people with something to hide would bother using encryption in the first place. From that assumption flows a sea of potential abuses. --Lauren-- Lauren Weinstein lauren at vortex.com or lauren at pfir.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, IOIC - International Open Internet Coalition - http://www.ioic.net Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com DayThink: http://daythink.vortex.com - - - > > >Begin forwarded message: > >From: "Patrick W. Gilmore" >Date: July 28, 2006 2:11:45 PM EDT >To: dave at farber.net >Cc: "Patrick W. Gilmore" >Subject: Can you be compelled to give a password? [was: Police >Blotter: Laptop border searches OK'd] > >On Jul 28, 2006, at 1:32 PM, David Farber wrote: > >>I don't believe it is a crime in any US Federal or State law, or in >>Canadian law, to set passwords and use encryption. In the US, I >>believe that a warrant would be necessary for law enforcement to >>ask for your password, but I don't know if you have to comply. >>IANAL. > >That is a good question - Can you be compelled to give up a >password? Would you mind posting it to IP, I am interested in the >answer. > >Seems there might be some 'self-incriminatory' arguments here. >Perhaps even an "unreasonable search" argument. But IANAL. > >-- >TTFN, >patrick > > >------------------------------------- >You are subscribed as lauren at pfir.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting- >people/ ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From j.care at securitypractice.com Fri Jul 28 03:02:01 2006 From: j.care at securitypractice.com (Jonathan H. Care) Date: July 28, 2006 3:02:01 PM EDT Subject: [IP] Can you be compelled to give a password? [was: Message-ID: Police Blotter: Laptop border searches OK'd] > >From: "Patrick W. Gilmore" >Date: July 28, 2006 2:11:45 PM EDT >To: dave at farber.net >Cc: "Patrick W. Gilmore" >Subject: Can you be compelled to give a password? [was: Police >Blotter: Laptop border searches OK'd] > > In the UK, it is a crime under the Regulation of Investigatory Powers Act 2000 not to disclose a password, encryption key, session key, or plaintext when required to do so by law enforcement. This applies both to end parties in the communication, and intermediates (such as telecommunication companies). Note that some people have been known to perform a risk assessment, and have elected the milder penalty associated with refusal to disclose, rather than face the harsher penalties that come with conviction of the crime that led to them being the target of investigation. I have a feeling the the Police and Justice bill 2006 has some further measures planned in this direction, but can't cite references at the moment. > >Seems there might be some 'self-incriminatory' arguments here. >Perhaps even an "unreasonable search" argument. But IANAL. > Kind Regards, Jonathan Care Director, The Security Practice Ltd. Tel: +44 (0)845 123 5413 Email: j.care at securitypractice.com Skype: jonathancare ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From GadboisZivruwsyk at oysterpointinn.com Fri Jul 28 06:56:40 2006 From: GadboisZivruwsyk at oysterpointinn.com (Great Weightloss Program) Date: Fri, 28 Jul 2006 08:56:40 -0500 Subject: No Love sincerer than the love of food Message-ID: <26fvebn6w934s414906i6yup3pp9g401@tidni.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1474 bytes Desc: not available URL: From eugen at leitl.org Fri Jul 28 01:05:44 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jul 2006 10:05:44 +0200 Subject: /. [Army to Require Trusted Platform Module in PCs] Message-ID: <20060728080544.GO14701@leitl.org> Link: http://slashdot.org/article.pl?sid=06/07/28/0338243 Posted by: CowboyNeal, on 2006-07-28 05:45:00 Overtone writes "Federal Computer Week is reporting that the US Army will [1]require hardware-based security via the [2]Trusted Platform Module standard in all new PCs. They are a large-enough volume buyer that this might kickstart an adoption loop." References 1. http://www.fcw.com/article95422-07-26-06-Web 2. https://www.trustedcomputinggroup.org/faq/TPMFAQ/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rjw at mcn.org Fri Jul 28 12:43:18 2006 From: rjw at mcn.org (Roger Weeks) Date: July 28, 2006 12:43:18 PM EDT Subject: [IP] more on Police Blotter: Laptop border searches OK'd Message-ID: Dave - For IP on the laptop border searches: I'm suprised that no one else has mentioned this so far, but this type of situation is one of the many excellent reasons to use an encrypted filesystem on your laptop hard disk, and to set up other types of security. For example, my PowerBook G4 is set up to use the built-in feature of OS X called FileVault, which encrypts the user's home directory. The home directory on OS X contains the browser cache for Safari, Firefox, and Camino, and I have to assume, any other browser cache for Opera and other browsers. I have also set an Open Firmware boot password. See http://www.apple.com/downloads/macosx/apple/openfirmwarepassword.html for details. When I travel I never put my laptop to sleep, but rather I shut it all the way down. This is marginally less convenient, but it means that if my laptop is stolen or confiscated, the Open Firmware password will be the first thing that the attacker sees. Supposing that is broken, they will then have to deal with logging into my laptop. My root account is disabled, like all OS X installs. I have my login preferences set to not show the usernames on the computer, so the attacker will have to guess both a login name and password. If the attacker were to take the hard disk out of my laptop and make an image of it with forensic software, they would find an encrypted partition. I'm sure the NSA probably has the horsepower to throw at cracking AES-128 encryption, but chances are my laptop will never get to them if we're talking about local law enforcement. For those in the Windows or Linux world, you can set a BIOS password on your laptop which is very similar to the Open Firmware boot password for Apple Hardware. Windows XP and Windows 2003 both include support for encrypting filesystems using DESX or 3DES, via the Encrypted File System. PGP Corp sells a product called "PGP Whole Disk Encryption" for Windows 2000 & XP that uses AES-256 encryption. Linux users can make a loopback encrypted filesystem for storing anything they wish to be encrypted. See http://www.tldp.org/HOWTO/ Cryptoloop-HOWTO/ for details. I don't believe it is a crime in any US Federal or State law, or in Canadian law, to set passwords and use encryption. In the US, I believe that a warrant would be necessary for law enforcement to ask for your password, but I don't know if you have to comply. IANAL. -- Roger J. Weeks Systems & Network Administrator Mendocino Community Network Now offering DSL across California ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Fri Jul 28 10:32:54 2006 From: dave at farber.net (David Farber) Date: Fri, 28 Jul 2006 13:32:54 -0400 Subject: [IP] more on Police Blotter: Laptop border searches OK'd Message-ID: Begin forwarded message: From dave at farber.net Fri Jul 28 11:48:26 2006 From: dave at farber.net (David Farber) Date: Fri, 28 Jul 2006 14:48:26 -0400 Subject: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd] Message-ID: Begin forwarded message: From dave at farber.net Fri Jul 28 12:07:35 2006 From: dave at farber.net (David Farber) Date: Fri, 28 Jul 2006 15:07:35 -0400 Subject: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd] Message-ID: Begin forwarded message: From s.schear at comcast.net Fri Jul 28 15:13:17 2006 From: s.schear at comcast.net (Steve Schear) Date: Fri, 28 Jul 2006 15:13:17 -0700 Subject: Cell Phone Picture Called Obstruction Of Justice Message-ID: <6.0.1.1.0.20060728150856.042c1340@mail.comcast.net> http://www.nbc10.com/news/9574663/detail.html From info at 700.ru Fri Jul 28 05:21:59 2006 From: info at 700.ru (Folvy) Date: Fri, 28 Jul 2006 15:21:59 +0300 Subject: Hi my Dear! Message-ID: <008c01c6b240$63e15280$0100a8c0@201-048-097-069.xd-dynamic.ctbcnetsuper.com.br> Ave . I think we had correspondence a long time ago if it was not you I am sorry. If it was I could not answer you because my Mozilla mail manager was down for a long time and I could not fix it only with my friend's help I got the emails address out for me ..:) I hope it was whom we were corresponded with you are still interested, as I am, though I realize much time has passed since then... I really don't know where to start .... Maybe you could tell me a little about yourself since I lost our early letters, your appearance,age , hobbies, and are you still in the search? If it was you I wrote to and you are interested to get to know me better, I have a profile at : http://www.dating-foryou.com/loveyou/ Don't really know what else to say for now I hope this is the right address Let me know if you are interested, And I hope you won't run when you see my picture :-) goodbye Folvy A. If you think that you were subscribed by mistake for this mail delivery or if your email has been added without your permission, please, visit http://dating-foryou.com/loveyou/ and unsubscribe from our mails. From eugen at leitl.org Fri Jul 28 10:37:34 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jul 2006 19:37:34 +0200 Subject: [dave@farber.net: [IP] more on Police Blotter: Laptop border searches OK'd] Message-ID: <20060728173734.GC14701@leitl.org> ----- Forwarded message from David Farber ----- From bill.stewart at pobox.com Fri Jul 28 21:17:50 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 28 Jul 2006 21:17:50 -0700 Subject: Cell Phone Picture Called Obstruction Of Justice In-Reply-To: <6.0.1.1.0.20060728150856.042c1340@mail.comcast.net> References: <6.0.1.1.0.20060728150856.042c1340@mail.comcast.net> Message-ID: <6.2.1.2.0.20060728205849.0370f3f8@pop.idiom.com> At 03:13 PM 7/28/2006, Steve Schear wrote to Cypherpunks: >http://www.nbc10.com/news/9574663/detail.html It's an article about a kid in Philly who used his cell phone to photograph a bunch of police, and was hauled off to jail and threatened with being charged with obstruction of justice and a number of other things, including breaking "a new law that prohibits people from taking pictures of police with cell phones." After about an hour, his parents got him out, with police saying that he was lucky because there was no supervisor on duty. The ACLU says there's no such new law. No big surprise. Cops routinely lie, and they often beat up photographers and smash cameras. The time I was arrested for photographing police, who were harassing a friend of mine and stealing his car radio, it was before the Rodney King case, and I was using a camera with real chemical film in it. Somehow the film got exposed to light and the camera got broken a bit before they gave it back. Unfortunately, there was a supervisor on duty (he'd been at the scene of the alleged crime), so I did get charged with something, which got dropped after I paid for a lawyer and the case came up for trial. Supervisors lie just as much as regular police - don't believe anything they tell you about court procedures :-) My friend's case did get to trial - the police did lots of lying on the witness stand, but unfortunately his car registration really _had_ expired, and since that charge stuck they also got to bust him for a burned-out taillight. And these cops were just local boys and girls - John Young gets to have Feds lie to him... Bill Stewart From BrashearJacquelyndwgvkomcacqpkm at ezform.com Fri Jul 28 20:46:06 2006 From: BrashearJacquelyndwgvkomcacqpkm at ezform.com (Mrs Holton) Date: Fri, 28 Jul 2006 22:46:06 -0500 (EDT) Subject: Cash Loans for Titles, Nationwide $200-$50,000 No Credit Check Message-ID: <4038122.0812694478757.JavaMail.root@mailfeb00.foxb7> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 918 bytes Desc: not available URL: From eugen at leitl.org Fri Jul 28 14:04:39 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jul 2006 23:04:39 +0200 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] Message-ID: <20060728210439.GN14701@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri Jul 28 14:05:22 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jul 2006 23:05:22 +0200 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] Message-ID: <20060728210522.GO14701@leitl.org> ----- Forwarded message from David Farber ----- From HavensEfratgmskabhbk at 1freeworld.net Fri Jul 28 22:39:55 2006 From: HavensEfratgmskabhbk at 1freeworld.net (Miss Snipes) Date: Sat, 29 Jul 2006 01:39:55 -0400 Subject: Refinance to Get Immediate Cash Compare Customized Quotes for Free Message-ID: <6955389.6279153512122.JavaMail._WDIGSgw8498@bmailrly08> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 822 bytes Desc: not available URL: From VanwinkleLolacjdqntuu at sprintbiz.com Sat Jul 29 07:19:29 2006 From: VanwinkleLolacjdqntuu at sprintbiz.com (Miss Victor) Date: Sat, 29 Jul 2006 09:19:29 -0500 Subject: To grow thinner, diminish your dinner Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 629 bytes Desc: not available URL: From rah at shipwright.com Sat Jul 29 06:30:14 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 29 Jul 2006 09:30:14 -0400 Subject: [Clips] [fc-announce] Financial Cryptography 2007 Call for Papers Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 29 Jul 2006 08:07:30 -0400 To: "Philodox Clips List" From: "R.A. Hettinga" Subject: [Clips] [fc-announce] Financial Cryptography 2007 Call for Papers Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text Delivered-To: rah at ibuc.com From: Sven Dietrich To: fc-announce at ifca.ai Subject: [fc-announce] Financial Cryptography 2007 Call for Papers Sender: fc-announce-admin at ifca.ai Date: Fri, 28 Jul 2006 11:41:39 -0400 (EDT) Dear Colleague, please find below the first Call for Papers for FC'07. Best regards, Sven Dietrich -- Dr. Sven Dietrich CERT Research - Software Engineering Institute spock at cert.org 4500 Fifth Ave, Pittsburgh, PA 15213, USA Tel: +1-412-268-7711 Fax: +1-412-268-6989 PGPkeyID: 0x04185247 ------------------------------------------------------------------ First Call for Papers FC'07: Financial Cryptography and Data Security http://fc07.ifca.ai/ Eleventh International Conference February 12-15, 2007 Lowlands, Scarborough, Trinidad and Tobago Submissions Due Date: October 9, 2006, 11:59pm, EDT (UTC-4) Program Chair: Sven Dietrich (Carnegie Mellon University) General Chair: Rafael Hirschfeld (Unipay) At its 11th year edition, Financial Cryptography and Data Security (FC'07) is a well established and major international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. We will continue last year's augmentation of the conference title and expansion of our scope to cover all aspects of securing transactions and systems. These aspects include a range of technical areas such as: cryptography, payment systems, secure transaction architectures, software systems and tools, fraud prevention, secure IT infrastructure, and analysis methodologies. Our focus will also encompass financial, legal, business, and policy aspects. Material both on theoretical (fundamental) aspects of securing systems,and on secure applications and real-world deployments will be considered. The conference goal is to bring together top cryptographers, data-security specialists, and computer scientists with economists, bankers, implementers, and policy makers. Intimate and colorful by tradition, the FC'07 program will feature invited talks, academic presentations, technical demonstrations, and panel discussions. This conference is organized annually by the International Financial Cryptography Association (IFCA). Original papers, surveys, and presentations on all aspects of financial and commerce security are invited. Submissions must have a strong and visible bearing on financial and commerce security issues, but can be interdisciplinary in nature and need not be exclusively concerned with cryptography or security. Possible topics for submission to the various sessions include, but are not limited to: Anonymity and Privacy Auctions Audit and Auditability Authentication and Identification, including Biometrics Certification and Authorization Commercial Cryptographic Applications Commercial Transactions and Contracts Digital Cash and Payment Systems Digital Incentive and Loyalty Systems Digital Rights Management Financial Regulation and Reporting Fraud Detection Game Theoretic Approaches to Security Identity Theft, Physhing and Social Engineering Infrastructure Design Legal and Regulatory Issues Microfinance and Micropayments Monitoring, Management and Operations Reputation Systems RFID-Based and Contactless Payment Systems Risk Assessment and Management Secure Banking and Financial Web Services Securing Emerging Computational Paradigms Security and Risk Perceptions and Judgments Security Economics Smart Cards and Secure Tokens Trust Management Trustability and Trustworthiness Underground-Market Economics Virtual Economies Voting system security For those interested, last year's proceedings are available from Springer. Submission Instructions Submission Categories FC'07 is inviting submissions in four categories: (1) research papers, (2) systems and applications presentations, (3) panel sessions, (4) surveys. For all accepted submissions, at least one author must attend the conference and present the work. Research Papers Research papers should describe novel scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series after the conference, so the submissions must be formatted in the standard LNCS format (15 page limit). Systems and Application Presentations Submissions in this category should describe novel or successful systems with an emphasis on secure digital commerce applications. Presentations may concern commercial systems, academic prototypes, or open-source projects for any of the topics listed above. Where appropriate, software or hardware demonstrations are encouraged as part of the presentations in these sessions. Submissions in this category should consist of a short summary of the work (1-6 pages in length) to be reviewed by the Program Committee, along with a short biography of the presenters. Accepted submissions will be presented at the conference (25 minutes per presentation), and a one-page abstract will be published in the conference proceedings. Panel Sessions Proposals for panel sessions are also solicited, and should include a brief description of the panel as well as prospective participants. Accepted panel sessions will be presented at the conference, and each participant will contribute a one-page abstract to be published in the conference proceedings. Surveys A limited number of surveys presentations may also be included in the program. We encourage submissions that summarize the current state of the art on any well-defined subset of the above listed submission topics. A limited description of visions on future directions of research in these topics would also be appreciated. Survey submissions can be significantly shorter than research paper submissions. Preparation Instructions Submissions to the research papers, systems/application presentation categories, and surveys must be received by the due date. Papers must be formatted in standard PostScript or PDF format. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found on this web site and at the submission site. Authors should provide names and affiliations at submission time, and have the option of including or not names and affiliations in their submitted papers, that must include on their first page the title of the paper, a brief abstract, and a list of topical keywords. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series after the conference, so the submissions must be formatted in the standard LNCS format (15 page limit). Authors of accepted submissions will be required to complete and sign an IFCA copyright form. A pre-proceedings volume containing preliminary versions of the papers will be distributed at the conference. Questions about all conference submissions should be directed to the Program Chair at fc07chair at cert.org Paper Submission Authors should only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference with proceedings or a journal. Paper submission will occur via website to be announced at a later time. The Rump Session FC'07 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5-7 minute), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail, or submitted in person through the Monday of the conference. Associated Workshop There will be a Usability Workshop held in conjunction with FC 2007. Details will be published at a later time. Program Committee Alessandro Acquisti, Carnegie Mellon University Jon Callas, PGP Corporation Yvo Desmedt, University College London Giovanni di Crescenzo, Telcordia Technologies Roger Dingledine, The Freehaven Project Bernhard Esslinger, Deutsche Bank Philippe Golle, PARC Klaus Kursawe, Philips Research Eindhoven Arjen Lenstra, EPFL Patrick McDaniel, Penn State University Tatsuaki Okamoto, NTT Kazue Sako, NEC Radu Sion, SUNY Stony Brook Stuart Stubblebine, Stubblebine Consulting Paul Syverson, NRL Mike Szydlo, RSA Jonathan Trostle, ASK Consulting and Research Moti Yung, RSA & Columbia University Yuliang Zheng, University of North Carolina at Charlotte Important Dates: Paper Submission: October 9, 2006 Notification: December 11, 2006 Pre-Proceedings: January 11, 2007 Conference dates: February 12-15, 2007 Post Proceedings: April 10, 2007 _______________________________________________ fc-announce mailing list fc-announce at ifca.ai http://mail.ifca.ai/mailman/listinfo/fc-announce --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sat Jul 29 02:32:57 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 29 Jul 2006 11:32:57 +0200 Subject: /. [Has Orwell's '1984' Come 22 Years Later?] Message-ID: <20060729093257.GX14701@leitl.org> Link: http://slashdot.org/article.pl?sid=06/07/29/0223253 Posted by: Cliff, on 2006-07-29 03:55:00 [1]gabec asks: "This weekend my mother bought a grille lighter, something like this [2]butane lighter. The self-scanner at Kroger's locked itself up and paged a clerk, who had to enter our drivers license numbers into her kiosk before we could continue. Last week my girlfriend bought four peaches. An alert came up stating that peaches were a restricted item and she had to identify herself before being able to purchase such a decidedly high quantity of the dangerous fruit. [3]My video games spy on me, reporting the applications I run, the websites I visit, the accounts of the people I IM. My ISP [4]is being strong-armed into a two-year archive of each action I take online under the guise of catching pedophiles, [5]the companies I trust to free information are my enemies, [6]the people looking out for me are being watched. As if that weren't enough, [7]my own computer spies on me daily, [8]my bank has been compromised, [9]my phone is tapped--has been for [10]years--and [11]my phone company is A-OK with it. What's a guy that doesn't even consider himself paranoid to think of the current state of affairs?" The sad state of affairs is that Big Brother probably became a quiet part of our lives a lot earlier. The big question now is: how much worse can it get? Am I just accustomed to old ways? Does the new generation, born with these restrictions, feel the weight of these bonds and recoil from my fears as paranoia? What can I, a person with no political interests--a person that would really rather think that the people in office are there because they're looking out for us, our rights, and our freedoms and not because their short-sightedness is creating a police state--do to stem the tide?" References 1. mailto:cooperg.myrealbox at com 2. http://www.broilkingbbq.com/grillpro/products.asp?CID=16 3. http://www.rootkit.com/blog.php?newsid=358 4. http://yro.slashdot.org/article.pl?sid=06/06/02/1238237&tid=158 5. http://www.rsf.org/article.php3?id_article=17180 6. http://yro.slashdot.org/article.pl?sid=06/05/15/1922209&tid=158 7. http://www.groklaw.net/article.php?story=20060608002958907 8. http://www.washingtonpost.com/wp-dyn/content/article/2006/06/23/AR20060623001 67.html 9. http://www.npr.org/templates/story/story.php?storyId=5399264 10. http://www.bloomberg.com/apps/news?pid=20601087&sid=abIV0cO64zJE&refer= 11. http://yro.slashdot.org/article.pl?sid=06/06/21/1718219&tid=158 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From cypherpunks at lne.com Sat Jul 29 08:39:10 2006 From: cypherpunks at lne.com (cypherpunks at lne.com) Date: Sat, 29 Jul 2006 12:39:10 -0300 Subject: Men with big dicks are more successful in life than the ones with small dicks. So be successful with Penis Enlarge Patch. Message-ID: 2MO9bziO11Sri.MZZOouxfoLkXQ@lne.com http://www.obesor.net/pt/?108&9cX0y5lunkReR All your muscles are nothing if you cant be proud of your penis. Be proud of all the parts of your body with Penis Enlarge Patch. From music8fhj at ktb.net Sat Jul 29 16:25:56 2006 From: music8fhj at ktb.net (Nichole Dorthy) Date: Sat, 29 Jul 2006 15:25:56 -0800 Subject: d HOT SELLING MEDICATIONS FROM $1.14/PILL, TODAY PROMOTION ONLY pronunciation appearance Message-ID: <13377.6288330191.214261570@ktb.net> YOUR BEST CHOICE FOR MEDS AT LOW $ We have popular meds * WHOLESALE PRICE FROM $1.14/PILL * No Doctor Visits * Secure 0rder * All countries shipping * Only FDA Approved Drugs * Fully Confidential * Next Day Priority Shipping * Discreet Packaging * Buy in Bulk and Save! Order Online Here http://www.geocities.com/diworem2469/ repeated meeting parents buy, luck least fly proceeded independent between. remained turning or south completely within? force everyone handwriting somewhere. oh raised too mentioned? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1348 bytes Desc: not available URL: From Riley_Ponce at copacabana.com Sat Jul 29 01:28:13 2006 From: Riley_Ponce at copacabana.com (Megan Stark) Date: Sat, 29 Jul 2006 16:28:13 +0800 Subject: The Hoodia ingredient in HoodiaLife is an all-natural. Message-ID: the screen for the book, most Web browsers will let you increase the size of HTML text. See the start of this page for information, including some of the on-line books listed at this site. Over the last couple of weeks, and continuing into the screen for the book, most Web browsers will let you increase the size of HTML text. See the start of this page for information, including some of the on-line books listed at this site. Over the last couple of weeks, and continuing into -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1875 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: credo.png Type: image/png Size: 7197 bytes Desc: not available URL: From info at rotogravure.org Sat Jul 29 14:35:15 2006 From: info at rotogravure.org (Olga K.) Date: Sun, 30 Jul 2006 01:35:15 +0400 Subject: You have new mail from Tatiana, 29 y.o., Russia, dating Message-ID: <003301c6b356$e42028b0$87df010a@retroactive> Regards, contact at 24ONLINETEASES4U.INFO administrator Olga -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 577 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: spam001.jpg Type: image/jpeg Size: 15788 bytes Desc: not available URL: From aehtyn8392 at 006.com Sat Jul 29 15:50:04 2006 From: aehtyn8392 at 006.com (Kristy Petty) Date: Sun, 30 Jul 2006 04:10:04 +0480 Subject: Lean and mean is in Message-ID: <200607300207.k6U27Ir6006972@proton.jfet.org> Anatrim -- The newest and most exciting fat loss product available - As scen on Oprah Real testimonials:"I was originally amazed that the first two pills I took of Anatrim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!"Silvia D., New York"I tried Anatrim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you... Anatrim really works!"Serge Smith, San FranciscoRead more testimonals here!Remove you e-mail http://www.pinswin.com/ http://www.pinswin.com/ http://www.pinswin.com/u.php -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1449 bytes Desc: not available URL: From Agrosso at acm.org Sun Jul 30 04:58:41 2006 From: Agrosso at acm.org (Andrew Grosso) Date: July 30, 2006 4:58:41 PM EDT Subject: [IP] Can you be compelled to give a password? [was: Message-ID: Police Blotter: Laptop border searches OK'd] As a former Assistant U.S. Attorney, allow me to comment. Information may be obtained by the government from a person in one of four ways: (1) it is voluntarily provided; (2) by regulation in a heavily regulated industry; (3) by subpoena; and (4) by a search and seizure warrant. We are concerned with number 3, the subpoena. A person can refuse to produce incriminating information in response to a subpoena under the Fifth Amendment. Please note that the password is not protected. If it is written down somewhere, the document on which it is written is not protected by the privilege. The *act* of producing the document or the password itself *may* be privileged, if such an act is itself incriminating. For example, if the password was used in a crime, and the fact that you have the password in your possession tends to show that you participated or conspired in the crime, and then the Fifth Amendment privilege is applicable to protect you from implicating yourself in the crime. The Government *can* immunize you to the limited extent necessary to obtain the password - it cannot then use the fact that it got the password from you in order to prosecute you. This is known as "Doe" immunity, and there is an extensive line of cases that has developed in this area. Webster Hubbell, the former Associate Attorney General who was convicted of tax fraud by Ken Starr's IC Office, eventually had his conviction vacated because Starr's legal team failed to follow the rules when they obtained, from him (by subpoena), his tax records. If the government is not investigating a crime, then it may use an administrative or civil subpoena to try and get the password. If the witness invokes the Fifth Amendment, then the government can immunize that person and compel production. The second point, above, concerning a regulated industry, applies to such areas as Medicare and Medicaid, Government contractors for procurement matters, industrial health and safety mattes, environmental concerns, etc. The same analysis as above would apply. Border searches are a different animal, since the government has the right to inspect items crossing the border without a warrant. However, if the password is in the traveler's head, then that is not an "item" that can be inspected at the border. The information on the laptop might very well be such an item, however, and if the only way to convince the government to allow you to cross the border is to show the border guards what is on the laptop, then the traveler might very well face the choice of turning on the laptop and opening files,, using the password, or not crossing the border. I do not believe that, even here, the traveler would have to produce the password itself. Andrew Grosso, Esq. Andrew Grosso & Associates 1250 Connecticut Avenue, NW, Suite 200 Washington, D.C. 20036 (202) 261-3593 Email: Agrosso at acm.org Web Site: www.GrossoLaw.com ----- Original Message ----- From: David Farber To: ip at v2.listbox.com Sent: Friday, July 28, 2006 2:26 PM Subject: [IP] Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd] Begin forwarded message: From b.malin at vanderbilt.edu Sun Jul 30 07:44:21 2006 From: b.malin at vanderbilt.edu (Brad Malin) Date: July 30, 2006 7:44:21 PM EDT Subject: Illegal to Photo Cops? Message-ID: http://www.freemarketnews.com/WorldNews.asp?nid=17667 STUDENT BUSTED FOR TAKING COP PICTURES Friday, July 28, 2006 - FreeMarketNews.com A Penn State college senior was arrested after he pointed his camera cell phone at police activity in his neighborhood. A Philadelphia NBC News Channel 10 report says the family of Neftaly Cruz, 21, is claiming the cops had "no right to come onto their property and arrest their 21-year- old son simply because he was using his cell phone's camera." The charge against Cruz was based on a new law, allegedly prohibiting people from taking pictures of police officers with cell phones. Cruz is quoted as saying, "They threatened to charge me with conspiracy, impeding an investigation, obstruction of a investigation..." Larry Frankel of the local ACLU chapter, reportedly said, "There is no law that prevents people from taking pictures of what anybody can see on the street," adding that, "it's rather scary that in this country you could actually be taken down to police headquarters for taking a picture on your cell phone of activities that are clearly visible on the street." - ST ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From hacuoxu at channelnewsasia.com Sat Jul 29 20:17:45 2006 From: hacuoxu at channelnewsasia.com (Valentin Villegas) Date: Sun, 30 Jul 2006 11:17:45 +0800 Subject: Guaranted 35%-80% Discount On All Medications. Message-ID: <8507740.9810@channelnewsasia.com> many of them hit the online "order" button, or dial the phone number provided on the Web pages to order a print copy. The plaintiffs prevail, thousands of books and other works, everything from overlooked classics of Harlem Renaissance poetry to many of them hit the online "order" button, or dial the phone number provided on the Web pages to order a print copy. The plaintiffs prevail, thousands of books and other works, everything from overlooked classics of Harlem Renaissance poetry to -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1893 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: archfool.png Type: image/png Size: 7401 bytes Desc: not available URL: From eugen at leitl.org Sun Jul 30 03:58:04 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 30 Jul 2006 12:58:04 +0200 Subject: /. [Photograph the Police, Get Arrested] Message-ID: <20060730105804.GZ14701@leitl.org> Link: http://slashdot.org/article.pl?sid=06/07/30/0557216 Posted by: Zonk, on 2006-07-30 08:16:00 [1]Servo writes "Last month a man was arrested in New Hampshire after presenting evidence of a police officer being verbally abusive that [2]he had captured on his home security camera system. Now just recently in Philadelphia a 21 year old student was arrested on his property after he [3]took a photo of the police who were in the process of arresting a drug dealer down the street." From the article: "Cruz said that when he heard a commotion, he walked out of his back door with his cell phone to see what was happening. He said that when he saw the street lined with police cars, he decided to take a picture of the scene. 'I opened (the phone) and took a shot,' Cruz said. Moments later, Cruz said he got the shock of his life when an officer came to his back yard gate." References 1. mailto:dstringf at getridofthis.gmail.com 2. http://it.slashdot.org/article.pl?sid=06/06/29/188221&tid=172 3. http://www.nbc10.com/news/9574663/detail.html ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Sun Jul 30 15:04:08 2006 From: dave at farber.net (David Farber) Date: Sun, 30 Jul 2006 18:04:08 -0400 Subject: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd] Message-ID: Begin forwarded message: From endy at MIT.EDU Sun Jul 30 16:33:14 2006 From: endy at MIT.EDU (Drew Endy) Date: Sun, 30 Jul 2006 19:33:14 -0400 Subject: [Synthetic Biology] Q. Is secret biodefense a bad idea? Message-ID: NBC news video and Washington Post front page story about the NBACC at Ft. Detrick. Best, Drew ______ http://www.washingtonpost.com/wp-dyn/content/video/2006/07/29/VI2006072900668.html http://www.washingtonpost.com/wp-dyn/content/article/2006/07/29/AR2006072900592_pf.html The Secretive Fight Against Bioterror The government is building a highly classified facility to research biological weapons, but its closed-door approach has raised concerns. By Joby Warrick Washington Post Staff Writer Sunday, July 30, 2006; A01 On the grounds of a military base an hour's drive from the capital, the Bush administration is building a massive biodefense laboratory unlike any seen since biological weapons were banned 34 years ago. The heart of the lab is a cluster of sealed chambers built to contain the world's deadliest bacteria and viruses. There, scientists will spend their days simulating the unthinkable: bioterrorism attacks in the form of lethal anthrax spores rendered as wispy powders that can drift for miles on a summer breeze, or common viruses turned into deadly superbugs that ordinary drugs and vaccines cannot stop. The work at this new lab, at Fort Detrick, Md., could someday save thousands of lives -- or, some fear, create new risks and place the United States in violation of international treaties. In either case, much of what transpires at the National Biodefense Analysis and Countermeasures Center (NBACC) may never be publicly known, because the Bush administration intends to operate the facility largely in secret. In an unusual arrangement, the building itself will be classified as highly restricted space, from the reception desk to the lab benches to the cages where animals are kept. Few federal facilities, including nuclear labs, operate with such stealth. It is this opacity that some arms-control experts say has become a defining characteristic of U.S. biodefense policy as carried out by the Department of Homeland Security, NBACC's creator. Since the department's founding in the aftermath of the Sept. 11 attacks, its officials have dramatically expanded the government's ability to conduct realistic tests of the pathogens and tactics that might be used in a bioterrorism attack. Some of the research falls within what many arms-control experts say is a legal gray zone, skirting the edges of an international treaty outlawing the production of even small amounts of biological weapons. The administration dismisses these concerns, however, insisting that the work of NBACC is purely defensive and thus fully legal. It has rejected calls for oversight by independent observers outside the department's network of government scientists and contractors. And it defends the secrecy as necessary to protect Americans. "Where the research exposes vulnerability, I've got to protect that, for the public's interest," said Bernard Courtney, NBACC's scientific director. "We don't need to be showing perpetrators the holes in our defense." Tara O'Toole, founder of the Center for Biosecurity at the University of Pittsburgh Medical Center and an adviser to the Defense Department on bioterrorism, said the secrecy fits a larger pattern and could have consequences. "The philosophy and practice behind NBACC looks like much of the rest of the administration's philosophy and practice: 'Our intent is good, so we can do whatever we want,' " O'Toole said. "This approach will only lead to trouble." Although they acknowledge the need to shield the results of some sensitive projects from public view, critics of NBACC fear that excessive secrecy could actually increase the risk of bioterrorism. That would happen, they say, if the lab fosters ill-designed experiments conducted without proper scrutiny or if its work fuels suspicions that could lead other countries to pursue secret biological research. The few public documents that describe NBACC's research mission have done little to quiet those fears. A computer slide show prepared by the center's directors in 2004 offers a to-do list that suggests the lab will be making and testing small amounts of weaponized microbes and, perhaps, genetically engineered viruses and bacteria. It also calls for "red team" exercises that simulate attacks by hostile groups. NBACC's close ties to the U.S. intelligence community have also caused concern among the agency's critics. The CIA has assigned advisers to the lab, including at least one member of the "Z- Division," an elite group jointly operated with Lawrence Livermore National Laboratory that specializes in analyzing and duplicating weapons systems of potential adversaries, officials familiar with the program confirm. Bioweapons experts say the nature of the research envisioned for NBACC demands an unusually high degree of transparency to reassure Americans and the rest of the world of the U.S. government's intentions. "If we saw others doing this kind of research, we would view it as an infringement of the bioweapons treaty," said Milton Leitenberg, a senior research scholar and weapons expert at the University of Maryland's School of Public Policy. "You can't go around the world yelling about Iranian and North Korean programs -- about which we know very little -- when we've got all this going on." Creating the Weapons of Terrorism Created without public fanfare a few months after the 2001 anthrax attacks, NBACC is intended to be the chief U.S. biological research institution engaged in something called "science-based threat assessment." It seeks to quantitatively answer one of the most difficult questions in biodefense: What's the worst that can happen? To truly answer that question, there is little choice, current and former NBACC officials say: Researchers have to make real biological weapons. "De facto, we are going to make biowarfare pathogens at NBACC in order to study them," said Penrose "Parney" Albright, former Homeland Security assistant secretary for science and technology. Other government agencies, such as the Centers for Disease Control and Prevention, study disease threats such as smallpox to discover cures. By contrast, NBACC (pronounced EN-back) attempts to get inside the head of a bioterrorist. It considers the wide array of potential weapons available. It looks for the holes in society's defenses where an attacker might achieve the maximum harm. It explores the risks posed by emerging technologies, such as new DNA synthesizing techniques that allow the creation of genetically altered or man-made viruses. And it tries in some cases to test the weapon or delivery device that terrorists might use. Research at NBACC is already underway, in lab space that has been outsourced or borrowed from the Army's sprawling biodefense campus at Fort Detrick in Frederick. It was at this compound that the U.S. government researched and produced offensive biological weapons from the 1940s until President Richard M. Nixon halted research in 1969. The Army continues to conduct research on pathogens there. In June, construction began on a $128 million, 160,000-square-foot facility inside the same heavily guarded compound. Space inside the eight-story, glass-and-brick structure will be divided between NBACC's two major divisions: a forensic testing center tasked with using modern sleuthing techniques to identify the possible culprits in future biological attacks; and the Biothreat Characterization Center, or BTCC, which seeks to predict what such attacks will look like. It is the BTCC's wing that will host the airtight, ultra-secure containment labs where the most controversial research will be done. Homeland Security officials won't talk about specific projects planned or underway. But the 2004 computer slide show -- posted briefly on a Homeland Security Web site before its discovery by agency critics prompted an abrupt removal -- offers insight into NBACC's priorities. The presentation by NBACC's then-deputy director, Lt. Col. George Korch, listed 16 research priorities for the new lab. Among them: "Characterize classical, emerging and genetically engineered pathogens for their BTA [biological threat agent] potential. "Assess the nature of nontraditional, novel and nonendemic induction of disease from potential BTA. "Expand aerosol-challenge testing capacity for non-human primates. "Apply Red Team operational scenarios and capabilities." Courtney, the NBACC science director, acknowledged that his work would include simulating real biological threats -- but not just any threats. "If I hear a noise on the back porch, will I turn on the light to decide whether there's something there, or go on my merry way?" Courtney asked. "But I'm only going to do [research] if I have credible information that shows it truly is a threat. It's not going to be dreamed up out of the mind of a novelist." Administration officials note that there is a tradition for this kind of biological risk assessment, one that extends at least to the Clinton administration. In the late 1990s, for example, a clandestine project run by the Defense Department re-created a genetically modified, drug-resistant strain of the anthrax bacteria believed to have been made by Soviet bioweaponeers. Such research helped the government anticipate and prepare for emerging threats, according to officials familiar with the anthrax study. Some arms-control experts see the comparison as troubling. They argued, then and now, that the work was a possible breach of a U.S.- negotiated international law. Legal and Other Pitfalls The Bush administration argues that its biodefense research complies with the Biological and Toxin Weapons Convention, the 1972 treaty outlawing the manufacture of biological weapons, because U.S. motives are pure. "All the programs we do are defensive in nature," said Maureen McCarthy, Homeland Security's director of research and development, who oversees NBACC. "Our job is to ensure that the civilian population of the country is protected, and that we know what the threats are." Current and former administration officials say that compliance with the treaty hinges on intent, and that making small amounts of biowarfare pathogens for study is permitted under a broad interpretation of the treaty. Some also argue that the need for a strong biodefense in an age of genetic engineering trumps concerns over what they see as legal hair-splitting. "How can I go to the people of this country and say, 'I can't do this important research because some arms-control advocate told me I can't'?" asked Albright, the former Homeland Security assistant secretary. But some experts in international law believe that certain experiments envisioned for the lab could violate the treaty's ban on developing, stockpiling, acquiring or retaining microbes "of types and in quantities that have no justification" for peaceful purposes. "The main problem with the 'defensive intent' test is that it does not reflect what the treaty actually says," said David Fidler, an Indiana University School of Law professor and expert on the bioweapons convention. The treaty, largely a U.S. creation, does not make a distinction between defensive and offensive activities, Fidler said. More practically, arms experts say, future U.S. governments may find it harder to object if other countries test genetically engineered pathogens and novel delivery systems, invoking the same need for biodefense. Already, they say, there is evidence abroad of what some are calling a "global biodefense boom." In the past five years, numerous governments, including some in the developing world -- India, China and Cuba among them -- have begun building high-security labs for studying the most lethal bacteria and viruses. "These labs have become a status symbol, a prestige item," said Alan Pearson, a biologist at the Center for Arms Control and Non- Proliferation. "A big question is: Will these labs have transparency?" Secrecy May Have a Price When it opens in two years, the NBACC lab will house an impressive collection of deadly germs and teams of scientists in full-body "spacesuits" to work with them. It will also have large aerosol-test chambers where animals will be exposed to deadly microbes. But the lab's most controversial feature may be its secrecy. Homeland Security officials disclosed plans to contractors and other government agencies to classify the entire lab as a Sensitive Compartmented Information Facility, or SCIF. In common practice, a SCIF (pronounced "skiff") is a secure room where highly sensitive information is stored and discussed. Access to SCIFs is severely limited, and all of the activity and conversation inside is presumed to be restricted from public disclosure. There are SCIFs in the U.S. Capitol, where members of Congress are briefed on military secrets. In U.S. nuclear labs, computers that store weapons data are housed inside SCIFs. Homeland Security officials plan to operate all 160,000 square feet of NBACC as a SCIF. Because of the building's physical security features -- intended to prevent the accidental release of dangerous pathogens -- it was logical to operate it as a SCIF, McCarthy said. "We need to protect information at a level that is appropriate," McCarthy added, saying she expects much of the lab's less-sensitive work to be made public eventually. But some biodefense experts, including some from past administrations, viewed the decision as a mistake. "To overlay NBACC with a default level of high secrecy seems like overkill," said Gerald L. Epstein, a former science adviser to the White House's National Security Council and now a senior fellow with the Center for Strategic and International Studies. While accepting that some secrecy is needed, he said the NBACC plan "sends a message that is not at all helpful." NBACC officials also have resisted calls for the kind of broad, independent oversight that many experts say is necessary to assure other countries and the American public about their research. Homeland Security spokesmen insist that NBACC's work will be carefully monitored, but on the department's terms. "We have our own processes to scrutinize our research, and it includes compliance to the bioweapons convention guidelines as well as scientific oversight," said Courtney, the NBACC scientific director. In addition to the department's internal review boards, the agency will bring in small groups of "three or four scientists" on an ad-hoc basis to review certain kinds of potentially controversial experiments, Courtney said. The review panels will be "independent," Courtney said, but he noted that only scientists with government security clearances will be allowed to participate. Some experts have called for unusual forms of oversight, including panels of well-respected, internationally known scientists and observers from overseas. While allowing that the results of some experiments should be kept confidential, O'Toole, of the Center for Biosecurity, argues that virtually everything else at NBACC should be publicly accountable if the United States is to be a credible leader in preventing the proliferation of bioweapons. "We're going to have to lean over backward," O'Toole said. "We have no leverage among other nation-states if we say, 'We can do whatever we want, but you can't. We want to see your biodefense program, but you can't see ours.' " In recent weeks, NBACC's first officially completed project has drawn criticism, not because of its methods or procedures, but because heavy classification has limited its usefulness. The project was an ambitious attempt to assess and rank the threats posed by dozens of different pathogens and delivery systems, drawing on hundreds of studies and extensive computer modeling. When delivered to the White House in January, it was the most extensive survey of its kind, and one that could guide the federal government in making decisions about biodefense spending. Six months later, no one outside a small group of officials and advisers with top security clearances has seen the results. "Something this important shouldn't be secret," said Thomas V. Inglesby, an expert at the Center for Biosecurity who serves on a government advisory board that was briefed on the results. "How can we make policy decisions about matters of this scale if we're operating in the dark?" Tomorrow: A new era of engineered microbes. _______________________________________________ discuss mailing list discuss at syntheticbiology.org http://lists.syntheticbiology.org/mailman/listinfo/discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dave at farber.net Sun Jul 30 16:50:09 2006 From: dave at farber.net (David Farber) Date: Sun, 30 Jul 2006 19:50:09 -0400 Subject: [IP] Illegal to Photo Cops? Message-ID: Begin forwarded message: From camera_lumina at hotmail.com Mon Jul 31 01:24:43 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 31 Jul 2006 04:24:43 -0400 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] In-Reply-To: <20060728210439.GN14701@leitl.org> Message-ID: "Keep in mind that in the eyes of some in government, only people with something to hide would bother using encryption in the first place. From that assumption flows a sea of potential abuses." No, that's not the problem. I've got plenty to hide, and that fact is no one's business but my own. The 'abuse' comes from governments who believe its their right to unhide that which you have decided is worth hiding. -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [dave at farber.net: [IP] more on Can you be compelled to give a >password? [was: Police Blotter: Laptop border searches OK'd]] >Date: Fri, 28 Jul 2006 23:04:39 +0200 > >----- Forwarded message from David Farber ----- > >From: David Farber >Date: Fri, 28 Jul 2006 14:48:26 -0400 >To: ip at v2.listbox.com >Subject: [IP] more on Can you be compelled to give a password? [was: >Police > Blotter: Laptop border searches OK'd] >X-Mailer: Apple Mail (2.752.2) >Reply-To: dave at farber.net > > > >Begin forwarded message: > >From: Lauren Weinstein >Date: July 28, 2006 2:40:02 PM EDT >To: dave at farber.net >Cc: lauren at vortex.com >Subject: Re: [IP] Can you be compelled to give a password? [was: >Police Blotter: Laptop border searches OK'd] > > >Dave, the trend is toward laws that penalize refusal to cooperate >with demands for decryption keys. This concept can work in various >ways. In the border case, for example, a person might be refused >entry -- or perhaps suffer confiscation of related property in some >cases -- if they declined to provide the keys. > >In the case of criminal convictions, additional sentence and fine >penalties can be imposed for uncooperative attitudes in this regard. > >Keep in mind that in the eyes of some in government, only people >with something to hide would bother using encryption in the first >place. From that assumption flows a sea of potential abuses. > >--Lauren-- >Lauren Weinstein >lauren at vortex.com or lauren at pfir.org >Tel: +1 (818) 225-2800 >http://www.pfir.org/lauren >Co-Founder, PFIR > - People For Internet Responsibility - http://www.pfir.org >Co-Founder, IOIC > - International Open Internet Coalition - http://www.ioic.net >Moderator, PRIVACY Forum - http://www.vortex.com >Member, ACM Committee on Computers and Public Policy >Lauren's Blog: http://lauren.vortex.com >DayThink: http://daythink.vortex.com > > - - - > > > > > > >Begin forwarded message: > > > >From: "Patrick W. Gilmore" > >Date: July 28, 2006 2:11:45 PM EDT > >To: dave at farber.net > >Cc: "Patrick W. Gilmore" > >Subject: Can you be compelled to give a password? [was: Police > >Blotter: Laptop border searches OK'd] > > > >On Jul 28, 2006, at 1:32 PM, David Farber wrote: > > > >>I don't believe it is a crime in any US Federal or State law, or in > >>Canadian law, to set passwords and use encryption. In the US, I > >>believe that a warrant would be necessary for law enforcement to > >>ask for your password, but I don't know if you have to comply. > >>IANAL. > > > >That is a good question - Can you be compelled to give up a > >password? Would you mind posting it to IP, I am interested in the > >answer. > > > >Seems there might be some 'self-incriminatory' arguments here. > >Perhaps even an "unreasonable search" argument. But IANAL. > > > >-- > >TTFN, > >patrick > > > > > >------------------------------------- > >You are subscribed as lauren at pfir.org > >To manage your subscription, go to > > http://v2.listbox.com/member/?listname=ip > > > >Archives at: http://www.interesting-people.org/archives/interesting- > >people/ > > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From patrick_sinz at yahoo.com Mon Jul 31 04:32:01 2006 From: patrick_sinz at yahoo.com (Patrick Sinz) Date: July 31, 2006 4:32:01 AM EDT Subject: [IP] more on Can you be compelled to give a password? Message-ID: The whole question seems to be a way to hide the proverbial white elephant. Why would the border police want to look at my PC's content anyway (apart from proving that it really work and is not just a cleverly disguised bomb, or drug stash). If I would smuggle illegal "whatshamacallits" the only reason to do it on my PC and travel through the border instead of using the internet would be because the internet "borders" would be watched "better" than the physical borders. So it seems that either: "Whatshamacallits" smuggler are better informed than I am and KNOW that the is reading ALL their encrypted anonymised e-mail. (and of course mine and yours and everybodys, because how would they know otherwise). Or it is not an efficient way to stop "Whatshamacallits" smuggler and then it seems it is just a way to hassle random people, since booting your PC letting the officer sniff around to find "Whatshamacallits" will take a significant amount of time, probably enough the make you miss your plane, train connection or what ever. (I guess using non Microsoft OS will be a way to agravate the nice officer that has not been trained on your platform). It also prompts a question: If I have a virtual "on-line" disk somewhere (lets say just to seem really suspicious it is hosted in transdniestrian moldova) I go to the US with my "clean PC", and then sit down and remote mount my "on-line" disk. Does it mean that now the US border control can legally inspect my data as it enters the US without any warrant ? Since it would actually be just a "continuation" of the search that they "might have made" on my PC when I crossed the border. [ps] ------------------- - In truth we are not moving to a "big brother state" it is just a conspiration launched by the pharma industry to sell more anti paranoia pills - but of course "they" would say that ;-) Le dimanche 30 juillet 2006 ` 18:04 -0400, David Farber a icrit : > >Begin forwarded message: > >From: Andrew Grosso >Date: July 30, 2006 4:58:41 PM EDT >To: dave at farber.net >Subject: Re: [IP] Can you be compelled to give a password? [was: >Police Blotter: Laptop border searches OK'd] > >As a former Assistant U.S. Attorney, allow me to comment. > >Information may be obtained by the government from a person in one of >four ways: (1) it is voluntarily provided; (2) by regulation in a >heavily regulated industry; (3) by subpoena; and (4) by a search and >seizure warrant. We are concerned with number 3, the subpoena. > >A person can refuse to produce incriminating information in response >to a subpoena under the Fifth Amendment. Please note that the >password is not protected. If it is written down somewhere, the >document on which it is written is not protected by the privilege. >The *act* of producing the document or the password itself *may* be >privileged, if such an act is itself incriminating. For example, if >the password was used in a crime, and the fact that you have the >password in your possession tends to show that you participated or >conspired in the crime, and then the Fifth Amendment privilege is >applicable to protect you from implicating yourself in the crime. >The Government *can* immunize you to the limited extent necessary to >obtain the password - it cannot then use the fact that it got the >password from you in order to prosecute you. This is known as "Doe" >immunity, and there is an extensive line of cases that has developed >in this area. Webster Hubbell, the former Associate Attorney General >who was convicted of tax fraud by Ken Starr's IC Office, eventually >had his conviction vacated because Starr's legal team failed to >follow the rules when they obtained, from him (by subpoena), his tax >records. > >If the government is not investigating a crime, then it may use an >administrative or civil subpoena to try and get the password. If the >witness invokes the Fifth Amendment, then the government can immunize >that person and compel production. > >The second point, above, concerning a regulated industry, applies to >such areas as Medicare and Medicaid, Government contractors for >procurement matters, industrial health and safety mattes, >environmental concerns, etc. The same analysis as above would apply. > >Border searches are a different animal, since the government has the >right to inspect items crossing the border without a warrant. >However, if the password is in the traveler's head, then that is not >an "item" that can be inspected at the border. The information on >the laptop might very well be such an item, however, and if the only >way to convince the government to allow you to cross the border is to >show the border guards what is on the laptop, then the traveler might >very well face the choice of turning on the laptop and opening >files,, using the password, or not crossing the border. I do not >believe that, even here, the traveler would have to produce the >password itself. > > >Andrew Grosso, Esq. >Andrew Grosso & Associates >1250 Connecticut Avenue, NW, Suite 200 >Washington, D.C. 20036 >(202) 261-3593 >Email: Agrosso at acm.org >Web Site: www.GrossoLaw.com >----- Original Message ----- >From: David Farber >To: ip at v2.listbox.com >Sent: Friday, July 28, 2006 2:26 PM >Subject: [IP] Can you be compelled to give a password? [was: Police >Blotter: Laptop border searches OK'd] > > > >Begin forwarded message: > >From: "Patrick W. Gilmore" >Date: July 28, 2006 2:11:45 PM EDT >To: dave at farber.net >Cc: "Patrick W. Gilmore" >Subject: Can you be compelled to give a password? [was: Police >Blotter: Laptop border searches OK'd] > >On Jul 28, 2006, at 1:32 PM, David Farber wrote: > >>I don't believe it is a crime in any US Federal or State law, or in >>Canadian law, to set passwords and use encryption. In the US, I >>believe that a warrant would be necessary for law enforcement to >>ask for your password, but I don't know if you have to comply. >IANAL. > >That is a good question - Can you be compelled to give up a >password? Would you mind posting it to IP, I am interested in the >answer. > >Seems there might be some 'self-incriminatory' arguments here. >Perhaps even an "unreasonable search" argument. But IANAL. > ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From camera_lumina at hotmail.com Mon Jul 31 01:35:03 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 31 Jul 2006 04:35:03 -0400 Subject: [dave@farber.net: [IP] more on Police Blotter: Laptop border searches OK'd] In-Reply-To: <20060728173734.GC14701@leitl.org> Message-ID: Hum. Is it possible to make a laptop boot up with a 'fake' (thouugh usable) directory tree? Of course, if the copss do the math (and they likely won't) they might be able too detect that there's a hell of a lot of nothing somewhere on the drive, but methinks one can also put fake info about the size of the disc and remaining space too. And then of course if this confiscated laptop ever sees online, it should squeal everything it knows about what's been attempted and/or accessed (ie, to you the rightful owner, of course). And if it stays on line then one should be able to remotely retrieve even the hidden and encrypted data. meanwhile, the cops wil continue to believe that you've just got some fairly banal usiness data on there. One good thing is that I think this battle will ultimately be won in favor of privacy. The statte can't really can't afford to train cops too be crypto experts. -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [dave at farber.net: [IP] more on Police Blotter: Laptop border >searches OK'd] >Date: Fri, 28 Jul 2006 19:37:34 +0200 > >----- Forwarded message from David Farber ----- > >From: David Farber >Date: Fri, 28 Jul 2006 13:32:54 -0400 >To: ip at v2.listbox.com >Subject: [IP] more on Police Blotter: Laptop border searches OK'd >X-Mailer: Apple Mail (2.752.2) >Reply-To: dave at farber.net > > > >Begin forwarded message: > >From: Roger Weeks >Date: July 28, 2006 12:43:18 PM EDT >To: dave at farber.net >Subject: Re: [IP] more on Police Blotter: Laptop border searches OK'd > >Dave - > >For IP on the laptop border searches: > >I'm suprised that no one else has mentioned this so far, but this >type of situation is one of the many excellent reasons to use an >encrypted filesystem on your laptop hard disk, and to set up other >types of security. > >For example, my PowerBook G4 is set up to use the built-in feature of >OS X called FileVault, which encrypts the user's home directory. The >home directory on OS X contains the browser cache for Safari, >Firefox, and Camino, and I have to assume, any other browser cache >for Opera and other browsers. > >I have also set an Open Firmware boot password. See >http://www.apple.com/downloads/macosx/apple/openfirmwarepassword.html >for details. When I travel I never put my laptop to sleep, but >rather I shut it all the way down. This is marginally less >convenient, but it means that if my laptop is stolen or confiscated, >the Open Firmware password will be the first thing that the attacker >sees. Supposing that is broken, they will then have to deal with >logging into my laptop. > >My root account is disabled, like all OS X installs. I have my login >preferences set to not show the usernames on the computer, so the >attacker will have to guess both a login name and password. > >If the attacker were to take the hard disk out of my laptop and make >an image of it with forensic software, they would find an encrypted >partition. I'm sure the NSA probably has the horsepower to throw at >cracking AES-128 encryption, but chances are my laptop will never get >to them if we're talking about local law enforcement. > >For those in the Windows or Linux world, you can set a BIOS password >on your laptop which is very similar to the Open Firmware boot >password for Apple Hardware. > >Windows XP and Windows 2003 both include support for encrypting >filesystems using DESX or 3DES, via the Encrypted File System. PGP >Corp sells a product called "PGP Whole Disk Encryption" for Windows >2000 & XP that uses AES-256 encryption. > >Linux users can make a loopback encrypted filesystem for storing >anything they wish to be encrypted. See http://www.tldp.org/HOWTO/ >Cryptoloop-HOWTO/ for details. > >I don't believe it is a crime in any US Federal or State law, or in >Canadian law, to set passwords and use encryption. In the US, I >believe that a warrant would be necessary for law enforcement to ask >for your password, but I don't know if you have to comply. IANAL. > >-- >Roger J. Weeks >Systems & Network Administrator >Mendocino Community Network >Now offering DSL across California > > > >------------------------------------- >You are subscribed as eugen at leitl.org >To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From EEkid at aol.com Mon Jul 31 08:25:53 2006 From: EEkid at aol.com (EEkid at aol.com) Date: July 31, 2006 8:25:53 AM EDT Subject: Why Should Feds Track College Students? Message-ID: http://www.courant.com/news/opinion/op_ed/hc- khwill0731.artjul31,0,984479.story?coll=hc-headlines-oped Why Should Feds Track College Students? July 31, 2006 Does the federal government need to know whether you aced Aristotelian ethics but had to repeat introductory biology? Does it need to know your family's financial profile, how much aid you received and whether you took off a semester to help out at home? The Secretary of Education's Commission on the Future of Higher Education thinks so. In its first draft report, released in late June, the commission called for creation of a tracking system to collect sensitive information about our nation's college students. Its second draft, made public last week, softens the name of the plan, but the essence of the proposal remains unchanged. Whether you call it a "national unit records database" (the first name) or a "consumer-friendly information database" (the second), it is in fact a mandatory federal registry of all American students throughout their collegiate careers - every course, every step, every misstep. Once established, it could easily be linked to existing K-12 and workforce databases to create unprecedented cradle-to-grave tracking of American citizens. All under the watchful eye of the federal government. The commission calls our nation's colleges and universities unaccountable, inefficient and inaccessible. In response it seeks to institute collection of personal information designed to quantify our students' performance in college and in the workforce. But many of us are concerned about invading our students' privacy by feeding confidential educational and personal data, linked to Social Security numbers, into a mandatory national database. Such a database would wrest control over educational records from students and hand it to the government. I'd like the commission to tell me how our students would benefit from our reporting confidential family financial information. Those of us in higher education aren't the only ones with concerns about this. Earlier this month, the National Association of Independent Colleges and Universities released results of a survey that showed the majority of Americans oppose creation of a national system to track students' academic, enrollment and financial aid information. More than 60 percent of those polled opposed the creation of such a system, and 45 percent of those surveyed were "strongly opposed" to the proposal. Privacy groups from both ends of the political spectrum - including the Eagle Forum and the American Civil Liberties Union - criticized an early form of the proposal that Education Department officials were exploring in 2004. We already have efficient systems in place to collect educational statistics. I question why the commission, which shares our concerns about the increased cost of education, would want to create a database that not only violates privacy but also would be very expensive. Our existing systems meet the government's need to inform public policy without intruding on student privacy because they report the data in aggregate form. Colleges and universities report on virtually every aspect of our students' experience - retention and graduation rates, financial aid rates and degrees conferred by major institutions - to the federal and state governments as well as to organizations such as the NCAA and to many publications. The commission seems bent on its Orwellian scheme of collecting extensively detailed, very personal student data. Supporters say it would make higher education more accountable and more affordable for students. Admirable goals, but a strange and forbidding solution. This proposal is a violation of the right to privacy that Americans hold dear. It is against the law. Moreover, there is a mountain of data already out there that can help us understand higher education and its efficacy. And, finally, implementation of such a database, which at its inception would hold "unit" record data on 17 million students, would be an unfunded mandate on institutions and add greatly to the expense of education. At a time when the world acknowledges the strength of the American system of higher education - that it is decentralized, diverse, competitive and independent - why would a commission on the future of higher education want to impose federal regulations and federal bureaucratic monitoring of individual students in the name of "improving" higher education? Katherine Haley Will is president of Gettysburg College and chairwoman-elect of the Annapolis Group, an organization of leading independent liberal arts colleges. This first appeared in The Washington Post. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From tau27 at 74.ru Sun Jul 30 22:30:56 2006 From: tau27 at 74.ru (Folvy) Date: Mon, 31 Jul 2006 08:30:56 +0300 Subject: hello from Folvyn Message-ID: <003101c6b462$6f13c880$1109000a@uWMP> Hallo . I am a lovely and lonely Lady who is looking for the man who will make me happy and whom I want to feel like in paradise with! If you want to be my beautiful Hero who will save me from this loneliness find me http://www.dating-foryou.com/loveyou/ and wake me up with a warm kiss. see you later, Folvy If you think that you were subscribed by mistake for this mail delivery or if your email has been added without your permission, please, visit http://dating-foryou.com/loveyou/ and unsubscribe from our mails. From dave at farber.net Mon Jul 31 05:36:51 2006 From: dave at farber.net (David Farber) Date: Mon, 31 Jul 2006 08:36:51 -0400 Subject: [IP] Why Should Feds Track College Students? Message-ID: Begin forwarded message: From dave at farber.net Mon Jul 31 05:40:30 2006 From: dave at farber.net (David Farber) Date: Mon, 31 Jul 2006 08:40:30 -0400 Subject: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd] Message-ID: Begin forwarded message: From bcpark at 0to7.com Mon Jul 31 04:01:11 2006 From: bcpark at 0to7.com (Nicole Singh) Date: Mon, 31 Jul 2006 10:01:11 -0060 Subject: Be leaner and slimmer by next week Message-ID: <200607311001.k6VA0kWN027460@proton.jfet.org> Anatrim -- The newest and most exciting fat loss product available - As scen on Oprah Real testimonials:"I was originally amazed that the first two pills I took of Anatrim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!"Lusia R., San Diego"I tried Anatrim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you... Anatrim really works!"Steve Burbon, BostonRead more testimonals here!Remove you e-mail http://www.unfento.com/d/ http://www.unfento.com/d/ http://www.unfento.com/d/u.php -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1449 bytes Desc: not available URL: From eugen at leitl.org Mon Jul 31 01:43:29 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jul 2006 10:43:29 +0200 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] Message-ID: <20060731084328.GB14701@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Mon Jul 31 01:48:01 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jul 2006 10:48:01 +0200 Subject: [endy@MIT.EDU: [Synthetic Biology] Q. Is secret biodefense a bad idea?] Message-ID: <20060731084801.GE14701@leitl.org> ----- Forwarded message from Drew Endy ----- From eugen at leitl.org Mon Jul 31 01:48:32 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jul 2006 10:48:32 +0200 Subject: [dave@farber.net: [IP] Illegal to Photo Cops?] Message-ID: <20060731084831.GF14701@leitl.org> ----- Forwarded message from David Farber ----- From lauren at vortex.com Mon Jul 31 12:21:00 2006 From: lauren at vortex.com (Lauren Weinstein) Date: July 31, 2006 12:21:00 PM EDT Subject: [IP] search experience on "border" Message-ID: >From: Travis Kalanick ... >While operating my laptop he said that we was tasked with preventing >illegal pornographic material from entering the United States ... >He returned my laptop after this warrantless search saying I was free Dave, And to what end -- other than going through the motions -- is such a search? Given a quick check, the border agent would be unlikely to find a cache of porn photos that was compressed and archived in a single encrypted file named C:\WINDOWS\$NtUninstallKB911567 or some other obscure name -- not a single JPG porn file to be found in a file scan. Perhaps what's really going on in such border cases is some sort of "amateur test" -- since any pro who wanted to bring porn (or any other data) into the U.S. on a laptop would never leave the data in an easily discovered form. But then again, why bother using the laptop? How about putting an innocuous looking file on that cute keychain memory dongle? Or on an iPod? Porn could be easily rigged to look like an mp3 file, that could even play properly. Or why not use some spare cell phone memory area? Or how about that 2 Gig memory stick in the camera, or a miniSD memory card inserted into an electric razor or the binding of a book? To quote the wonderful episode "OBIT" from the original '60s television series "The Outer Limits": "The machines are everywhere!" Anyone with half a brain who wants to bring data into the U.S. can do so without meaningful detection, short of a full body cavity strip search and prolonged forensic analysis -- and even then the true nature of any data might well be undiscovered. All of the rest is for show, and perhaps to cull the low hanging fruit. --Lauren-- Lauren Weinstein lauren at vortex.com or lauren at pfir.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, IOIC - International Open Internet Coalition - http://www.ioic.net Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com DayThink: http://daythink.vortex.com ------------------------------------- You are subscribed as tfairlie at frontiernet.net To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting- people/ ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From TonyaHammond at humour.com Sun Jul 30 23:37:37 2006 From: TonyaHammond at humour.com (Delbert Wilkerson) Date: Mon, 31 Jul 2006 14:37:37 +0800 Subject: Hoodia is the new miracle supplement for safe, effective weight loss. Message-ID: <3773838.97585@humour.com> often call numbers and descriptive subject terms. There is also a new stable link shown for the information page that can be incentives for authors and other artists to create and publish new works. But, the plaintiffs argue, once a work has been often call numbers and descriptive subject terms. There is also a new stable link shown for the information page that can be incentives for authors and other artists to create and publish new works. But, the plaintiffs argue, once a work has been -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1892 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: soybean.png Type: image/png Size: 7197 bytes Desc: not available URL: From eugen at leitl.org Mon Jul 31 05:48:22 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jul 2006 14:48:22 +0200 Subject: [dave@farber.net: [IP] Why Should Feds Track College Students?] Message-ID: <20060731124821.GO14701@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Mon Jul 31 05:50:02 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jul 2006 14:50:02 +0200 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] Message-ID: <20060731125002.GP14701@leitl.org> ----- Forwarded message from David Farber ----- From michaelslists at gmail.com Mon Jul 31 02:25:12 2006 From: michaelslists at gmail.com (mikeiscool) Date: Mon, 31 Jul 2006 19:25:12 +1000 Subject: [dave@farber.net: [IP] more on Can you be compelled to give a password? [was: Police Blotter: Laptop border searches OK'd]] In-Reply-To: <20060731084328.GB14701@leitl.org> References: <20060731084328.GB14701@leitl.org> Message-ID: <5e01c29a0607310225k7e45a772g10c6b0e69cd2c729@mail.gmail.com> It's interesting really. Assuming one _did_ use some form of dual-key encryption such that key a produces the real data, key b produces useless random noise, would the feds smarten up such that they will analyse the decrypted result, and, if they decide it's useless, force you to give up another key? What if there were an N-Key system that (i.e. maybe OTP) where any given key could give any given plaintext. Maybe they would force you to try keys until they got a result they liked? Is such a scenario possible? -- mic On 7/31/06, Eugen Leitl wrote: > ----- Forwarded message from David Farber ----- > > From: David Farber > Date: Sun, 30 Jul 2006 18:04:08 -0400 > To: ip at v2.listbox.com > Subject: [IP] more on Can you be compelled to give a password? [was: Police > Blotter: Laptop border searches OK'd] > X-Mailer: Apple Mail (2.752.2) > Reply-To: dave at farber.net > > > > Begin forwarded message: > > From: Andrew Grosso > Date: July 30, 2006 4:58:41 PM EDT > To: dave at farber.net > Subject: Re: [IP] Can you be compelled to give a password? [was: > Police Blotter: Laptop border searches OK'd] > > As a former Assistant U.S. Attorney, allow me to comment. > > Information may be obtained by the government from a person in one of > four ways: (1) it is voluntarily provided; (2) by regulation in a > heavily regulated industry; (3) by subpoena; and (4) by a search and > seizure warrant. We are concerned with number 3, the subpoena. > > A person can refuse to produce incriminating information in response > to a subpoena under the Fifth Amendment. Please note that the > password is not protected. If it is written down somewhere, the > document on which it is written is not protected by the privilege. > The *act* of producing the document or the password itself *may* be > privileged, if such an act is itself incriminating. For example, if > the password was used in a crime, and the fact that you have the > password in your possession tends to show that you participated or > conspired in the crime, and then the Fifth Amendment privilege is > applicable to protect you from implicating yourself in the crime. > The Government *can* immunize you to the limited extent necessary to > obtain the password - it cannot then use the fact that it got the > password from you in order to prosecute you. This is known as "Doe" > immunity, and there is an extensive line of cases that has developed > in this area. Webster Hubbell, the former Associate Attorney General > who was convicted of tax fraud by Ken Starr's IC Office, eventually > had his conviction vacated because Starr's legal team failed to > follow the rules when they obtained, from him (by subpoena), his tax > records. > > If the government is not investigating a crime, then it may use an > administrative or civil subpoena to try and get the password. If the > witness invokes the Fifth Amendment, then the government can immunize > that person and compel production. > > The second point, above, concerning a regulated industry, applies to > such areas as Medicare and Medicaid, Government contractors for > procurement matters, industrial health and safety mattes, > environmental concerns, etc. The same analysis as above would apply. > > Border searches are a different animal, since the government has the > right to inspect items crossing the border without a warrant. > However, if the password is in the traveler's head, then that is not > an "item" that can be inspected at the border. The information on > the laptop might very well be such an item, however, and if the only > way to convince the government to allow you to cross the border is to > show the border guards what is on the laptop, then the traveler might > very well face the choice of turning on the laptop and opening > files,, using the password, or not crossing the border. I do not > believe that, even here, the traveler would have to produce the > password itself. > > > Andrew Grosso, Esq. > Andrew Grosso & Associates > 1250 Connecticut Avenue, NW, Suite 200 > Washington, D.C. 20036 > (202) 261-3593 > Email: Agrosso at acm.org > Web Site: www.GrossoLaw.com > ----- Original Message ----- > From: David Farber > To: ip at v2.listbox.com > Sent: Friday, July 28, 2006 2:26 PM > Subject: [IP] Can you be compelled to give a password? [was: Police > Blotter: Laptop border searches OK'd] > > > > Begin forwarded message: > > From: "Patrick W. Gilmore" > Date: July 28, 2006 2:11:45 PM EDT > To: dave at farber.net > Cc: "Patrick W. Gilmore" > Subject: Can you be compelled to give a password? [was: Police > Blotter: Laptop border searches OK'd] > > On Jul 28, 2006, at 1:32 PM, David Farber wrote: > > > I don't believe it is a crime in any US Federal or State law, or in > > Canadian law, to set passwords and use encryption. In the US, I > > believe that a warrant would be necessary for law enforcement to > > ask for your password, but I don't know if you have to comply. > IANAL. > > That is a good question - Can you be compelled to give up a > password? Would you mind posting it to IP, I am interested in the > answer. > > Seems there might be some 'self-incriminatory' arguments here. > Perhaps even an "unreasonable search" argument. But IANAL. > > -- > TTFN, > patrick > > > ------------------------------------- > You are subscribed as Agrosso at worldnet.att.net > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: http://www.interesting-people.org/archives/interesting- > people/ > > > ------------------------------------- > You are subscribed as eugen at leitl.org > To manage your subscription, go to > http://v2.listbox.com/member/?listname=ip > > Archives at: http://www.interesting-people.org/archives/interesting-people/ > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > > [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From tkruithof at infogenie.com Mon Jul 31 14:12:39 2006 From: tkruithof at infogenie.com (Elizabeth Mann) Date: Mon, 31 Jul 2006 23:32:39 +0180 Subject: replica watches :: rolex replicas :: fake watches :: Message-ID: <200607312332.k6VNWNOq018373@proton.jfet.org> Genuine Swiss made Rolex replicas are as close to the real thing as a replica watch can be. Sometimes even the professional jewelers are unable to tell the difference from the real Rolex watch. All genuine Swiss Rolex Replicas should have the following:- Full 1-year Warranty - Solid 14k or 18k Gold on two-toned models - Guaranteed triple-wrapped gold on all-gold models - Genuine sapphire crystal - a type of glass that is many times better at resisting scratches than regular glass. - The color of the gold looks exactly like a genuine Rolex watch If the retailer does not offer this, do not purchase from them!//e have all this! JUST COME and buy your REPLICA //atches! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1151 bytes Desc: not available URL: From PfeifferJanelletqtv at skycanada.net Mon Jul 31 22:18:39 2006 From: PfeifferJanelletqtv at skycanada.net (Mrs Ivy) Date: Tue, 01 Aug 2006 00:18:39 -0500 Subject: Ephedra is Back, Looking Trim again? Message-ID: <8L5M3M$W7V8SX300U3179986KV713G7Z4FFWS9Z@kwikit.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2025 bytes Desc: not available URL: