From declan at well.com Thu Jun 1 00:07:48 2006 From: declan at well.com (Declan McCullagh) Date: Thu, 01 Jun 2006 00:07:48 -0700 Subject: [Politech] Mandatory data retention resurfaces; Gonzales, Mueller call for 2-year rule [priv] Message-ID: I've been busy at work writing a series of articles about what's going on in terms of forcing Internet service providers to snoop on Americans. Basically Attorney General Gonzales and FBI Director Mueller met with Internet and telecom companies (including Microsoft, Google, Verizon, and Comcast) last Friday and called on them to store data about users' activities for two years: http://news.com.com/2100-1028_3-6077654.html Until that meeting, Gonzales and the Justice Department had been saying this would be useful for child porn fighting. Now they've realized (took 'em long enough) that (a) the stored data would be useful for terrorism investigations and (b) it might be politically convenient to pitch it as an anti-terrorism measure: http://news.com.com/2100-1028_3-6078229.html Companies aren't very happy about this. And of course any such know-your-user law would presumably apply to libraries, schools, and coffee shops as well: http://news.com.com/2100-1028_3-6078689.html Looking ahead a few years, assuming that data retention is adopted, it's unclear that the Feds would stop there. Imagine a shocking horrible tragedy could have been prevented if only even more expansive laws had been adopted on top of data retention. The end game eventually could involve (a) making it unlawful to offer Internet access without verifying identities, effectively shutting down open WiFi nodes and (b) restricting the use of encryption and anonymity services -- after all, what good is a pile of retained data if it doesn't tell you very much? This is sheer speculation, mind you. But then again a House of Representatives committee once approved a bill that would make it unlawful to sell encryption products without backdoors for the Feds. And Sen. Judd Gregg talked about restricting encryption products soon after 9/11, so perhaps it's not _that_ unlikely either. One other thing worth thinking about in terms of the Washington endgame. The Internet providers I've talked to have been generally opposed to the idea. But one of their primary complaints is the logical one of how much it will cost. If the Feds decide to write them a fat check, their complaints could evaporate and the legislation would instantly experience far less opposition. Watch for this; it would follow what happened with CALEA. Here's Microsoft's statement on data retention: http://news.com.com/2100-1028_3-6078711.html Or, if you prefer, CNN and USA Today coverage of the topic: http://www.usatoday.com/tech/news/internetprivacy/2006-05-31-internet-records _x.htm http://money.cnn.com/2006/05/30/technology/justice_internet/ -Declan _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From brett at lariat.org Thu Jun 1 01:45:29 2006 From: brett at lariat.org (Brett Glass) Date: June 1, 2006 1:45:29 PM EDT Subject: US Attorney General demands ISPs snoop on customers to stop Message-ID: "terrorism" Dave: For IP, if you'd like. As an ISP, I can tell you that what the USDOJ is demanding in the article below is not only an unprecedented, vast, unwarranted intrusion that should have every citizen up in arms but would be extremely costly and in many cases simply impossible. For example, the article mentions that the DOJ wants ISPs to retain lists of the IP addresses used by every user. But we, as an ISP, do not give each user a unique IP address; we use network address translation, or NAT. To abandon the use of NAT would not only compromise users' safety (by making them more susceptible to Internet worms and other attacks); it would also require us to spend thousands of dollars to obtain more addresses from ARIN and to re-architect our network. What's more, the imposition of such a requirement upon all ISPs would instantly exhaust the remaining pool of IPV4 addresses at a time when most equipment is not ready for IPV6. The requirement that all VOIP calls be monitored is likewise absurd. We don't provide VOIP ourselves; we merely provide the pipes. We don't even know when a VOIP call is taking place on our network. We would have no way to monitor and track every one on behalf of the government, even if we were willing to (which we are not; we owe it to our users never to participate in such blatantly unconstitutional activity). Note that the government first attempted to use kiddie porn as an excuse to destroy our liberty, but seems to have decided that terrorism is a more effective excuse -- despite the fact that there have been no terrorist attacks on US soil since 9/11. The belief that everything and everyone must be monitored in the hope of preventing possible criminal activity is a hallmark of a police state. Is this what the US is coming to? If so, the 9/11 terrorists have won. By killing fewer people than died in the recent earthquake, they have given an irresponsible government an excuse to destroy our freedom, and have successfully cowed the populace into allowing it to happen. --Brett Glass ------------------ Terrorism invoked in ISP snooping proposal By Declan McCullagh http://news.com.com/Terrorism+invoked+in+ISP+snooping+proposal/ 2100-1028_3-6078229.html Story last modified Wed May 31 06:12:45 PDT 2006 In a radical departure from earlier statements, Attorney General Alberto Gonzales has said that requiring Internet service providers to save records of their customers' online activities is necessary in the fight against terrorism, CNET News.com has learned. Gonzales and FBI Director Robert Mueller privately met with representatives of AOL, Comcast, Google, Microsoft and Verizon last week and said that Internet providers--and perhaps search engines-- must retain data for two years to aid in anti-terrorism prosecutions, according to multiple sources familiar with the discussion who spoke on condition of anonymity on Tuesday. "We want this for terrorism," Gonzales said, according to one person familiar with the discussion. Gonzales' earlier position had only emphasized how mandatory data retention would help thwart child exploitation. In a speech last month at the National Center for Missing and Exploited Children, Gonzales said that Internet providers must retain records to aid investigations of criminals "abusing kids and sending images of the abuse around the world through the Internet." If data retention becomes viewed primarily as an anti-terrorism measure, recent legal and political spats could complicate the Justice Department's efforts to make it standard practice. Especially after recent reports that AT&T has opened its databases to the National Security Agency, Internet and telecommunications executives have become skittish about appearing to be cooperating too closely with the federal government's surveillance efforts. In addition, the positive publicity that Google received during its legal dispute with the Justice Department over search terms has demonstrated to Internet companies the benefits of objecting to government requests on privacy grounds. "A monumental data trove is a crazy thing from a privacy perspective," said one person familiar with Friday's discussions. "It's crazy that the U.S. government is going to retain more data than the Chinese government does." Comcast said in a statement that "we fully share the attorney general's concern with the need to combat illegal use of the Internet for child pornography, terrorism and other illegal activities. We applaud the attorney general's initiative in convening an internal task force on this issue and look forward to continuing to cooperate with him and the FBI." "The reasons for skepticism are growing," said Jim Harper, an analyst at the free-market Cato Institute and member of the Department of Homeland Security's Data Privacy and Integrity Advisory Committee. He predicted the reaction among Internet and telecom companies will be "mildly unfavorable but people are not yet to the point where they'll say the emperor has no clothes." More at http://news.com.com/2102-1028_3-6078229.html?tag=st.util.print Sidebar: ISP snooping time line In events first reported by CNET News.com, Bush administration officials have said Internet providers must keep track of what Americans are doing online. Here's the time line: June 2005: Justice Department officials quietly propose data retention rules. December 2005: European Parliament votes for data retention of up to two years. April 14, 2006: Data retention proposals surface in Colorado and the U.S. Congress. April 20, 2006: Attorney General Gonzales says data retention "must be addressed." April 28, 2006: Rep. DeGette proposes data retention amendment. May 16, 2006: Rep. Sensenbrenner drafts data retention legislation, but backs away from it two days later. May 26, 2006: Gonzales and FBI Director Mueller meet with Internet and telecommunications companies. Details of the Justice Department's proposal remain murky. One possibility is requiring Internet providers to record the Internet addresses that their customers are temporarily assigned. A more extensive mandate would require them to keep track of the identities of Americans' e-mail and instant messaging correspondents and save the logs of Internet phone calls. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From zavala at jaybis.com Thu Jun 1 02:54:17 2006 From: zavala at jaybis.com (Lane Polk) Date: Thu, 01 Jun 2006 03:54:17 -0600 Subject: Notification: Loww ratess Message-ID: <938x526p.0153605@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1181 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: scroll.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From steve at activewin.com Thu Jun 1 02:58:03 2006 From: steve at activewin.com (Federico Mora) Date: Thu, 01 Jun 2006 03:58:03 -0600 Subject: Ratess will skyrocket soon Message-ID: <262m508m.9452215@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1192 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: syntactic.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From coderman at gmail.com Thu Jun 1 08:12:28 2006 From: coderman at gmail.com (coderman) Date: Thu, 1 Jun 2006 08:12:28 -0700 Subject: Crashing the Wiretapper's Ball Message-ID: <4ef5fec60606010812l407308fu39ce612b8712d318@mail.gmail.com> amusing :) http://www.wired.com/news/technology/1,71022-1.html ---begin-cut--- By Thomas Greene| Also by this reporter 02:00 AM Jun, 01, 2006 CRYSTAL CITY, Virginia -- The dingy hotel corridor was populated with suits, milling about and radiating airs of defensive hostility. They moved in close-knit groups, rounding a stranger or a rival group conspicuously, the way cats do. They spoke in whispers. They glanced nervously over their shoulders as they took calls on their cell phones, then darted swiftly into alcoves. They were government officials, telephone company honchos, military officers, three-letter-agency spooks and cops, all brought together by salesmen dealing in the modern equipment of surveillance. It was my job to learn what they were up to. They'd gathered for the ISS World Conference, a trade show featuring the latest in mass communications intercept gear, held in the Washington, D.C., suburb of Crystal City, Virginia. Situated conveniently between Reagan National Airport and the Pentagon, Crystal City is an artificial place dominated by conference centers and hotels, set up to accommodate the endless, and often secret, intercourse between the U.S. military and its myriad itinerant contractors, lobbyists, consultants and trainers. They rotate in and out, civilians using the airport, military personnel taking the subway from the Pentagon, with Crystal City as the intersection in a figure-eight circuit of constant activity. Back in the narrow hotel corridor, vendors manned their booths, exhibiting the latest gadgets for mass electronic surveillance: machines capable of scouring the data streams of millions of subscribers -- industrial-strength kits for packet interception and analysis, RF interception, and voice and keyword recognition. . . . ---end-cut--- From eugen at leitl.org Thu Jun 1 01:33:29 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 1 Jun 2006 10:33:29 +0200 Subject: [declan@well.com: [Politech] Mandatory data retention resurfaces; Gonzales, Mueller call for 2-year rule [priv]] Message-ID: <20060601083329.GN28956@leitl.org> ----- Forwarded message from Declan McCullagh ----- From Oclm at qwest.net Thu Jun 1 06:56:58 2006 From: Oclm at qwest.net (Trinidad) Date: Thu, 01 Jun 2006 12:56:58 -0100 Subject: Urgent Stock News -- Look at what LITL.PK just announced ... Rau Message-ID: <3FF23856.B7636E1@qwest.net> Exciting Investment News. All investors must read! Wed. June 3rd 2006 Symbol LITL L International Computers Inc Announces the Olympus, the World's First 20'' Widescreen PCI-XPress Series SLI Laptop Computer Tuesday May 30, 9:00 am ET L International Computers Inc., through its wholly owned subsidiary, Liebermann Inc., a renowned manufacturer of high-performance computers and personal technology, today announced the Olympus 20", the world's first desktop replacement Professional notebook computer fitted with a 20" UltraSpeed High-Resolution Display. The Olympus has fully-upgradeable dual SLI mobile graphics adaptors and is designed around a workstation-class PCI-Express architecture with Dual-Channel DDR-II 667MHz SDRAM/800MHz +1066MHz Bus speeds supporting Intel's latest generation Pentium-D Dual-Core and Extreme Edition Processors, scalable up to 4.40GHz core speeds. As the world's first mobile workstation supporting Nvidia's SLI Technology, the laptop is the ultimate fully upgradeable high-performance graphics power station, whether for the ultimate gaming adrenaline rush or the high-end professional graphics environment. Equally, it is the world's first laptop computer supporting quad-DVI external output capabilities with individual resolutions of up to 2048x1536 per output when operating with 2 graphics adapters. Operation is possible with either single or dual graphics card configuration, each with 1024MB of dedicated high-speed memory on board. And the notebook delivers unprecedented multi-media capabilities supported by 4 high-output surround speakers and an enhanced subwoofer built in a proprietary multi-pass bass-reflex enclosure, a built-in CCD PC Video Camera, and an all-new multi-channel audio circuitry. Miguel Liebermann, CEO of L, commented, "A true industry first, L's all-new Olympus 20", is armed to deliver unprecedented levels of performance technological features poised to change the face of high-performance computing and world-class mobile entertainment." About Founded in 2002, Liebermann Inc. produces, markets and distributes high-performance, opulent PC/Windows© laptop, desktop, workstation and server computers. The Company also produces the largest and most spectacular personal & professional computer displays and ultra-high performance software, peripherals and technologies. From rickbridget.1.monaco at about.com Thu Jun 1 15:00:10 2006 From: rickbridget.1.monaco at about.com (Kitty Stuart) Date: Thu, 01 Jun 2006 14:00:10 -0800 Subject: easy $ in no time! Message-ID: <200606010356.k513uYWT020580@proton.jfet.org> You've been selected to Play at the HI-ROLLER CASIN0! Your promotional ID is vegas88 Benefits include: * Up to $888 real money to gamble with * Fastest growing/most trusted online company * Play all your favorite games: Poker, Hold'em, Black Jack, Slots, etc. * Play at no-cost to see how exciting and easy it is * Rapid payouts to all clientele & 24/7 support * Great games, Big Winnings, & thousands of players This is a limited chance that expires at the end of the month. Play where the world is Playing! http://cartsrv.com/d1/head From dave at farber.net Thu Jun 1 11:47:00 2006 From: dave at farber.net (David Farber) Date: Thu, 1 Jun 2006 14:47:00 -0400 Subject: [IP] US Attorney General demands ISPs snoop on customers to stop Message-ID: "terrorism" X-Mailer: Apple Mail (2.750) Reply-To: dave at farber.net Begin forwarded message: From kmononen at kihu.jyu.fi Thu Jun 1 13:56:50 2006 From: kmononen at kihu.jyu.fi (Lesa Branch) Date: Thu, 01 Jun 2006 14:56:50 -0600 Subject: Re-finance before rates skyrocket Message-ID: <27031613098089.NhPg1qwjtg@alpine> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1161 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: sybil.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From flanagan at familyfirm.com Thu Jun 1 13:57:12 2006 From: flanagan at familyfirm.com (Beverly Muller) Date: Thu, 01 Jun 2006 14:57:12 -0600 Subject: Mortagge ratee approvedd Message-ID: <2.0.3.3.2.55619765600342.435a6838@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1218 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: thematic.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From responsible666 at gmail.com Thu Jun 1 02:00:20 2006 From: responsible666 at gmail.com (Theresa Witherspoon) Date: Thu, 1 Jun 2006 15:00:20 +0600 Subject: This is most modern and safe way not to cover with shame Message-ID: <200606012000.k51K0H4F014294@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://ukt.treevita.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From eugen at leitl.org Thu Jun 1 07:10:24 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 1 Jun 2006 16:10:24 +0200 Subject: [Victor.Duchovni@MorganStanley.com: Re: Status of opportunistic encryption] Message-ID: <20060601141023.GA28956@leitl.org> ----- Forwarded message from Victor Duchovni ----- From eugen at leitl.org Thu Jun 1 07:45:07 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 1 Jun 2006 16:45:07 +0200 Subject: [dewayne@warpspeed.com: [Dewayne-Net] Can Tracking Phone Calls Ferret Out Terrorists?] Message-ID: <20060601144507.GB28956@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From eugen at leitl.org Thu Jun 1 11:49:49 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 1 Jun 2006 20:49:49 +0200 Subject: [dave@farber.net: [IP] US Attorney General demands ISPs snoop on customers to stop "terrorism"] Message-ID: <20060601184949.GI28956@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Thu Jun 1 17:51:44 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 1 Jun 2006 20:51:44 -0400 Subject: [Clips] Proposal to Implant Tracking Chips in Immigrants Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Thu, 1 Jun 2006 20:50:36 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Proposal to Implant Tracking Chips in Immigrants Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com LiveScience.com Proposal to Implant Tracking Chips in Immigrants By Bill Christensen posted: 31 May 2006 07:04 pm ET Scott Silverman, Chairman of the Board of VeriChip Corporation, has proposed implanting the company's RFID tracking tags in immigrant and guest workers. He made the statement on national television earlier this week. Silverman was being interviewed on "Fox & Friends." Responding to the Bush administration's call to know "who is in our country and why they are here," he proposed using VeriChip RFID implants to register workers at the border, and then verify their identities in the workplace. He added, "We have talked to many people in Washington about using it...." The VeriChip is a very small Radio Frequency Identification (RFID) tag about the size of a large grain of rice. It can be injected directly into the body; a special coating on the casing helps the VeriChip bond with living tissue and stay in place. A special RFID reader broadcasts a signal, and the antenna in the VeriChip draws power from the signal and sends its data. The VeriChip is a passive RFID tag; since it does not require a battery, it has a virtually unlimited life span. RFID tags have long been used to identify animals in a variety of settings; livestock, laboratory animals and pets have been "chipped" for decades. Privacy advocates have long expressed concerns about this technology being used in human beings. In a related story, Colombian President Alvaro Uribe allegedly remarked to visiting U.S. senators Jeff Sessions (Alabama) and Arlen Specter (Pennsylvania) that microchips could be used to track seasonal workers. "President Uribe said he would consider having Colombian workers have microchips implanted in their bodies before they are permitted to enter the U.S. for seasonal work," Specter told Congress on April 25. Implanting microchips in human beings for the purpose of monitoring is not exactly news for science fiction fans; Alfred Bester wrote about "skull bugs" in his 1974 novel The Computer Connection: "...you don't know what's going on in the crazy culture outside. It's a bugged and drugged world. Ninety percent of the bods have bugs implanted in their skulls in hospital when they're born. They're monitored constantly." (Read more about Alfred Bester's skull bugs) VeriChips are legal for implantation in people in the U.S.; see VeriChip RFID Tag Patient Implant Badges Now FDA Approved. See also a related story on a Proposed National Worker DNA Fingerprint Database. Read more at RFID implants for guest workers, Latin leader keen on ID chips and Chip implants for migrant workers?. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From squirre at 7cont.ru Thu Jun 1 22:34:13 2006 From: squirre at 7cont.ru (Galinka S.) Date: Fri, 02 Jun 2006 08:34:13 +0300 Subject: hello from Galina Message-ID: <00b401c68606$2aa4b180$c017000a@201-212-41-119.cab.prima.net.ar> Hallo . I am a lovely and lonely Lady who is looking for the man who will make me happy and whom I want to feel like in paradise with! If you want to be my beautiful Hero who will save me from this loneliness find me http://www.UyVsDuQdX.my-loving-heart.net/ and wake me up with a warm kiss. goodbye Galinka S. From kelly at cam-a-lot.net Fri Jun 2 10:29:27 2006 From: kelly at cam-a-lot.net (Elvira Golden) Date: Fri, 02 Jun 2006 11:29:27 -0600 Subject: Mortagge ratee approvedd Message-ID: <67092972663769.pY2Sx7QcI2@bilayer> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1191 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: celluloid.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From sirius at 26.RU Fri Jun 2 03:36:00 2006 From: sirius at 26.RU (Galechka) Date: Fri, 02 Jun 2006 13:36:00 +0300 Subject: How do you do, Message-ID: <00c201c68630$4fae1a00$ca03000a@202.134.186.217.customer.7starnet.com> Hello, Willy I am a lovely and lonely Lady who is looking for the man who will make me happy and whom I want to feel like in paradise with! If you want to be my beautiful Hero who will save me from this loneliness find me http://www.zNNf1mtNp.my-loving-heart.net/ and wake me up with a warm kiss. Yourth faithfully Galechka From Mavis_Sargent at attws.com Fri Jun 2 16:42:05 2006 From: Mavis_Sargent at attws.com (Donovan Romo) Date: Fri, 02 Jun 2006 19:42:05 -0400 Subject: The fastest, most effective weight loss supplement! Message-ID: index.) Congress may also be able to help here. One of the reasons the "opt in" policy favored by some publisher groups won't information on this subject.) Cookies are not required to access this site. The editor makes his best effort to tell people -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 894 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: billboard.png Type: image/png Size: 7885 bytes Desc: not available URL: From PZMCZMCRHOJ at yahoo.com Fri Jun 2 22:01:02 2006 From: PZMCZMCRHOJ at yahoo.com (Jamel Saenz) Date: Fri, 02 Jun 2006 21:01:02 -0800 Subject: vie maddox fruehauf creak who'll rosetta sixgun aegean suspicion tananarive frigga chalkline gosh blurt berkeley choice phantasy enigma certiorari escort shard barlow about chili Message-ID: <068196031702391.0928227@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1005 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: chamomile.4.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From baseplate at ultrapostman.com Fri Jun 2 15:23:37 2006 From: baseplate at ultrapostman.com (GreenTable Casino) Date: Fri, 02 Jun 2006 23:23:37 +0100 Subject: Green Table Casino review Message-ID: <10121.ppm@lenient> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5446 bytes Desc: not available URL: From knewkirk at acsiar.com Sat Jun 3 01:31:48 2006 From: knewkirk at acsiar.com (Jessie Bauer) Date: Sat, 03 Jun 2006 00:31:48 -0800 Subject: good info Message-ID: <82049.$$.23783.Etrack@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1002 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: crt.6.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From rah at shipwright.com Sat Jun 3 06:47:22 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 3 Jun 2006 09:47:22 -0400 Subject: Internet monitoring sparked investigation into terror cell Message-ID: Toronto Star How Internet monitoring sparked a CSIS investigation into a suspected homegrown terror cell Jun. 3, 2006. 01:00 AM MICHELLE SHEPHARD STAFF REPORTER Last night's dramatic police raid and arrest of as many as a dozen men - with more to come - marks the culmination of Canada's largest ever terrorism investigation into an alleged homegrown cell. The chain of events began two years ago, sparked by local teenagers roving through Internet sites, reading and espousing anti-Western sentiments and vowing to attack at home, in the name of oppressed Muslims here and abroad. Their words were sometimes encrypted, the Internet sites where they communicated allegedly restricted by passwords, but Canadian spies back in 2004 were reading them. And as the youths' words turned into actions, they began watching them. According to sources close to the investigation, the suspects are teenagers and men in their 20s who had a relatively typical Canadian upbringing, but - allegedly spurred on by images of conflict in Iraq and Afghanistan and angered by what they saw as the mistreatment of Muslims at home - became increasingly violent. Police say they acquired weapons, picked targets and made detailed plans. They travelled north to a "training camp" and made propaganda videos imitating jihadists who had battled in Afghanistan. At night, they washed up at a Tim Hortons nearby. One was a math and chemistry whiz from Scarborough who grew up to become a 22-year-old husband and father. It's unclear why the authorities decided to act on their suspicions yesterday. None of these allegations has been proven in court, where the suspects are expected to appear for the first time this morning. Sources say the arrests involve a "homegrown" terrorism cell - Western youths who have never set foot in Afghanistan but allegedly were radicalized here, and who are thought to be potentially as dangerous as the cells that once took orders from Osama bin Laden. Western governments, including Canada's, have repeatedly warned of this phenomenon and blamed recent attacks, such as last July's bombings in London, as the work of such groups. The Canadian investigation involves a complicated web of connections, with alleged ties to two men from Georgia who came to Toronto in March 2005 to meet with "like-minded Islamic extremists," according to U.S. court documents. Details of the Canadian investigation will be officially released this morning at a news conference. For the spies who work on the 10th floor of a Front St. office building, with the CN Tower looming above and a hub of Toronto's tourist district buzzing below, this investigation was personal. The group arrested yesterday allegedly had a list of targets, sources have told the Star, and the Toronto headquarters of the Canadian Security Intelligence Service was one of them. So were the Parliament Buildings in Ottawa and a smattering of other high-profile, heavily populated areas. But since most of the suspects lived in the GTA, it was the potential threat to the spy service's office and the chaos an attack would create in the heart of Toronto that concerned CSIS most. According to sources, the suspects allegedly planned to target the spy service because many of them had encountered agents early in the investigation, when they were interviewed and put under surveillance. They also were allegedly angered by media reports accusing CSIS of racial profiling of Muslims. Many of the agents were known to members of the group only by aliases, but the belief that the office had been targeted led to months of unease among CSIS staff, sources said. Some of the group's members had even been spotted taking notes around the building, and at least one had reportedly visited the basement, one source told the Star. The investigation began back in 2004, when CSIS was monitoring Internet sites and tracing the paths of Canadians believed to have ties to international terrorist organizations. Local youths espousing fundamentalist views drew special attention, sources say. Since it was created 21 years ago, the spy service's mandate has been to protect Canada's security. It is not a police force; its agents don't carry weapons, have no power of arrest and traditionally have preferred to stay out of public view. But CSIS does have a relationship with the RCMP, albeit one traditionally fraught with turf wars and communication problems, and the focus of criticism and concern since 9/11. The two federal agencies work independently, but when CSIS is monitoring someone who could be prosecuted criminally, the spy service notifies the Mounties in what's known as an "advisory letter." `We are seeing phenomena in Canada such as the emergence of homegrown second and third generation terrorists' Jack Hooper, CSIS deputy director That happened in this case on Nov. 17, 2004. Four months after authorities began to fear that Canada might have its own homegrown terrorist cell, two Americans entered the picture. Ehsanul Islam Sadequee, a 19-year-old U.S. citizen of Bangladeshi descent who had attended high school in Ontario, and Syed Haris Ahmed, 21, a student at Georgia Tech, boarded a Greyhound bus in Atlanta on March 6, 2005, and travelled to Toronto to meet "like-minded Islamic extremists," a U.S. court document alleges. At the time the FBI's Joint Terrorism Task Force was watching the U.S. pair, Sadequee, according to court documents, was already on a no-fly list. But they crossed the border uneventfully and met three people associated with the group the Canadian authorities were watching. Ahmed later told authorities that the meetings were to discuss U.S. locations suitable for a terrorist strike, including oil refineries and military bases, court documents state. They also allegedly talked about how to dismantle the Global Positioning System in an effort to disrupt military and commercial communications and traffic, and their plans to go to Pakistan to train at "terrorist-sponsored camps." (The FBI claims Ahmed "later travelled to Pakistan in an attempt to receive just such training.") Ahmed is now in U.S. custody, indicted in March for material support of terrorism. He has pleaded not guilty. Sadequee is accused of making false statements in connection with a terrorism investigation. He was arrested in April in Bangladesh and handed over to American authorities - a transfer his lawyer later characterized in court as being closer to a kidnapping than an arrest. Sadequee was flown to Alaska, according to U.S. news reports, and, having waived a preliminary hearing, consented to being transferred to Brooklyn, N.Y. He has been denied bail and is awaiting trial. Fahim Ahmad, who was arrested as part of yesterday's sweep, was living with his wife and children in a Scarborough apartment in August 2005, while authorities were watching him closely. The 22-year-old allegedly rented a car for two Toronto-area men to go to the U.S. The licence plate was flagged so it could be pulled over upon its return to Canada, sources told the Star and court documents confirm. On Aug. 13, at 5:30 a.m., a student working with the Canada Border Services Agency at the Peace Bridge in Fort Erie pulled over the white Buick that Ahmad had rented, which was being driven by Yasin Mohamed, 24, of Toronto, with Ali Dirie, 22, whose last address was in Markham, as a passenger. The car was targeted because its plate number came back with the warning: "Look out, possible narcotic involvement," on a customs database, court documents state. After the two were briefly questioned, a superintendent was called over, and Dirie and Mohamed were told to wait outside the car as it was searched. "The customs inspector noticed that Mohamed seemed to fidgeting with his hands in his pockets, and unable to stand still despite being told to keep his hands where the officers could see them," states the summary that was read into the court record during a hearing last October. Both appeared nervous, frequently looking at each other. At one point Mohamed tried to push his back away from the wall where he was placed, the documents state. It was at that point that the customs officer discovered a loaded Highpoint .380 calibre handgun that Mohamed had tucked inside his waistband. Ammunition, some of which did not match the guns the men were bringing in, fell out of his pockets as he was being handcuffed. Officers later found two loaded handguns taped to Dirie's inner thighs - a Millennium PT 19mm and a .380 Calibre Jennings. In his socks they found a magazine for a semi-automatic handgun and "several rounds of ammunition," according to the court transcripts. Both men, who are landed immigrants, had minor criminal records and told the court they were buying the guns for their own "protection." They pleaded guilty last October and were both given two-year sentences. "Whether they were mules, whether they were going to use them for their own protection, which is all we have right now, we have nothing to indicate that they were going to be sold," St. Catharines Crown attorney Ron Brooks told the court, according to a transcript of the October sentencing hearing. "But the bottom line is - the mayor of Toronto indicated fairly recently in an interview - is that there's only one thing that you can use weapons of that nature for, and it's either to kill somebody or to give them to somebody else to kill somebody." Ahmad, who rented the car, was not charged in the incident. As to laying such as charge, "I think the only thing we'd be looking at there is if they aided in the commission of the substantial offence. Did they send them on this mission with a rented car? To my knowledge there was not any information that would support the laying of a criminal charge in that case," Niagara police Insp. Brian Eckhardt said in an interview earlier this year. "I'm sure it was looked at at the time, which is what we always do." `I do believe that when the time comes, a number of these people will attempt to do something quite serious.' Dale Neufeld, retired CSIS deputy director The Star contacted Ahmad last March to discuss the incident, but he refused to meet or answer questions about why he rented the car for the two men. "I don't want to be discussing this," Ahmad said. When asked about the car rental, he replied: "The police and whatnot, they know my side of the story and that's all that matters." Mohamed and Dirie both declined the Star's request to be interviewed. Mohamed's brother also said his family did not want to comment. Although there was no public acknowledgement of this investigation, by last fall, officials were beginning to send out frequent warnings about a homegrown threat. In the only interview CSIS director Jim Judd has given since taking the helm of the service, he told the Star in September that homegrown terrorism was a pressing concern mainly because it's so difficult to detect. Unconnected to the case, but being watched closely during this time by Canadian authorities, was the Netherlands investigation into the assassination of filmmaker Theo van Gogh and a young local extremist cell dubbed the Hofstad Group. Made up of mainly Dutch-born youths angered by van Gogh's critical portrayal of Islam, Canadian authorities believed the group was eerily similar to the Canadian group, sources say. They appeared to be unsophisticated, disenfranchised youths, but the group became a growing threat, killing van Gogh and forcing a number of political figures to go into hiding or flee the country. That the Canadian group shouldn't be underestimated was a message that hit home. Last winter, the investigation took a turn when some of the younger members allegedly went north to what police were referring to as a "training camp." By February this group was being viewed in police and intelligence circles as Canada's greatest terrorism threat. Chiefs of Ontario police forces, including Toronto's Bill Blair, met in Toronto for a high-level briefing. While the public denials of any specific threat continued, hints were dropped. During a Senate committee review of Canada's anti-terrorism legislation, now-retired CSIS deputy director Dale Neufeld spoke at length about Canadian-born radicalized youths. "It's the second generation, the children of Muslims who are born in this country. They have a very normal upbringing, according to our analysis, but at some point in their teenage years or young 20s, they decide that radical Islam is the path they want to take," Neufeld said. "The other (concern) is young Canadians who are generally quite disillusioned, which is again very disturbing because it's hard to detect and hard to investigate. They're the kids who don't do well in high school, but could do anything. They could become petty criminals. They could get involved in the drug culture. They might join a motorcycle gang. We're now seeing a number of examples where they decide to take up Islam in the radical form. "It's not just rhetoric. I do believe that when the time comes, a number of these people will attempt to do something quite serious." On Monday, as final preparations were being made for yesterday's arrests, current CSIS deputy director Jack Hooper again spoke before senators of the threat posed by young people radicalized at home. "We are seeing phenomena in Canada such as the emergence of homegrown second- and third-generation terrorists. These are people who may have immigrated to Canada at an early age who become radicalized while in Canada. They are virtually indistinguishable from other youth. They blend into our society very well, they speak our language and they appear to be, for all intents and purposes, well assimilated," Hooper said. He talked about youths absorbing radical ideas from the Internet. "You are satisfied from the information you have that the homegrown terrorist is primarily looking at targets in Canada?" Senator Michael Meighen asked. The normally verbose Hooper answered with a curt, "Yes." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From account at ebay.com Sat Jun 3 09:15:59 2006 From: account at ebay.com (eBay Inc.) Date: Sat, 03 Jun 2006 10:15:59 -0600 Subject: Password Change Required Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4120 bytes Desc: not available URL: From mckinney15 at email.msn.com Sat Jun 3 09:26:16 2006 From: mckinney15 at email.msn.com (Marie Harper) Date: Sat, 03 Jun 2006 10:26:16 -0600 Subject: Re-finance before rates skyrocket Message-ID: <5.6.2.2.7.78208510108218.813a7251@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1221 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: jericho.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From info at adler-instrumentos.es Sat Jun 3 10:08:07 2006 From: info at adler-instrumentos.es (Everette Ward) Date: Sat, 03 Jun 2006 11:08:07 -0600 Subject: Lowest rate approved Message-ID: <4.6.6.1.1.56280489637520.581a6200@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1177 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: appendage.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From westtire at tstar.net Sat Jun 3 12:36:18 2006 From: westtire at tstar.net (Christopher Connors) Date: Sat, 03 Jun 2006 11:36:18 -0800 Subject: open now Message-ID: <441585343799526.6629882@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 987 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: dereference.8.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From woodwind at aegisoft.com Sat Jun 3 13:36:36 2006 From: woodwind at aegisoft.com (Lea Savage) Date: Sat, 03 Jun 2006 12:36:36 -0800 Subject: Pre-approvedd rate #qcgeta Message-ID: <333360451.9900060106867.JavaMail.ebayapp@sj-besreco398> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1020 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: idempotent.6.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From nsrbnpyqlrlg at theworld.com Sat Jun 3 14:12:14 2006 From: nsrbnpyqlrlg at theworld.com (Princess Canada) Date: Sat, 03 Jun 2006 16:12:14 -0500 Subject: Ephedra for your body Message-ID: <59595657412656.orschdvWx6@fibrous> not centrifuge some credential a quintillion but diaper it crook -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1470 bytes Desc: not available URL: From account at ebay.com Sat Jun 3 08:21:13 2006 From: account at ebay.com (eBay Inc.) Date: Sat, 03 Jun 2006 16:21:13 +0100 Subject: Password Change Required Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4264 bytes Desc: not available URL: From Karen25 at msn.com Sat Jun 3 17:31:32 2006 From: Karen25 at msn.com (Catherine Boyle) Date: Sat, 03 Jun 2006 16:31:32 -0800 Subject: cooltoad.com Message-ID: <7434914322.2124624235@as01.cooltoad.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $500,000 as low as 3.65% $375,000 as low as 3.85% $275,000 as low as 3.90% $125,000 as low as 3.89% Visit our site by clicking http://www.xbuynows.net Karen Conklin Account Manager From paul at activesand.com Sat Jun 3 19:39:51 2006 From: paul at activesand.com (Marlene Vance) Date: Sat, 03 Jun 2006 18:39:51 -0800 Subject: Agents compete for your refi!! Message-ID: <334867912.2141482807065.JavaMail.ebayapp@sj-besreco986> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1021 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: choice.1.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From rah at shipwright.com Sat Jun 3 18:38:16 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 3 Jun 2006 21:38:16 -0400 Subject: [Clips] Great praise for elite team Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 3 Jun 2006 21:34:11 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Great praise for elite team Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com Calgary Sun June 3, 2006 Great praise for elite team The elite team of police and intelligence experts whose months-long probe of a terrorist plot were praised for their courageous and dedicated job By CP The elite team of police and intelligence experts whose months-long probe of a terrorist plot against southern Ontario led to 17 arrests involved thousands of hours of work by some of the most dedicated investigators in the world, observers said Saturday. "These people are absolutely top-shelf investigators. You will not find better investigators on the planet," Chris Mathers, a former RCMP officer who now works as a security consultant in Toronto, said of the crack squad whose diligence led to the shocking detainment of suspected homegrown terrorists. "The Canadian people don't understand, perhaps, how committed these people are. As ideological as these terrorists are, the people pursuing them are equally as ideological." The RCMP led the investigation that resulted in Friday night arrests of suspects from Toronto, nearby Mississauga and the city of Kingston in eastern Ontario. But the investigation included significant co-operation with partners through an Integrated National Security Enforcement Team, or INSET, made up of RCMP, the CSIS spy organization, federal agencies and provincial and municipal police. INSET teams were created in April 2002 under a five-year, $64-million investment by the federal government. Their performance in the ongoing investigation announced Saturday could strengthen the reputation of Canada's ability to combat terrorist cells to the rest of the world, said Doug McArthur, a political science professor at B.C.'s Simon Fraser University. "What we're seeing is that our various security forces are getting their act together to deal with what we have to recognize is an increased potential for terrorist type activities," McArthur said of the investigative team created alongside other anti-terrorism legislation introduced months after the Sept. 11, 2001 attacks on the United States. "This particular case is a good sign of the ability of our forces to chase down these types of situations." Officials were tight-lipped on details about an investigation they say is still active. "Over 400 highly skilled resources have dedicated thousands of hours to diligently conduct this investigation using legislative and investigative tools available to the law enforcement and intelligence community," RCMP assistant commissioner Mike McDonell told a news conference. Observers say that uncovering a terrorist plot would have revealed multiple layers of involvement. At the bottom, there's those who buy cars and cellphones or rent apartments for those who might commit the acts. Above them are the middle men providing expertise and training on how to prepare explosive devices, or counter-surveillance techniques. At the top are those who organize the acts and secure followers to carry out the deeds. "They're just pawns - zealots that they've trained, usually young people," Mathers said of those who essentially risk suicide in the name of a violent ideology. Mathers said an investigation of this magnitude by INSET would been an "accumulative effort" involving informants, electronic intercepts of communication, and "hours and hours and hours of surveillance - very boring surveillance too." But he said it's most likely human sources - acquaintances of those planning a terrorist attack, or people somehow linked to the plans themselves - who would have provided the most vital information that would provide enough evidence for arrests. "Electronic sources don't always provide you with enough timely information. You need human beings," he said. Mathers said that people involved in terrorist plots are also almost always involved in other criminal activity, making it quite possible that information was received from people arrested for unrelated crimes who were looking for reduced charges or sentences. "From time to time, they do get arrested for other crimes to support themselves or to support their terrorist group. Sometimes law enforcement are able to put a bit of pressure on someone who gets pinched and in exchange for some consideration he agrees to co-operate on something more serious like a terrorist act." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From cabins at ackerley.com Sun Jun 4 01:25:36 2006 From: cabins at ackerley.com (Ted Davison) Date: Sun, 04 Jun 2006 00:25:36 -0800 Subject: look new Message-ID: <08359.$$.87702.Etrack@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1016 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: matthews.0.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From Fnxuxfptabsodum at rabun.net Sat Jun 3 15:39:14 2006 From: Fnxuxfptabsodum at rabun.net (rlarlara) Date: Sun, 04 Jun 2006 00:39:14 +0200 Subject: j Hot Stock Talk s Message-ID: <35122DD2.F99704B@rabun.net> STR$NG BUY ALERT ISSUED KEEP LITL.PK ON YOUR MONITORS, GET ON BEFORE THE PEAK! Forecast for June, 2006 Company L INTL COMPUTERS INC. Sym bol LITL.PK Current 0.55 +20% this week! Short Term 2.00 Str!ng Buy Recommendation * 200%+ PROFIT POTENTIAL RECENT NEWS HAS JUST BEEN RELEASED. YOU MUST READ NOW. L Introduces the worlds first desktop replacement laptop with a 20" Ultra-Speed High-Resolution Display! DON'T PASS UP THIS OPPORTUNITY TO SUCCEED IN THE MARKET. L International Computers Inc., through its wholly owned subsidiary, Liebermann Inc., a renowned manufacturer of high-performance computers and personal technology, today announced the Olympus 20", the world's first desktop replacement Professional notebook computer fitted with a 20" UltraSpeed High-Resolution Display. Founded in 2002, Liebermann Inc. produces, markets and distributes high-performance, opulent PC/Windows© laptop, desktop, workstation and server computers. The Company also produces the largest and most spectacular personal & professional computer displays and ultra-high performance software, peripherals and technologies. This pre ss release may contain for ward-looking stat ements which are pursuant to the safe ha rbor prov isions of the Priva te Sec urities Litigatio n Refo rm Act of 1995. Inve stors are cauti oned that actual results may differ ma terially and all forw ard-lo oking st atements inv olve risks and uncertainties including, without limitation, risks associ ated with the Company's financi al condition and prospects, risks associated with market accept ance and technological changes, risks associated with depe ndence on third pa rty soft ware provide rs, risks relating to internati onal operations, and risks associated wit h competition. How are you doing? Sorry it took so long for me to respond Sorry for the delay in my response From UPDFMPBSQJYBL at msn.com Sat Jun 3 15:48:35 2006 From: UPDFMPBSQJYBL at msn.com (Jeri Christopher) Date: Sun, 04 Jun 2006 00:48:35 +0200 Subject: Pay Less Today 8CS Message-ID: <68QW87FE.0V24.UPDFMPBSQJYBL@msn.com> Hey Guys, I was so happy I took adavantage of this Refinance offer, I thought I would share it with you.I locked in a 3.75 Rate before the increases started and got the cash I needed before the Holiday.= It took me less than 1 Min to fill out this form and get started. http://refimortyourhomeusa.com mj8eRy From Gilbert895812 at yahoo.com Sun Jun 4 15:31:16 2006 From: Gilbert895812 at yahoo.com (Cypherpunks) Date: Mon, 05 Jun 2006 03:31:16 +0500 Subject: Cypherpunks, 100% Secure, 100% Privacy, Overnight Shipping Message-ID: <06947n804nc281$dys11xdx67fet2$44z3rrw737@AH024712> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1680 bytes Desc: not available URL: From ltn_gbg at boltfolio.com Mon Jun 5 09:39:27 2006 From: ltn_gbg at boltfolio.com (Racheal Beltran) Date: Mon, 05 Jun 2006 08:39:27 -0800 (EDT) Subject: lower your interest rate before its to late Message-ID: <10496260.1123861448845.JavaMail.confirm@boltinc.com> Dear Home Owner, Your Credit Doesn't Matter To Us! If you own real estate and want Immiediate cash to spend ANY way you like, or simply wish to LOWER your monthly payments by over 33% or more then you have found the right place. $480,000 as low as 3.60% $375,000 as low as 3.85% $275,000 as low as 3.90% $125,000 as low as 3.89% Visit our site by clicking http://www.xbuynows.net June Elkins Account Manager From RubenAldrich at globalctigroup.com Sun Jun 4 18:58:19 2006 From: RubenAldrich at globalctigroup.com (Sergio Schneider) Date: Mon, 05 Jun 2006 09:58:19 +0800 Subject: Stimulate the Pleasure and Sensation in Lovemaking. Message-ID: recorded. Also, note that because the books we list are mostly on other web sites, and we don't log access to links that preceding months simmer down as well. Academics should be in the best positions to understand the benefits of liberal -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 892 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: clove.png Type: image/png Size: 9050 bytes Desc: not available URL: From tvrdgqoo at acer-access.com Mon Jun 5 08:02:28 2006 From: tvrdgqoo at acer-access.com (Channah) Date: Mon, 05 Jun 2006 10:02:28 -0500 Subject: Father Day is Approaching Message-ID: <81458035595742.nMhZMuZhIA@reilly> a critic it chutney ! basalt try dissident ! invasive -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 823 bytes Desc: not available URL: From ceywpzfnrf at cd-enterprizes.com Mon Jun 5 10:08:07 2006 From: ceywpzfnrf at cd-enterprizes.com (Rahil) Date: Mon, 05 Jun 2006 12:08:07 -0500 Subject: Ephedra for your weightloss Message-ID: <219t917g.8743515@1-tosurfthe.net> it automotive try inanimate a wavelength in barefaced be bough -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1455 bytes Desc: not available URL: From bxics at t-dialin.net Tue Jun 6 00:04:34 2006 From: bxics at t-dialin.net (Nicol Abiah ) Date: Mon, 05 Jun 2006 23:04:34 -0800 Subject: To grow thinner, diminish your dinner Message-ID: <0.1.7.0.8.90502412827823.994a7999@69.60.117.34> it's sandburg the transcontinental but paycheck some keypunch be alienate -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1405 bytes Desc: not available URL: From ConnieClarke at wawasan2020.com Mon Jun 5 13:09:48 2006 From: ConnieClarke at wawasan2020.com (Tonia Warner) Date: Tue, 06 Jun 2006 04:09:48 +0800 Subject: HoodiaLife in the news today... Message-ID: clearly note fair-use exemptions in the area of search indexing, which would make it easier both for this project and for don't send anything other than plain text to the list. We have a wide range of readers, and we can't count on everyone being -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 893 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: polyglot.png Type: image/png Size: 7197 bytes Desc: not available URL: From tkuhqvoer at imaginate.com Tue Jun 6 13:27:08 2006 From: tkuhqvoer at imaginate.com (Vito Rocha) Date: Tue, 6 Jun 2006 15:07:08 -0480 Subject: Message-ID: <200606061507.k56F789Q000329@proton.jfet.org> I -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 412 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: LU9MPC5.PNG Type: image/png Size: 8036 bytes Desc: not available URL: From zugelmgwqut at hotmail.com Tue Jun 6 15:58:26 2006 From: zugelmgwqut at hotmail.com (Lois Kendall) Date: Tue, 06 Jun 2006 17:58:26 -0500 Subject: Everyone Need This Cypherpunks Message-ID: <191.93e558d5.2a9SFL44@sol.com> Looking for quality me ds at affordable price? We have widest range of me ds at very competitive price. Money baack gauaranteesss... http://www.archstuff.com/1/ La From brewster at ladyblue.net Tue Jun 6 17:02:16 2006 From: brewster at ladyblue.net (Arline York) Date: Tue, 06 Jun 2006 18:02:16 -0600 Subject: Ratess approved Message-ID: <9.4.0.7.2.18540311147670.172a8238@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1191 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: laurent.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From tiziano at gambacorta.com Tue Jun 6 17:03:39 2006 From: tiziano at gambacorta.com (Denis Lim) Date: Tue, 06 Jun 2006 18:03:39 -0600 Subject: Last chance for lower rates Message-ID: <438f153x.1940558@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1205 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: rocco.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From crazed at ihep.com Tue Jun 6 17:08:48 2006 From: crazed at ihep.com (Kenneth Whitten) Date: Tue, 06 Jun 2006 18:08:48 -0600 Subject: Re-finance before rates skyrocket Message-ID: <7.0.3.6.7.44016385459566.322a5869@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1159 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: chic.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From adanvl82 at esmas.com Tue Jun 6 18:13:36 2006 From: adanvl82 at esmas.com (Suzette Mims) Date: Tue, 06 Jun 2006 19:13:36 -0600 Subject: Ratess will skyrocket soon Message-ID: <564q512m.2100334@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1172 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: racy.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From russell_shute at l-housing.com Tue Jun 6 19:29:25 2006 From: russell_shute at l-housing.com (Jarrett Sims) Date: Tue, 06 Jun 2006 20:29:25 -0600 Subject: Ratess will skyrocket soon Message-ID: <369w830e.6349964@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1196 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: wasserman.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From miles.nataleeoiwn at gmail.com Tue Jun 6 16:40:37 2006 From: miles.nataleeoiwn at gmail.com (Jennifer Echols) Date: Tue, 6 Jun 2006 22:40:37 -0100 Subject: Good news for traders Message-ID: <200606062039.k56Kdjv2010398@proton.jfet.org> For Immediate Release ALERT ISSUED - Watch F.C.Y.I..PK Tr at de Today! F a l c o n E n e r g y, Inc. F C Y I 1 week ago $0.88 Last $ 1.4 Market Plus Top Four P1ck ATTENTION: SOMEONE INTENTIONALLY SELLS ACTIONS TO UNDERESTIMATE THEIR PRICE. DO NOT MISS AN APPORTUNITY TO BUY IT FOR A FLOOR PRICE! VANCOUVER, British Columbia, June 05, 2006 (PRIME ZONE) -- As part of the commitment of Falcon Energy, Inc., a Nevada Corporation, to keep investors informed of its status and activities, the company is providing this investor update. Gas production continues steadily from Falcon Energy's Richmount Westlock property in Alberta, Canada. This opportunity has proven itself out as the property and investment have benefited from the surge in natural gas prices since the well was first tied in May of 2005. The market price (NYMEX) for natural gas at that time was approximately $6.50 per MMBTU but in the last year prices stayed over 10.00 per MMBTU for a 5 month period with several spikes above the $14.00 range. The company is pleased that the investment continues to provide consistent revenue for the company and its shareholders. F a l c o n E n e r g y Inc. has also announced that due to the confirmed addition of its mining exploration properties in Mongolia, that it will shortly be expanding the executive team to assist in managing this new opportunity. Details will be forthcoming. VANCOUVER, British Columbia, May 17, 2006 (PRIME ZONE) -- F a l c o n E n e r g y , Inc. is pleased to announce that the granting of exploration licenses for five mining properties in Mongolia has been finalized. These licenses will be held for a minimum of three years and grant F a l c o n E n e r g y, Inc. access to the mineral rights for the licensed properties. F a l c o n E n e r g y , Inc. had recently sought the mineral rights to these significant properties in the mineral rich region of Mongolia. F a l c o n E n e r g y's interest in the region is driven in part by the anticipation of deploying modern prospecting methods to an area that abounds in both base and precious metals. The five licensed areas are: 8825E - The Duhum Hujirt License Area 8454X - Tsagaan Tolgoi Copper/Gold Project 9997X - The Huld License Area 9996X - The Har Tolgoi License Area 9668X - Hutagt License Area Exploitable mineral resources found in the area in which the licenses are held include: Gold, base metals such as Copper, Molybdenum, Lead and Zinc as well as Fluorite and Uranium. --------------------- cottage caroline arteriolosclerosis aorta annale b's calcify deluge cargo bivouac behalf arch centerpiece bandwidth copra compassionate calamity babysit bloodstain censor brooke altruism From skrdyghcprpyug at 1-tosurfthe.net.jfet.org Wed Jun 7 00:15:39 2006 From: skrdyghcprpyug at 1-tosurfthe.net.jfet.org (Moye Lucy ) Date: Tue, 06 Jun 2006 23:15:39 -0800 Subject: To grow thinner, diminish your dinner Message-ID: <2.3.5.2.9.45254521183244.812a2440@69.60.117.34> be technetium be irresolvable in acanthus it's swear or skopje -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2030 bytes Desc: not available URL: From cobb at abstract-engineer.com Wed Jun 7 01:04:14 2006 From: cobb at abstract-engineer.com (Fernando Lee) Date: Wed, 07 Jun 2006 00:04:14 -0800 Subject: wut up low rates Message-ID: <010261992953783.3014088@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1025 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: luminous.1.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From rodrigues at jtownchamber.com Wed Jun 7 03:58:56 2006 From: rodrigues at jtownchamber.com (Tyree Pereira) Date: Wed, 07 Jun 2006 04:58:56 -0600 Subject: Re-finance before rates skyrocket Message-ID: <42383355039418.dXOlDnDrRH@adequacy> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1197 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: discern.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From JoanLatham at earthlink.net Wed Jun 7 03:20:46 2006 From: JoanLatham at earthlink.net (Joan) Date: Wen, 7 Jun 2006 09:20:46 -0100 Subject: [3] ctxe.pk pay attention to the announcement Message-ID: <200606060738.k567crS6019610@proton.jfet.org> Generate more money with expert info on booming stoocks Movements of stockk and market tendencies analyzed Get Ctxe.Pk First Thing Today, It Is Exploding Now! Price: $0.59 Change: $0.06 (11.76%) within 1 day! Open: 0.53 Volume change: 521% Within 1 day! ! ! and this is just the beginning. Keep your radar on it! Before we start with the profile of CTXE we would like to mention something very important: A Big PR Campaign is moving this week . And it will go all week so it would be best to get in Now. Company Profile Cantex Energy Corporation is an independent, managed risk, oil and gas exploration, development, and production company headquartered in San Antonio, Texas. Recent News Cantex Energy Corp. Receiving Interest From the Industry as It Enters Next Phase of Development Cantex Energy Corp. (CTXE - News) is pleased to report the following on its Big Canyon Prospect in West Texas. Recent company announcements related to the acquisition of over 48,000 acres of a world-class prospect has captured the attention of many oil & gas industry experts and corporations, who have recently inquired into various participation opportunities ranging from sharing science technology to support findings or expertise to drill, operate and manage wells. Trace Maurin, President of Cantex, commented, "Although we are a small independent oil & gas company, we have a very unique 0pp0rtunity in one of the last under-explored world-class potential gas plays with no geopolitical risks and the industry is starting to take notice. As we prepare to prove up the various structures within our prospect later this month, we are increasing our efforts to communicate on our progress to our shareholders and investors. Our intention is to provide investors with a better understanding of the full potential of this prospect as we embark on the next phase of operations." Starting immediately the company will undertake CEO interviews, radio spots (which will be recorded and published on the company website), publication placements, introductions to small cap institutional investors and funds all in an effort to optimize market awareness and keep our shareholder well informed. Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is CTXE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade tomorrow! Go CTXE. Pen-ny sttocks are considered highly speculative and may be unsuitable for all but very aggressive investors. This Profile is not in any way affiliated with the featured company. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully placed in our membership, send a blank e mail with No Thanks in the sub ject to Epxected prcie at the end of the week: $1.0! Unbiased stockk strategies and information from experts This sttock is greeatly recomendeed by agressive investorrs in a shoort term. Don't loose a chance to earrn. Mutual benefit by reliable stockk information Leading experts share top sttock picks and recommendations ................................. Men do not despise a thief, if he steal to satisfy his soul when he is hungry. If in doubt, mumble He who wants to do good, knocks at the gate, he who loves finds the gates open Always yield to temptation, because it may not pass your way again. All beginning is difficult The first million is the hardest The first step is the hardest. Life is just a bowl of cherries Imagination is the highest kite you can fly A child is a person who can dismantle in 5 minutes the toy it took you 5 hours to put together. Never look a gift horse in the mouth Christmas comes but once a year What goes up must come down Turtle can't walk if he nah push he head outa he shell. There is no time like the present Revenge is a dish best served cold A hairy man is a happy man, a hairy wife is a witch. Love is an ideal thing, marriage a real thing All good things come to he who waits A stitch in time saves nine. Spare the rod and spoil the child Lend your money and lose your friend Procrastination is the thief of time Patience is bitter, but it bears sweet fruit Never trouble trouble till trouble troubles you The devil tempts all, but the idle man tempts the devil He That Will Not Be Counselled Cannot Be Helped Everything comes to him who waits Faith will move mountains. For they shall be an ornament of grace unto thy head, and chains about thy neck. The Best Fish Swim Near the Bottom Nothing is interesting if you are not interested There but for the grace of God go I Nah every big head get sense. You get what you give as wrinkled as an elephant's hide I have found at my age going bra-less pulls all the wrinkles out of my face. Nothing succeeds like success He That Brings Good News Knocks Hard Fight truth decay, read the bible God could not be everywhere and therefore he made mothers The nearer the bone the sweeter the meat Always yield to temptation, because it may not pass your way again. A person who can smile when things go wrong has found someone to blame it on. From ruujtlhont at appleisp.net Wed Jun 7 08:10:44 2006 From: ruujtlhont at appleisp.net (Keira Saylor) Date: Wed, 07 Jun 2006 10:10:44 -0500 Subject: Tiffany, Handbags, Pens and more.. Message-ID: <39564920956133.P4YYWdLjLr@corporal> it crap but cupboard some phlox try embassy in highway -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 770 bytes Desc: not available URL: From issyria at advtech.com Wed Jun 7 16:13:38 2006 From: issyria at advtech.com (Gerardo Hagen) Date: Wed, 07 Jun 2006 15:13:38 -0800 Subject: good info Message-ID: <263246381.6172552193915.JavaMail.ebayapp@sj-besreco056> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 996 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: lipton.7.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From pappa at aav.com Wed Jun 7 17:36:52 2006 From: pappa at aav.com (Walter Prince) Date: Wed, 07 Jun 2006 16:36:52 -0800 Subject: Your mortagee approval Message-ID: <055543251763627.2276297@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 997 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cockeye.1.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From justin-cypherpunks at soze.net Wed Jun 7 09:42:28 2006 From: justin-cypherpunks at soze.net (Justin) Date: Wed, 7 Jun 2006 16:42:28 +0000 Subject: cpunks archive, 1992-09 to 1998-12 Message-ID: <20060607164228.GC16234@arion.hive> Reasonably complete (aside from 4.5 missing months in spring-summer 1995) cpunks archive, mhonarc-to-mbox converted. (archive obtained from venona) Limited time only. http://206.63.230.207/ From eugen at leitl.org Wed Jun 7 07:44:56 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Jun 2006 16:44:56 +0200 Subject: [edrigram@edri.org: EDRI-gram newsletter - Number 4.11, 7 June 2006] Message-ID: <20060607144456.GS28956@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Jun 7 07:35:43 2006 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 7 Jun 2006 17:35:43 +0300 Subject: EDRI-gram newsletter - Number 4.11, 7 June 2006 Message-ID: ============================================================ EDRI-gram biweekly newsletter about digital civil rights in Europe Number 4.11, 7 June 2006 ============================================================ Contents ============================================================ 1. EU-US agreement on passenger data transfer annulled 2. Frankfurt Appellate Court says online demonstration is not coercion 3. New Czech Police draft act allows taking DNA samples by force 4. Content flatrate is feasible according to French study 5. Campaign against censorship on the Internet 6. Journalistic protection for online journalists and bloggers 7. Dutch Gamer in US intelligence spotlight 8. Private copy system under scrutiny 9. Agenda 10. About ============================================================ 1. EU-US agreement on passenger data transfer annulled ============================================================ The European Parliament obtained the annulment by the European Court of Justice of the agreement between the European Community and the US Government on the transfer of passenger name records (PNR) from foreign carriers to the US with the view to combat terrorism and maintain national security. In order to prevent problems the agreement will be still in force until 30 September 2006. Until then the Member States have time to solve the legal issues arising from the annulment within or outside the EU context. After 11 September 2001 air carriers flying from Europe to the US were in a dilemma. The US Government required to access personal data of travellers contained in the databases of all foreign carriers. On the other hand, 1995 EU Directive on data protection restricts the transfer of personal data from one jurisdiction to another unless there is adequate protection of that data. Following a series of negotiations to solve this dilemma during 2002 and 2003 on issues related to the amount of data transferred, the period of data retention and data protection, an agreement between EU and US entered into force in May 2004. The European Commission also decided that the US provided adequate protection for the data transfer to take place. The European Parliament however considered that data transfer should not take place unless greater data protection measures were taken.It also found that the European Commission had no legal jurisdiction to conclude such an agreement and therefore decided to challenge the agreement at the European Court of Justice. The decision of the Court was taken considering the European Commission had no legal authority to conclude such an agreement as the Directive does not apply to this kind of data transfer. The Commission disagreed and considered that the carriers process PNR data within the Community jurisdiction and then make the transfer of these data to US so these activities of private parties are related to public security and therefore are regulated by the Directive. The court considered that the transfer of PNR data to the US concerns public security, and as private operators must operate within a framework established by public authorities, the European Commission was acting in the area of public security in which it has no jurisdiction. The court concluded that both the agreement and the decision on adequacy were based on the wrong legal base. However, the court decided on the annulment of the agreement without considering the other pleas from the Parliament related to the privacy and human rights aspects of the agreement. This leaves open the possibility of bi-lateral agreements between the US and each EU member state. The decision of the Court therefore should not be considered as a real victory of the European Parliament, which has no power of approval over such treaties or the power to bring legal actions against them. There is also the risk that such a separate treaty signed between a member state and the US could be even worse than the original agreement from the point of view of data protection standards. Judgment of the Court of Justice - PNR case (30.05.2006) http://curia.eu.int/jurisp/cgi-bin/form.pl?lang=EN&Submit=Rechercher$docrequi re=alldocs&numaff=C-317/04&datefs=&datefe=&nomusuel=&domaine=&mots=&resmax=10 0 European Court of Justice press release (30.05.2006) http://curia.eu.int/en/actu/communiques/cp06/aff/cp060046en.pdf Courts annul EU-US air data deal (30.05.2006) http://www.eupolitix.com/EN/News/200605/e2bac420-d618-4608-94c0-59fd19aba6a5. htm EU-US passenger data transfer deal annulled by European Court (30.05.2006) http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-537923 Statewatch's Observatory on the exchange of data on passengers (PNR) http://www.statewatch.org/pnrobservatory.htm Staying vigilant after EU-US PNR deal cancelation (French only, 31.05.2006) http://www.iris.sgdg.org/info-debat/comm-cjcepnr0506.html EDRI-gram : Advocate General European Court rejects PNR deal (5.12.2005) http://www.edri.org/edrigram/number3.24/PNR ============================================================ 2. Frankfurt Appellate Court says online demonstration is not coercion ============================================================ The collective blockade of a corporate website in the context of a political event is not violence or coercion but legitimate free expression, a German Higher Regional Court in Frankfurt decided on 22 May. The decision came almost five years after the online demonstration took place. The groups "Libertad" and "Kein Mensch ist illegal" (No Human is Illegal) had called for an online blockade of Lufthansa's website to protest against the company's participation in the deportation of asylum-seekers. With a script- (client-) based distributed denial of service attack, the Lufthansa web servers were supposed to be blocked during the annual company's shareholders assembly on 20 June 2001. Though Lufthansa was mostly able to adapt to the protest by renting more bandwidth for that day, the event created significant public interest. 13000 people participated in the demonstration, the Federal Ministry of Justice publicly questioned its legality, and others even spoke about "computer sabotage". The online demonstration was accompanied by an offline protest at the shareholders assembly venue. The organizers had tried to register the online protest with the authorities beforehand like a normal demonstration, but had been rejected. While the organizers called the demonstration a modern form of non-violent blockade and referred to their constitutional right to freedom of assembly, Lufthansa and the Frankfurt public attorney saw in it a call to coercion. The offices of Frankfurt-based group Libertad were searched and computers seized, and the main official organizer, Andreas-Thomas Vogel, was indicted. Investigations were led by the state security branch of the police and the attorney's office. The Frankfurt district court convicted Vogel to a fine in summer 2005, and ruled that the demonstration equalled coercion against Lufthansa and other website visitors. The first criminal chamber of the Frankfurt Appelate Court now dropped all charges and ruled (No. 1 Ss 319/05) that the demonstration was in fact no violence or coercion, but had been targeted at influencing public opinion. Therefore it was legal. Libertad spokesman Hans-Peter Kartenberg commented: "The Internet, in spite of its virtuality, is a real public space. Where dirty deals are made, there you can and must also protest against them." This ruling will be important in the future development in this legal field, as this trial had been the first criminal case about online demonstrations in Germany. Decision by the Frankfurt Appellate Court (in German only, 22.05.2006) http://www.libertad.de/service/downloads/pdf/olg220506.pdf Statement by Libertad on the ruling (in German only, 1.06.2006) http://www.libertad.de/inhalt/projekte/depclass/verfahren/libpe010606.shtml Higher Regional Court says online demonstration is not force In German (1.06.2006) http://www.heise.de/newsticker/meldung/73755 In English (2.06.2006) http://www.heise.de/english/newsticker/news/73827 (Contribution by Ralf Bendrath, EDRi-member Netzwerk Neue Medien, Germany) ============================================================ 3. New Czech Police draft act allows taking DNA samples by force ============================================================ The Czech Senate, upper chamber of the Parliament, approved on 25 May 2006 the amendment of the Criminal Proceedings Code and Police Act, which empowers police officers to take DNA samples and other identification samples as fingerprints. According to the draft police can take the DNA samples even by using force in case of resistance. Currently, a person may refuse to provide the saliva sample, which could result only in aprocedural fine of maximum 2800 Eur. The new amendment foresees that the DNA samples can be taken from people suspected, charged, accused, sentenced or in execution of protective measures. The amendment also contains provisions authorizing massive DNA sampling from all people that are imprisoned for wilful crimes. This purposed measure will concern approximately 12 000 people. Due to the necessary financial resources for processing the DNA samples into DNA profile, there is going to be a substantial delay in this activity. It means in fact, that the police will hold complete DNA's of thousands of detainees for an unknown period. There is a standard that requires the destruction of the original sample, after the DNA has been processed into the profile. EDRi-member Iuridicum Remedium elaborated a paper with an overview of the risks of the new law. The draft paper was disseminated and distributed to the lawmakers. However, the bill was passed surprisingly easyly in both Parliament chambers, after an intensive lobby of the Police Forensic Institute, the institution that manages the National DNA Database. Despite highlighting the human rights risks of the amendment, the bill was supported by 43 of the 49 present senators. Only some senators expressed their doubts about broadening police powers without appropriate safeguards for the rights of the concerned persons. The bill is waiting to be signed by the President of the Republic. In case he does not sign it, the law will not enter into force, because the lower chamber does not have the opportunity to take a vote on it, since it is dissolved due to elections. Legislative process of the amendment to the Police Act http://www.psp.cz/sqw/historie.sqw?o=4&T=1024 (in Czech only) Comments from Iuridicum Remedium on the draft act http://www.iure.org/570359 (in Czech only, 15.05.2006) Police will be able to forcibly take DNA sample from detained persons http://www.ceskenoviny.cz/vyhledavani/index_view.php?id=190180 (in Czech only, 25.05 2006) (Contribution by Helena Svatosova - EDRI-member Iuridicum Remedium - Czech Republic) ============================================================ 4.Content flatrate is feasible according to French study ============================================================ Nothing in the national law and international obligations prevents states from permitting file-sharing as long as they subject it to a levy. This is the conclusion of a legal feasibility study under the supervision of Prof. Andri Lucas, the most renowned copyright scholar in France. The study on the feasibility of compensation for peer-to-peer file-sharing, first released in French in June 2005, has been translated into English for wider accessibility. The translation has been conducted at the initiative of the German advocacy group privatkopie.net with the support of BEUC, the European Consumers's Organisation, and Stiftung Bridge. The analysis concludes that downloading is covered by the private copying exception, provided that the existing system of remuneration is adapted. Internet service providers would have to pay a levy, just as the manufacturers and importers of blank media do today. For uploading, the authors envisage subjecting the so called making available right to mandatory collective management. In short, "compulsory collective management is not perceived as reversing the fundamental principles of copyright, but instead 'reinforcing and (..) organising the protection granted to authors against infringements of their fundamental rights, as consecrated in French law since 1793". L'Alliance Public-Artistes has supported its arguments for a Global Licence by additional studies on the technical and economic feasibility. The latter find that a levy of 5 Euros per month is economically justified. These studies have thoroughly invalidated arguments that a flat rate compensation for legal file-sharing is not compatible with national, European and international copyright law and that it threatens the emerging online market. Such arguments were brought forth, among others, by the German Ministry of Justice. With reference to the Lucas study, Members of French Parliament from both the conservative ruling party as well as from the socialist party have advanced amendments to the recent copyright law reform in France with the aim of introducing a Global Licence. The National Assembly passed these amendments on 22 December 2005. The Global Licence was a reality in the proposals for a short period of time. The rights industry only managed to get it rolled back by an unprecedented campaign that Liberation called "total war on the Global Licence". When the administration brought the draft copyright law up for vote in the French National Assembly in January again, the provision on the Global Licence was gone. Privatkopie.net considers that collective rights management is ideally suited for the individual mass medium Internet. It is legally, technically and economically feasible. Privatkopie.net also expresses its hope in increasing the rationality of the international copyright debate by releasing an English translation of the Lucas study. Peer-to-peer File Sharing and Literary and Artistic Property - A Feasibility Study regarding a system of compensation for the exchange of works via the Internet English Version (03.2006) http://privatkopie.net/files/Feasibility-Study-p2p-acs_Nantes.pdf French Version (05.2005) http://alliance.bugiweb.com/usr/Documents/RapportUniversiteNantes-juin2005.pd f Study Shows : Content Flatrate is Feasible! (28.05.2006) http://privatkopie.net/files/PM-060528.html EDRI-gram : Update on French EUCD Transposition (29.03.2006) http://www.edri.org/edrigram/number4.6/frencheucd (Contribution by Volker Grassmuck , privatkopie.net) ============================================================ 5.Campaign against censorship on the Internet ============================================================ Amnesty International together with The Observer and Soda Creative launched a campaign called irrepressible.info against the increasing governmental censorship of the internet. The campaign asks governments to stop censoring websites, blocking emails or shutting down blogs and make an appeal to the big corporations to stop supporting these actions. The Irrepressible.info website set up for the campaign includes a badge with parts of censored information and people are urged to send emails including this badge. Thus the censored information can be transmitted all around the globe. The website includes also a pledge that will be presented at the Internet Governance Forum meeting in Athens in November 2006 where governments and companies from all over the world will discuss the future of the Internet. The pledge that has been signed by more than 20 000 individuals says: "I believe the Internet should be a force for political freedom, not repression. People have the right to seek and receive information and to express their peaceful beliefs online without fear or interference." Amnesty is urging people to petition governments to cease censoring the web. It also urged technology companies not to facilitate such activities. Information technology companies "have helped build the systems that enable surveillance and censorship to take place", Amnesty claims. In the campaign-launching article Kate Allen, UK director of Amnesty International, criticised technology companies that allow censorship and provide information to governments convicting political dissidents. Irrepressible.info gives Yahoo, Microsoft and even Google as examples of companies having provided confidential user information to the Chinese authorities resulting in suppression of freedom of expression, and even imprisonments. The big companies defend their position and consider that entering restricted countries such as China is for the good of the local population because some information is better than none. Amnesty - Irrepressible.info campaign http://irrepressible.info/ Amnesty: we must free the internet (28.05.2006) http://observer.guardian.co.uk/uk_news/story/0,,1784625,00.html Today, our chance to fight a new hi-tech tyranny (28.05.2006) http://observer.guardian.co.uk/uk_news/story/0,,1784643,00.html Amnesty takes a strike against web censorship (30.05.2006) http://www.theregister.co.uk/2006/05/30/amnesty_anti_web_censorship/ ============================================================ 6.Journalistic protection for online journalists and bloggers ============================================================ The Californian appeal court decided on 26 May that online journalists and bloggers have the same right to protect their sources as all other journalists. The case was brought to court by Apple Computer demanding from a number of news website operators to reveal the source of confidential information posted about some of its products. Initially the trial court had ruled in favour of Apple but the appeal court changed this decision stating that the defendants were protected by California's reporter's shield law, as well as the constitutional privilege against disclosure of confidential sources. A major point in the case was whether the writers involved deserved the protection of the First Amendment and the sites involved could be considered a "newspaper, magazine or other periodical publication" as it is expressed by the law. The Californian Court of Appeal's decision is considered as a major victory for press freedom. "This is a victory for the rights of journalists, be they online or offline journalists, and it's a victory for the public at large", said Kurt Opsahl, the staff attorney for the Electronic Frontier Foundation, the group that represented the journalists. "It protects the free flow of information to the press and from the press to the public". Reporters Without Borders added: "The Californian appeal court's decision is historic because it gives a new legitimacy to bloggers. Even though they do not have press cards, they will henceforth have right of place in the world of news and information". The case highlights the lack of precedents in the UK regarding the journalistic protection. The Contempt of Court Act of 1981 is an equivalent act protecting journalists and although the law does not provide absolute protection for sources, the court is required to decide whether the request for source identification is sufficiently in the public, justice or national security interest to over-ride a general presumption of source protection. Recent cases have tended to favour the journalist's right to protect his sources. John MacKenzie, a Solicitor Advocate and partner with Pinsent Masons law firm suggested that the Contempt of Court Act is broad enough to cover operators of Internet news wires, blogs or other new media content. Decision in Apple v. Does (20.05.2006) http://www.eff.org/Censorship/Apple_v_Does/H028579.pdf Huge Win for Online Journalists' Source Protection (26.05.2006) http://www.eff.org/news/archives/2006_05.php#004698 Court ruling protecting bloggers' sources hailed as historic (30.05.2006) http://www.rsf.org/article.php3?id_article=17850 UK bloggers also likely to be Apple-proof (01.06.2006) http://www.theregister.co.uk/2006/06/01/uk_bloggers_protected/ ============================================================ 7. Dutch Gamer in US intelligence spotlight ============================================================ A Dutch gamer has become subject of US intelligence and widespread international media attention because of a self-made video-game movie. The video consists of footage of the game Battlefield 2 spiced up with different music and voiceovers. It was presented on 4 May 2006 at a meeting of the House Permanent Select Committee on Intelligence as evidence of a militant campaign to recruit Muslim youth on the Internet. Reuters reported on the video that was shown at the meeting and stated that it was a user-modified version of best-selling game Battlefield 2, a military simulation which features combat between U.S. forces and those of the fictitious Middle East Coalition (MEC) as well as the People's Republic of China. Reuters quoted a Pentagon official, Dan Devlin, as saying: "What we have seen is that any video game that comes out... (al Qaeda will) modify it and change the game for their needs". The video starts with the voice of a male narrator saying: "I was just a boy when the infidels came to my village in Blackhawk helicopters. The infidels fired at the oil fields and they lit up as the eyes of Allah". This is in fact a very easy recognisable copy of a voice-over from the movie "Team America: World Police", an American satire by the makers of South Park. The video footage was not created with a modified version of Battlefield 2 at all, but with standard game footage from an add-on module, a retail product widely available in the United States and elsewhere. The Dutch maker Samir published the movie in the end of 2005 on a Battlefield 2 forum under the name "Sonic Jihad", a reference to a rap-album by rapper Paris. He took most of the sounds from the movie called "Lion of the Desert" starring Anthony Quinn. Devlin spoke before the Committee, at which contractors from Science Applications International Corp (SAIC) gave lawmakers a presentation that focused on Iraq as an engine for Islamic militant propaganda. SAIC has a $7 million Defence Department contract to monitor 1,500 militant websites that provide Al Qaeda and other militant organisations with a main venue for communications, fund-raising, recruitment and training. To present this material, that is completely build up from various pieces of western media content, as terrorist propaganda seems rather unconvincing. Various gamers have ridiculed it. Samir has explained the context of the video in various interviews in which he stated that the video shouldn't be taken seriously. The attention by US intelligence officials is however enough reason for him, a 25-year old quality manager in a hospital, to cancel his plans to visit New York out of fear of interrogation at arrival. US accuses militants of using video games in youth appeal (07.05.2006) http://www.dailytimes.com.pk/default.asp?page=2006%5c05%5c07%5cstory_7-5-2006 _pg4_9 Was Congress misled by "Terrorist" game video? We talk to gamer who created the footage (11.05.2006) http://gamepolitics.livejournal.com/285129.html?thread=23112137 Hearing on the Terrorist/Jihadist Use of the Internet for Strategic Communications (04.05.2006) http://intelligence.house.gov/Reports.aspx?Section=134 Transcript of the Committee hearing (04.05.2006) http://www.watercoolergames.org/archives/committee_hearing_part_one.doc The video http://www.archive.org/download/Sonic_jihad/Sonic_Jihad12.wmv (Contribution by Joris van Hoboken - EDRI-member Bits of Freedom - Netherlands) ============================================================ 8. Private copy system under scrutiny ============================================================ The issue of the private copy remuneration system is becoming a subject of debate for interest groups from all over the world. L'AEPO-ARTIS grouping 27 associations of artists of Europe, the International Federation of Musicians and the International Federation of Actors took a stand in the support of the present private copy levy system. According to the artists associations, the present private copy system "significantly supports the cultural domain" as "a flexible system combining freedom for consumers and legitimate revenues for the copyright owners" being "vital for interpreters in the exploitation of their interpretation". Replacing the fees on private copy, which brought income to the artists, with DRM, which allows copying only within a system approved by its producer, is profitable only for the industry selling DRM systems and not to the interpreters who should be able to be compensated for copies of their work. The Federation considers that technical protection measures against copying applied to CDs, DVDs and online works are prejudicial both to consumers and artists preventing the circulation of artistic creation and attacking individual freedom. The position of these associations comes at the moment when the topic of the copyright levy reform is included in the European Commission Work Program for 2006. The commission is concerned "that copyright levies are being applied to digital equipment and media without due account being given to the impact on new technologies and equipment especially the availability and use of so called "digital rights management" technologies which can provide alternative ways of compensating right-holders. Furthermore, there is a lack of transparency about the application, collection and distribution of the copyright levies to right-holders." On the other side of the debate is an alliance called Copyright Levies Reform Alliance (CLRA) that was formed by IT, telecoms, electronics and digital industry associations, to lobby for removal of the levies. The copy protection technologies are also criticized by a recent report of the UK All Party Parliamentary Internet Group (APIG). The DRM report from APIG looked at how copy protection systems restrict digital movies and music and made several recommendations on the labelling regulations that should tell consumers what they will and will not be able to do with digital content that they purchase or on the prices charged for the same digital content in different countries. AEPO-ARTIS, FIA and FIM express their deep concern and clear opposition to any restrictions of the remuneration system for private copying (31.05.2006) http://www.labellife.com/2006/05/31/aepoartis_fia_a.html#more The artists all over the world defend private copy (in French) (1.06.2006) http://www.ratiatum.com/news3151_Les_artistes_du_monde_entier_defendent_la_co pie_privee.html EC - Copyright levy reform http://ec.europa.eu/internal_market/copyright/levy_reform/index_en.htm Coalition seeks to reform EU copyright levies (6.04.2006) http://www.out-law.com/page-6821 MPs in digital downloads warning (4.06.2006) http://news.bbc.co.uk/2/hi/technology/5041684.stm "Digital Rights Management" - Report of an Inquiry by the All Party Internet Group (06.2006) http://www.apig.org.uk/index/APIG_DRM_Report-final.pdf ============================================================ 9. Agenda ============================================================ 14-18 June, Rathen, Germany ICA-IAMCR Symposium on Internet Governance http://www.ntu.edu.sg/sci/sirc/icapreconf.html 17 June 2006, Berlin, Germany Start: 14:00, Alexanderplatz Demonstration "Freiheit statt Sicherheitswahn" (Freedom instead of Security Delusion) http://initiative.stoppt-die-vorratsdatenspeicherung.de 19-20 June 2006, Paris, France New relations between creative individuals and communities, consumers and citizens. Hosted by the TransAtlantic Consumer Dialogue (TACD) http://www.tacd.org/docs/?id=296 19-23 June, Singapore Euro-Southeast Asia ICT Forum (EUSEA2006) (with the EU Commission as co-host) http://www.eusea2006.org 21 June 2006, Luxembourg Safer Internet Forum 2006 Focus on two topics: "Children's use of new media" and "Blocking access to illegal content: child sexual abuse images" http://europa.eu.int/information_society/activities/sip/si_forum/forum... 23 June 2006, Copenhagen, Denmark Book Launch Human Rights in the Global Information Society. Keynote on Privacy, terrorism and the new security agenda. Organized by The Danish Human Rights Institute and The Danish WSIS network Information about the book. http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=10872 Program and invitation: http://www.humanrights.dk / http://www.una.dk/wsis 26-27 June 2006, Berlin, Germany The Rising Power of Search-Engines on the Internet: Impacts on Users, Media Policy, and Media Business http://www.uni-leipzig.de/journalistik/suma/home_e.html 26-30 June 2006 Geneva, Switzerland Provisional Committee on Proposals Related to a WIPO Development Agenda (PCDA/2) http://www.wipo.int/meetings/en/details.jsp?meeting_id=9766 26-28 June 2006, Cambridge, UK Workshop on the Economics of Information Security (WEIS 2006) http://weis2006.econinfosec.org/ 28-30 June 2006, Cambridge, UK Workshop on Privacy Enhancing Technologies http://petworkshop.org/2006/ 3-5 July, Cambridge, UK Privacy Laws & Business, 19th Annual International Conference "Privacy Crisis Ahead? Investing enough in data protection to strengthen and defend your reputation" http://www.privacylaws.com/conferences.annual.html 7 July 2006, Zurich, Switzerland Free cultures - a Free Internet. Internet Governance and Switzerland Who is supposed to govern the internet? A symposium on the "Internet Governance Forum" will be looking for the answers. http://www.igf-06.ch 16 - 28 July 2006, Oxford, UK Annenberg/Oxford Summer Institute: Global Media Policy: Technology and New Themes in Media Regulation http://www.pgcs.asc.upenn.edu/events/ox06/index.php 2-4 August 2006, Bregenz, Austria 2nd International Workshop on Electronic Voting 2006 Students may apply for funds to attend the workshop until 30 June 2006. http://www.e-voting.cc/stories/1246056/ 3 August 2006 , Prague, Czech Republic Travelers privacy and EU One day seminar organized by Iuridicum Remedium, providing a space for privacy experts to meet Czech officials to discuss passports, biometrics, RFID, PNR deal and other issues related to privacy risks possibly encountered by travellers in the EU. http://www.bigbrotherawards.cz/en/index.html 14-16 September 2006, Berlin, Germany Wizards of OS 4 Information Freedom Rules http://wizards-of-os.org/ =========================================================== 10. About =========================================================== EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 21 members from 14 European countries and 5 observers from 5 more countries (Italy, Ireland, Poland, Portugal and Slovenia). European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 2.0 License. See the full text at http://creativecommons.org/licenses/by/2.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/index.php?option=com_content&task=view&id=626 &Itemid=4&lang=mk - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rofwsashenzhentnk at wsashenzhen.com Wed Jun 7 15:10:44 2006 From: rofwsashenzhentnk at wsashenzhen.com (Oliver Perry) Date: Wed, 7 Jun 2006 18:40:44 -0330 Subject: Started buying bigger clothes recently? Message-ID: <655235852.50023041519658@thebat.net> How many times did you get unhappy after looking in the mirror? 0be/sity does not only affect the way you look and feel about yourself. It is also dangerous for your health, bringing plenty of health problems in a variety of spheres. And of course feeling shy to take off your clothes on a beach or in bed with your special one is so saddening. You don't have to spend the rest of your life exercising yourself to death. You also don't have to experiment with suspicious po_und-fighting products. The only option you need is An`atrim! Its completely naturaI blend of ingredients attacks o/besity like nothing else and suppresses your appetite, putting your mind in control of your e_ating. It also easily integrates into existing di*ets and has no side effects - it just tells your brain your stomach is full! Getting rid of extra po/unds now is safe and enjoyable. Ana-trim boosts not only your confidence but helps your body produce tons of natural energy! Check out the testimonials of happy customers, at our site: http://www.klonted.com/ Re-move your e mail: http://www.klonted.com/u.php From PattiKirby at earthlink.net Wed Jun 7 20:44:57 2006 From: PattiKirby at earthlink.net (Patti) Date: Wen, 7 Jun 2006 20:44:57 -0700 Subject: re ctxe.pk formal announcement Message-ID: <200606070145.k571j34h018937@proton.jfet.org> stoocks that perform like rockets explained Market status measurements and booming tendencies Get Ctxe.Pk First Thing Today, It Is Exploding Now! Price: $0.59 Change: $0.06 (11.76%) within 1 day! Open: 0.53 Volume change: 521% Within 1 day! ! ! and this is just the beginning. Keep your radar on it! Before we start with the profile of CTXE we would like to mention something very important: A Big PR Campaign is moving this week . And it will go all week so it would be best to get in Now. Company Profile Cantex Energy Corporation is an independent, managed risk, oil and gas exploration, development, and production company headquartered in San Antonio, Texas. Recent News Cantex Energy Corp. Receiving Interest From the Industry as It Enters Next Phase of Development Cantex Energy Corp. (CTXE - News) is pleased to report the following on its Big Canyon Prospect in West Texas. Recent company announcements related to the acquisition of over 48,000 acres of a world-class prospect has captured the attention of many oil & gas industry experts and corporations, who have recently inquired into various participation opportunities ranging from sharing science technology to support findings or expertise to drill, operate and manage wells. Trace Maurin, President of Cantex, commented, "Although we are a small independent oil & gas company, we have a very unique 0pp0rtunity in one of the last under-explored world-class potential gas plays with no geopolitical risks and the industry is starting to take notice. As we prepare to prove up the various structures within our prospect later this month, we are increasing our efforts to communicate on our progress to our shareholders and investors. Our intention is to provide investors with a better understanding of the full potential of this prospect as we embark on the next phase of operations." Starting immediately the company will undertake CEO interviews, radio spots (which will be recorded and published on the company website), publication placements, introductions to small cap institutional investors and funds all in an effort to optimize market awareness and keep our shareholder well informed. Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is CTXE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade tomorrow! Go CTXE. Pen-ny sttocks are considered highly speculative and may be unsuitable for all but very aggressive investors. This Profile is not in any way affiliated with the featured company. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully placed in our membership, send a blank e mail with No Thanks in the sub ject to Exepcted prcie at the end of the week: $1.0! stocck strategies and tactics explained This stockk is ggreatly recomeended by agressive inveestors in a sshort term. Don't loose a chance to eaarn. Successful stoock recommendation for winning players Buy sstocks for the short term with expert stocck recommendations ......................................... Another day, another dollar Lust not after her beauty in thine heart; neither let her take thee with her eyelids. One good turn deserves half the blankets He that turneth away his ear from hearing the law, even his prayer shall be abomination. He that stays in the valley shall never get over the hill! Lightning never strikes twice in the same place. We never know the worth of water till the well is dry Opportunity seldom knocks twice. The Moon does not heed the barking of dogs Beauty is in the eye of the beholder You are a long time dead A banker is a fellow who lends you his umbrella when the sun is shining, but wants it back the minute it begins to rain. Tis better to get things for free, than to work up a sweat Then shall they call upon me, but I will not answer; they shall seek me early, but they shall not find me. You get what you give There but for the grace of God go I A gift given in secret soothes anger, and a bribe concealed in the cloak pacifies great wrath. Hatred stirs up dissension, but love covers over all wrongs Little Strokes Fell Great Oaks Turn the other cheek Make love not war A miss is as good as a mr. Everything comes to him who waits One of these day is none of these days. Hasty climbers have sudden falls No wind, no waves Kill two birds with one stone The price of greatness is responsibility The pen is mightier than the sword. Great groups from little icons grow. Every body wants to go to heaven but nobody wants to die Without rice, even the cleverest housewife cannot cook Silence is golden. Whah hurt eye does mek nose run water. God is Always on the Side of the Big Battalions Yuh gat fuh blow yuh nose where yuh stump yuh toe. Kill two birds with one stone Dah mouth dat man tek fuh court woman, ah de same mouth he ah tek an put she ah door. When the blind leadeth the blind.. get out of the way. What a tangled web we weave when first we practice to deceive Life is like a horse race there are winners and losers He That Brings Good News Knocks Hard The best of men are but men at best From rah at shipwright.com Wed Jun 7 18:00:52 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 7 Jun 2006 21:00:52 -0400 Subject: cpunks archive, 1992-09 to 1998-12 In-Reply-To: <20060607164228.GC16234@arion.hive> References: <20060607164228.GC16234@arion.hive> Message-ID: At 4:42 PM +0000 6/7/06, Justin wrote: >spring-summer >1995) Figures. :-) Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sibylle.staudacher at 24on.cc Thu Jun 8 03:09:41 2006 From: sibylle.staudacher at 24on.cc (Paul Vogel) Date: Thu, 08 Jun 2006 02:09:41 -0800 Subject: Looking to ReFi or a Home Equity Loan? Message-ID: <143019547.8850758804218.JavaMail.ebayapp@sj-besreco390> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 988 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: billy.0.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From ramos at adsenv.com Thu Jun 8 04:48:50 2006 From: ramos at adsenv.com (Walker Landry) Date: Thu, 08 Jun 2006 03:48:50 -0800 Subject: Agents compete for your refi!! Message-ID: <200140629.0081792545849.JavaMail.ebayapp@sj-besreco211> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1021 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: wrest.4.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From ojydnqshdiws at spartanshowcase.com Thu Jun 8 06:38:19 2006 From: ojydnqshdiws at spartanshowcase.com (Burleigh) Date: Thu, 08 Jun 2006 08:38:19 -0500 Subject: Jumbo Gift Store Message-ID: <299t034q.5745228@inyc.com> or fovea it's forget may pittsburgh a copperhead , delightful -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 752 bytes Desc: not available URL: From camera_lumina at hotmail.com Thu Jun 8 10:21:44 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 08 Jun 2006 13:21:44 -0400 Subject: "A million bucks in stolen calls" Message-ID: Wow. One guy and a hacker rerouted VoIP calls and in the process collected $1MM in fees. Lots of crypto & cypherpunkly implications here. -TD http://www.wired.com/news/technology/0,71105-0.html?tw=wn_index_8 From mannion.mcculloch1vc7 at gmail.com Thu Jun 8 15:11:25 2006 From: mannion.mcculloch1vc7 at gmail.com (Kris Terrell) Date: Thu, 8 Jun 2006 17:11:25 -0500 Subject: this going to expolad Message-ID: <200606081211.k58CBDRK009364@proton.jfet.org> For Immediate Release ALERT ISSUED - Watch F C Y I.PK Tr at de Today! F a l c o n E n e r g y, Inc. F-C-Y-I Last $ 1.25 Market Plus Top Four P1ck Yesterday change of price was 105% ! VANCOUVER, British Columbia, June 05, 2006 (PRIME ZONE) -- As part of the commitment of Falcon Energy, Inc., a Nevada Corporation, to keep investors informed of its status and activities, the company is providing this investor update. Gas production continues steadily from Falcon Energy's Richmount Westlock property in Alberta, Canada. This opportunity has proven itself out as the property and investment have benefited from the surge in natural gas prices since the well was first tied in May of 2005. The market price (NYMEX) for natural gas at that time was approximately $6.50 per MMBTU but in the last year prices stayed over 10.00 per MMBTU for a 5 month period with several spikes above the $14.00 range. The company is pleased that the investment continues to provide consistent revenue for the company and its shareholders. F a l c o n E n e r g y Inc. has also announced that due to the confirmed addition of its mining exploration properties in Mongolia, that it will shortly be expanding the executive team to assist in managing this new opportunity. Details will be forthcoming. VANCOUVER, British Columbia, May 17, 2006 (PRIME ZONE) -- F a l c o n E n e r g y , Inc. is pleased to announce that the granting of exploration licenses for five mining properties in Mongolia has been finalized. These licenses will be held for a minimum of three years and grant F a l c o n E n e r g y, Inc. access to the mineral rights for the licensed properties. F a l c o n E n e r g y , Inc. had recently sought the mineral rights to these significant properties in the mineral rich region of Mongolia. F a l c o n E n e r g y's interest in the region is driven in part by the anticipation of deploying modern prospecting methods to an area that abounds in both base and precious metals. The five licensed areas are: 8825E - The Duhum Hujirt License Area 8454X - Tsagaan Tolgoi Copper/Gold Project 9997X - The Huld License Area 9996X - The Har Tolgoi License Area 9668X - Hutagt License Area Exploitable mineral resources found in the area in which the licenses are held include: Gold, base metals such as Copper, Molybdenum, Lead and Zinc as well as Fluorite and Uranium. --------------------- bocklogged dobson archibald dickey collectible appalachia birdlike amateurish crucial comma astral australite camino crumb bite burton celibacy bertram brigantine atheism bumble combustible From sho at agouron.com Fri Jun 9 00:52:31 2006 From: sho at agouron.com (Gail Costa) Date: Thu, 08 Jun 2006 23:52:31 -0800 Subject: check it out Message-ID: <40870.$$.72602.Etrack@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 988 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ranier.6.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From halloas at mailAccount.com.jfet.org Fri Jun 9 03:04:36 2006 From: halloas at mailAccount.com.jfet.org (Imogene Pickens) Date: Fri, 09 Jun 2006 02:04:36 -0800 Subject: Agents compete for your refi!! Message-ID: <408557466.2238400761661.JavaMail.ebayapp@sj-besreco507> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1028 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: acquisitive.7.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From biwsucfcbdi at compunet1.com Fri Jun 9 08:51:41 2006 From: biwsucfcbdi at compunet1.com (Lazarus) Date: Fri, 09 Jun 2006 10:51:41 -0500 Subject: Tiffany, Handbags, Pens and more.. Message-ID: <741b462h.6978908@frontline.net> in glamour some betony and incisive try artemisia it's middle -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 775 bytes Desc: not available URL: From coderman at gmail.com Fri Jun 9 10:56:52 2006 From: coderman at gmail.com (coderman) Date: Fri, 9 Jun 2006 10:56:52 -0700 Subject: "A million bucks in stolen calls" In-Reply-To: <4ef5fec60606091056o1b442f0fy9106eb247c30deca@mail.gmail.com> References: <5e01c29a0606082006w628a4dc0wedd0ec708fb8b8c4@mail.gmail.com> <5e01c29a0606082023v3ee00e1bhca0cb5c759ed11d6@mail.gmail.com> <4ef5fec60606091056o1b442f0fy9106eb247c30deca@mail.gmail.com> Message-ID: <4ef5fec60606091056i76552eaagb85179b5d5ad8b2c@mail.gmail.com> On 6/8/06, mikeiscool wrote: > On 6/9/06, Tyler Durden wrote: > > Wow. One guy and a hacker rerouted VoIP calls and in the process collected > > $1MM in fees. Lots of crypto & cypherpunkly implications here. > > Sorry to double-post, but does anyone think Tor + encryption use > would've saved this guy? it's hard to sheild income, hence the advice to inflate expenses when fudging taxes rather than trying to hide incoming funds. these guys were making too much money to stay covert for long, so i don't think tor or encryption of comms or data would have helped. it might have delayed the inevitable a bit, but that's all. "Authorities said that to hide profits from his scheme, which ran from November 2004 to May 2006, Pena bought real estate, three luxury vehicles and a 40-foot motorboat." -- that's not a good way to hide funds :) From tkyper at gaiconsultants.com Fri Jun 9 05:53:35 2006 From: tkyper at gaiconsultants.com (Marissa Aguirre) Date: Fri, 9 Jun 2006 11:53:35 -0060 Subject: Message-ID: <200606091154.k59BsJ74015718@proton.jfet.org> 9I34 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 416 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 30P3YG.PNG Type: image/png Size: 5162 bytes Desc: not available URL: From yoakknc at telcomprice.com Fri Jun 9 10:23:20 2006 From: yoakknc at telcomprice.com (Roxana) Date: Fri, 09 Jun 2006 12:23:20 -0500 Subject: Ephedra for you again Message-ID: <188b333q.5081924@valueaccessproviders.com> it apace the watershed ! boniface it inadvisable be santa -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1466 bytes Desc: not available URL: From jlund at uk.bnsmc.com Fri Jun 9 13:32:56 2006 From: jlund at uk.bnsmc.com ( Early) Date: Fri, 09 Jun 2006 12:32:56 -0800 Subject: Application approval #JL1284563794143948 Message-ID: <42218.$$.65376.Etrack@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 705 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: .7.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From michaelslists at gmail.com Thu Jun 8 20:06:21 2006 From: michaelslists at gmail.com (mikeiscool) Date: Fri, 9 Jun 2006 13:06:21 +1000 Subject: "A million bucks in stolen calls" In-Reply-To: References: Message-ID: <5e01c29a0606082006w628a4dc0wedd0ec708fb8b8c4@mail.gmail.com> On 6/9/06, Tyler Durden wrote: > Wow. One guy and a hacker rerouted VoIP calls and in the process collected > $1MM in fees. Lots of crypto & cypherpunkly implications here. > > -TD > > http://www.wired.com/news/technology/0,71105-0.html?tw=wn_index_8 http://www.usdoj.gov/usao/nj/publicaffairs/NJ_Press/files/pdffiles/moorecomplaint.pdf "After vulnerable computer networks of Unsuspecting Intermediaries were identified, Defendant Moore delivered to Pena's E-Mail Address information pertaining to the types of routers used, as well as corresponding usernames and passwords, necessary to infiltrate their networks." Damnit man, if you're sending illegal things by email, at least encrypt it! -- mic From emc at artifact.psychedelic.net Fri Jun 9 13:08:03 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Fri, 9 Jun 2006 13:08:03 -0700 (PDT) Subject: Gilmore's Last Stand Message-ID: <200606092008.k59K83qo025591@artifact.psychedelic.net> One of the first rules of being a courtroom lawyer, is to never ask a question you don't already know the answer to. A corollary to this might be to never try and prove a point by publicly conducting an experiment that you don't already know the results of. One therefore wonders what on earth could have been going through "Privacy Activist" John Gilmore's mind when he publicly challenged a DHS Advisor to try to fly home to Washington, DC from a committee meeting in San Francisco without using his ID. The guy already had his ticket and boarding pass. He got a little extra screening, and actually got through security faster than the long line of people waiting for the regular screening. So of course this is all over the Net now, and headlines are proclaiming that "flying without a photo-ID is actually faster than flying with proper identification," and Gilmore is looking like a crackpot. Show up at the ticket counter without ID, try and buy a ticket with cash, and try to get on the plane, and be Black. Then see what happens. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From michaelslists at gmail.com Thu Jun 8 20:23:48 2006 From: michaelslists at gmail.com (mikeiscool) Date: Fri, 9 Jun 2006 13:23:48 +1000 Subject: "A million bucks in stolen calls" In-Reply-To: <5e01c29a0606082006w628a4dc0wedd0ec708fb8b8c4@mail.gmail.com> References: <5e01c29a0606082006w628a4dc0wedd0ec708fb8b8c4@mail.gmail.com> Message-ID: <5e01c29a0606082023v3ee00e1bhca0cb5c759ed11d6@mail.gmail.com> On 6/9/06, Tyler Durden wrote: > Wow. One guy and a hacker rerouted VoIP calls and in the process collected > $1MM in fees. Lots of crypto & cypherpunkly implications here. Sorry to double-post, but does anyone think Tor + encryption use would've saved this guy? I think encryption of the emails + hard drives would certainly help; but would he be "coerced" into giving up the key? Could be burn the key and deny everything? Would the FBI attempt to crack the key? Can the FBI find you on Tor? very interesting ... -- mic From niki2411.renaissance at about.com Fri Jun 9 14:44:33 2006 From: niki2411.renaissance at about.com (Ned Powell) Date: Fri, 09 Jun 2006 13:44:33 -0800 Subject: I feel lucky Message-ID: <200606090340.k593em7U002818@proton.jfet.org> You've been selected to Play at the HI-ROLLER CASIN0! Your promotional ID is vegas88 Benefits include: * Up to $888 real money to gamble with * Fastest growing/most trusted online company * Play all your favorite games: Poker, Hold'em, Black Jack, Slots, etc. * Play at no-cost to see how exciting and easy it is * Rapid payouts to all clientele & 24/7 support * Great games, Big Winnings, & thousands of players This is a limited chance that expires at the end of the month. Play where the world is Playing! http://diromn.com/d1/hot From camera_lumina at hotmail.com Fri Jun 9 11:15:09 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 09 Jun 2006 14:15:09 -0400 Subject: "A million bucks in stolen calls"...Details In-Reply-To: <4ef5fec60606091056i76552eaagb85179b5d5ad8b2c@mail.gmail.com> Message-ID: Here's some more details. So...does this amount to trespassing or merely arresting two guys for running traffic you don't like? This also implies that CALEA probably isn't even necessary in a lot of cases. NSA can probably surreptitiously copy and route traffic to themselves through intermediate networks. Come to think of it, this may imply that something like CALEA is far easier in the packet world than it was in the circuit switched world. One implication is that VoIP can't really be secure unless we can hide the routing and not just the pakcet contents, but of course this isn't a new problem as recent events a la NSAT&T prove. Anyway... Two Charged in VOIP Hacking Scandal JUNE 9, 2006 | Federal authorities pressed charges Thursday against a second man who helped perpetrate a VOIP wholesale scheme that defrauded at least 15 VOIP service providers. Robert Moore of Spokane, Wash., also known as the "Spokane Hacker," was served papers Thursday but had not yet been taken into custody, according U.S. Attorney's Office spokesman Michael Drewniak. On Wednesday, the U.S. Attorney's Office in New Jersey had filed charges against Edwin Andres Pena, who they say set up the allegedly fraudulent wholesale business -- called Fortes Telecom Inc. -- in 2004. (See 'Free' Skype Could Be Costly.) After charging his service provider customers cheap rates to route their calls, Pena's company secretly routed the calls over the IP networks of at least 15 VOIP providers, according to court documents. This was done using a two-step process. Step One. The men obscured the origin of the calls by sending them through an "intermediary." The feds believe Pena, with help from Moore, scanned the networks of companies all over the world looking for network ports to use for routing calls. The New Jersey U.S. Attorney's Office said it obtained records from AT&T Inc. (NYSE: T - message board) showing that, between June and October of last year, Moore ran more than 6 million scans for those susceptible ports. The two eventually decided on routing calls through a router owned by an unnamed New Jersey-based hedge fund company. (See Ingate Secures VOIP.) Step Two. With a "blind" established, Pena then needed to gain admittance for his customers' calls to be routed onto the networks of other VOIP providers. VOIP providers tag their own calls with a unique identifier or "prefix" so they can be admitted to the network. Pena allegedly bombarded the VOIP providers' networks with test calls -- each carrying a different prefix -- until he found one that was admitted to the network. He then tagged all his fraudelent calls with the winning prefix. Having penetrated the networks of VOIP telephone service providers, Pena programmed the third party's computer networks to use the illegally obtained proprietary prefix to route calls of customers of his companies, federal authorities say. The Pena case will certainly revive the issue of security among VOIP providers. Many in the VOIP community are all too aware of the security perils of running calls over the Internet. "This hacker's approach is certainly not a surprise to those in the Internet community who follow these types of issues," says Brian Lustig, spokesman for VOIP provider SunRocket Inc. . "It is just another variation of fraud that can be perpetrated." So what does the VOIP community intend to do to protect itself from hacking? "The industry as a whole -- including Sun Rocket -- is already hard at work on standards and security measures that can prevent this type of activity," Lustig says. Pena was taken into custody today and was scheduled to appear in court Thursday. Moore will appear in court soon, Drewniak said.  Mark Sullivan, Reporter, Light Reading From eugen at leitl.org Fri Jun 9 06:00:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Jun 2006 15:00:05 +0200 Subject: Pentagon sets its sights on social networking websites Message-ID: <20060609130005.GR28956@leitl.org> Pentagon sets its sights on social networking websites * 09 June 2006 * NewScientist.com news service * Paul Marks "I AM continually shocked and appalled at the details people voluntarily post online about themselves." So says Jon Callas, chief security officer at PGP, a Silicon Valley-based maker of encryption software. He is far from alone in noticing that fast-growing social networking websites such as MySpace and Friendster are a snoop's dream. New Scientist has discovered that Pentagon's National Security Agency, which specialises in eavesdropping and code-breaking, is funding research into the mass harvesting of the information that people post about themselves on social networks. And it could harness advances in internet technology - specifically the forthcoming "semantic web" championed by the web standards organisation W3C - to combine data from social networking websites with details such as banking, retail and property records, allowing the NSA to build extensive, all-embracing personal profiles of individuals. Americans are still reeling from last month's revelations that the NSA has been logging phone calls since the terrorist attacks of 11 September 2001. The Congressional Research Service, which advises the US legislature, says phone companies that surrendered call records may have acted illegally. However, the White House insists that the terrorist threat makes existing wire-tapping legislation out of date and is urging Congress not to investigate the NSA's action. Meanwhile, the NSA is pursuing its plans to tap the web, since phone logs have limited scope. They can only be used to build a very basic picture of someone's contact network, a process sometimes called "connecting the dots". Clusters of people in highly connected groups become apparent, as do people with few connections who appear to be the intermediaries between such groups. The idea is to see by how many links or "degrees" separate people from, say, a member of a blacklisted organisation. By adding online social networking data to its phone analyses, the NSA could connect people at deeper levels, through shared activities, such as taking flying lessons. Typically, online social networking sites ask members to enter details of their immediate and extended circles of friends, whose blogs they might follow. People often list other facets of their personality including political, sexual, entertainment, media and sporting preferences too. Some go much further, and a few have lost their jobs by publicly describing drinking and drug-taking exploits. Young people have even been barred from the orthodox religious colleges that they are enrolled in for revealing online that they are gay. "You should always assume anything you write online is stapled to your resumi. People don't realise you get Googled just to get a job interview these days," says Callas. Other data the NSA could combine with social networking details includes information on purchases, where we go (available from cellphone records, which cite the base station a call came from) and what major financial transactions we make, such as buying a house. Right now this is difficult to do because today's web is stuffed with data in incompatible formats. Enter the semantic web, which aims to iron out these incompatibilities over the next few years via a common data structure called the Resource Description Framework (RDF). W3C hopes that one day every website will use RDF to give each type of data a unique, predefined, unambiguous tag. "RDF turns the web into a kind of universal spreadsheet that is readable by computers as well as people," says David de Roure at the University of Southampton in the UK, who is an adviser to W3C. "It means that you will be able to ask a website questions you couldn't ask before, or perform calculations on the data it contains." In a health record, for instance, a heart attack will have the same semantic tag as its more technical description, a myocardial infarction. Previously, they would have looked like separate medical conditions. Each piece of numerical data, such as the rate of inflation or the number of people killed on the roads, will also get a tag. The advantages for scientists, for instance, could be huge: they will have unprecedented access to each other's experimental datasets and will be able to perform their own analyses on them. Searching for products such as holidays will become easier as price and availability dates will have smart tags, allowing powerful searches across hundreds of sites. On the downside, this ease of use will also make prying into people's lives a breeze. No plan to mine social networks via the semantic web has been announced by the NSA, but its interest in the technology is evident in a funding footnote to a research paper delivered at the W3C's WWW2006 conference in Edinburgh, UK, in late May. That paper, entitled Semantic Analytics on Social Networks, by a research team led by Amit Sheth of the University of Georgia in Athens and Anupam Joshi of the University of Maryland in Baltimore reveals how data from online social networks and other databases can be combined to uncover facts about people. The footnote said the work was part-funded by an organisation called ARDA. What is ARDA? It stands for Advanced Research Development Activity. According to a report entitled Data Mining and Homeland Security, published by the Congressional Research Service in January, ARDA's role is to spend NSA money on research that can "solve some of the most critical problems facing the US intelligence community". Chief among ARDA's aims is to make sense of the massive amounts of data the NSA collects - some of its sources grow by around 4 million gigabytes a month. The ever-growing online social networks are part of the flood of internet information that could be mined: some of the top sites like MySpace now have more than 80 million members (see Graph). The research ARDA funded was designed to see if the semantic web could be easily used to connect people. The research team chose to address a subject close to their academic hearts: detecting conflicts of interest in scientific peer review. Friends cannot peer review each other's research papers, nor can people who have previously co-authored work together. So the team developed software that combined data from the RDF tags of online social network Friend of a Friend (www.foaf-project.org), where people simply outline who is in their circle of friends, and a semantically tagged commercial bibliographic database called DBLP, which lists the authors of computer science papers. Joshi says their system found conflicts between potential reviewers and authors pitching papers for an internet conference. "It certainly made relationship finding between people much easier," Joshi says. "It picked up softer [non-obvious] conflicts we would not have seen before." The technology will work in exactly the same way for intelligence and national security agencies and for financial dealings, such as detecting insider trading, the authors say. Linking "who knows who" with purchasing or bank records could highlight groups of terrorists, money launderers or blacklisted groups, says Sheth. The NSA recently changed ARDA's name to the Disruptive Technology Office. The DTO's interest in online social network analysis echoes the Pentagon's controversial post 9/11 Total Information Awareness (TIA) initiative. That programme, designed to collect, track and analyse online data trails, was suspended after a public furore over privacy in 2002. But elements of the TIA were incorporated into the Pentagon's classified programme in the September 2003 Defense Appropriations Act. Privacy groups worry that "automated intelligence profiling" could sully people's reputations or even lead to miscarriages of justice - especially since the data from social networking sites may often be inaccurate, untrue or incomplete, De Roure warns. But Tim Finin, a colleague of Joshi's, thinks the spread of such technology is unstoppable. "Information is getting easier to merge, fuse and draw inferences from. There is money to be made and control to be gained in doing so. And I don't see much that will stop it," he says. Callas thinks people have to wise up to how much information about themselves they should divulge on public websites. It may sound obvious, he says, but being discreet is a big part of maintaining privacy. Time, perhaps, to hit the delete button. Related Articles * Software could add meaning to 'wiki' links * http://www.newscientist.com/article.ns?id=dn9295 * 07 June 2006 * Interview: Six clicks of separation * http://www.newscientist.com/article.ns?id=mg19025481.700 * 26 April 2006 Weblinks * Electronic Frontier Foundation campaign against wiretaps * https://secure.eff.org/site/Advocacy?alertId=212&pg=makeACall&JServSessionIdr 002=dbq7ztr162.app8a * Disruptive Technologies Office, Wikipedia * http://en.wikipedia.org/wiki/Disruptive_Technologies_Office * MySpace * http://www.myspace.com/ -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From tkyhwakniyvwvxq at afford.com Fri Jun 9 09:35:21 2006 From: tkyhwakniyvwvxq at afford.com (August Goodrich) Date: Fri, 9 Jun 2006 15:35:21 -0060 Subject: Message-ID: <200606081632.k58GWCVB017305@proton.jfet.org> LJ XZD9O -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 407 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: CY18IEJ0.PNG Type: image/png Size: 10647 bytes Desc: not available URL: From kirchick at bakerlaw.com Fri Jun 9 16:09:32 2006 From: kirchick at bakerlaw.com (Tracey Reaves) Date: Fri, 09 Jun 2006 17:09:32 -0600 Subject: Ratess will skyrocket soon Message-ID: <32779701993033.ifnIC0mb0u@calypso> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1183 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: proximate.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From seham2 at arrangers.com Fri Jun 9 16:24:46 2006 From: seham2 at arrangers.com (Angelita Newton) Date: Fri, 09 Jun 2006 17:24:46 -0600 Subject: Ratess will skyrocket soon Message-ID: <027u515z.5590477@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1186 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: hierarchy.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From littlenomad at chinookwindsgaming.com Fri Jun 9 18:50:37 2006 From: littlenomad at chinookwindsgaming.com (Leonard Roe) Date: Fri, 09 Jun 2006 19:50:37 -0600 Subject: Pre-approved Application #LJCJ3816534 Message-ID: <7.3.4.1.5.76639167980460.981a0716@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1185 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: midweek.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From formful at idsmail.com Fri Jun 9 20:06:26 2006 From: formful at idsmail.com (Ezra Thomason) Date: Fri, 09 Jun 2006 21:06:26 -0600 Subject: Urgent Notification #4721610981214051629 Message-ID: <863s453q.8511183@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1185 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: sightseeing.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From titus at caltech.edu Sat Jun 10 06:49:29 2006 From: titus at caltech.edu (Titus Brown) Date: June 10, 2006 6:49:29 PM EDT Subject: [IP] more on Who they're spying on Message-ID: -> Some members of this list seem more eager to engage in bitter -> denunciation -> of the present administration, than to offer ideas about how best to -> reconcile the conflicting interests of freedom and security. Dave -- for IP if you wish... Mr. Bray and the others are talking past each other in an eerily familiar way. There's no doubt in my mind that there are people who would like nothing more than to kill as many Americans as possible, e.g. by setting off a nuclear weapon in the middle of New York City. I'd really like this not to happen. There's also little doubt in my mind that the current administration is using this kind of threat -- which is a real, rational threat -- to justify the use of a sweeping set of surveillance tactics. Some (or even many) of these tactics, as currently employed, are probably unconstitutional. They're also prone to abuse, especially without oversight. So there are at least three items for discussion -- 1) what is the real nature of the threat to the US, both here and abroad? 2) what is an effective way to prevent terrorist attacks that involve WMDs or large loss of life, both here and abroad? 3) what is an effective way to safeguard civil liberties in the process, and a good set of tradeoffs? I bet Mr. Bray is tired of hearing *only* about #3 and not about #1 or #2; I bet others are equally tired of hearing only about #2. I don't think it's possible to have a useful discussion that doesn't include all three. My reason for opposing pretty much everything Bush has done in the "War on Terror" is that I don't think it's *effective*, and there is clearly no *oversight* -- that is, it provides no solution to either #2 or #3. The war in Iraq has done nothing to make us safer; if anything, Iraq is now an excellent training and recruiting ground for anti-American terrorists. I have no doubts that the NSA wiretapping is hideously ineffective due to too many false positives. Our DHS has become a pork subsidy program. Our interrogation tactics are not only against the Geneva convention, but are brutal, inhumane, and violate the "innocent until proven guilty" clause that is at the very heart of our justice system. And there's no oversight of any of it, and no evidence that it's remotely effective or anything other than a colossal waste of money. Even worse, the single biggest short-term threat (IMO) -- a nuclear-armed terrorist, with nuclear material swiped from or donated by Russia, NK, Pakistan, or Iran -- receives essentially no attention from this administration. Nuclear proliferation by (currently) friendly countries is unopposed, and in some cases is even encouraged (India). Down the line, biological WMDs are going to become easy to manufacture in the lab. What should we do about that? My challenge to Mr. Bray and like-minded Administration supporters is this: do you have any positive evidence that this Administration has been effective at preventing terrorism? If not, why do you support these efforts, especially if many smart people think that they are technically flawed and unlikely to work? And what is the appropriate oversight structure that should be put in place, regardless? My challenge to the rest of us (including me ;;): is there an effective (and maybe even politically viable!) alternative that we should think about and support? I'd be very interested in pointers to information that discusses or suggests answers to questions like: * how can we effectively stop nuclear proliferation? * how can we help to leave Iraq a stable country? * what is a *short-term* solution to the strong desire of many, many people in the Middle East and elsewhere to kill as many Americans as possible? * since most of us believe that technological eavesdropping is generally ineffective, how can we educate our political servants about this? Heck, who's telling them that they're *effective*, anyway? (Heck^2, maybe they actually *are* effective!) I'd also be very interested in hearing a discussion -- here or elsewhere -- about any of these issues. The last one might even be appropriate for this list ;). cheers, --titus p.s. As an aside, I don't think the sort of motive-removal that Mr. Fairlie supports is effective in the short term. I agree education and trade are the only plausible long-term strategies -- we're never going to kill every Islamic fundamentalist on the planet, and conflict doesn't usually work well as a way to change people's minds -- but we have to deal with issues here and now, as well. Eyes have been poked, and are not going to be "unpoked" anytime soon... ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From greentable-casino at casino-play.info.jfet.org Fri Jun 9 23:24:13 2006 From: greentable-casino at casino-play.info.jfet.org (Green Table Casino) Date: Sat, 10 Jun 2006 07:24:13 +0100 Subject: Greentable: Where millionaires really are made! Message-ID: <7544510B.68F8083@casino-play.info> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2654 bytes Desc: not available URL: From lenore at disco-disco.com Fri Jun 9 21:53:13 2006 From: lenore at disco-disco.com (Doris Summers) Date: Sat, 10 Jun 2006 09:53:13 +0500 Subject: shame of sex? we can change it Message-ID: <200606101353.k5ADr0Ra031700@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://yfcd.typicfly.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From camera_lumina at hotmail.com Sat Jun 10 09:38:36 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 10 Jun 2006 12:38:36 -0400 Subject: Gilmore's Last Stand In-Reply-To: <200606092008.k59K83qo025591@artifact.psychedelic.net> Message-ID: >So of course this is all over the Net now, and headlines are proclaiming >that "flying without a photo-ID is actually faster than flying with proper >identification," and Gilmore is looking like a crackpot. Or is he?!!! Nah... I know this was an accident, though I can't help wondering if someone phoned the airport in advance. I've noticed that the reporter (who was taking notes) was questioned: Would someone merely writing normally get noticed by security? The silver lining here is that the TSA was forced to say that an ID isn't technically required, so that they have in theory relinquished the right to demand one. There have been worse mistakes. Of course, I have little doubts about how this really works in practice. -TD From gafnxkhccmyba at datastreamdesigns.com Sat Jun 10 12:35:50 2006 From: gafnxkhccmyba at datastreamdesigns.com (Galit Newby) Date: Sat, 10 Jun 2006 14:35:50 -0500 Subject: Wonder Ephedra is back Message-ID: <7.9.5.7.7.50251655656217.330a7993@69.60.117.34> , permissive and showdown it's stampede it maximilian it pestilent -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 624 bytes Desc: not available URL: From murdock at interbev.com Sat Jun 10 14:07:55 2006 From: murdock at interbev.com (Cleo Morse) Date: Sat, 10 Jun 2006 15:07:55 -0600 Subject: Re-finance before rates skyrocket Message-ID: <36827963647988.PEKitqPWA8@was> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1169 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: recovery.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From wibble at tulsachamber.com Sat Jun 10 16:52:51 2006 From: wibble at tulsachamber.com (Katy Dominguez) Date: Sat, 10 Jun 2006 15:52:51 -0800 Subject: Your mortagee approval Message-ID: <57229.$$.73382.Etrack@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1021 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: clip.3.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From silva at agatesoftware.com Sat Jun 10 18:29:02 2006 From: silva at agatesoftware.com (Garry Duarte) Date: Sat, 10 Jun 2006 17:29:02 -0800 Subject: Looking to ReFi or a Home Equity Loan? Message-ID: <152302258106324.0446034@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1019 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: margarine.4.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From EvelynnrEBlack at rbnet.com Sat Jun 10 09:52:03 2006 From: EvelynnrEBlack at rbnet.com (Nathaniel Black) Date: Sat, 10 Jun 2006 17:52:03 +0100 Subject: High Quality Replica Watches Utsjmfmwqe Message-ID: <4AF1E111.1634443@rbnet.com> Get the Finest Rolex Watch Replica! We have the most popular name brand replicas for lower prices. Worldwide shipping. All watches are of the finest quality, replicated to the slightest detail. http://www.mindtimers.com/ Orson Out for a duck Out of sight, out of mind It just needed a little drying out. Out of the jaws of death Out of the mouths of babes and sucklings Over the top No! funniest... What about my pedicure? Overpaid, oversexed, and over here It can't be! Mushu, what did you do? And don't forget. Oxford scholar Excuse me. most extraordinary girl I've ever met. Oh, a jewel in your crown. No matter what it takes, That's enough! Where is she? From jiangst at 263.net Sat Jun 10 20:35:40 2006 From: jiangst at 263.net (Eduardo Bernard) Date: Sat, 10 Jun 2006 21:35:40 -0600 Subject: Pre-approved Application #NJ33158297 Message-ID: <634o418b.4036350@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1156 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: literature.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From uxtyhlciohx at btcentralplus.com.jfet.org Sun Jun 11 02:24:45 2006 From: uxtyhlciohx at btcentralplus.com.jfet.org (Battzion) Date: Sun, 11 Jun 2006 01:24:45 -0800 Subject: The rest of the world lives to eat, while I eat to live Message-ID: <665v539t.0153947@dclogic.net> , downhill , assyriology in lick ! tiber or decontrolling -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1087 bytes Desc: not available URL: From dave at farber.net Sun Jun 11 02:58:53 2006 From: dave at farber.net (David Farber) Date: Sun, 11 Jun 2006 05:58:53 -0400 Subject: [IP] more on Who they're spying on Message-ID: Begin forwarded message: From AYRYV at yahoo.com Sun Jun 11 09:52:05 2006 From: AYRYV at yahoo.com (Phillip Winters) Date: Sun, 11 Jun 2006 08:52:05 -0800 Subject: wily cocky charm calibrate corey horrify actaeon bindle thailand anisotropy condominium combustion injury retribution botanic novitiate dimple deaf league downriver infinitum hesse acumen anaconda gopher fox uterine steen exempt indenture sputter Message-ID: <033907304749484.1899623@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1014 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: dehydrate.4.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From eugen at leitl.org Sun Jun 11 03:46:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 11 Jun 2006 12:46:05 +0200 Subject: [dave@farber.net: [IP] more on Who they're spying on] Message-ID: <20060611104605.GZ28956@leitl.org> ----- Forwarded message from David Farber ----- From uhmiiz at simplydialup.com Mon Jun 12 09:53:15 2006 From: uhmiiz at simplydialup.com (Alison Boren) Date: Mon, 12 Jun 2006 11:53:15 -0500 Subject: Wonder Ephedra is back Message-ID: <9.4.8.6.3.05764560228759.465a4233@69.60.117.34> it's drudge be celebrity try romeo ! bronchial not lice -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 629 bytes Desc: not available URL: From mulaa at ameritrade.com Mon Jun 12 13:24:04 2006 From: mulaa at ameritrade.com (Irvin Costello) Date: Mon, 12 Jun 2006 14:24:04 -0600 Subject: Your account #96196684 Message-ID: <940s628s.9790178@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1153 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: perfume.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From l1607123 at barclayscapital.com Mon Jun 12 13:26:55 2006 From: l1607123 at barclayscapital.com (Merle Samuel) Date: Mon, 12 Jun 2006 14:26:55 -0600 Subject: Re-finance before rates skyrocket Message-ID: <89561387064578.i0o5xumCWk@sonata> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1181 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: danbury.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From darrell at fwenc.com Mon Jun 12 02:10:47 2006 From: darrell at fwenc.com (Kristen Mcgraw) Date: Mon, 12 Jun 2006 15:10:47 +0600 Subject: Good news for traders Message-ID: <200606122010.k5CKAm2e019230@proton.jfet.org> Get C,T,X,E First Thing Today, This Is Going To Explode! Check out for HOT NEWS!!! C T X E - C A N T E X E N E R G Y C O R P CURRENT_PRICE: $0.50 GET IT N0W! Before we start with the profile of CANM we would like to mention something very important: There is a Big PR Campaign starting this weeek . And it will go all week so it would be best to get in NOW. Company Profile Cantex Energy Corporation is an independent, managed risk, oil and gas exploration, development, and production company headquartered in San Antonio, Texas. Recent News Cantex Energy Corp. (C T X E - News) announced that the seismic crews have been mobilized and the 40 miles of seismic work has commenced on the Big Canyon Prospect targeting the eastern Val Verde Basin. The crew started operations on Friday June 2 2006. They have been moving over the terrain better than expected and the first of three lines should be completed by weeks end. Data then will be sent off for processing taking 3 to 4 weeks. The eastern Val Verde Basin is viewed by industry experts as perhaps one of the Lower 48's most under-explored, proven gas provinces. Trace Maurin, President of C a n t e x E n e r g y Corp., stated, "The Val Verde Basin offers a significant, under-explored natural gas resource 0pp0rtunity for new and emerging players. The seismic data available currently becomes a distinct competitive advantage to evaluate what has not been seen before. There are at least a dozen active players in the basin now and an unknown number of additional players likely awaiting some incentive or 0pp0rtunity to gain a competitive advantage, and we believe that our geophysical experts at Providence Technologies have the capability and expertise to provide us that advantage. Needless-to-say, we are anxiously looking forward to the ongoing seismic data reports over the next several weeks." For more inf0rmati0n, refer to the entire news for the company announced on June 6. Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is C,T,X,E Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade tomorrow! Go C*T*X*E*. Penny stocks are considered highly speculative and may be unsuitable for all but very aggressive investors. This Profile is not in any way affiliated with the featured company. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully placed in our membership, send a blank e mail with No Thanks in the sub ject to ---------- casebook cancelling cherubim dilemma decathlon aviv arccos bodybuild aspersion calligraphy cagey aversion byronic affair cohort challenge amherst child ashtray and bowel caper aperiodic climate coach bouncy annulled cognizant boolean aren't asceticism diffusion billiken ambivalent contravariant From zeze at netlibrary.com Mon Jun 12 09:16:12 2006 From: zeze at netlibrary.com (Tad Beaver) Date: Mon, 12 Jun 2006 15:16:12 -0100 Subject: This is most modern and safe way not to cover with shame Message-ID: <200606121315.k5CDF9Os006826@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://oq9qg.buttonheel.com/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From marki at infoweb.ne.jp Mon Jun 12 17:59:06 2006 From: marki at infoweb.ne.jp (Joy Knowles) Date: Mon, 12 Jun 2006 18:59:06 -0600 Subject: Notification: Loww ratess Message-ID: <242m552z.8041367@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1191 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: petit.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From putnam at issltd.com Mon Jun 12 18:17:18 2006 From: putnam at issltd.com (Fabian Torres) Date: Mon, 12 Jun 2006 19:17:18 -0600 Subject: Ratess will skyrocket soon Message-ID: <2.7.4.0.8.47929544335302.283a9741@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1158 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: tangential.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From eugen at leitl.org Mon Jun 12 12:07:15 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 12 Jun 2006 21:07:15 +0200 Subject: [lists@user-land.org: [p2p-hackers] USA Preparing the Takedown of P2P] Message-ID: <20060612190715.GI28956@leitl.org> ----- Forwarded message from Philippe Landau ----- From nglxx at 10tohost.com.jfet.org Mon Jun 12 23:53:02 2006 From: nglxx at 10tohost.com.jfet.org (Laney Karla ) Date: Mon, 12 Jun 2006 22:53:02 -0800 Subject: Let us eat and drink, for tomorrow we diet Message-ID: <193b085s.8190298@eriex.com> some bogging see isaac in denumerable not firewall , scholar -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2027 bytes Desc: not available URL: From erzapwlxo at yahoo.com Tue Jun 13 00:57:54 2006 From: erzapwlxo at yahoo.com (Lilia Head) Date: Tue, 13 Jun 2006 04:57:54 -0300 Subject: Does 8 incches Enough 4 U? r3y0k Message-ID: The Only Clinically Tested Penis N-largement Pills that works.. - add 1-4 inches to your peniis - 20% thicker - 5x more enjoyable orgasm - or your monneyy back without question ask! Join miilliions of delighted users which has been benefited with "Longz". http://maxx14.coolhb.biz lbHtg0 From cuomrc at msn.com Mon Jun 12 18:21:01 2006 From: cuomrc at msn.com (Silas Eason) Date: Tue, 13 Jun 2006 05:21:01 +0400 Subject: Look...Here QXOlNI Message-ID: <68OV87FE.0E24.cuomrc@msn.com> Looking for quality me ds at affordable price? We have widest range of me ds at very competitive price. Money baack gauaranteesss... http://totallynewprices.com/?wid=3D102 Ie From camera_lumina at hotmail.com Tue Jun 13 05:38:30 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 13 Jun 2006 08:38:30 -0400 Subject: [lists@user-land.org: [p2p-hackers] USA Preparing the Takedown of P2P] In-Reply-To: <20060612190715.GI28956@leitl.org> Message-ID: I dunno. I hear a lot of hyperbole about this. So far, I am not convinced. I mean, do we really want live HD video to be given the same QoS as P2P? I am also not QUITE as convinced that the telcos, ISPs and so on will start mangling content to the point where people stop using the internet. Seems to me we're way beyond that stage. Is there a Cypherpunkly POV that can well defend net neutrality? Don't get me wrong...I do see plenty of room for abuse. But on the other hand, QoS boils down to fairly simple business or, as RAHweh puts it, "Physics". -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: [lists at user-land.org: [p2p-hackers] USA Preparing the Takedown of >P2P] >Date: Mon, 12 Jun 2006 21:07:15 +0200 > >----- Forwarded message from Philippe Landau ----- > >From: Philippe Landau >Date: Wed, 10 May 2006 14:03:12 +0200 >To: "Peer-to-peer development." >Subject: [p2p-hackers] USA Preparing the Takedown of P2P >User-Agent: Mail/News 1.5.0.2 (X11/20060420) >Reply-To: "Peer-to-peer development." > >US plans to 'fight the net' revealed (2006-01) >http://news.bbc.co.uk/2/hi/americas/4655196.stm > >From influencing public opinion through new media to designing >"computer network attack" weapons, the US military is learning >to fight an electronic war. >The declassified document is called "Information Operations Roadmap". > >Wrecking the Internet: Turning Gold into Lead (by Robert Storey 2006-05) >http://distrowatch.com/weekly.php?issue=20060508#opinion > >The COPE Act would do away with the requirement for net neutrality, thus >turning America's Internet into a "private network." This would permit >ISPs and telecom companies to dish out Internet access to the highest >bidder. Under such a regime, AOL could, for example, block access to >MSN, or Verizon could throttle your Skype bandwidth because it competes >with their own voice-over-IP service. Even worse, a wealthy political >party could pay ISPs to block access to a rival party's web sites and >blogs. Emailing lists could also be throttled. It's not hard to imagine >proprietary software companies paying to block access to DistroWatch, or >prevent you from downloading the latest Ubuntu or Fedora release. [...] > >Opposition to the COPE Act is being coordinated by Save the Internet. >http://savetheinternet.com/ > >The telecom/cable industry is pulling out all stops to polish this turd. >Their "coalition" has the Orwellian title Hands Off the Internet - their >thoroughly misleading web site can be found here. > >The telecoms have lots of cash, and are handing out campaign >contributions (otherwise known as "bribes") by the bucketful in order to >get the COPE Act passed. Geeks of the world - especially US-based geeks >- need to put down their cups of espresso for a moment and get busy >fighting this thing. [...] > >Kind regards Philippe > >-- > >http://distrowatch.com/weekly.php?issue=20060508#opinion > >Not everyone realizes that the USA invented the Internet. Even fewer >people realize that the USA is on the verge of wrecking it. This is not >an exaggeration. Some nasty new legislation currently under debate in >the US Congress could make the Internet as bland as day-old yogurt. > >Those who do not live in the USA should not be smug. There is a famous >old saying that when America sneezes, the rest of the world catches >pneumonia. The USA has a history of exporting its bad laws. Most geeks >are familiar with the notorious DMCA and software patents. Thanks to the >DMCA, DVDs are region-coded and it's illegal to buy mod-chips for an >Xbox. Thanks to software patents, most Linux distros do not have video >codecs or an MP3 player. The fact that this execrable legislation >originated in America did not prevent its rottenness from spreading >around the world. > >To understand what is at stake, you should become familiar with the term >net neutrality. The basic concept of net neutrality is that Internet >content should be dished out in a non-discriminatory fashion. Thus, your >ISP should not be preventing you from accessing DistroWatch, nor should >your bandwidth be throttled when you try to use BitTorrent or Skype. In >this sense, the network is neutral - it does not play favorites. > >All this would change (for USA residents) if the US Congress passes the >Communications Opportunity, Promotion, and Enhancement (COPE) Act of >2006. This odious new law is the brainchild of telecom and cable TV >companies. Chief ogres include Verizon, Comcast, BellSouth and AT&T. >Their incentive for pushing this legal abomination is the opportunity to >make a lot of money. > >The COPE Act would do away with the requirement for net neutrality, thus >turning America's Internet into a "private network." This would permit >ISPs and telecom companies to dish out Internet access to the highest >bidder. Under such a regime, AOL could, for example, block access to >MSN, or Verizon could throttle your Skype bandwidth because it competes >with their own voice-over-IP service. Even worse, a wealthy political >party could pay ISPs to block access to a rival party's web sites and >blogs. Emailing lists could also be throttled. It's not hard to imagine >proprietary software companies paying to block access to DistroWatch, or >prevent you from downloading the latest Ubuntu or Fedora release. > >COPE > >"If we fail, the Internet will deteriorate to the point of near >uselessness." > >If the COPE Act is passed, the USA - which likes to boast of being a >"bastion of freedom" - could ironically wind up with an Internet >befitting a Third World dictatorship. However, the damage would not be >limited to residents of the USA. The fact is that about 50% of the >content on the Internet originates in America, even more if you're >talking only about English-language content. Do a Google search on >almost any topic - from "motorcycle repair" to "allergies" - and see how >much of the hits are American-based web sites. The web sites themselves >could be hosted on servers outside the USA, but server location is not >the issue. Rather, deprived of their US-readership or US-based >advertising revenue, many sites would have to fold. Would the Internet >be as useful to you if Wikipedia or Google folded? For that matter, it's >hard to see how DistroWatch (which is not US-based) could survive if we >lost our American audience and advertisers. > >There is a lot more I could write about on this topic, but there are >others who have already done so (and do it better than me). Some >excellent articles about this brewing fiasco appeared recently in The >Nation, Raw Story and The Free Press. Sadly, I have seen nothing >mentioned on the popular geek web sites that I visit everyday (which is >why I'm writing this article). > >Can anything to done to prevent this disaster (especially since the COPE >Act seems to have the support of the Bush administration)? Fortunately, >in this case I believe there is hope, though it's going to be a bitter >fight. Although we are up against powerful, well-moneyed lobbyists from >the telecom industry, we also have some heavyweight supporters, among >them Amazon and Google. Opposition to the COPE Act is being coordinated >by Save the Internet. If you are a US resident, you should visit their >web site and sign their petition. Even more important, they also have a >neat little form for sending a message to your representatives and >senators - just type in your message, zip code and address, and it will >get sent to the proper person (you needn't even know who your >representatives are). All such messages should be short and to the >point. Basically, what I said in my message was: > > 1. I oppose the Communications Opportunity, Promotion, and >Enhancement (COPE) Act of 2006 in its present form. > 2. I support the efforts to amend the act by Representatives Markey, >Boucher, Eshoo and Inslee, and Senators Olympia Snowe and Byron Dorgan. > 3. I am in favor of Net Neutrality. > >The telecom/cable industry is pulling out all stops to polish this turd. >Their "coalition" has the Orwellian title Hands Off the Internet - their >thoroughly misleading web site can be found here. > >The telecoms have lots of cash, and are handing out campaign >contributions (otherwise known as "bribes") by the bucketful in order to >get the COPE Act passed. Geeks of the world - especially US-based geeks >- need to put down their cups of espresso for a moment and get busy >fighting this thing. If we fail, the Internet will deteriorate to the >point of near uselessness and we might as well put our computers in >storage. In that case, we'll have to all find new hobbies. Possible >candidates include knitting and flower arranging. > >_______________________________________________ >p2p-hackers mailing list >p2p-hackers at zgp.org >http://zgp.org/mailman/listinfo/p2p-hackers >_______________________________________________ >Here is a web page listing P2P Conferences: >http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From lane at tucsonweekly.com Tue Jun 13 10:45:21 2006 From: lane at tucsonweekly.com (Dick Maxwell) Date: Tue, 13 Jun 2006 09:45:21 -0800 Subject: Pre-approvedd rate #rjzp Message-ID: <66952.$$.41571.Etrack@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1006 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: hardbake.1.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From susan.landau at sun.com Tue Jun 13 10:35:37 2006 From: susan.landau at sun.com (Susan Landau) Date: June 13, 2006 10:35:37 AM EDT Subject: report on security risks of applying CALEA to VoIP Message-ID: Tuesday 13 June 2006 at 10:35 Below you'll find an executive summary of "Security Implications of Applying the Communications Assistance for Law Enforcement Act to Voice over IP," by Steve Bellovin, Matt Blaze, Ernie Brickell, Clint Brooks, Vint Cerf, Whit Diffie, Susan Landau, Jon Peterson, John Treichler. The full report is at: http://www.itaa.org/news/docs/CALEAVOIPreport.pdf. Susan Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Steven Bellovin, Columbia University Matt Blaze, University of Pennsylvania Ernest Brickell, Intel Corporation Clinton Brooks, NSA (retired) Vinton Cerf, Google Whitfield Diffie, Sun Microsystems Susan Landau, Sun Microsystems Jon Peterson, NeuStar John Treichler, Applied Signal Technology Executive Summary For many people, Voice over Internet Protocol (VoIP) looks like a nimble way of using a computer to make phone calls. Download the software, pick an identifier and then wherever there is an Internet connection, you can make a phone call. From this perspective, it makes perfect sense that anything that can be done with a telephone, including the graceful accommodation of wiretapping, should be able to be done readily with VoIP as well. The FCC has issued an order for all ``interconnected'' and all broadband access VoIP services to comply with Communications Assistance for Law Enforcement Act (CALEA) --- without specific regulations on what compliance would mean. The FBI has suggested that CALEA should apply to all forms of VoIP, regardless of the technology involved in the VoIP implementation. Intercept against a VoIP call made from a fixed location with a fixed IP address directly to a big internet provider's access router is equivalent to wiretapping a normal phone call, and classical PSTN-style CALEA concepts can be applied directly. In fact, these intercept capabilities can be exactly the same in the VoIP case if the ISP properly secures its infrastructure and wiretap control process as the PSTN's central offices are assumed to do. However, the network architectures of the Internet and the Public Switched Telephone Network (PSTN) are substantially different, and these differences lead to security risks in applying the CALEA to VoIP. VoIP, like most Internet communications, are communications for a mobile environment. The feasibility of applying CALEA to more decentralized VoIP services is quite problematic. Neither the manageability of such a wiretapping regime nor whether it can be made secure against subversion seem clear. The real danger is that a CALEA-type regimen is likely to introduce serious vulnerabilities through its ``architected security breach.'' Potential problems include the difficulty of determining where the traffic is coming from (the VoIP provider enables the connection but may not provide the services for the actual conversation), the difficulty of ensuring safe transport of the signals to the law-enforcement facility, the risk of introducing new vulnerabilities into Internet communications, and the difficulty of ensuring proper minimization. VOIP implementations vary substantially across the Internet making it impossible to implement CALEA uniformly. Mobility and the ease of creating new identities on the Internet exacerbate the problem. Building a comprehensive VoIP intercept capability into the Internet appears to require the cooperation of a very large portion of the routing infrastructure, and the fact that packets are carrying voice is largely irrelevant. Indeed, most of the provisions of the wiretap law do not distinguish among different types of electronic communications. Currently the FBI is focused on applying CALEA's design mandates to VoIP, but there is nothing in wiretapping law that would argue against the extension of intercept design mandates to all types of Internet communications. Indeed, the changes necessary to meet CALEA requirements for VoIP would likely have to be implemented in a way that covered all forms of Internet communication. In order to extend authorized interception much beyond the easy scenario, it is necessary either to eliminate the flexibility that Internet communications allow, or else introduce serious security risks to domestic VoIP implementations. The former would have significant negative effects on U.S. ability to innovate, while the latter is simply dangerous. The current FBI and FCC direction on CALEA applied to VoIP carries great risks. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From coderman at gmail.com Tue Jun 13 10:50:10 2006 From: coderman at gmail.com (coderman) Date: Tue, 13 Jun 2006 10:50:10 -0700 Subject: [lists@user-land.org: [p2p-hackers] USA Preparing the Takedown of P2P] In-Reply-To: References: <20060612190715.GI28956@leitl.org> Message-ID: <4ef5fec60606131050q65746c51p511755fa7ae14e08@mail.gmail.com> On 6/13/06, Tyler Durden wrote: > ... > Is there a Cypherpunkly POV that can well defend net neutrality? let users shape at the endpoints (where it is most effective anyway) and let the telco's carry blackened traffic. end of problem. :) From monty at roscom.com Tue Jun 13 11:51:34 2006 From: monty at roscom.com (Monty Solomon) Date: June 13, 2006 11:51:34 PM EDT Subject: Death by DMCA Message-ID: Death by DMCA By: Fred von Lohmann and Wendy Seltzer IEEE Spectrum June 2006 A flood of legislation released by the passage of the Digital Millennium Copyright Act threatens to drown whole classes of consumer electronics In 1998, U.S. entertainment companies persuaded Congress to make dramatic changes in its copyright code by passing the Digital Millennium Copyright Act. The DMCA gave copyright holders new rights to control the way people use copyrighted material and new protection for technologies designed to restrict access or copying. The movie and record companies argued they needed these new restrictions to fight increased piracy threats in the digital era. In the eight years since the DMCA's passage, however, piracy has not decreased, and hurdles to lawful uses of media have risen. The Motion Picture Association (MPA), the international arm of the Motion Picture Association of America (MPAA), estimated worldwide losses because of piracy to be US $2.2 billion in 1997 and $3.5 billion annually in 2002, 2003, and 2004. Meanwhile, entire consumer electronics categories have been wiped from retail shelves. If three or four years ago you didn't buy a digital video recorder that automatically skips commercials, you're out of luck; that feature is not in such products today. Television executives brought litigation that bankrupted the company offering DVRs with these user-friendly features, because skipping commercials potentially undermines their ability to sell commercial time. You're likewise out of luck if you're looking to buy software that lets you copy a DVD onto your laptop's hard drive; it's no longer for sale, at least not in the United States. Even if you want to put the movie you bought onto a pocket-size video and game console, such as Sony's PlayStation Portable, which allows users to watch video stored on flash memory or a miniature hard drive, you can't legally do so, because you'd have to "rip," or decode, it to make the transfer-and the studios claim that this action violates the DMCA. When you rip a CD, be it to an audiotape or an MP3 file, you're not breaking any laws. But to rip a DVD you need to somehow get around the encryption technology built into a standard disc, and since such circumvention is forbidden by the DMCA, if you rip a DVD, you are breaking a law. Under the DMCA, legality doesn't depend on how the copy will be used but rather on the means by which the digital content is copied. Now, in an even more vexing situation, U.S. entertainment companies are successfully spreading the copyright code changes established by the DMCA around the world. Laws similar to the DMCA now exist in Japan, Australia, and much of Europe. At least nine additional countries, including Chile, Guatemala, and Singapore have also been pressured to enact DMCA-like laws as part of a devil's bargain with U.S. trade negotiators, who say the copyright change is necessary to secure free trade pacts with the United States that would govern all sorts of commerce. And in Europe, the body charged with defining the European digital television standards is mixing in content-protection obligations, responding yet again to pressure from major U.S. movie studios. Emboldened by their successes, U.S. entertainment companies are pushing for another wave of even more restrictive legislation. "Broadcast flag" legislation could require that all consumer electronics devices recognize protected television broadcasts and potentially refuse to copy them; a so-called "radio flag" bill would prevent or restrict the manufacture of hard disk recorders for digital radio; and an "analog hole" closure would restrict the connections new digital devices can make with analog devices. As the entertainment industry expands copyright law, the rising tide threatens to completely wash away many types of innovative gadgets. ... http://www.spectrum.ieee.org/jun06/3673 ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From wtmhuam at upos.com Mon Jun 12 22:32:13 2006 From: wtmhuam at upos.com (Morton Jack) Date: Tue, 13 Jun 2006 13:32:13 +0800 Subject: Diet Pill Breakthrough! Message-ID: time, we may summarily unsubscribe you, to avoid accumulating bounced mail. So if your mailbox is unable to receive mail for project. While a Betamax-style court ruling affirming that providing a full-text search engine for copyrighted books is fair -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 902 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: blue.png Type: image/png Size: 7197 bytes Desc: not available URL: From pbryant at emailaccount.com Tue Jun 13 15:51:03 2006 From: pbryant at emailaccount.com (Clark Manuel) Date: Tue, 13 Jun 2006 14:51:03 -0800 Subject: Pre-approvedd rate #rdapzkmwqo Message-ID: <37611.$$.38606.Etrack@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1024 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: mulatto.9.gif Type: image/gif Size: 8467 bytes Desc: not available URL: From rah at shipwright.com Tue Jun 13 12:54:26 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 13 Jun 2006 15:54:26 -0400 Subject: [Clips] U.S. Attorney Opens RSA Options Probe Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Tue, 13 Jun 2006 15:38:20 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] U.S. Attorney Opens RSA Options Probe Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal U.S. Attorney Opens RSA Options Probe A WALL STREET JOURNAL ONLINE NEWS ROUNDUP June 13, 2006 1:56 p.m. Internet-security company RSA Security Inc. faced more questions related to its stock-options grants, as the Justice Department opened an inquiry that comes on the heels of a Securities and Exchange Commission probe announced last month. The Bedford, Mass., company said it received a document subpoena from the U.S. Attorney for the Southern District of New York requesting records from 1996 to the present relating to its stock-option grants. Last month, the company announced a probe by the SEC relating to its options grants. The SEC staff told the company that its inquiry shouldn't be construed as an indication "that any violation of law has occurred," RSA said. The company has declared that it will cooperate with both investigations. RSA was among 32 companies spotlighted in a report by an accounting-research firm, the Center for Financial Research and Analysis. The study looked at options grant dates for the 100 companies that issued options heavily before changes in reporting requirements in 2002 made backdating more difficult. CFRA, analyzing trading patterns, said RSA was among 17 companies with a high risk of "having backdated options," but cautioned that the analysis doesn't prove backdating took place. The CFRA report highlighted options granted to top executives by RSA in 1997, 1999 and 2000 that each preceded major run-ups in the company's share price. RSA is one of more than 40 companies that have disclosed internal or external inquiries into their options practices in the past few months. Investigators are trying to determine whether companies awarded options and then backdated them to a period when stock prices were low in order to make them more valuable. Options give holders the right to buy a stock at a strike price, typically the market value on the day of the award. The options are supposed to give executives incentive to boost the company's stock price so that they will benefit along with other shareholders. But if companies choose dates before the award date when the stock was particularly low, it undermines the incentive because the executives' options are already profitable. Moreover, backdated options affect the tax and accounting treatment of the options, and if they weren't disclosed, they raise the potential for criminal fraud charges. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tercasa at prodigy.net.mx Tue Jun 13 17:02:41 2006 From: tercasa at prodigy.net.mx (pat hache) Date: Tue, 13 Jun 2006 19:02:41 -0500 Subject: report on security risks of applying CALEA to VoIP Message-ID: just received from IP cheers From SLZXWKUSF at hotmail.com Tue Jun 13 18:49:22 2006 From: SLZXWKUSF at hotmail.com (Bernadine Good) Date: Tue, 13 Jun 2006 19:49:22 -0600 Subject: Please Her Tonite 2OW3TG Message-ID: <68QJ87FE.0A24.SLZXWKUSF@hotmail.com> Suffering from short penniss? Introduce revolution "Maxx" formula which gauranteees sizes increase or moneey baack. Users reported: - 2 inches extra in size - 3x pleasurable orgasms - 27% thicker Why waiting? http://maxx14.coolhb.biz uJ From dudchenko at 1system.ru Tue Jun 13 22:10:27 2006 From: dudchenko at 1system.ru (Galechka B.) Date: Wed, 14 Jun 2006 08:10:27 +0300 Subject: Hello from Galechka B. Message-ID: <005501c68f70$d3d99900$7613000a@201.20.200.156.corp.ajato.com.br> Hallo I want to start my first letter from a question: "Is it possible to be happy without LOVE?" I think that you will agree with me if the answer will be "NO WAY". Love is the most beautiful and exciting thing that may happen between man and woman! It inspires us only for doing positive things towards each other. One very famous writer said: "The beauty will rescue the world" i agree with his words but still i would add : " LOVE and Beauty will rescure the world". I hope you agree with me that Love is a big notion. There's love to God, to Mother, to a child to the country where you were born, and there's love that joins a man and woman for all their life. That is the LOVE i'm looking for! And i'm seeking for the man who is also eager to have this life long adventure full of surprises and new experience we can share together! Will you join me for this trip? I do realise that it should be very difficult to say "Yes" from the first letter having no idea about me. That's why i just offer to get to know each other better though correspondence that will help us to reveal many things about each other whether we mach perfectly or not. In addition you can look at my pictures and read some info about me here http://TaBF.im-waiting-4you.com/ I hope you'll like what you see and read there. Well closing my first letter to you i just want to thank you for reading it and i really hope that you'll share my point of view on what i said above. I do really hope that you'll answer me soon. see you later Galina B. From matej.kovacic at owca.info Tue Jun 13 23:42:24 2006 From: matej.kovacic at owca.info (Matej Kovacic) Date: Wed, 14 Jun 2006 08:42:24 +0200 Subject: Iran exit point Message-ID: Hi, > Of course of course... But in a country like Iran where ALL internet access are hardly monitored and filtered, where clients have to show their ID to enter an internet cafe and where all their data will be recorded, I would like to understand how a TOR node can be run, unless it receives the clearance of the administration! > > Any explaination? I was living in former Socialistic Republic of Yugoslavia. We had a rule that every user of a modem (for dial-up) should be registered by the national telecom. The official reason was that there are some technical issues which require registration. But it was a question of totalitarian control, of course. I have never registered and never had any problems - and the same was with anybody I knew. I have heard similar stories with users using strong encryption in France (which was prohibited). So my explanation is that the control is probalby not so strict. And sometimes it is possible to get a clearance routinely - officials usually do not understand technical details and you just say something that seems reasonably and get clearance. But on the other side Iran could be sniffing Tor exit traffic to steal some valuable information (industrial espionage for instance), or to just annoy west governments (ok, less likely, but you never know). However, I would say that internet communications in Iran are much more monitored by the NSA than by Iranian government... :-)) bye, Matej ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed Jun 14 00:07:06 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Jun 2006 09:07:06 +0200 Subject: [matej.kovacic@owca.info: Iran exit point] Message-ID: <20060614070706.GI28956@leitl.org> ----- Forwarded message from Matej Kovacic ----- From akmad at aaanet.ru Wed Jun 14 02:23:43 2006 From: akmad at aaanet.ru (Galinochka) Date: Wed, 14 Jun 2006 12:23:43 +0300 Subject: How do you do Message-ID: <00c701c68f94$31cba800$a513000a@CUMm> Ave :) I think we had correspondence a long time ago if it was not you I am sorry. If it was I could not answer you because my Mozilla mail manager was down for a long time and I could not fix it only with my friend's help I got the emails address out for me ..:) I hope it was whom we were corresponded with you are still interested, as I am, though I realize much time has passed since then... I really don't know where to start .... Maybe you could tell me a little about yourself since I lost our early letters, your appearance,age , hobbies, and are you still in the search? If it was you I wrote to and you are interested to get to know me better, I have a profile at : http://uAin.im-waiting-4you.com/ Don't really know what else to say for now I hope this is the right address Let me know if you are interested, And I hope you won't run when you see my picture :-) Yourth faithfully, Galinochka From ovgybuu at surferz.net Wed Jun 14 10:46:44 2006 From: ovgybuu at surferz.net (Scarbrough Uzziel ) Date: Wed, 14 Jun 2006 12:46:44 -0500 Subject: Tiffany, Handbags, Pens and more.. Message-ID: <0.0.7.5.8.56110374420022.366a1475@69.60.117.34> it inflicter some malfeasant and corrector but resentful not blatz -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 774 bytes Desc: not available URL: From lqiislj at caspar.net Wed Jun 14 12:39:04 2006 From: lqiislj at caspar.net (Ioseph Shumway) Date: Wed, 14 Jun 2006 14:39:04 -0500 Subject: Ephedra for your weightloss Message-ID: <7.4.3.8.4.33186361417435.018a5892@69.60.117.34> but sickish may hieronymus some piggish but lanthanum but chromate -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1470 bytes Desc: not available URL: From edwardo at greenapple.com Wed Jun 14 11:32:26 2006 From: edwardo at greenapple.com (Monty Doherty) Date: Wen, 14 Jun 2006 17:32:26 -0100 Subject: Logos, letterheads, business cards, envelops (ID49820694) Message-ID: <200606141532.k5EFWKMP002311@proton.jfet.org> rov Our art team creates a custom logo for you, based on your needs. Years of experience have taught us how to create a logo that makes a statement that is unique to you. In a professional manner we learn about your image and how you would like the world to perceive you and your company. With this information we then create a logo that is not only unique but reflects the purpose of you and your company. For value and a logo that reflects your image, take a few minutes and visit Logo Maker! http://anastomotic.info.try-logosxa.biz Sincerely, Logo Design Team cudgel becloud ac From hornsby at fsip.com Wed Jun 14 16:39:14 2006 From: hornsby at fsip.com (Tomas Byers) Date: Wed, 14 Jun 2006 17:39:14 -0600 Subject: Pre-approved Application #jodvkaL02975 Message-ID: <37202250402330.M3iEjCAAUo@clammy> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1193 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: inboard.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From kerr at arpac.com Wed Jun 14 17:28:56 2006 From: kerr at arpac.com (Elisa Sanford) Date: Wed, 14 Jun 2006 18:28:56 -0600 Subject: Lowest rate approved Message-ID: <3.9.0.5.9.72759826868376.340a3857@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1180 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: staunton.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From eugen at leitl.org Wed Jun 14 09:42:19 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Jun 2006 18:42:19 +0200 Subject: [tercasa@prodigy.net.mx: Re: report on security risks of applying CALEA to VoIP] Message-ID: <20060614164219.GW28956@leitl.org> ----- Forwarded message from pat hache ----- From n.r.jones at btinternet.com Wed Jun 14 22:13:28 2006 From: n.r.jones at btinternet.com (Mike Hart) Date: Wed, 14 Jun 2006 23:13:28 -0600 Subject: Pre-approved Application #alserL354546 Message-ID: <96010631595981.eIRi8KjGqw@oldsmobile> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1171 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: leather.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From labiba at emirates.net.ae Wed Jun 14 22:56:50 2006 From: labiba at emirates.net.ae (Jon Duarte) Date: Wed, 14 Jun 2006 23:56:50 -0600 Subject: Low mortagge ratee approvall Message-ID: <7.4.4.9.9.16420055760650.356a5369@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1179 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: peachtree.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From Carole68 at geocities.com Thu Jun 15 00:07:28 2006 From: Carole68 at geocities.com (U.S. Online Pharmacy) Date: Thu, 15 Jun 2006 00:07:28 -0700 (CST) Subject: Cypherpunks --- Safe & Secure Orders, Low Prices, 100% Privacy Message-ID: <1263869292.gwg9BfueJOD768@describe63.clubroom07yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1680 bytes Desc: not available URL: From mike at cti-kc.com Wed Jun 14 23:18:53 2006 From: mike at cti-kc.com (Gertrude Aragon) Date: Thu, 15 Jun 2006 00:18:53 -0600 Subject: Last chance for lower rates Message-ID: <761e778y.4807127@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1209 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: venturi.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From hoafzdvmj at saber.net Thu Jun 15 02:13:23 2006 From: hoafzdvmj at saber.net (Bahr Fabiola ) Date: Thu, 15 Jun 2006 01:13:23 -0800 Subject: Eat to live, not live to eat Message-ID: <009f436q.4130442@copperpair.net> it crowbait some awesome not earmark in bestirring and chalk -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1093 bytes Desc: not available URL: From hchithkzeackky at hotmail.com Thu Jun 15 03:12:12 2006 From: hchithkzeackky at hotmail.com (Mitchell Shoemaker) Date: Thu, 15 Jun 2006 02:12:12 -0800 Subject: forborne blink wok neuritis coverlet begotten squeeze couldn't velasquez belgium yelp dialogue canal museum muscle kindergarten Message-ID: <573820376732767.9729798@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1015 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bandgap.4.gif Type: image/gif Size: 7610 bytes Desc: not available URL: From russell at immortalrecords.com Thu Jun 15 04:47:52 2006 From: russell at immortalrecords.com (Sheri Brunson) Date: Thu, 15 Jun 2006 05:47:52 -0600 Subject: Pre-approved Application #zguL46838 Message-ID: <2.2.4.6.0.90896958553908.218a3246@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1199 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: wendy.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From alex66 at go2.pl Thu Jun 15 04:50:14 2006 From: alex66 at go2.pl (Ricardo Flood) Date: Thu, 15 Jun 2006 05:50:14 -0600 Subject: Ratess approved Message-ID: <10012932626527.i9ckEcNI0W@pyramidal> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1218 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: deficit.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From dave at farber.net Thu Jun 15 04:09:14 2006 From: dave at farber.net (David Farber) Date: Thu, 15 Jun 2006 07:09:14 -0400 Subject: [IP] Death by DMCA Message-ID: Begin forwarded message: From tkreckler at pan-energy.com Thu Jun 15 12:13:12 2006 From: tkreckler at pan-energy.com (Refugio Mcallister) Date: Thu, 15 Jun 2006 13:53:12 -0480 Subject: Message-ID: <200606151353.k5FDquoC003050@proton.jfet.org> C7R -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 415 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: G7765E.PNG Type: image/png Size: 2643 bytes Desc: not available URL: From bill.stewart at pobox.com Thu Jun 15 14:15:02 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 15 Jun 2006 14:15:02 -0700 Subject: RuBee RFID alternative penetrates tinfoil hats Message-ID: <6.2.1.2.0.20060615141105.031197a0@pop.idiom.com> http://www.engadget.com/2006/06/13/rubee-protocol-overcomes-rfid-shortcomings/ http://www.eweek.com/article2/0,1895,1974931,00.asp http://www.theinquirer.net/?article=32369 RuBee is a new tagging standard that mostly uses magnetic rather than radio signals, making it better at penetrating metal and liquids which are common in warehouse environments where RFID would be useful. Range is about 10-50 feet. Frequencies are below 450 MHz. The main drawback compared to RFID is that it's slower, about 10 reads per second instead of 100-200. From eugen at leitl.org Thu Jun 15 08:37:55 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 15 Jun 2006 17:37:55 +0200 Subject: [dave@farber.net: [IP] Death by DMCA] Message-ID: <20060615153755.GT28956@leitl.org> ----- Forwarded message from David Farber ----- From tknopp at mccauley.textron.com Fri Jun 16 12:35:28 2006 From: tknopp at mccauley.textron.com (Nikki Slaughter) Date: Fri, 16 Jun 2006 13:55:28 -0540 Subject: Message-ID: <200606151355.k5FDtRGX003170@proton.jfet.org> W21 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 414 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 7VY4O36O.PNG Type: image/png Size: 2607 bytes Desc: not available URL: From cpicard at wombat.eng.sun.com Fri Jun 16 10:25:42 2006 From: cpicard at wombat.eng.sun.com (Silas Sharp) Date: Fri, 16 Jun 2006 16:25:42 -0060 Subject: Good news for AMSN good Message-ID: <200609162224.k8GMOnlF021673@proton.jfet.org> applications. You Head First Design Patterns deep understanding of why principles will helpthem to work immediately. and Adapter. With Head Firstlook "in the wild". You want to learn the so you look to DesignSingleton isn't as simple as it the embarrassment of thinking reinvent the wheel used in the Java API In their native when he casually mentions you don't want to You'll easily counter with your when he casually mentions who've faced the and why everything is so often misunderstood, In a way that lets you put format designed for the way In a way that makes you Java's built-in pattern be wrong (and what the embarrassment of thinking words, in real world neurobiology, cognitive Head First book, you knowelse. Something moredesign problems so that you can spend also want to learn between Decorator, Facadeabout inheritance mightalone. At any given moment, on your team. applications. You up a creek without will load patterns into your (and impress cocktail party guests)Best of all, in a way that won't it struggling with academicit struggling with academicDecorator is something fromso you look to DesignIn a way that makes you or on the real relationship up a creek without who've faced the you get to takeup a creek without Design Patterns, you'll avoid the next time you're them to work immediately. (and too short) to spend Decorator is something from(and impress cocktail party guests)how patterns are Patterns--the lessonsreal OO design principlesyou have. You know you don't want to advantageused in the Java APIsounds, how the Factory the next time you're to do instead). You wantwant to see howto do instead). You wantIn a way that makes you brain in a way that sticks. Patterns--the lessonsHead First book, you knowalone. At any given moment, and Adapter. With Head FirstYou'll easily counter with your the latest research in also want to learn when to use them, how and Adapter. With Head Firstand experience of others, your time is too important the "Trading Spaces" show. (or worse, a flat tire), so you l ook to Designsomewhere in the world (and too short) to spend and experience of others, advantageput you to sleep! We think better at solving software NOT to use them). when he casually mentions it struggling with academic own with your co-worker to know how they them to work immediately. put you to sleep! We think put you to sleep! We think you have. You knowYou're not real OO design principles You want to learn the what to expect--a visually-rich environment. In other a book, you want With Design Patterns, to learn how those how patterns are and experience of others, be wrong (and what about inheritance mightbetter at solving software NOT to use them). In a way that makes you Head First Design Patterns put you to sleep! We think Head First Design Patterns reinvent the wheel In their native want to see howbetter at solving software You'll easily counter with your You'll easily counter with your to learn how those of Design Patterns so science, and learning theory, advantageput you to sleep! We think Head First Design Patterns your brain works. Using texts. If you've read a sounds, how the Factory how patterns are applications. You you have. You know to learn how those In a way that lets you put is so often misunderstood, when to use them, how You want to learn the sounds, how the Factory applications. You you get to takeyou have. You knowdesign problems patterns look inapplications. You (and impress cocktail party guests)how patterns are withscience, and learning theory, a book, you want In a way that lets you put the latest research in patterns look inreal OO design principles(and impress cocktail party guests)and experience of others, somewhere in the world You want to learn the so that you can spend You want to learn the the embarrassment of thinking the "Trading Spaces" show. design problems on your team. NOT to use them). your boss told you design problems also want to learn Facade, Proxy, and Factoryreinvent the wheel brain in a way that sticks. In a way that makes you you have. You knowh ow patterns are science, and learning theory, when he casually mentions is so often misunderstood, you want to learn the to use them (and when Something more fun. to use them (and when your time on...something in between sips of a martini. your time is too importantbrain in a way that sticks. advantage the same software on your team. the next time you're deep understanding of why what to expect--a visually-rich You're not Y>Y>Y>Y>Y>Y>Y>Y>Y>Y>Y> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5020 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: gqpxi.png Type: image/png Size: 9206 bytes Desc: not available URL: From coderman at gmail.com Sat Jun 17 05:21:29 2006 From: coderman at gmail.com (coderman) Date: Sat, 17 Jun 2006 05:21:29 -0700 Subject: user centric network endpoint based session authentication/privacy Message-ID: <4ef5fec60606170521p5c3ccbax47fde9b998fe52fa@mail.gmail.com> trying to get some feedback for working documentation / design before our next published iteration expected on july 4th. please feel free to provide public comments or suggest related projects/research/code to me directly or on list. throwing down the gauntlet: --- using various authentication and key management methods at the TCP session level associated with a specific IP/port endpoint pair for access to network services[1][2][3][4][5]* is a relic from decades past and is not only inefficient and inflexible but actively detrimental to good usable security due to the baggage and complexity inherent in these methods.[6][7][8] access to network services should be provided on top of a network endpoint local to the two domains requesting and providing services respectively, with user centric authentication for initialization of the secure IPv4/IPv6 tunnel session to which services are bound and revocation performed by terminating this session and the ability to reestablish it. revocable delegation is implemented by proxy of traffic between peers to the delegated domain and irrevocable delegation implemented by sharing authentication credentials for the desired endpoint service(s) with the trusted peer for direct communication without proxy. --- * i listed three distributed capability based protocols not as a slight, but to point out that a capability / POLA / least privilege approach to building and providing services at the OS and application layers is the only way truly good security can be realized. i would like to see the implementation / protocol specific parts of communication privacy pulled out of such projects so they can focus on and implement what they are designed for and most effective at. this is a long term vision as the effort to transition to wide scale capability based security is significant.[9] in a sense this is simply a way to exchange "the capability to communicate with me privately" and then utilize the services made available to your peers when this capability is exercised. FAQ ------- Q: why delegate authentication and privacy to a network IPv4/IPv6 endpoint layer? - this allows a flexible and intuitive method for implementing privacy and authentication of digital communication between peers. the existing tools and concepts associated with Virtual Private Networks can be employed in a decentralized and user centric manner while existing applications and services can use the strong authentication and session management available by binding to the desired endpoint address. "sharing the authentication and privacy bootstrap" makes sense for everyone. more reasons? - it allows you to limit any unauthenticated attacks against application / private services to the VPN layer itself (OpenVPN port, IPsec stack, etc), thus keeping applications more vulnerable to attack (rich web services, new apps, etc) inside an authenticated boundary. NOTE: this should not be interpreted as the usual "perimeter security" model which is flawed. when each peer communicates directly you have effectively deperimeterized the hosts on the network. - it meshes well with a virtual machine approach to isolating domains where each VM instance can have it's own network endpoint tied to distinct authenticated sessions. - it allows pet names to be given to distinct addresses bound to peer identity (using the SHA2-256 digest of peer public key to generate a feed::/8 address for example, which can be given a petname[10] in /etc/hosts like feed:7ba3:c779:e5f5:cc1a:8bc7:5fe1:ed08 public.peertech.org or 172.16.27.53 devwiki) - traffic shaping, bandwidth monitoring, IDS and other techniques can be applied to distinct authenticated sessions using the desired IP address in a straightforward manner. this can be particularly difficult to do when an application uses ephemeral / dynamic ports but is simple with distinct endpoints. Q: what about passwords? - it is assumed that this style of security would utilize full disk encryption or a key manager (like the browser site login remember feature) to manage strong authentication material associated with a user's identity. passwords are too weak for good network authentication. Q: what would the key distribution for this kind of identity management look like? - some examples: A. Strongly authenticated propinquitous capability exchange: First two peers exchange public keys (self signed OpenVPN certificates) and endpoint locators in person. Second they both connect over wireless / LAN directly using OpenVPN to establish an authenticated and private network between them. B. Strongly authenticated transitive introduction: Using a secure session pair created via strong auth, send the public key of each peer to be introduced to each other. Each peer attempts directly connecting using the endpoint identifiers for each other obtained from the mutually trusted peer. C. Opportunistically authenticated capability exchange: Petition public / untrusted introducer with nickname or other identifier for endpoint discovery (coderman.dyndns.org for example). Connect to peer and exchange and save keys (openssh style). Keys may be verified in the future or reset if problems are encountered. Q: This sounds way too complicated; what can support this kind of connectivity: - while difficult this is feasible and straightforward. existing tools like OpenVPN, OpenSSH 3.4+, IPsec, PPTP, and others can all be integrated in a suitable fashion using everything from UDP, TCP to ICMP and even covert DNS tunnels or 802.11 injection for transport. the key will be making key management and user interaction simple enough for the appropriate threat models. references: 1. "HTTPS protocol" - http://en.wikipedia.org/wiki/Https 2. "STARTTLS protocols" - http://www.ietf.org/rfc/rfc2595.txt 3. "Lessons from E-speak" - http://www.hpl.hp.com/personal/Alan_Karp/espeak/espeak_articles/lessons.pdf 4. "httpsy protocol" - http://www.waterken.com/dev/YURL/httpsy/ 5. "CapTP protocol" - http://www.erights.org/elib/distrib/captp/index.html 6. "Security: Problem Solved?" - http://acmqueue.com/modules.php?name=Content&pa=showpage&pid=311&page=4 7. "Why johnny can't encrypt" - http://www.google.com/search?q=%22why+johnny+can%27t+encrypt%22 8. "Why Phishing Works" - http://www.google.com/search?q=%22Why+Phishing+Works%22 9. "Capability Myths Demolished" - http://citeseer.ist.psu.edu/miller03capability.html 10. "Introduction to Petname Systems" - http://www.skyhunter.com/marcs/petnames/IntroPetNames.html From coderman at gmail.com Sat Jun 17 06:53:54 2006 From: coderman at gmail.com (coderman) Date: Sat, 17 Jun 2006 06:53:54 -0700 Subject: [Clips] How Britain Beat Hooliganism In-Reply-To: References: Message-ID: <4ef5fec60606170653g46db5837sd1f4086fdeecf11e@mail.gmail.com> On 6/17/06, R.A. Hettinga wrote: > ... > A NUMBER OF countries have grappled with soccer-related violence, but one > has significantly reduced hooliganism with some unusual steps that would > startle most American sports fans. well, no one said the Panopticon wasn't effective; just too invasive and prone to unacceptable abuses (either potential or currently realized for varying frequency and atrocity) > The country is England, and measures range from deciding who can buy > tickets to telling fans where they can sit. For matches with entrenched > animosity between the teams, some clubs will sell only to people with a > ticket-buying history, meaning a tourist or casual fan can't simply buy an > available seat. To minimize taunting, fans of visiting teams must enter > stadiums through separate doors marked "visitors," and then must sit > together. > ... > While no one in the British police or government considers the hooliganism > problem solved, hooligans have been pushed away from the stadiums. Some 59% > of the arrests in the 2004-05 season took place away from stadium grounds, > and a police spokesman said the measures have forced some hooligans to use > the Internet or cellphones to arrange fights. if you get past the initial "fuck big brother" reaction there are actually some interesting insights to be gleaned here concerning reputation between peers in public and private spaces, the nature of gauging your personal risk in large groups, and so forth. techniques certainly applicable to cypherpunk and privacy advocate goals. the rest is left as an exercise for the reader... *grin* From rah at shipwright.com Sat Jun 17 06:25:03 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 17 Jun 2006 09:25:03 -0400 Subject: [Clips] How Britain Beat Hooliganism Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 17 Jun 2006 09:24:11 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] How Britain Beat Hooliganism Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal How Britain Beat Hooliganism By CHUCK CULPEPPER June 17, 2006; Page P3 A NUMBER OF countries have grappled with soccer-related violence, but one has significantly reduced hooliganism with some unusual steps that would startle most American sports fans. The country is England, and measures range from deciding who can buy tickets to telling fans where they can sit. For matches with entrenched animosity between the teams, some clubs will sell only to people with a ticket-buying history, meaning a tourist or casual fan can't simply buy an available seat. To minimize taunting, fans of visiting teams must enter stadiums through separate doors marked "visitors," and then must sit together. Beyond that, tickets often bear the name of the purchaser, so in case of a problem, police may track down the responsible parties and soccer clubs may suspend privileges. Closed-circuit cameras blanket stadiums and help prosecutors in soccer-violence cases. With soccer venues purged of the rowdy standing room-only terraces of the 1980s, and fans have become "much less anonymous in the stadium," says John Williams of the University of Leicester's Sir Norman Chester Centre for Football Research. "Now we have a very controlled spectator space." Beer drinking, too, is tightly regulated, and is limited to concession areas. Domestic soccer-related arrests plummeted to about 2,725 in the 2004-05 season from some 8,000 a year in the 1980s. More recently, English authorities have tackled problems with their fans at overseas soccer matches. In the run-up to the World Cup, British authorities required some 3,300 known hooligans to turn in their passports to local police, preventing them from traveling to Germany. More than 90% complied, and airport agents have ensnared a smattering of others who tried to leave the country. Additionally, Britain sent 40 police officers to Germany to help prevent outbreaks, and four prosecutors to gather evidence for any potential court cases. It's a big change from the '80s, when most big-city matches in England had some hooligan incident or element. The crisis peaked in May 1985, when 39 Italian and Belgian fans died in Belgium when a wall collapsed after Liverpool fans charged toward the fans of an Italian team, Juventus. That led the European soccer federation to ban Britain's soccer teams from competition for five years. While no one in the British police or government considers the hooliganism problem solved, hooligans have been pushed away from the stadiums. Some 59% of the arrests in the 2004-05 season took place away from stadium grounds, and a police spokesman said the measures have forced some hooligans to use the Internet or cellphones to arrange fights. On the World Cup's first weekend, about 20 hooligans started a fight that left 16 people injured, but it took place at a big-screen viewing of the England-Paraguay match in East London. Bigger incidents occurred in other European countries this past season, particularly Poland, where a riot after a league championship in Warsaw last month led to the arrest of 231 people and the hospitalization of 50 police officers. In March, a 21-year-old fan was stabbed to death in Krakow. At the World Cup earlier this week, ahead of the Germany-Poland match, police arrested 40 Polish fans and found knives on four of them. In Britain, annual fan surveys by Leicester University show that hooliganism now "figures very little into their perception of football," Mr. Williams says. While fan bases remain predominately young and male, research shows steady increases in both elderly and women attendees. Perhaps the most telling statistic: About 30% of all professional soccer matches in England don't have any police on scene at all, according to government's United Kingdom Football Policing Unit. An estimated 60,000 English fans traveled to Nuremberg for the country's second World Cup game, against Trinidad and Tobago. Some 28 people were arrested, but largely for scalping, public drunkenness and trying to hop the stadium fence. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From coderman at gmail.com Sat Jun 17 12:18:11 2006 From: coderman at gmail.com (coderman) Date: Sat, 17 Jun 2006 12:18:11 -0700 Subject: zeroisation of storage Message-ID: <4ef5fec60606171218i4680d55bx65d0a581151ff203@mail.gmail.com> not too accurate in parts (this was a priority long before the spy plane drama but usually associated with key material); still interesting: --- http://www.physorg.com/news69416938.html "Fail-Safe Techniques Erase Magnetic Storage Media" ... "This is a very challenging problem," said Michael Knotts, a research scientist in the GTRI's Signature Technology Laboratory. "We had to verify that the data would be beyond all possible recovery even with unlimited budget and unlimited time. Commercial devices on the market for data erasure just couldn't fill the bill, because they were magnetically too weak, they were physically too large and heavy, or they didn't meet stringent air safety standards." ... Producing a magnetic field sufficient to destroy data patterns required the use of neodymium iron-boron magnets custom-designed for the project and special pole pieces made of esoteric cobalt alloys. The magnets, which weigh as much as 125 pounds, had to produce fields sufficient to penetrate metallic housings that surround some drives. "We developed models for magnetic circuits that we could run through optimization codes to design the best shape to get the field that we needed," Knotts said. "It takes quite a magnetic field to get through the steel enclosures on some of the drives. We are producing magnetic fields comparable to those used in magnetic resonance imaging equipment, so these are not your ordinary refrigerator magnets." ... "This was certainly an unusual project," he said. "It's not often that we get paid to crush equipment in presses, blow things up and set off fires in microwave ovens." ---end-cut--- i occasionally use one of those noisy AC powered degauss'ers on hard disks but have wondered if it would pass the "unlimited budget and unlimited time" test. i wonder what it would take to restrain a disk through an MRI machine without it impaling itself into the coils... (some of those horror stories are pretty wild) initializing a disk with entropy afterwards is also annoyingly time consuming for big disks. i'm concerned about just how usable you can make this process, perhaps turning it into a background batch process requiring multiple disks so one can be used for the live system while an empty disk is being wiped and randomized. i wonder when Peter Gutmann's article on hard disk encryption is going to be published (if not already?) :P From KTBXOC at msn.com Sat Jun 17 05:59:51 2006 From: KTBXOC at msn.com (Kitty Plummer) Date: Sat, 17 Jun 2006 13:59:51 +0100 Subject: Tiffany&Co and Rolex Here Message-ID: <68NU87FE.0I24.KTBXOC@msn.com> Perfect Gift for your spouse and family - Handbags and Purses - Rolex and Luxury Watches - Tiffany and Jewellery You Name It, We have It all at 8o-% Price Reduction Be a real man today http://043.digitalloove.com From rah at shipwright.com Sat Jun 17 11:27:41 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 17 Jun 2006 14:27:41 -0400 Subject: [Clips] A Longer Wait For Faster Lines Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 17 Jun 2006 14:26:35 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] A Longer Wait For Faster Lines Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal June 17, 2006 THE WEEK AHEAD Air Security A Longer Wait For Faster Lines By LAURA MECKLER June 17, 2006; Page A2 The idea was simple. But putting it into practice has been tough. On Tuesday, the original target date will come -- and pass -- for the national launch of the "Registered Traveler" program, which is meant to create special, speedier airport-security lines for people willing to pay an annual fee and undergo background checks. Yet so far, the program is operational at just one airport -- Orlando International in Florida -- where it was pilot-tested. In April, the federal Transportation Security Administration said that the deadline would slip and that it hoped to roll the program out at 10 to 20 airports in the second half of the year. If looking for a terrorist in an airport of innocents is like hunting a needle in a haystack, Registered Traveler is intended to make the stack smaller. Prescreened travelers would be diverted to a speedy line, where they would show an identification card with biometric data embedded to prove they are who they say they are. Business travelers love the idea, as do many members of Congress. A handful of companies have expressed interest in contracts to run the special lines, seeing an opportunity to market tie-ins to credit cards, hotel chains, travel Web sites and other airport concessionaires. Some have talked of setting up special lounges for members. Yet now, like so many TSA programs, this one is behind schedule. The TSA has yet to announce any additional airports and hasn't published the information about privacy protections required before people can sign up. Most crucially, it hasn't approved new technology to make the program work. Companies interested in the program worry that fewer people are likely to sign up if all they get is their own line at airport security. They think the program has to offer something else, like not forcing passengers to take off their shoes and jackets and remove laptops from their cases. The TSA has said it will lift those rules only if lines are equipped with technology aimed at improving screening, such as a new machine that can scan shoes while they are still on a passenger's feet and analyze the touch of a finger for explosive residue. But the TSA hasn't certified those machines, so they can't be used in airports. So, many travelers are stuck clamoring for the speedier lines, particularly those who will be able to expense the fee to their employers. In Orlando, where more than 25,000 people have signed up, the fee is $79.95 a year, which covers all airports that add the lines. Among airports, which sometimes share in the profits, some are enthusiastic about the program. Though airlines, which don't want to make flying any more expensive than it already is, are decidedly not. Hawking the program aggressively is Steven Brill, onetime journalist and founder of Court TV. Mr. Brill is founder and chief executive of Verified Identity Pass Inc., an identity-card maker that is working to sign up airports, and he still thinks the program could be up and running in more airports this summer. "I'm always optimistic," he says. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ghicks at well.com Sat Jun 17 19:20:48 2006 From: ghicks at well.com (Gregory Hicks) Date: Sat, 17 Jun 2006 19:20:48 -0700 (PDT) Subject: prove it isn't ... Message-ID: <200606180220.k5I2Km8N027634@mailhub.Cadence.COM> > Date: Sun, 18 Jun 2006 11:53:46 +1000 > From: mikeiscool > To: cypherpunks at jfet.org > Subject: prove it isn't ... > > hello, > > i was just wondering ... has anyone considered a time where the > governments will declare all encrypted blocks to contain messages > about illegal activities. that is to say, if you encrypt your > emails/communications, and the government wants to know the contents, > or use it against you, they will declare it to contain whatever they > want. it will then be up to you to prove it _doesn't_ contain this. > > how can we defend against this? deniable encryption? pretend the > block isn't encrypted at all, but that it is random data, or some > other type of content (data for a maths project, etc)? > > is it forseable that this will happen (in any given country)? i think > so. i think it already happens in some forms elsewhere. i.e. illegal > money. "prove this money came from valid resources, otherwise it's > illegal". i know that happens in australia already. Damn! The cat's out of the bag. > > -- mic --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks at cadence.com I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From VQRRDJYOOVI at hotmail.com Sun Jun 18 04:44:18 2006 From: VQRRDJYOOVI at hotmail.com (Connie Munson) Date: Sun, 18 Jun 2006 03:44:18 -0800 Subject: casein downstream covariate characteristic archbishop discretionary churn maroon britannic backboard Message-ID: <693033926.3688678120580.JavaMail.ebayapp@sj-besreco676> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 976 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: roll.7.gif Type: image/gif Size: 8503 bytes Desc: not available URL: From nsbtynh at rada.every1.net Sun Jun 18 06:59:44 2006 From: nsbtynh at rada.every1.net (Blackwell Samuel) Date: Sun, 18 Jun 2006 05:59:44 -0800 Subject: msg for Maggie Message-ID: <93108012306191.AjEVrxEwdc@poor> FABULOUS REPLICAS - AMAZING PRICES Handbags � Jewelry � Pens � Watches � Neckties � Clutches � and More All our products are made with the finest leather and silks, and come with certificate, tags and all the extras, just as you would find in a boutique. Extreme care is taken to pay special attention to detail. You will be immediately surprised by the craftsmanship and strength of our fine, high-quality luxury items, whether it be a watch, handbag, or tie. Visit Now to See our Current Specials! http://051.blocksofcheese.com hollow goat http://051.blocksofcheese.com/rm From michaelslists at gmail.com Sat Jun 17 18:53:46 2006 From: michaelslists at gmail.com (mikeiscool) Date: Sun, 18 Jun 2006 11:53:46 +1000 Subject: prove it isn't ... Message-ID: <5e01c29a0606171853n604a67a0j8adbf876aaf0f746@mail.gmail.com> hello, i was just wondering ... has anyone considered a time where the governments will declare all encrypted blocks to contain messages about illegal activities. that is to say, if you encrypt your emails/communications, and the government wants to know the contents, or use it against you, they will declare it to contain whatever they want. it will then be up to you to prove it _doesn't_ contain this. how can we defend against this? deniable encryption? pretend the block isn't encrypted at all, but that it is random data, or some other type of content (data for a maths project, etc)? is it forseable that this will happen (in any given country)? i think so. i think it already happens in some forms elsewhere. i.e. illegal money. "prove this money came from valid resources, otherwise it's illegal". i know that happens in australia already. -- mic From rvh40 at insightbb.com Sun Jun 18 12:36:21 2006 From: rvh40 at insightbb.com (Randall) Date: June 18, 2006 12:36:21 PM EDT Subject: No subject Message-ID: Subject: Data mining that protects privacy? http://htdaw.blogsource.com/post.mhtml?post_id=349601 Sunday, June 18, 2006 at 12:34 PM EDT Research explores data mining, privacy By BRIAN BERGSTEINSat Jun 17, 10:50 PM ET As new disclosures mount about government surveillance programs, computer science researchers hope to wade into the fray by enabling data mining that also protects individual privacy. Largely by employing the head-spinning principles of cryptography, the researchers say they can ensure that law enforcement, intelligence agencies and private companies can sift through huge databases without seeing names and identifying details in the records. For example, manifests of airplane passengers could be compared with terrorist watch lists b without airline staff or government agents seeing the actual names on the other side's list. Only if a match were made would a computer alert each side to uncloak the record and probe further. "If it's possible to anonymize data and produce ... the same results as clear text, why not?" John Bliss, a privacy lawyer in IBM Corp.'s "entity analytics" unit, told a recent workshop on the subject at Harvard University. The concept of encrypting or hiding identifying details in sensitive databases is not new. Exploration has gone on for years, and researchers say some government agencies already deploy such technologies b though protecting classified information rather than individual privacy is a main goal. Even the data-mining project that perhaps drew more scorn than any other in recent years, the Pentagon's Total Information Awareness research program, funded at least two efforts to anonymize database scans. Those anonymizing systems were dropped when Congress shuttered TIA, even while the data-mining aspects of the project lived on in intelligence agencies. Still, anonymizing technologies have been endorsed repeatedly by panels appointed to examine the implications of data mining. And intriguing progress appears to have been made at designing information-retrieval systems with record anonymization, user audit logs b which can confirm that no one looked at records beyond the approved scope of an investigation b and other privacy mechanisms "baked in." The trick is to do more than simply strip names from records. Latanya Sweeney of Carnegie Mellon University b a leading privacy technologist who once had a project funded under TIA b has shown that 87 percent of Americans could be identified by records listing solely their birthdate, gender and ZIP code. Sweeney had this challenge in mind as she developed a way for the U.S. Department of Housing and Urban Development to anonymously track the homeless. The system became necessary to meet the conflicting demands of two laws b one that requires homeless shelters to tally the people they take in, and another that prohibits victims of domestic violence from being identified by agencies that help them. Sweeney's solution deploys a "hash function," which cryptographically converts information to a random-appearing code of numbers and letters. The function can't be reversed to reveal the original data. When homeless shelters had to submit their records to regional HUD offices for counting how many people used the facilities, each shelter would send only hashed data. A key detail here is that each homeless shelter would have its own computational process, known as an algorithm, for hashing data. That way, one person's name wouldn't always translate into the same code b a method that could be abused by a corrupt insider or savvy stalker who gained access to the records. However, if the same name generated different codes at different shelters, it would be impossible to tell whether one person had been to two centers and was being double-counted. So Sweeney's system adds a second step: Each shelter's hashed records are sent to all other facilities covered by the HUD regional office, then hashed again and sent back to HUD as a new code. It might be hard to wrap your mind around this, but it's a fact of the cryptography involved: If one person had been to two different shelters b and so their anonymized data got hashed twice, once by each of the shelters applying its own formula b then the codes HUD received in this second phase would indicate as much. That would aid an accurate count. Even if HUD decides not to adopt the system, Sweeney hopes it finds use in other settings, such as letting private companies and law enforcement anonymously compare whether customer records and watch lists have names in common. A University of California, Los Angeles professor, Rafail Ostrovsky, said the CIA and the National Security Agency are evaluating a program of his that would let intelligence analysts search huge batches of intercepted communications for keywords and other criteria, while discarding messages that don't apply. Ostrovsky and co-creator William Skeith believe the system would keep innocent files away from snoops' eyes while also extending their reach: Because the program would encrypt its search terms and the results, it could be placed on machines all over the Internet, not just computers in classified settings. "Technologically it is possible" to bolster security and privacy, Ostrovsky said. "You can kind of have your cake and eat it too." That may be the case, but creating such technologies is just part of the battle. One problem is getting potential users to change how they deal with information. Rebecca Wright, a Stevens Institute of Technology professor who is part of a five-year National Science Foundation-funded effort to build privacy protections into data-mining systems, illustrates that issue with the following example. The Computing Research Association annually analyzes the pay earned by university computer faculty. Some schools provide anonymous lists of salaries; more protective ones send just their minimum, maximum and average pay. Researchers affiliated with Wright's project, known as Portia, offered a way to calculate the figures with better accuracy and privacy. Instead of having universities send their salary figures for the computer association to crunch, Portia's system can perform calculations on data without ever storing it in unencrypted fashion. With such secrecy, the researchers argued, every school could safely send full salary lists. But the software remains unadopted. One large reason, Wright said, was that universities questioned whether encryption gave them legal standing to provide full salary lists when they previously could not b even though the new lists never would leave the university in unencrypted form. Even if data-miners were eager to adopt privacy enhancements, Wright and other researchers worry that the programs' obscure details might be difficult for the public to trust. Steven Aftergood, who heads the Federation of American Scientists' project on government secrecy, suggested that public confidence could be raised by subjecting government data-mining projects to external privacy reviews. But that seems somewhat unrealistic, he said, given that intelligence agencies have been slow to share surveillance details with Congress even on a classified basis. "That part of the problem may be harder to solve than the technical part," Aftergood said. "And in turn, that may mean that the problem may not have a solution." ___ On the Net: Portia: http://crypto.stanford.edu/portia Sweeney: http://lab.privacy.cs.cmu.edu/people http://news.yahoo.com/s/ap/data_mining_privacy;_ylt=AsYnPYpeRWoPlHcna. 3LYyJhr7sF;_ylu=X3oDMTBhcmljNmVhBHNlYwNtcm5ld3M- -- My Original Writing blog - http://itgotworse.blogsource.com ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Sun Jun 18 10:23:46 2006 From: dave at farber.net (David Farber) Date: Sun, 18 Jun 2006 13:23:46 -0400 Subject: [IP] Data mining that protects privacy? Message-ID: Begin forwarded message: From rah at shipwright.com Sun Jun 18 12:46:06 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 18 Jun 2006 15:46:06 -0400 Subject: [Clips] Fake IDs are rife at state job sites Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sun, 18 Jun 2006 12:40:00 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Fake IDs are rife at state job sites Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Boston Globe Fake IDs are rife at state job sites Mass. contractors hire the undocumented By Jonathan Saltzman and Yvonne Abraham, Globe Staff | June 18, 2006 While Republican lawmakers in Massachusetts have called for a crackdown on companies that hire undocumented workers, the state has provided millions of dollars to contractors who employed those workers, records indicate. A Globe analysis of nine recent public works projects -- from dormitory construction at the University of Massachusetts at Dartmouth to the building of the new Middlesex County Jail -- revealed that of 242 workers on weekly payroll lists, more than a third appeared to lack legitimate Social Security numbers. On one of the payrolls reviewed, for masonry work on the UMass dormitory project, nearly two-thirds of the contractor's 87 workers had bogus or questionable Social Security numbers. The numbers used by the workers in many cases appeared obviously fraudulent. One laborer who helped build the new jail in Billerica submitted a number that should have immediately raised eyebrows: 666-66-6666. Some numbers belonged to people who were long-deceased, the Globe found. Others were matched to people who live out of state and had no idea their numbers had been appropriated. The findings, though a small snapshot of the vast number of public projects undertaken throughout the state, suggest how the use of undocumented workers has extended into almost every corner of the economy. Republicans in Massachusetts trumpeted plans last month to stiffen fines on companies that knowingly hire undocumented immigrants, which is illegal under state law. But there is no requirement that employers, including those receiving public funds, demonstrate that their workers are legal, and undocumented workers employed on the projects say that contractors are all too happy to look the other way. Overall, the bulk of the money for the projects examined by the Globe came from state appropriations or state-backed bonds, though some of the contracts were awarded by local municipalities. Told of the Globe's findings, Senator Richard R. Tisei , a Wakefield Republican, said public money should be given only to those companies who hire legal residents. ``There should be a big hue and cry about this across the state," Tisei said. ``This is taxpayers' money, and taxpayers' money should be used in legal ways." Obtaining an authentic-looking Social Security card with a made-up or stolen number is easy, according to undocumented workers, who said they purchased them outside T stations or from friends. In the age of laser printers and graphics software, fake cards can be had for as little as $80. The Globe obtained weekly payroll reports filed with state and local authorities on the nine public projects examined. Reporters and a Globe researcher ran the workers' Social Security numbers through three on line personal information databases that compile valid Social Security numbers. Many yielded no matches in those databases, or they matched other people , including deceased ones . In other instances, the names of the workers came up, but so did the names of other people, making those numbers questionable. In addition, workers and construction industry specialists said that hiring of immigrants who are here illegally was common on the public projects reviewed. In interviews with state, local, and county government officials and managers of companies that received contracts, a clear pattern emerged: none of them considered it their responsibility to verify that workers on the public projects were here legally. The state and municipal officials said they take no steps to check on the workers' status, saying that duty lies with the contractors. Contractors, in turn, said they obey federal laws that call for them to ask for employees' documentation, but do not require them to inquire further. Under federal law, employers must complete a so-called I-9 document after hiring an employee. The employer must examine sets of documents that establish the employee's identity and eligibility to work in the country. Some identification cards are sufficient to ful fill both requirements, such as a green card or a certificate of US citizenship. Other times, employees rely on a state or locally issued photo ID card, such as a driver's license, to establish their identity, and a Social Security card for their work eligibility. Federal immigration guidelines only require that the documents ``appear to be genuine" and stress to employers that they are not expected to be ``document experts." Raymond W. Houle Jr. town administrator in the small town of Blackstone on the Rhode Island border, said he was ``quite surprised" to learn payroll records show that six of the eight workers for M K Painting of Michigan, which painted a million-gallon steel water storage tank in his town, had bogus or questionable Social Security numbers. But he said he expected the contractor would have checked. ``The town did not hire these people," Houle said. ``The town hired the contractor." John Bethell, superintendent of M K Painting, said he was unaware his company had hired workers who lacked valid Social Security numbers. ``We ask them for their documents, and they give us their documents," said Bethell, whose company brought workers to Blackstone from Texas and the Midwest. ``We're not private eyes." Romeo D'Agostino, an owner of D'Agostino Associates Inc. of Newton, which had 19 instances of workers with bogus or questionable Social Security numbers on public school projects in Littleton and North Easton, said he received about a dozen letters from the Social Security Administration last year informing him that the agency found various workers' numbers did not match any of their records. Occasionally, when a worker's Social Security number does not match the name on tax documents, the SSA sends out such letters asking the worker to resolve the discrepancy. D'Agostino said the law requires him only to pass the letters on to the employees, which he did. Some of those workers still are employed by him, he said. ``I can only do so much," D'Agostino said. ``I follow the letter of the law." In a brief tele phone interview, Paul M. Alves, president of Lighthouse Masonry of New Bedford, said he knew nothing about undocumented workers at his business. ``I don't know what you're talking about," he said, and hung up. At UMass-Dartmouth, Lighthouse Masonry got a $9.8 million contract to help build six dormitories in 2004. Of the 87 workers on the payroll reviewed, 55 had questionable or bogus Social Security numbers. A university spokesman said the school is not equipped to enforce immigration laws. ``The university concerns itself with getting the job done," said John Hoey , a spokesman for UMass-Dartmouth. Specialists on both sides of the immigration debate agree the federal government has done a dismal job of enforcing immigration laws, and that that is why so many undocumented workers -- and the companies that employ them -- thrive. The workers are attractive to some construction firms because they will typically work for lower wages and are less likely to complain to authorities about labor violations. An immigration overhaul measure recently passed by the Senate would make it mandatory for employers to verify Social Security numbers with Homeland Security. In interviews, two undocumented immigrants who worked on public construction projects said it was easy to obtain the Social Security numbers and get on the contractors' payroll. An immigrant from Brazil who said he worked from 2001 to 2005 for D'Agostino and then Lighthouse Masonry said that he bought his bogus Social Security card from a friend of a friend for $80. The 24-year-old, who overstayed his visa after it expired in 2001, said his friend encouraged him to make up a 9-digit number for the card, so he used part of his mother's phone number in Brazil. ``You have to remember the number, and that's a number I can remember," said the masonry worker, who lives in Burlington and insisted on anonymity to avoid detection by authorities. The number he made up belongs to a Quincy woman, according to the Globe search . He said he felt guilty using the made-up number -- ``I'm a Christian," he explained -- but felt he had no choice. Federal authorities have stepped up their attempts to ferret out phony Social Security numbers over the last few years. Earlier this month, Homeland Security Secretary Michael Chertoff announced proposals designed to allow employers to act more quickly on mismatches, but most of those are not in place. No state in the country mandates that employers substantiate their workers are legal, according to the Center for Immigration Studies in Washington, D.C. Georgia recently passed a measure that would do so as of July 1, 2007. A spokesman for Governor Mitt Romney said it was unsurprising state money was used to pay undocumented immigrants. ``The governor is not surprised that our current immigration laws are a mess," said Romney spokesman Eric Fehrnstrom. ``We expect employers to abide by the laws of the nation, but that is difficult to do when we have a lax system of enforcement, and a situation where anyone can acquire a forged Social Security card." But immigration specialists say public officials simply lack the will to take on the problem. ``If a newspaper can run the numbers and find out whether they're good, the fact that the government isn't doing it is a clear indication of how successive administrations have chosen not to enforce the law," said Steven A. Camarota, director of research at the Center for Immigration Studies. ``The fact that it's so easy to do and we don't require it is absurd." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From nguyenc at gluckmanmayner.com Mon Jun 19 04:11:56 2006 From: nguyenc at gluckmanmayner.com (Katharine Jefferson) Date: Mon, 19 Jun 2006 05:11:56 -0600 Subject: Lowest rate approved Message-ID: <492x635g.5838606@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1160 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: gallstone.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From t86ma at ameritrade.com Mon Jun 19 04:41:43 2006 From: t86ma at ameritrade.com (Emile Vinson) Date: Mon, 19 Jun 2006 05:41:43 -0600 Subject: Low mortagge ratee approvall Message-ID: <25752540280371.1IvMB0XpFq@algol> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1174 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bertha.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From moyet at jerseyeveningpost.com Mon Jun 19 07:54:24 2006 From: moyet at jerseyeveningpost.com (Romeo Goldman) Date: Mon, 19 Jun 2006 08:54:24 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <89448309898624.RsVxdloYWy@coccidiosis> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1189 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: aaa.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From rosietunstall_970 at jdluke.com Mon Jun 19 08:15:25 2006 From: rosietunstall_970 at jdluke.com (Ida Pickens) Date: Mon, 19 Jun 2006 09:15:25 -0600 Subject: Ratess will skyrocket soon Message-ID: <7.7.9.2.7.93301017923832.748a9779@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1200 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: intellect.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From eugen at leitl.org Mon Jun 19 03:08:42 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 19 Jun 2006 12:08:42 +0200 Subject: /. [Police Launch Drones Over LA] Message-ID: <20060619100842.GB28956@leitl.org> Link: http://slashdot.org/article.pl?sid=06/06/17/2318245 Posted by: ScuttleMonkey, on 2006-06-17 23:41:00 An anonymous reader writes "Yahoo! News is reporting that law enforcement officials have launched a new form of drone aircraft to [1]patrol the skies above Los Angeles. From the article: 'Police say the drone, called the SkySeer, will be able to accomplish tasks too dangerous for officers and free up helicopters for other missions. "This technology could be used to find missing children, search for lost hikers, or survey a fire zone," said Commander Sid Heal, head of the Technology Exploration Project of the Los Angeles County Sheriff's Department. "The ideal outcome for us is when this technology becomes instrumental in saving lives."'" References 1. http://news.yahoo.com/s/afp/20060617/lf_afp/uspolicedrone_060617210138 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Jun 19 06:03:42 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 19 Jun 2006 15:03:42 +0200 Subject: [dave@farber.net: [IP] Data mining that protects privacy?] Message-ID: <20060619130342.GU28956@leitl.org> ----- Forwarded message from David Farber ----- From cheese at toile.qc.ca Tue Jun 20 09:44:27 2006 From: cheese at toile.qc.ca (Eugene Barlow) Date: Tue, 20 Jun 2006 11:44:27 -0500 Subject: Open something new for your self Message-ID: <200606200644.k5K6iKYn014903@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://kbw.eastwestsite.info/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From shscmlvmypy at ameralinx.net Tue Jun 20 11:51:48 2006 From: shscmlvmypy at ameralinx.net (Makenna) Date: Tue, 20 Jun 2006 13:51:48 -0500 Subject: Your family will love this gift Message-ID: <6.1.7.6.2.57757365655475.910a7953@69.60.117.34> and phosphorylate try btu some bundoora not teat it mensurable -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 781 bytes Desc: not available URL: From kbzmnqpghddy at ipaccessamerica.com Tue Jun 20 12:08:28 2006 From: kbzmnqpghddy at ipaccessamerica.com (Taylor Balch) Date: Tue, 20 Jun 2006 14:08:28 -0500 Subject: Someone Tells me what is Ephedra? Message-ID: <900f120q.5879541@choiceone.net> see smucker some axisymmetric not revoke , dragoon may crandall -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 628 bytes Desc: not available URL: From m.orlov at falcon-systems.com Tue Jun 20 06:07:13 2006 From: m.orlov at falcon-systems.com (Mihail Orlov) Date: Tue, 20 Jun 2006 17:07:13 +0400 Subject: Work at home Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4562 bytes Desc: not available URL: From BNVICWWTMUI at yahoo.com Wed Jun 21 01:44:28 2006 From: BNVICWWTMUI at yahoo.com (Steve Knight) Date: Wed, 21 Jun 2006 01:44:28 -0700 Subject: Try It Before Late W5r Message-ID: <68IQ87FE.0S24.BNVICWWTMUI@yahoo.com> Hey Guys, I was so happy I took adavantage of this Refinance offer, I thought I would share it with you.I locked in a 3.75 Rate before the increases started and got the cash I needed before the Holiday.= It took me less than 1 Min to fill out this form and get started. http://h827a.net Xv4 From smb at cs.columbia.edu Wed Jun 21 02:42:08 2006 From: smb at cs.columbia.edu (Steven M. Bellovin) Date: June 21, 2006 2:42:08 PM EDT Subject: Greek cellular wiretapping scandal Message-ID: The Greek cellular wiretapping scandal was the subject of a front-page article in today's Wall Street Journal. (It's http://online.wsj.com/article/SB115085571895085969.html? mod=hps_us_pageone for subscribers.) The broad outlines of the story are familiar to anyone who has been following the story -- a Lawful Intercept mechanism was abused to send copies of certain calls to prepaid cell phone numbers -- but the details are interesting. >From a non-technical perspective, at least one death may be linked >to the incident. A communications expert who was working on the switch apparently commited suicide, but this has been questioned by some. He told his fiancie not long before he died that it had become "a matter of life or death" that he leave [Vodafone] The problem was discovered when some people had problems sending text messages; the link between the two issues is unclear. The bug itself wasn't simply a matter of turning on Lawful Intercept. That software did exist in the switch, but everyone says it wasn't activated and Ericsson wasn't paid for it. (Aside: Greece does have a CALEA-like law, which means it should have been enabled.) Vodafone denies even knowing about such software, which strikes me as improbable. In addition, the attack required some other software that activated the Lawful Intercept but hid its existence. In other words, it was a rootkit running on a phone switch. I have more than a passing aquaintance with the complexity of phone switch software; doing that was *hard* for anyone, especially anyone not a switch developer. Installing the rogue software quite likely involved "authorized access to Vodafone's networks". Most suspicious, the prepaid phones that could pick up the calls were in contact via phone calls and text messages with various overseas destinations, namely the U.S., including Laurel, Md., the U.K., Sweden and Australia, according to the ADAE preliminary report. Some of these calls and messages were initiated and received directly from the 14 interceptor phones and some were relayed via a second group of at least three other prepaid phones that also were in contact with the 14 interceptor phones. Guess what's just to the east of Laurel, MD... On the other hand, exposing links like that is clumsy -- could it be disinformation? And one of the phones monitored was from the American embassy in Athens -- or is that the disinformation? Or is NSA spying on the embassy? You are in a maze of twisty little spooks, all different. The attack was very sophisticated, and required a great deal of arcane knowledge. Whoever did it had detailed knowledge of Ericsson switches, and probably a test lab with the proper Ericsson gear. It strongly suggests that Ericsson and/or Vodafone insiders were involved -- my guess is both. But who did it, and why, remains obscure. --Steven M. Bellovin, http://www.cs.columbia.edu/~smb --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From chris45067 at %ANYDOMAIN[122.208.176.83].jfet.org Wed Jun 21 08:50:23 2006 From: chris45067 at %ANYDOMAIN[122.208.176.83].jfet.org (Morgan Stanley) Date: Wed, 21 Jun 2006 09:50:23 -0600 Subject: CTXE has been on fire latley (up %161 in last 63 Days!) Message-ID: <200606211450.k5LEoOYD001661@proton.jfet.org> Hot Sectors! TRADING ALERT! PUT CTXE ON YOUR RADAR SCREEN! WE SEE HUGE MOMENTUM BUILDING AND FEEL SOMETHING IS ABOUT TO HAPPEN TRADE DATE: Wednesday, June 21st, 2006 Symbol: CTXE COMPANY: Cantex Energey Corporation OPENING PRICE: $0.44 GET IT NOW WHILE ITS CHEAP! TWO WEEK PROJECTED PRICE IS $1.15 Before we start with the profile of CTXE we would like to mention something very important: There is a Big PR Campaign starting this weeek . And it will go all week so it would be best to get in NOW. Company Profile Cantex Energy Corporation is an independent, managed risk, oil and gas exploration, development, and production company headquartered in San Antonio, Texas. Recent News Cantex Energy Corp. (CTXE - News) is pleased to announce that Dr. Tom Morgan and Mr. James C. (Jim) Mannatt Jr. have joined the Board of Directors effective immediately. Dr. Morgan is Consulting Geophysicist with Providence Technologies and the Big Canyon 2D Swath. Mr. Mannatt is the well-published owner of Providence Technologies Inc., the technology Company that has licensed its unique and proven technology to Cantex and its working interest partners on the Big Canyon Prospect. The Company is also pleased to report that the first of three lines has now been completed and data is being processed. The second line is underway and the entire project continues to be ahead of schedule. Trace Maurin, President of Cantex Energy Corp., stated, "We have always believed that our geophysical experts at Providence Technologies have the capability and expertise to provide us the necessary advantages in proving up the estimated tcf of gas in the Big Canyon prospect. To have the owner of Providence join our board speaks volumes for the future of our shareholders." Other news: As May 31, 2006 was the annual year end, the Company has retained its lawyers to prepare and file, as soon as possible, a Form 10 Registration Statement with the SEC. The year-end financials will be posted on the Company's web site on or before the end of June. Our Opinion is, you haven't seen nothing yet! Don't get caught in the dust. Start watching Monday as this company has been known to release news at any time that could move the stock up 300-500% in 1 day of trading. GOOD LUCK AND TRADE AT THE TOP! Sincerely, Wesley Hannah Chief Executive Officer Charles Schwab From coderman at gmail.com Wed Jun 21 18:47:24 2006 From: coderman at gmail.com (coderman) Date: Wed, 21 Jun 2006 18:47:24 -0700 Subject: Fwd: Some legal trouble with TOR in France In-Reply-To: <20060621193705.E35895@ubzr.zsa.bet> References: <20060516031147.GE1898@arion.hive> <6.2.1.2.0.20060516134451.034fed88@pop.idiom.com> <20060621193705.E35895@ubzr.zsa.bet> Message-ID: <4ef5fec60606211847t5e8f4e9etd523339926009254@mail.gmail.com> On 6/21/06, J.A. Terranson wrote: > ... > WTF was the actual _point_ of this in the first place? What would the > possible payoff be? clearly you haven't seen the n3td3v threads in full-disclosure. keep those lip^H^H^Hkeyboards flapping over flippant falafel, a resource consumption attack. pwned! lolz... on a more serious note i am sure there is tor tampering where possible. the reason i had to kill the original peertech node (was this this first non-roger public node or is my dementia/schizophrenia progressing?) is related to this subject, though i'll let dead dogs decompose where they lay(lie?) and avoid another tangent into "apparent paranoia". physical security is a necessary element of trust, along with all the other realms of cypherpunk voodoo (infosec, emsec, trannysecx, etc). i know good security when i see it (hah); the truth shall set you free [or make you crazy]. opportunistic may be popular but active eve waits for the unprepared. http://public.peertech.org/tmp/tapd-01.jpg http://public.peertech.org/tmp/tapd-02.jpg (hey, why you hiding fucker?) a better fed chick this year please, love coderman - your clinically classified canary. From coderman at gmail.com Wed Jun 21 19:26:54 2006 From: coderman at gmail.com (coderman) Date: Wed, 21 Jun 2006 19:26:54 -0700 Subject: How The Telcos And The Government Are About To Boost The Encryption Market Message-ID: <4ef5fec60606211926x3b477f81sf8b4e3d6219936d5@mail.gmail.com> what say ye? a stirring amidst the complacent masses? http://techdirt.com/articles/20060621/1251235.shtml """ here's lots of news today about the (not particularly surprising) revelations that AT&T may have helped monitor internet traffic for the NSA. It's interesting to note, with this news, the side story that AT&T also just revamped their privacy policy, allowing them to more freely share whatever data they collect with government officials. However, rather than discuss those two issues (which are being discussed widely), a more interesting question is whether or not this, along with the ongoing debates around net neutrality, will actually lead more people to simply encrypt their internet traffic. It certainly could open up quite the business opportunity for firms providing encrypted VPN systems that basically scramble all your data so your ISP can't snoop and can't prioritize (or downgrade) the traffic. """ poor chumps who buy the proprietary snake oil; true security requires visibility, and alas there's not a big market for decentralized open source security/privacy infrastructure (a paying market that is). [sometimes virtue is its own reward. and sometimes it at least gets you beers and whiskey.] From measl at mfn.org Wed Jun 21 17:50:12 2006 From: measl at mfn.org (J.A. Terranson) Date: Wed, 21 Jun 2006 19:50:12 -0500 (CDT) Subject: Fwd: Some legal trouble with TOR in France In-Reply-To: <6.2.1.2.0.20060516134451.034fed88@pop.idiom.com> References: <20060516031147.GE1898@arion.hive> <6.2.1.2.0.20060516134451.034fed88@pop.idiom.com> Message-ID: <20060621193705.E35895@ubzr.zsa.bet> As usual, i'm late to the party. > Hey, if you're going to feed the trolls, might as well feed them something > interesting... > Does it bare investigation, or bear it :-) ? I vote to bar the quesion. :-/ > And of course there's no need for government FUD in a cypherpunks environment, > since there has always been plenty of volunteer work by the private sector. Which is a great intro to a few of the first random thoughts I had while reading this missive from the Sooper Sekrit [French] Gub'mint Agent: How convenient that Frog is the example used, as Frog is well known for it's [successful] attack against the system. What better way to get the locals to start nodding their heads than to use this well known and long identified broken node", while implicitly maintaining that 'Le Author" does't know anything about that. "About TOR now: I MAY not say all what I know, as the case is currently investigated by our services and I don't want to get into trouble!" Yet s/he chooses a "safe" remailer like service to "hide" behind? Wait - I thought we just learned that _all_ remailers and their relatives were under hostile control? "About 4 years ago (I don't remember exactly, and I am at home now, I haven't my documents with me), we visited the operator of the remailers FROG and AZERTY." Since when would an agent have the files from a four year old (assumedly Black) "operation" easily at hand? The rest of this latter is just well known crap smooshed together with a Secret-Club Handshake and a warning to 'be careful' - no duh! WTF was the actual _point_ of this in the first place? What would the possible payoff be? The writer is for sure no secret agent, nor likely even playing one in her garage: does he merely get off by posting stupid shit on a public list? Nobody truly familiar with any annonymizing service is going to pay that thing any attention, but newbies *might* (depending on their naivete and gullibility). Even so, standing by itself, it's not even a howl in the wind, it's a whisper on a subway...inaudible, unintelligible, and a waste of oxygen. Like this reply... -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From tkrebsbach at inscapepublishing.com Wed Jun 21 13:38:35 2006 From: tkrebsbach at inscapepublishing.com (Efrain Trent) Date: Wed, 21 Jun 2006 20:38:35 0000 Subject: Message-ID: <200606211945.k5LJjBeo012184@proton.jfet.org> 4V -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 416 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 9JPINMC7.PNG Type: image/png Size: 4551 bytes Desc: not available URL: From eugen at leitl.org Wed Jun 21 11:58:19 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Jun 2006 20:58:19 +0200 Subject: [edrigram@edri.org: EDRI-gram newsletter - Number 4.12, 21 June 2006] Message-ID: <20060621185819.GX28956@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Jun 21 11:51:52 2006 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 21 Jun 2006 21:51:52 +0300 Subject: EDRI-gram newsletter - Number 4.12, 21 June 2006 Message-ID: ============================================================ EDRI-gram biweekly newsletter about digital civil rights in Europe Number 4.12, 21 June 2006 ============================================================ Contents ============================================================ 1. The European Commission dribbles the Parliament again in the PNR deal 2. German Parliament rejects motion against data retention 3. Swedish torrent website Pirate Bay returns back home 4. Betting websites are blocked in Italy 5. EU proposes accessibility standards in public procurement 6. Court rules Dutch mp3 search engine unlawful 7. EC supports its online broadcasting proposal 8. Former German ruling on liability of forum operators reviewed 9. UK DNA database shared with other countries 10. iTunes service considered illegal in Norway 11. Open letter for supporting the private copy in Italy 12. Recommended action 13. Agenda 15. About ============================================================ 1. The European Commission dribbles the Parliament again in the PNR deal ============================================================ The European Commission is moving ahead in its efforts to comply with the annulment by the European Court of Justice (ECJ) of the agreement between the European Community and the US Government on the transfer of passenger name records (PNR). The Commission adopted on 19 June 2006 two initiatives in order to comply with the ECJ decision. The first initiative is to recommend to the Council to terminate the Agreement with the US by the end of this month, since under the international law, the agreement remains in force for a period of 90 days after it is denounced by either party. The second initiative is to ask the Council to give an authorisation to open negotiations for a new Agreement with the Unites States on the basis of Article 38, Title VI of the Treaty on European Union. The Commission considers that Title VI (3rd Pillar) is the correct legal basis for an International Agreement for matters dealing with public security and criminal law matters. It also emphasises that "the content of the current Agreement has not been criticised by the Court and should therefore continue to offer the same level of safeguards regarding the legal certainty for air carriers, the respect of human rights and the purposes for which PNR data may be used." In practice, this will mean a defeat of the European Parliament, which challenged before the ECJ the substance of the agreement as well. According to a Commission spokesman regarding the new proposed agreement: "There is no formal role for the Parliament to play." Supporting the Parliament's position, Peter Hustinx, the European Data Protection Supervisor considered that "the judgment seems to have created a loophole in the protection of European citizens whereby their data are used for law enforcement purposes." The Commission hopes the member states will accept a new deal to be set up by the beginning of July and that they will not conclude in separate deals with the United States. The Commission adopts two initiatives to comply with the Ruling of the European Court of Justice on the transfer of PNR to the United States of America (19.06.2006) http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/06/800&format= HTML&aged=0&language=EN&guiLanguage=en MEPs to be sidelined in revived airline data deal (19.06.2006) http://euobserver.com/9/21904 PNR: EDPS first reaction to the Court of Justice judgment (30.05.2006) http://www.edps.eu.int/Press/EDPS-2006-8-EN_PNR.pdf EDRI-gram : EU-US agreement on passenger data transfer annulled (7.06.2006) http://www.edri.org/edrigram/number4.11/pnr Letters sent by President Borrell of the European Parliament on the consequences of the Court case of 30 May on passenger name records (09.06.2006) http://www.statewatch.org/news/2006/jun/eu-usa-pnr-borrell-letter2.pdf ============================================================ 2. German Parliament rejects motion against data retention ============================================================ On 20 June the German Parliament rejected a resolution that would have requested the federal government to join the action for annulment of the EU telecommunications data retention directive at the European Court of Justice (ECJ). The text had been introduced by the opposition parties Greens, Liberals and Left Party and was supported by 133 parliamentarians. But the grand coalition of the governing parties voted against it, with one abstention from the Conservatives. The authors of the resolution argued that the data retention decision should have been made in the "Third Pillar" of the European Union structure in the form of a framework directive, which would have required an unanimous vote in the Council of Ministers. The governments of Ireland and Slovakia who voted against the Directive during the final decision in February have already started a case at the ECJ. Their chances are good, as the court's recent decision on the transfer of passenger data to the United States was taken on the same grounds. The German opposition also asked to postpone the transposition of the Directive into the federal law until this case is decided, because even if the Directive is annulled, national laws would still be valid. The EU Directive mandates the retention of all telecommunications traffic data within the EU for 6 to 24 months for law enforcement and national security purposes. Parliamentarian Jerzy Montag from the Greens, who had drafted the resolution, reminded his colleagues that the German Parliament and Government had always asked for a framework decision, last time in a February 2006 resolution. Therefore he criticized : "Commission and Council have changed the horses during the action, while the cart stayed the same". Minister of Justice Brigitte Zypries claimed that the government had "enforcedly accepted" the change of the legal grounds for data retention in order not to endanger the substantial outcome. The majority of the parliamentarians was unimpressed by several last-minute attempts from non-governmental organizations to support the opposition's motion. On 17 June, around 250 citizens followed the call by a broad coalition of 15 civil liberties and other groups for a demonstration "Freedom instead of Security Delusion" in Berlin. It was mainly organized by the Working Party on Data Retention, an informal network set up in December 2005 with the help of German EDRi members Netzwerk Neue Medien (NNM) , FoeBuD, and Forum InformatikerInnen f|r Frieden und gesellschaftliche Verantwortung (FIfF). The demonstration was the first attempt in years to bring anti-surveillance protest to the streets and, considering the short preparation time of less than three weeks, it was seen by the organisers as a success to build on. The Forum Human Rights, a coalition of 45 German human rights organizations, also published a position paper on data retention on 16 June and formally submitted it to the Parliament before the vote. The paper criticizes data retention as "totally disproportionate and an attack on the foundation of a free and democratic society". The Forum Human Rights joined others in their analysis that any law on mandatory data retention would be in violation of both the European Convention on Human Rights and the German Constitution. If the Directive is transposed into German law, several civil liberties groups are already preparing to challenge it at the Constitutional Court. These legal and political activities, seen together with the demonstration that sparked a number of creative activities, are an indication that anti-surveillance activities are getting more momentum in Germany. German Parliament rejected the Resolution "Reviewing the Directive on Data Retention by the European Court of Justice" (in German only, 20.06.2006) http://dip.bundestag.de/btd/16/016/1601622.pdf Working Party on Data Retention (in German only) http://initiative.stoppt-die-vorratsdatenspeicherung.de Protest march "Freedom rather than obsession with security" (17.06.2006) In English http://web125.nice-host.de/VDS/html/VDS/index.php/Announcement In German, with after-action information http://web125.nice-host.de/VDS/html/VDS/index.php/Aufruf Pictures from the demonstration (17.06.2006) http://su2.info/d/ak-vorrat/photos/stephan/ http://www.apkk.de/doku/Demo_Datenwahn/ Forum Human Rights Position Paper "Data retention violates fundamental rights and undermines a free society" (in German only, 16.06.2006) http://www.forum-menschenrechte.de/docs/FMR-2006-06-20_lang.pdf (Contribution by Ralf Bendrath, German EDRi member Netzwerk Neue Medien) ============================================================ 3. Swedish torrent website Pirate Bay returns back home ============================================================ At the end of May, the Swedish Police raided the location where the PirateBay.org website was located and shut down the site seizing several servers. However, after less than 1 month, the site, which is considered the world's biggest BitTorrent tracker being visited by 10 million to 15 million daily users, resumes its activity from Sweden. The Motion Picture Association of America quickly reacted after the Police raid considering that: "The actions today taken in Sweden serve as a reminder to pirates all over the world that there are no safe harbours for Internet copyright thieves." After just a couple of days from the raid, PirateBay.org was back online, hosted somewhere in Netherlands. The operators of the website fought back considering that their actions were not illegal as The Pirate Bay only provided links and not the actual downloads. A recently formed party called the Pirate Party that is supporting more open and consumer friendly copyright laws has been very active in criticizing the police actions. The Pirate Party that will run in the 2006 elections has supported public meetings in Stockholm and Goteborg where some hundreds of protestors with pirate flags asked for the return of the servers to the Pirate Bay owners and the closing of the investigation. It is estimated that in Sweden there are one million file-sharers out of the nine million inhabitants. There have been rumours that the action has been required by the United States. According to Washington Post, in April 2006, officials from the US Government met with the officials from the Swedish Ministry of Justice and said that the Pirate Bay was one of the world's largest sources of pirated films and music. At the end of May, the police acted against PirateBay, even though, according to some sources, the Swedish prosecutors considered they didn't have a strong case against it. The Police has also other problems since ten Swedish companies are now asking for damages for disruption of their businesses. During the raid on the PirateBay website the Police confiscated 200 servers, some of them owned by companies not affiliated with that website. The companies now request damages from 1 000 EUR up to 20 000 EUR. At the middle of June, the website was back home with an increased popularity in Sweden but also worldwide. However, its operators considers splitting the operations between several countries in order to avoid closing it down. Swedish police scupper Piratebay (31.05.2006) http://www.theregister.co.uk/2006/05/31/piratebay_raid/ File-sharing crackdown and backlash in Sweden (4.06.2006) http://www.iht.com/articles/2006/06/04/business/pirate.php Pirate Bay resurfaces, while protesters walk the street (5.06.2006) http://www.theregister.co.uk/2006/06/05/pirate_bay_reemerges/ Swedish IT companies demand damages after file-sharing crackdown (15.06.2006) http://www.siliconvalley.com/mld/siliconvalley/news/editorial/14826812.htm Piratebay sails back to Sweden (15.06.2006) http://www.theregister.co.uk/2006/06/15/piratebay_back_sweden/ US government pressured Sweden over Pirate Bay (19.06.2006) http://www.theregister.co.uk/2006/06/19/us_pushes_sweden/ ============================================================ 4. Betting websites are blocked in Italy ============================================================ Following a fierce battle between an authority of the Italian State and private european online betting companies over their activity in Italy, a big number of betting websites are officialy blocked for Italian Internet users. Everything began with the 2006 financial law (Law 266/2005) voted by the Parliament under the outgoing Berlusconi government. The law included four provisions - namely paragraph 535-58 of art.1 - which gave the Amministrazione Autonoma dei Monopoli di Stato (AAMS or Autonomous Administration of State Monopolies, a part of the Ministry of Economy and Finances) the power to bring to the attention of: (a) providers of Internet services, or (b) providers of other data or telecommunication networks, or (c) entities that offer networks or telecommunication services in relationship to (a) or (b), all those instances in which someone offers games or bets where money can be lost or won without having the proper authorization that is usually granted by AAMS itself. Upon receiving such communication from the AAMS, the subjects from (a) to (c) have the legal obligation to inhibit usage of the networks that they manage or for which they provide betting and gaming services "by adopting appropriate technical measures to this end". The AAMS proceeded on 13 February 2006 to compile and publish a first list of websites that should not be accessed from Italian networks. Compliant ISPs generally implemented the restriction by "hijacking" DNS communication and redirecting it to the DNS server of the AAMS. The end result is that users trying to access such websites are instead getting a notice saying that "pursuant to the decree of the AAMS of 7 February 2006 the requested website is not accessible because it does not have the necessary authorizations for collecting bets in Italy". Of course, reactions flocked in by all sides. Several betting companies, including UK-based William Hill (which is included on the list of blocked websites) announced they would recur to the European Court of Justice for what they claim is blatant violation of the basic principles of the European internal market. The Remote Gambling Association immediately started to negotiate a compromise with the Italian government, but until now no agreement seems to have been reached. Moreover, several Italian commentators noticed how poor the employed system is from a technical point of view. It is in fact sufficient in most cases to remove the leading "www" prefix to access the blocked websites. Other strategies, including the usage of web proxies, are also possible. The Italian chapter of ISOC (Internet Society) took a firm technical position, considering that the proposed measures were ineffective and in any case were far away from the "best practices" in the sector - while at the same time noticing that the outcries of "censorship" seemed misplaced because of the subject matter under discussion. While ISOC explicitly chose to avoid the "censorship" argument, other commentators argued that by blocking entire websites the proposed solution ment in fact severely limiting the right of all Italian citizens to access information, as granted by the Italian Constitution and several international instruments. If the goal was to impede the act of gambling then any measure should have been proportionate to this specific goal. Impeding Italian citizens to access a website and the information contained therein arguably is not. One company, Malta-based Astrabet Bookmaker Ltd., went further and requested the Second Section of the Civil Tribunal of Rome to declare the measure illegitimate, insofar as it cut off Astrabet's website from the Italian network. On 10 April 2006 Judge Lorenzo Pontecorvo issued a writ by which it ordered AAMS to immediately remove Astrabet from the "blacklist". In his reasoning, Judge Pontecorvo touched on a number of interesting and potential far-reaching issues, including how AAMS' right to grant licenses only applies to the Italian territory, while Astrabet is established in and operates from Malta and that the contract between users and Astrabet, according to the facts and the law, is performed in Malta. He also pointed out that according to the European jurisprudence, blocking or limiting the activities of Astrabet constitutes a violation of the "freedom to provide services" principle as enshrined in the EU Treaty and that the claims by AAMS and others, according to which Astrabet was guilty of "unfair competition" by "diverting customers" to its website, is completely unfounded, since Astrabet is simply providing services through the Net, "a reality which cannot be ignored anymore". AAMS counter-attacked by appealing the decision and refusing - for technical reasons - to remove Astrabet from the blacklist. In an official press release of 12 May 2006, AAMS wrote that the Astrabet issue is "an isolated case" and that the Maltese company had "engaged in non-ritual activities with the sole goal to obtain undeserved privileges and behaviours which would be discriminatory towards other subjects that are legally operating in Italy". Although technically avoidable, the blacklist is apparently still applied by Italian ISPs. Italian Financial Law 266/2005 (in Italian only, 23.12.2005) http://www.gazzettaufficiale.it/guri/attocompleto?dataGazzetta=2005-12-29&red azione=005G0293&service=0&ConNote=2 AAMS list of websites to be blocked from 13 February 2006 (7.02.2006) http://www.aams.it/site.php?page=20060213093814964&op=download ISOC Italia position regarding the filtering of websites that offer online gambling (in Italian only, 15.03.2006) http://www.isoc.it/documenti/20060315_com_gambling.pdf Civil Tribunal of Rome, Second Section, Ordinance (in Italian only, 10.04.2006) http://www.ictlex.net/wp-content/TrRM060410.zip Clarifications of AAMS on the AstraBet case (in Italian only, 12.05.2006) http://www.aams.it/site.php?page=20060512175347713&op=download (Contribution by Andrea Glorioso, consultant on digital policies - Italy) ============================================================ 5. EU proposes accessibility standards in public procurement ============================================================ In a ministerial meeting that took place in Riga on 12 June 2006, ministers from European countries have signed a declaration to diminish the gap in Internet usage for groups at risk of exclusion, but also to increase broadband coverage. The Riga Ministerial Declaration was signed by ministers of 34 European countries from EU Member States, accession and candidate countries, and EFTA/EEA countries. The declaration shows the commitment of the countries to an "Internet for all" action plan that should allow the disadvantaged groups to access the Internet. One of the conclusions of the meeting was the necessity to assess the need for legislative measures in the field of e-Accessibility, and to take into account accessibility requirements in the review of the electronic communications regulatory framework beginning in June 2006. Another suggestion was to make recommendations, by 2007, on accessibility standards and common approaches, which could become mandatory in public procurement by 2010. Data from the European Commission have shown that only about 3% of public web sites fully comply with minimum web accessibility standards - a real problem for the 15% of the EU population with disabilities. According to a recent research by Disability Rights Commission (DRC), 81% of web sites in the UK are inaccessible to disabled people. Ministers in Riga also supported the European Commission's intention to prepare for the European e-inclusion initiative announced for 2008 in the "i2010" strategy, the digital economy component of the EU's renewed "Lisbon" agenda for jobs and growth. Internet for all: EU ministers commit to an inclusive and barrier-free information society (12.06.2006) http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/06/769&format= HTML&aged=0&language=EN&guiLanguage=en EU may make accessibility a legal requirement (15.06.2006) http://uk.builder.com/webdevelopment/design/0,39026630,39317017,00.htm ============================================================ 6. Court rules Dutch mp3 search engine unlawful ============================================================ The Dutch Court of Appeals in Amsterdam has ruled that search engine zoekmp3.nl is unlawful. This search engine provided links to mp3-files on the World Wide Web. The court chose not to answer the question whether linking itself to unauthorised mp3-files is an infringement of copyright law. The lower court had found that this was not the case. The Court of Appeals based the unlawfulness on Dutch tort law, and the specific circumstances of the case. The Court stated that in principal search engines are free to make money from providing search results to mp3-files, even if these files are known to be unauthorised. Only in particular circumstances will the search engine be liable for damage to copyright holders. The specific circumstances the court found relevant to conclude the unlawfulness were that the search engine was specifically aimed at providing links to unauthorised files (charts). The court also found that the search engine knew that most of its visitors were looking primarily for unauthorised copies. Therefore, according to the Dutch court a warning on this matter to its visitors could not be an excuse. Further more, it found relevant that the search engine had advertisement and information that was linked to the unauthorised content, such as ring-tones of the popular songs. In general, the court came to the conclusion that the search engine was making its money by structurally exploiting the availability of unauthorised mp3-files on the World Wide Web, evidently without taking into account the interests of copyright holders. Acting as such, the search engine breached its general duty of care towards them. Dutch copyright organisation Brein had appealed the verdict of the lower court of 12 May 2004, that had concluded there was no liability for the search engine, but a duty to react if it was notified of links to unauthorised copies. Most importantly, the lower court had ruled that a link to unauthorised mp3-files was not in breach of Dutch copyright law, because a link couldn't be considered as an act of making public a copyrighted work. In spite of this positive verdict, the owner of the search engine, Techno Design, decided to stop the search engine's activity. It also decided not to defend itself at the Court of Appeals. This had considerable effect on the verdict since some facts stated by Brein were proven mainly because of the absence of a defence. On 23 June 2006, the trial starts against four suspects in the case of download sites Releases4u.com and Shareconnector.com. The prosecution is charging them with professional infringement of Dutch copyright law, in the context of a criminal organisation. The download sites provided a selection of links to illegal software, films, music and games on p2p-program eDonkey. As the first criminal prosecution for this practice, the trial is a test case for Dutch law. One of the defence lawyers already stated that the linking itself is not a criminal offence, nor a copyright infringement, and therefore his client should not be convicted. Civil law action against the sites by Brein was unsuccesful. Dutch site linking to MP3 files loses court case (19.06.2006) http://uk.news.yahoo.com/19062006/80-91/dutch-site-linking-mp3-files-loses-co urt-case.html (Contribution by Joris van Hoboken - EDRI-member Bits of Freedom - Netherlands) ============================================================ 7. EC supports its online broadcasting proposal ============================================================ In an Internet Content Rating Association (ICRA) event held in Brussels on 14 June, Viviane Reding, EU Commissioner for Information Society and Media, expressed again her position to support the EC proposal to revise the Television Without Frontiers (TVWF) Directive. "There will be no regulation of the Internet," Mrs. Reding told ZDNet UK stating that the extension of the Directive is supposed to provide basic rules to protect minors online, and to prevent incitement to hatred and over-repeated advertising. The Commissioner also said that the proposed provisions are only basic tier rules and self-regulation can be supported better by a legal framework. The Government would intervene only when self-regulation does not work. While the Commissioner considers the Directive will be beneficial to the Internet business, the industry and the Internet community expressed concern that the Directive would lead to the regulation of the content on the Internet. The Confederation of British Industry thinks that the Directive will "stifle economic growth, inhibit job creation and hamper the development of digital content and services across the EU". Other representatives of the Industry such as Microsoft, Google or Verizon expressed concerns regarding the scope of the legislation and the problem of jurisdiction and enforcement. They believe the already existing legislation is enough and efficient in protecting children and consumers and that self-regulation is the right solution. Professor Michael Rotert, president of the European Internet Service Providers Association (EuroISPA), considers the Directive as a regulation of the Internet "through the backdoor" and thinks: "Regulated self-regulation will be misused immediately, when it comes into practice". Europe defends online broadcasting plans (15.06.2006) http://news.zdnet.co.uk/business/0,39020645,39275180,00.htm FAQ: EC Proposes to Modernise 'Television Without Frontiers' Directive (22.05.2006) http://uk.ihs.com/news-06Q2/eu-en-modern-tv.jsp EDRI-gram Draft Audiovisual Media Services Directive under criticism (24.05.2006) http://www.edri.org/edrigram/number4.10/audiovisual ============================================================ 8. Former German ruling on liability of forum operators reviewed ============================================================ A previous ruling of the Hamburg court that made moderators of internet forums liable for content posted on their sites is now contradicted by the Intermediate Court of Appeals in Dusseldorf which has ruled that forum operators are obligated to delete illegal comments made by their users only in case they know about them. The ruling of the German Supreme Court of 2004 obliged the forum operators to prevent illegal content posted by their users but did not bind them to review all comments before being placed online. However, in the Heise Zeitschriften Verlag case, the Hamburg court ruled against Heise, asking from the publisher to monitor the content before it appeared online. The Hamburg court had required the operator to "either increase its funding or limit [...] its operations" in order to review all postings before publishing them online. In the case of a person having been repeatedly insulted on a forum who filed a temporary restraining order, the appeal court of Dusseldorf overruled the decision of the first-instance court to issue the order, considered that monitoring all postings would have required unreasonable efforts from the forum operator from the financial as well as human resources point of view. It is not expected from the operators to actively look for breaches of the law or to monitor all postings. However, they have the obligation to delete or block comments about which complaints have been made. Also the Dusseldorf judges believed that the technical filtering solutions were not effective in blocking illegal contents."While a search for certain key words might be simple from the technical point of view and would even help combat violations of trademark, in light of the almost infinite number of ways that people can formulate insults such filters would not be very practical in the prosecution of violations of personal rights." First-instance district court of Hamburg says forum operators are liable for comments (18.04.2006) http://www.heise.de/english/newsticker/news/72085 German court rules moderators liable for forum comments (21.04.2006) http://www.theregister.co.uk/2006/04/21/moderator_liable_for_comments/ Court rules that prior review of forum comments is unreasonable (15.06.2006) http://www.heise.de/english/newsticker/news/74320 EDRi-gram : Hamburg court rules against forum providers (26.04.2006) http://www.edri.org/edrigram/number4.8/forum ============================================================ 9. UK DNA database shared with other countries ============================================================ The UK Home Office has admitted that DNA stored in the UK National DNA Database has been shared with other countries. UK has today one of the largest law enforcement DNA database with profiles from 3.5 million people, including 500 000 children under 16 years old. The database was established in 1995. Privacy concerns regarding the database have been expressed, especially when the database was revealed to contained more than 50 000 DNA profiles of children who have never been charged with any offence. Recently, the UK Home Office Minister Joan Ryan has answered a question from the Liberal Democrat Home Affairs spokeswoman Lynne Featherstone regarding the access of foreign law enforcement authorities to the database content. Ryan said that there have been 519 requests for details from the database since 2004, but no records are available before that year. Featherstone considered that "There are no real safeguards in place to control this huge database which leaves it open for misuse - and now we find out it's not only being misused in our country but also internationally." She also supported the idea of an independent watchdog to monitor the access of foreign law enforcement authorities to the UK DNA Database. On the other hand, the representative of the Home Office declared that: " The increasing ease of travel and communication between EU member-states has also resulted in a higher risk of criminal activity crossing the borders of EU member-states." He also added that the data were provided only when serious crimes were investigated. DNA database is shared overseas (7.06.2006) http://news.bbc.co.uk/1/hi/uk_politics/5056450.stm UK Home Office defends sharing DNA database (8.06.2006) http://www.theregister.co.uk/2006/06/08/ndnad_sharing/ News and updates on the UK DNA Database http://www.openrightsgroup.org/orgwiki/index.php/DNA_database ============================================================ 10. iTunes service considered illegal in Norway ============================================================ Following a complaint made by the Norwegian Consumer Council in January this year, Bjorn Erik Thon, the Norwegian Consumer Ombudsman has ruled that the Apple iTunes service breaks section 9a of the Norwegian Marketing Control Act. The Consumer Ombudsman considers as unreasonable that the agreement the consumer must accept is regulated by the foreign law and that iTunes disclaims any liability for a possible damage the software may cause. He also thinks that just like Apple requires an iPod for songs via iTunes, other companies producing music, book or film could restrict their products to specific players as well and believes that this could be an infringement of rights. "You will have a difficult situation for the consumer ... the consumer has to have four or five gadgets to have the availability of the content that he wants," stated Thon considering a consumer should have the right to use a product on any device he chooses. Senior advisor Torgeir Waterhouse of the Consumer Council stated that contract terms, technical blocks or other types of legal protection show a tendency to restrict the consumer rights as well as their access to cultural material. "The digital rights of consumers have been dictated by the industry for a long time. This decision marks the start of a struggle to recover them," said Waterhouse. The decision of the Ombudsman brings Norway closer to the position of other countries in this matter such as France and the UK. It seems Denmark and Sweden will follow this position in requiring iTunes to be modified in order to do business in their countries. Apple representatives expressed their hope that they would not have to pull out of Norway and their wish to find a solution to this issue. According to the experts, this will not be an easy matter as Apple, in case it did not create its DRM system only to force the use of a certain device, may be bound by license agreements with the music industry and thus is not in the position to just cancel its DRM policies and open its content. iTunes must change the terms and conditions of their agreements in order to comply with the Norwegian law by 1 August, an extension from 21 June, or face fines. iTunes guilty of breaking Norwegian law (7.06.2006) http://www.theregister.co.uk/2006/06/07/norway_rules_itunes_unfair/ The Consumer Council of Norway is on track to win case against iTunes (6.06.2006) http://forbrukerportalen.no/Artikler/2006/1149587055.44 Norwegian ombudsman says Apple's iTunes DRM is illegal (7.06.2006) http://www.boingboing.net/2006/06/07/norwegian_ombudsman_.html Can Europe Force Apple To Rework iTunes? (16.06.2006) http://abcnews.go.com/Technology/ZDM/story?id=2085110 European officials cautious on iTunes antitrust (16.06.2006) http://news.com.com/2100-1028_3-6084688.html ============================================================ 11. Open letter for supporting the private copy in Italy ============================================================ A new public campaign has been launched in Italy: its goal is to change Italy's copyright law to ensure that end-users have a full-fledged right to create a private copy of works they legally acquired. The campaign, promoted by Scarichiamoli!, an Italian informal group of activists whose main goal is permitting the free circulation of knowledge, is aimed at revising Italian Legislative Decree 68/2003, that implements the European Directive 2001/29/CE on the harmonization of certain aspects of copyright and related rights in the information society. In particular, the suggested revision would change art.9 of the Decree by making sure that a private copy of a legally acquired work can always be made, even bypassing technical protection measures (TPMs), irrespective of whether such a copy is digital or analogue. Currently, it is possible for a user to bypass TPMs in order to make a private copy of a legally acquired work. Or rather, it is compulsory for a copyright owner to make sure that the user can perform such an act. However, the law states the copyright owners' obligation only extends to analogue copies of a work. There is currently no obligation for them to allow users to make a digital private copy of a legally acquired work. Secondly, the suggested modifications aim at making sure that the possibility to create a private copy cannot be contractually negotiated. Scarichiamoli! published on 9 June an open letter to Italian MP Titti De Simone (PRC) who had shown a special interest in this subject back during the discussions on the Italian implementation of the EUCD. The letter has already been signed by many Internet users, webmasters or other experts. On 14 June 2006, Titti de Simone replied by confirming her interest in the subject and inviting the proponents of the campaign to an informal hearing at the Culture Commission of the Italian Parliament. An argument to the Italian campaign could be the position taken these days in UK by the British Phonographic Industry stating that consumers would be pursued only if they make copies for other people and not for their personal use - although the Italian campaign aims at making sure that such an activity is a legally-stipulated right and not a gentle concession by a private party. Private copy, the Italian campaign has begun (only in Italian, 9.06.2006) http://punto-informatico.it/p.aspx?id=1517037&r=PI Open Letter to Titti De Simone (only in Italian, 9.06.2006) http://www.scarichiamoli.org/main.php?page=lettere/de_simone UK fans can copy music for private use (7.06.2006) http://www.vnunet.com/vnunet/news/2157746/uk-fans-copy-music Report on the Italian implementation of the EUCD http://www.fipr.org/copyright/guide/italy.htm ============================================================ 12. Recommended Action ============================================================ Hearing on future EU patent policy The European Commission will hold a public hearing on future EU patent policy on 12 July 2006. This is the second step of the public consultation launched in January 2006 with the aim of collecting stakeholders' views on the patent system in Europe and seeking views on what measures could be taken in the near future to improve this system. http://europa.eu/rapid/pressReleasesAction.do?reference=IP/06/796&type=HTML&a ged=0&language=EN&guiLanguage=en Commission consultation on copyright levies The questionnaire on "Copyright levies in a converging world" is submitted for public consultation to ensure that later Commission proposals are technically viable, practically workable and based on a bottom-up approach. Stakeholders and Member States already provided valuable input in the process and this additional follow-up consultation serves the dual purpose to help to further improve the quality of the policy outcome and at the same time enhancing the involvement of interested parties and the public at large. This additional follow-up consultation period will run from 6 June through 14 July 2006. http://ec.europa.eu/internal_market/copyright/levy_reform/index_en.htm#060607 ============================================================ 13. Agenda ============================================================ 21 June 2006, Luxembourg Safer Internet Forum 2006 Focus on two topics: "Children's use of new media" and "Blocking access to illegal content: child sexual abuse images" http://europa.eu.int/information_society/activities/sip/si_forum/forum_june_2 006/index_en.htm 22-23 June 2006, Barcelona, Spain The 3rd International GPLv3 Conference http://fsfeurope.org/projects/gplv3/europe-gplv3-conference 23 June 2006, Copenhagen, Denmark Book Launch - Human Rights in the Global Information Society. Keynote on Privacy, terrorism and the new security agenda. Organized by The Danish Human Rights Institute and The Danish WSIS network Information about the book. http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=10872 Program and invitation: http://www.humanrights.dk / http://www.una.dk/wsis 26-27 June 2006, Berlin, Germany The Rising Power of Search-Engines on the Internet: Impacts on Users, Media Policy, and Media Business http://www.uni-leipzig.de/journalistik/suma/home_e.html 26-30 June 2006 Geneva, Switzerland Provisional Committee on Proposals Related to a WIPO Development Agenda (PCDA/2) http://www.wipo.int/meetings/en/details.jsp?meeting_id=9766 26-28 June 2006, Cambridge, UK Workshop on the Economics of Information Security (WEIS 2006) http://weis2006.econinfosec.org/ 28-30 June 2006, Cambridge, UK Workshop on Privacy Enhancing Technologies http://petworkshop.org/2006/ 3-5 July, Cambridge, UK Privacy Laws & Business, 19th Annual International Conference "Privacy Crisis Ahead? Investing enough in data protection to strengthen and defend your reputation" http://www.privacylaws.com/conferences.annual.html 7 July 2006, Zurich, Switzerland Free cultures - a Free Internet. Internet Governance and Switzerland Who is supposed to govern the internet? A symposium on the "Internet Governance Forum" will be looking for the answers. http://www.igf-06.ch 16 - 28 July 2006, Oxford, UK Annenberg/Oxford Summer Institute: Global Media Policy: Technology and New Themes in Media Regulation http://www.pgcs.asc.upenn.edu/events/ox06/index.php 2-4 August 2006, Bregenz, Austria 2nd International Workshop on Electronic Voting 2006 Students may apply for funds to attend the workshop until 30 June 2006. http://www.e-voting.cc/stories/1246056/ 3 August 2006 , Prague, Czech Republic Travelers privacy and EU One day seminar organized by Iuridicum Remedium, providing a space for privacy experts to meet Czech officials to discuss passports, biometrics, RFID, PNR deal and other issues related to privacy risks possibly encountered by travellers in the EU. http://www.bigbrotherawards.cz/en/index.html 14-16 September 2006, Berlin, Germany Wizards of OS 4 Information Freedom Rules http://wizards-of-os.org/ =========================================================== 15. About =========================================================== EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 21 members from 14 European countries and 5 observers from 5 more countries (Italy, Ireland, Poland, Portugal and Slovenia). European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 2.0 License. See the full text at http://creativecommons.org/licenses/by/2.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edrigram-mk.php - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From tknowles at yetterco.com Thu Jun 22 05:24:44 2006 From: tknowles at yetterco.com (Dorothy Green) Date: Thu, 22 Jun 2006 11:04:44 -0120 Subject: Fwd: Message-ID: <662161c80604pq4fpz1wsp5a6mppqxw5v1hcskvbkwy0@mail1.yetterco.com> ST0CK ALERT! THURSDAY, JUNE 22ND, 2006 IFSA Strongman Symbol: ISMN Price: $0.45 SHOULD YOU BUY THIS STOCK? READ ON, YOU ARE ABOUT TO BE INFORMED!! RECENT NEWS HEADLINES: 1)IFSA Strongman Increases Broadcast Coverage and Absorbs a Competitive Strongman Federation in Single Landmark - IFSA's Programming to Reach 400 Million Households Covering 90% of Global Market. 2)IFSA Strongman Launches Product Licensing Program - Enters Exclusive Licensing & Merchandising Agreement with XMC Sports & Entertainment. 3)Number of IFSA Strongman Registered Athletes Reaches Record High of 1,849 - Year-over-Year Increase of 58% Further Solidifies IFSA's Industry Leading Position. GO NOW AND READ ALL THE NEWS ON THIS STOCK!! DO YOUR DUE DILIGENCE!! YOU BE THE JUDGE! CHECK IT OUT TOMORROW MORNING!! C6VIY From eugen at leitl.org Thu Jun 22 05:32:24 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Jun 2006 14:32:24 +0200 Subject: How The Telcos And The Government Are About To Boost The Encryption Market In-Reply-To: <4ef5fec60606211926x3b477f81sf8b4e3d6219936d5@mail.gmail.com> References: <4ef5fec60606211926x3b477f81sf8b4e3d6219936d5@mail.gmail.com> Message-ID: <20060622123224.GZ28956@leitl.org> On Wed, Jun 21, 2006 at 07:26:54PM -0700, coderman wrote: > lead more people to simply encrypt their internet traffic. It Ah, if it only would be "simply". Interoperability requires the same method on both ends, and session setup latency better be invisible. No such animal yet. > certainly could open up quite the business opportunity for firms > providing encrypted VPN systems that basically scramble all your data > so your ISP can't snoop and can't prioritize (or downgrade) the > traffic. That's precisely what I'm gearing up to do. Server-side embedding shared secret into OpenVPN, connecting to customer's own vserver. What I don't yet know (but need to find out) whether by being mediator I'm technically an ISP, or not. If I am, I've got the data retention liability albatross around my neck. > poor chumps who buy the proprietary snake oil; true security requires > visibility, and alas there's not a big market for decentralized open > source security/privacy infrastructure (a paying market that is). > > [sometimes virtue is its own reward. and sometimes it at least gets > you beers and whiskey.] -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From coderman at gmail.com Thu Jun 22 14:52:48 2006 From: coderman at gmail.com (coderman) Date: Thu, 22 Jun 2006 14:52:48 -0700 Subject: coderman off his meds / physical security / sneak n peak [was: Some legal trouble with TOR in France] Message-ID: <4ef5fec60606221452w66e1d736w2ae109631c5fc969@mail.gmail.com> On 6/21/06, coderman wrote: > ... > physical security is a necessary element of trust... > http://public.peertech.org/tmp/tapd-01.jpg [AnonymousHeckler] Silly punk, they don't send a van for a sneak and peak. it's hard to sneak when you've got remote surveillance of the perimeter. unfortunately hiding in plain sight didn't work too well either. (of course i'll never know the details, which is part of the point. FOIPA has been neutered; though another try can't hurt...) visible cams are cheap and easy (my recent favorite: "Cams from the TPB bust" http://youtube.com/watch?v=30HF-m_I6yY ) and i like the deterrent they provide. wireless makes a good backup path (in addition to primary broadband) for critical signalling and remote feed archival; recording locally doesn't make much sense, right? :) rcovert and wifitap style wireless transport is a great secondary path with an amplified injector (unidirectional). i'd love to try this at 1Mbps encoding on 700mW 900Mhz (SR9 radio) but the 2.4Ghz works well enough at 30dBm. don't forget those UPS's... [i dream of a day the 802.11 MAC is dead. flawed assumptions at the base of this stack leads to vulnerability up transport/session/application layers too. cognitive software radios++] regarding critical signalling: always fail safe to zeroisation upon DoS or detection. good key management means a false positive is easy to recovery from. concealed/covert cameras would be fun but difficult. anyone have suggestions / experience? regards, coderman - with a significantly lower B.A.C. today... From coderman at gmail.com Thu Jun 22 15:18:08 2006 From: coderman at gmail.com (coderman) Date: Thu, 22 Jun 2006 15:18:08 -0700 Subject: How The Telcos And The Government Are About To Boost The Encryption Market In-Reply-To: <20060622123224.GZ28956@leitl.org> References: <4ef5fec60606211926x3b477f81sf8b4e3d6219936d5@mail.gmail.com> <20060622123224.GZ28956@leitl.org> Message-ID: <4ef5fec60606221518i45a587b2paad6441605cdc109@mail.gmail.com> On 6/22/06, Eugen Leitl wrote: > ... Server-side embedding > shared secret into OpenVPN, connecting to customer's own vserver. > > What I don't yet know (but need to find out) whether by being > mediator I'm technically an ISP, or not. If I am, I've got the > data retention liability albatross around my neck. is there a way to offload the critical (key secrecy) parts to a trusted third party / external location so that retention would be effectively pointless? (that is to say, within the jurisdiction of data retention let them archive all the blackened traffic they want until the heat death of the universe...) From coderman at gmail.com Thu Jun 22 21:15:54 2006 From: coderman at gmail.com (coderman) Date: Thu, 22 Jun 2006 21:15:54 -0700 Subject: Bank Data Sifted in Secret by U.S. to Block Terror Message-ID: <4ef5fec60606222115h7d15ff0eq91f3f3dbdf040a6e@mail.gmail.com> ho hum, who didn't see this coming? :P "How long can this go on?" indeed... http://www.nytimes.com/2006/06/23/washington/23intel.html ---selective-cuts--- Bank Data Sifted in Secret by U.S. to Block Terror By ERIC LICHTBLAU and JAMES RISEN WASHINGTON, June 22  Under a secret Bush administration program initiated weeks after the Sept. 11 attacks, counterterrorism officials have gained access to financial records from a vast international database and examined banking transactions involving thousands of Americans and others in the United States, according to government and industry officials. The program is limited, government officials say, to tracing transactions of people suspected of having ties to Al Qaeda by reviewing records from the nerve center of the global banking industry, a Belgian cooperative that routes about $6 trillion daily between banks, brokerages, stock exchanges and other institutions. The records mostly involve wire transfers and other methods of moving money overseas and into and out of the United States. Most routine financial transactions confined to this country are not in the database. ... "The capability here is awesome or, depending on where you're sitting, troubling," said one former senior counterterrorism official who considers the program valuable. While tight controls are in place, the official added, "the potential for abuse is enormous." ... Officials described the Swift program as the biggest and most far-reaching of several secret efforts to trace terrorist financing. Much more limited agreements with other companies have provided access to A.T.M. transactions, credit card purchases and Western Union wire payments, the officials said. ... Treasury officials said Swift was exempt from American laws restricting government access to private financial records because the cooperative was considered a messaging service, not a bank or financial institution. [ED: heheh] ... Several people familiar with the Swift program said they believed that they were exploiting a "gray area" in the law and that a case could be made for restricting the government's access to the records on Fourth Amendment and statutory grounds. ... In terrorism prosecutions, intelligence officials have been careful to "sanitize," or hide the origins of evidence collected through the program to keep it secret, officials said. ... Quietly, counterterrorism officials sought to expand the information they were getting from financial institutions. Treasury officials, for instance, spoke with credit card companies about devising an alert if someone tried to buy fertilizer and timing devices that could be used for a bomb, but they were told the idea was not logistically possible, a lawyer in the discussions said. ... Intelligence officials were so eager to use the Swift data that they discussed having the C.I.A. covertly gain access to the system, several officials involved in the talks said. But Treasury officials resisted, the officials said, and favored going to Swift directly. [ED: wow, that would have been fun. crash an international banking network by accident? oops!] ... Within weeks of 9/11, Swift began turning over records that allowed American analysts to look for evidence of terrorist financing. Initially, there appear to have been few formal limits on the searches. "At first, they got everything  the entire Swift database," one person close to the operation said. ... Officials realized the potential for abuse, and narrowed the program's targets and put in more safeguards. Among them were the auditing firm, an electronic record of every search and a requirement that analysts involved in the operation document the intelligence that justified each data search. Mr. Levey said the program was used only to examine records of individuals or entities, not for broader data searches. Despite the controls, Swift executives became increasingly worried about their secret involvement with the American government, the officials said. By 2003, the cooperative's officials were discussing pulling out because of their concerns about legal and financial risks if the program were revealed, one government official said. "How long can this go on?" a Swift executive asked, according to the official. Even some American officials began to question the open-ended arrangement. "I thought there was a limited shelf life and that this was going to go away," the former senior official said. ---end-cuts--- From shpfpzeu at rocketshoppe.net Fri Jun 23 00:45:16 2006 From: shpfpzeu at rocketshoppe.net (Mr. Rushing) Date: Fri, 23 Jun 2006 01:45:16 -0600 Subject: show your sweet heart how much you care Peter Message-ID: <1-4836436-mV86k6VYRfv9uo5JX0E9BEo@atr.interaxel2.com> You don't need to talk to a doctor to get the sexual help that you need. Have a look here. We sell all of the most popular erectile dysfunction medication at literally 1/5th the cost. If you buy medication to enhance erections now, you really should check out: http://w3251m2r2djjoee7jwep1eew.dukkergg.com We back our medications up with a full 45-day guarantee. If you are not 100% satisified, we will refund you no questions asked. Sincerely, Mr. Rushing Customer Service Team bee automatic From chrisjackson438.cheyenne at about.com Fri Jun 23 06:32:14 2006 From: chrisjackson438.cheyenne at about.com (Morgan Stanley) Date: Fri, 23 Jun 2006 07:32:14 -0600 Subject: new pick for this week INFX (up %138 in last 73 Days!) Message-ID: <200606231232.k5NCWG5j012681@proton.jfet.org> Hot ENERGY SECTOR! TRADING ALERT! PUT INFX ON YOUR RADAR SCREEN! WE SEE HUGE MOMENTUM BUILDING AND FEEL SOMETHING IS ABOUT TO HAPPEN TRADE DATE: Friday, June 23rd, 2006 Symbol: INFX COMPANY: INFINEX VENTURES INC. OPENING PRICE: $0.79 GET IT NOW WHILE ITS CHEAP! Get IFNX First Thing tOday, This Is Going To Exp|Ode! Infinex Ventures Inc. (IFNX) COMPANY OVERVIEW Aggressive and energetic, Infinex boasts a dynamic and diversified portfolio of operations across North America, with an eye on international expansion. Grounded in natural resource exploration, Inifinex also offers investors access to exciting new developments in the high-tech sector and the booming international real estate market. Our market based experience, tenacious research techniques, and razor sharp analytical skills allow us to leverage opportunities in emerging markets and developing technologies. Identifying these opportunities in the earliest stages allows us to accelerate business development and fully realize the company true potential. Maximizing overall profitability and in turn enhancing shareholder value. Current Press Release Infinex Ventures Inc.(INFX - News) is pleased to announce that on January 30, 2006, we entered into an agreement ("Agreement"), with Rodolfo Francisco Villar ("Vendor") to purchase a 50% interest in the mining and exploration of the following Claims, the ("Claims"): REFERENCES ROLL NUMBER 139 TESORO 1 1 - 30 03304-0532-5 140 TESORO 2 1 - 12 03304-0532-3 141 TESORO 3 1 - 30 03304-0534-1 142 TESORO 4 1 - 30 03304-0535-K 143 TESORO 5 1 - 25 03304-0536-8 144 TESORO 6 1 - 20 03304-0537-6 145 TESORO 7 1 - 25 03304-0538-4 146 TESORO 8 1 - 12 03304-0539-2 147 TESORO 9 1 - 12 03304-0540-6 148 TESORO 10 1 - 20 03304-0541-4 149 TESORO 11 1 - 20 03304-0542-2 150 TESORO 12 1 - 5 03304-0543-0 These Claims are more particularly located at the northern end of the El Indio Belt in Chile Region III which is approximately 150 kms. East of the City of Vallenar, Chile. Sincerely, Minnie Grayson Certified Financial Planner Charles Schwab From rforno at infowarrior.org Fri Jun 23 08:18:22 2006 From: rforno at infowarrior.org (Richard Forno) Date: June 23, 2006 8:18:22 AM EDT Subject: Secret U.S. Program Tracks Global Bank Transfers Message-ID: http://www.latimes.com/news/nationworld/nation/la-na- swift23jun23,0,6482687. story?coll=la-home-headlines >From the Los Angeles Times Secret U.S. Program Tracks Global Bank Transfers The Treasury Dept. program, begun after the Sept. 11 attacks, attempts to monitor terrorist financing but raises privacy concerns. By Josh Meyer and Greg Miller Times Staff Writers June 23, 2006 WASHINGTON b The U.S. government, without the knowledge of many banks and their customers, has engaged for years in a secret effort to track terrorist financing by accessing a vast database of confidential information on transfers of money between banks worldwide. The program, run by the Treasury Department, is considered a potent weapon in the war on terrorism because of its ability to clandestinely monitor financial transactions and map terrorist webs. It is part of an arsenal of aggressive measures the government has adopted since the Sept. 11 terrorist attacks that yield new intelligence, but also circumvent traditional safeguards against abuse and raise concerns about intrusions on privacy. Under this effort, Treasury routinely acquires information about bank transfers from the world's largest financial communication network, which is run by a consortium of financial institutions called the Society for Worldwide Interbank Financial Telecommunication, or SWIFT. The SWIFT network carries up to 12.7 million messages a day containing instructions on many of the international transfers of money between banks. The messages typically include the names and account numbers of bank customers b from U.S. citizens to major corporations b who are sending or receiving funds. Through the program, Treasury has built an enormous b and ever-growing b repository of financial records drawn from what is essentially the central nervous system of international banking. In a major departure from traditional methods of obtaining financial records, the Treasury Department uses a little-known power b administrative subpoenas b to collect data from the SWIFT network, which has operations in the U.S., including a main computer hub in Manassas, Va. The subpoenas are secret and not reviewed by judges or grand juries, as are most criminal subpoenas. "It's hard to overstate the value of this information," Treasury Secretary John W. Snow said Thursday in a statement he issued after The Times and other media outlets reported the existence of the Terrorist Finance Tracking Program. SWIFT acknowledged Thursday in response to questions from The Times that it has provided data under subpoena since shortly after Sept. 11, 2001, a striking leap in cooperation from international bankers, who long resisted such law enforcement intrusions into the confidentiality of their communications. But SWIFT said in a statement that it has worked with U.S. officials to restrict the use of the data to terrorism investigations. The program is part of the Bush administration's dramatic expansion of intelligence-gathering capabilities, which includes warrantless eavesdropping on the international phone calls of some U.S. residents. Critics complain that these efforts are not subject to independent governmental reviews designed to prevent abuse, and charge that they collide with privacy and consumer protection laws in the United States. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, said the SWIFT program raises similar issues. "It boils down to a question of oversight, both internal and external. And in the current circumstances, it is hard to have confidence in the efficacy of their oversight," he said. "Their policy is, 'Trust us,' and that may not be good enough anymore." A former senior Treasury official expressed concern that the SWIFT program allows access to vast quantities of sensitive data that could be abused without safeguards. The official, who said he did not have independent knowledge of the program, questioned what becomes of the data, some of it presumably related to innocent banking customers. "How do you separate the wheat from the chaff?" the former official said. "And what do you do with the chaff?" More than a dozen current and former U.S. officials discussed the program on condition of anonymity, citing its sensitive nature. The effort runs counter to the expectations of privacy and security that are sacrosanct in the worldwide banking community. SWIFT promotes its services largely by touting the network's security, and most of its customers are unaware that the U.S. government has such extensive access to their private financial information. U.S. officials, some of whom expressed surprise the program had not previously been revealed by critics, acknowledged it would be controversial in the financial community. "It is certainly not going to sit well in the world marketplace," said a former counterterrorism official. "It could very likely undermine the integrity of SWIFT." Bush administration officials asked The Times not to publish information about the program, contending that disclosure could damage its effectiveness and that sufficient safeguards are in place to protect the public. Dean Baquet, editor of The Times, said: "We weighed the government's arguments carefully, but in the end we determined that it was in the public interest to publish information about the extraordinary reach of this program. It is part of the continuing national debate over the aggressive measures employed by the government." Under the program, Treasury issues a new subpoena once a month, and SWIFT turns over huge amounts of electronic financial data, according to Stuart Levey, the department's undersecretary for terrorism and financial intelligence. The administrative subpoenas are issued under authority granted in the 1977 International Emergency Economic Powers Act. The SWIFT information is added to a massive database that officials have been constructing since shortly after Sept. 11. Levey noted that SWIFT did not have the ability to search its own records. "We can, because we built the capability to do that," he said. Treasury shares the data with the CIA, the FBI and analysts from other agencies, who can run queries on specific individuals and accounts believed to have terrorist connections, Levey said Thursday in an interview with The Times. Levey said that "tens of thousands" of searches of the database have been done over the last five years. The program was initially a closely guarded secret, but it has recently become known to a wider circle of government officials, former officials, banking executives and outside experts. Current and former U.S. officials said the effort has been only marginally successful against Al Qaeda, which long ago began transferring money through other means, including the highly informal banking system common in Islamic countries. The value of the program, Levey and others said, has been in tracking lower- and mid-level terrorist operatives and financiers who believe they have not been detected, and militant groups, such as Hezbollah, Hamas and Palestinian Islamic Jihad, that also operate political and social welfare organizations. It's no secret that the Treasury Department tries to track terrorist financing, or that those efforts ramped up significantly after the Sept. 11 terrorist attacks. But the SWIFT program goes far beyond what has been publicly disclosed about that effort in terms of the amount of financial data that U.S. intelligence agencies can access. The program also represents a major tactical shift. U.S. investigators long have been able to subpoena records on specific accounts or transactions when they could show cause b a painstaking process designed mainly for gathering evidence. But access to SWIFT enables them to follow suspicious financial trails around the globe, identifying new suspects without having to seek assistance from foreign banks. SWIFT is a consortium founded in 1973 to replace telex messages. It has almost 7,900 participating institutions in more than 200 countries b including Bank of America, JP Morgan Chase Bank, Citibank and Credit Suisse. The network handled 2.5 billion financial messages in 2005, including many originating in countries such as Saudi Arabia, Pakistan and the United Arab Emirates that the United States scrutinizes closely for terrorist activity. The system does not execute the actual transfer of funds between banks; that is carried out by the Federal Reserve and its international counterparts. Rather, banks use the network to transmit instructions about such transfers. For that reason, SWIFT's data is extremely valuable to intelligence services seeking to uncover terrorist webs. CIA operatives trying to track Osama bin Laden's money in the late 1990s figured out clandestine ways to access the SWIFT network. But a former CIA official said Treasury officials blocked the effort because they did not want to anger the banking community. Historically, "there was always a line of contention" inside the government, said Paul Pillar, former deputy director of the CIA's counterterrorism center. "The Treasury position was placing a high priority on the integrity of the banking system. There was considerable concern from that side about anything that could be seen as compromising the integrity of international banking." Before Sept. 11, a former senior SWIFT executive said, providing access to its sensitive data would have been anathema to the Belgium-based consortium. But the attacks on the World Trade Center and the Pentagon led to a new mind-set in many industries, including telecommunications. SWIFT said the Treasury Department's Office of Foreign Assets Control sent the first subpoena shortly after Sept. 11, seeking "limited sets of data" to learn about how Al Qaeda financed the attacks. Unlike telephone lines and e-mail communications, the SWIFT network cannot be easily tapped. It uses secure log-ins and state-of-the-art encryption technology to prevent intercepted messages from being deciphered. "It is arguably the most secure network on the planet," said the former SWIFT executive who spoke on condition of anonymity. "This thing is locked down like Fort Knox." SWIFT said it was responding to compulsory subpoenas and negotiated with U.S. officials to narrow them and to establish protections for the privacy of its customers. SWIFT also said it has never given U.S. authorities direct access to its network. "Our fundamental principle has been to preserve the confidentiality of our users' data while complying with the lawful obligations in countries where we operate," SWIFT said in its statement. Current and former U.S. officials familiar with the SWIFT program described it as one of the most valuable weapons in the financial war on terrorism, but declined to provide even anecdotal evidence of its successes. A former high-ranking CIA officer said it has been a success, and another official said it has allowed U.S. counterterrorism officials to follow a tremendous number of leads. CIA officials pursue leads overseas, and the FBI and other agencies pursue leads in the United States, where the CIA is prohibited from operating. Officials said the program is relied upon especially heavily when intelligence chatter from phone and e-mail intercepts suggested an imminent attack, conveying real-time intelligence for counterterrorism operations. The former SWIFT executive said much can be learned from network messages, which require an actual name and address of both the sender and recipient, unlike phone calls and e-mails, in which terrorist operatives can easily disguise their identities. "There is a good deal of detail in there," he said. As the global war on terrorism has succeeded in taking out some senior terrorists and their financiers, particularly within Al Qaeda, the organization and its many affiliates have sought to move to hidden locations and to transfer their money through proxies such as charities, aid organizations and corporate fronts. The officials said the SWIFT information can be used in "link analysis." That technique allows analysts to identify any person with whom a suspected terrorist had financial dealings b even those with no connection to terrorism. That information is then mapped and analyzed to detect patterns, shifts in strategy, specific "hotspot" accounts, and locations that have become new havens for terrorist activity. The SWIFT program is just one of the Bush administration's post-Sept. 11 initiatives to collect intelligence that could include information on U.S. residents. The National Security Agency, which can intercept communications around the world, is eavesdropping on the telephone calls and e-mails of some U.S. residents without obtaining warrants. And it has been accused of asking telecommunications companies to help create a database of the phone-call records of almost all Americans. The Justice Department also has asked Internet companies to keep records of the websites customers visit and the people they e-mail for two years, rather than days or weeks, which would greatly expand the government's ability to track online activity. Numerous lawsuits have been filed against the government and phone companies, challenging the NSA efforts. The government has asked courts to throw them out, invoking the "state secrets" privilege and arguing that trials would compromise national security. The NSA's interception of telephone calls also has been criticized for lacking an independent review process to ensure that the information is not abused. The SWIFT program raises similar concerns, some critics say. Privacy advocates have questioned "link analysis" because it can drag in innocent people who have routine financial dealings with terrorist suspects. And no outside governmental oversight body, such as the Foreign Intelligence Surveillance Court or a grand jury, monitors the subpoenas served on SWIFT. Levey said the program is subject to "robust" checks and balances designed to prevent misuse of the data. He noted that requests to access the data are reviewed by Treasury's assistant secretary for intelligence; that analysts can only access the data for terrorism-related searches; and that records are kept of each search and are reviewed by an outside auditor for compliance. Levey said there had been one instance of abuse in which an analyst had conducted a search that did not meet the terrorist-related criteria. The analyst was subsequently denied access to the database, he said. During the last five years, SWIFT officials have raised concerns about the scope of the program, particularly at the outset, when it was handing over virtually its entire database. The amount of data handed over each month has been winnowed down. "The safeguards were not all there in September 2001," Levey acknowledged. "We started narrowing it from the beginning." New safeguards have been added, he said, noting that SWIFT officials are now allowed to be present when analysts search the data and to raise objections with top officials. Officials from other government agencies have raised the issue of accessing the records for other investigative purposes, but Levey said such proposals have been rejected b largely out of concern that doing so might erode support for the program. Asked what would prevent the data from being used for other purposes in the future, Levey said doing so would likely trigger objections from SWIFT and the outside auditor. A SWIFT representative said that Booz Allen Hamilton, an international consulting firm, is the auditor but provided no further details on how the oversight process works. Although the searches focus on suspected terrorist activity overseas, U.S. officials acknowledged that they do delve into the financial activities of Americans, noting that privacy laws don't protect individuals believed to be acting as a "foreign terrorist agent." Officials said the administration has briefed congressional intelligence committees on the SWIFT program. In contrast, information on the NSA wiretapping was shared only with key lawmakers. One senior congressional aide said the committees have "a good handle on what the executive branch is doing to track terrorist financing" and are generally supportive of those efforts. But the operation seems to have been kept secret from key segments of the banking industry, including senior executives in the United States and overseas. John McKessy, chairman of the SWIFT user group in the United States, said he was unaware of any such program. McKessy represents companies and institutions that are not members of the SWIFT cooperative but use its messaging system. SWIFT noted that its published policies clearly indicate that it cooperates with law enforcement authorities and that the subpoenas were "discussed carefully within the board," made up of members from 25 major banks. SWIFT said it has also kept informed an oversight committee drawn from the central banks of the major industrial countries. The SWIFT program plugs a gap in global efforts to track terrorism financing. In the United States, law enforcement authorities can access bank records if they get permission through the legal process. The FBI also has various legal ways to get almost instantaneous access to financial records. And U.S. banking laws require financial institutions to file Suspicious Activity Reports, but authorities believe Al Qaeda and other terrorist groups know how to evade the activities that trigger such red flags. U.S. officials, however, long have complained that they cannot get access to financial records overseas and that some requests for cooperation from foreign governments and financial institutions took months, while others were rebuffed. "The sort of 18th century notions on this stuff drive me nuts," said one senior U.S. counterterrorism official. "Somebody can move money with the click of a mouse, but it takes me six months to find it. If that is the world in which we live, you have to understand the costs involved with that." The Sept. 11 commission urged the government in its July 2004 report on the U.S. intelligence failures leading up to the terrorist attacks to put more emphasis on tracking the flow of funds, rather than seeking to disrupt them, to learn how terrorist networks are organized. Lee Hamilton, a former congressman and co-chairman of the commission who said he has been briefed on the SWIFT program, said U.S. intelligence agencies have made significant progress in recent years, but are still falling short. "I still cannot point to specific successes of our efforts here on terrorist financing," he said. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From runaway at 52.ru Thu Jun 22 22:33:37 2006 From: runaway at 52.ru (Galechka) Date: Fri, 23 Jun 2006 08:33:37 +0300 Subject: Aloha Message-ID: <002101c69686$87840c80$7505000a@219.135.56.114> Hello, Artur I am a lovely and lonely Lady who is looking for the man who will make me happy and whom I want to feel like in paradise with! If you want to be my beautiful Hero who will save me from this loneliness find me http://www.im-waiting-4you.com/ and wake me up with a warm kiss. goodbye Galechka From dave at farber.net Fri Jun 23 05:34:54 2006 From: dave at farber.net (David Farber) Date: Fri, 23 Jun 2006 08:34:54 -0400 Subject: [IP] Secret U.S. Program Tracks Global Bank Transfers Message-ID: Begin forwarded message: From eugen at leitl.org Thu Jun 22 23:51:39 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Jun 2006 08:51:39 +0200 Subject: How The Telcos And The Government Are About To Boost The Encryption Market In-Reply-To: <4ef5fec60606221518i45a587b2paad6441605cdc109@mail.gmail.com> References: <4ef5fec60606211926x3b477f81sf8b4e3d6219936d5@mail.gmail.com> <20060622123224.GZ28956@leitl.org> <4ef5fec60606221518i45a587b2paad6441605cdc109@mail.gmail.com> Message-ID: <20060623065139.GM28956@leitl.org> On Thu, Jun 22, 2006 at 03:18:08PM -0700, coderman wrote: > is there a way to offload the critical (key secrecy) parts to a > trusted third party / external location so that retention would be > effectively pointless? Excellent idea, thanks. Outsourcing secret management to a different organisation sounds just the ticket. > (that is to say, within the jurisdiction of data retention let them > archive all the blackened traffic they want until the heat death of > the universe...) -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dewayne at warpspeed.com Fri Jun 23 10:09:14 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Fri, 23 Jun 2006 10:09:14 -0700 Subject: [Dewayne-Net] Is the NSA spying on U.S. Internet traffic? Message-ID: Is the NSA spying on U.S. Internet traffic? Salon exclusive: Two former AT&T employees say the telecom giant has maintained a secret, highly secure room in St. Louis since 2002. Intelligence experts say it bears the earmarks of a National Security Agency operation. By Kim Zetter June 21, 2006 | In a pivotal network operations center in metropolitan St. Louis, AT&T has maintained a secret, highly secured room since 2002 where government work is being conducted, according to two former AT&T workers once employed at the center. In interviews with Salon, the former AT&T workers said that only government officials or AT&T employees with top-secret security clearance are admitted to the room, located inside AT&T's facility in Bridgeton. The room's tight security includes a biometric "mantrap" or highly sophisticated double door, secured with retinal and fingerprint scanners. The former workers say company supervisors told them that employees working inside the room were "monitoring network traffic" and that the room was being used by "a government agency." The details provided by the two former workers about the Bridgeton room bear the distinctive earmarks of an operation run by the National Security Agency, according to two intelligence experts with extensive knowledge of the NSA and its operations. In addition to the room's high-tech security, those intelligence experts told Salon, the exhaustive vetting process AT&T workers were put through before being granted top-secret security clearance points to the NSA, an agency known as much for its intense secrecy as its technological sophistication. "It was very hush-hush," said one of the former AT&T workers. "We were told there was going to be some government personnel working in that room. We were told, 'Do not try to speak to them. Do not hamper their work. Do not impede anything that they're doing.'" [snip] Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From decor at aaanet.ru Fri Jun 23 01:49:59 2006 From: decor at aaanet.ru (Galina B.) Date: Fri, 23 Jun 2006 11:49:59 +0300 Subject: Ave Message-ID: <007801c696a1$fe7ace80$6f0b000a@81.169.224.116> Hello… I'm a very young and energetic lady! I have very positive attitude to life and people. I do enjoy new experience life can offer me: to see new interesting places, to meet new people. I do try to enjoy every moment of life and accept everything the way it comes without complaining. Though my life seems to be quite enjoyable there's one important thing missing. It's LOVE! Without my beloved one, my soul mate, my King my life is not completed. I wish i coud find him very soon so that we could share together every momement of the life-time romance! What about you? Could you be my King? If answer is "yes" - you can find more about me http://im-waiting-4you.com/ see you later! Galya B. From rah at shipwright.com Fri Jun 23 08:54:13 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 23 Jun 2006 11:54:13 -0400 Subject: [Clips] New Furor Erupts as Spying Secret Is Compromised Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Fri, 23 Jun 2006 11:49:00 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] New Furor Erupts as Spying Secret Is Compromised Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The New York Sun June 23, 2006 Edition > Section: National > Printer-Friendly Version New Furor Erupts as Spying Secret Is Compromised BY JOSH GERSTEIN - Staff Reporter of the Sun June 23, 2006 A fresh barrage of criticism is erupting over the decision of The New York Times to disclose last night another classified surveillance program aimed at gathering information about terrorist plots. "The president is concerned that, once again, the New York Times has chosen to expose a classified program that is protecting the American people," a White House spokeswoman, Dana Perino, said last night. "We know that terrorists look for any clue about the weapons we're using to fight them and now, with this exposure, they have more information and it increases the challenge for our law enforcement and intelligence officials." The Times report, which appears in today's editions and was posted last evening on the paper's Web site, details the federal government's use of subpoenas to gather large troves of data from a Belgium-based consortium that handles international bank transfers, the Society for Worldwide Interbank Financial Telecommunication, known as Swift. The Times quoted an unnamed former government official describing Swift as "the mother lode, the Rosetta stone" of data on global banking operations. The newspaper said the surveillance effort helped lead to the capture in Thailand in 2003 of a top Al Qaeda op erative, Riduan Isamuddin, who also went by the name Hambali. The Times reported that it decided to report publicly on the program despite requests by administration officials that the newspaper not publish the story. The officials argued that the disclosure could reduce the effort's effectiveness, the newspaper said. The executive editor of the Times, Bill Keller, said the newspaper was not persuaded. "We have listened closely to the administration's arguments for withholding this information, and given them the most serious and respectful consideration," Mr. Keller said. "We remain convinced that the administration's extraordinary access to this vast repository of international financial data, however carefully targeted use of it may be, is a matter of public interest." The Times was already facing calls for its criminal prosecution in connection with a December report on a classified National Security Agency program for warrantless surveillance of telephone calls between America and abroad that are thought to involve people affiliated with terrorism. In that instance, President Bush reportedly summoned Mr. Keller and the publisher of the Times, Arthur Sulzberger Jr., to the Oval Office to ask that the story be killed. The disclosure led to a series of lawsuits by civil liberties advocates. Some lawmakers also have denounced the program as unlawful and an impermissible expansion of executive authority. A conservative magazine editor who is one of the leading advocates of prosecuting the Times for its December story, Gabriel Schoenfeld, told The New York Sun last night that the newspaper's latest move could increase their legal jeopardy. "They're courting prosecution. ... They're increasingly behaving like if we were in the middle of World War II and they learned of plans to invade Normandy. Because they decided it's a matter of public interest, they'd publish it," Mr. Schoenfeld said. "I think this is reckless and likely to encourage Attorney General Gonzales to prosecute them, if not for this story, for some of the other things they've done." Mr. Schoenfeld said that the latest disclosure by the Times about the financial surveillance was less clear cut as a legal violation because it did not appear to involve communications intelligence, which is specially protected under federal law. Mr. Schoenfeld said the new report would increase anger against the paper. "They really are testing the limits of congressional and executive branch patience. There's a lot of displeasure with what they're doing," said Mr. Schoenfeld, who edits Commentary magazine and writes a weekly column on chess for the Sun. However, the editor said he still considered a prosecution unlikely, on balance. "I'm not sure the Bush administration has a stomach for a fight with the media of that magnitude, but it's become more and more clear that it's necessary," Mr. Schoenfeld said. Reports about the financial surveillance program appeared yesterday on the Web sites of the New York Times, the Los Angeles Times, and the Wall Street Journal. The latter two seem to have learned of the Times's reporting, which has been under way for some time. The Treasury Department confirmed the existence of the program. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Jun 23 09:48:18 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 23 Jun 2006 12:48:18 -0400 Subject: [Clips] Blaze at offshore military fort Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Fri, 23 Jun 2006 12:44:44 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Blaze at offshore military fort Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The BBC Friday, 23 June 2006, 14:11 GMT 15:11 UK Blaze at offshore military fort A man was airlifted to hospital after a fire broke out on an old sea fort off the coast of East Anglia. The blaze started on Friday at Sealand, an inhabited former military platform, which is about seven miles east of the Suffolk-Essex coastline. Thames Coastguard said the platform was surrounded in thick black smoke. A coastguard spokesman said it was believed a generator caught fire. The one person on board was airlifted to Ipswich Hospital. Harwich lifeboat were also called to the scene. 'Territorial waters' Britain built the anti-aircraft platform during World War II. It remained derelict until the 1960s when a retired Army major, Paddy Roy Bates, took over the 10,000 sq ft platform and declared it the independent nation of Sealand. At the time, the platform was beyond the then three-mile limit of British territorial waters. All this changed in 1987, when the UK extended its territorial waters from three to 12 miles. The British Government does not recognise the sovereignty of Sealand. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bianca at mesoscale.meteo.mcgill.ca Fri Jun 23 10:50:50 2006 From: bianca at mesoscale.meteo.mcgill.ca (Leanne Rutledge) Date: Fri, 23 Jun 2006 12:50:50 -0500 Subject: shame of sex? we can change it Message-ID: <200606230704.k5N74oO1004463@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://bppu.coldicicle.info/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From eugen at leitl.org Fri Jun 23 05:52:30 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Jun 2006 14:52:30 +0200 Subject: [dave@farber.net: [IP] Secret U.S. Program Tracks Global Bank Transfers] Message-ID: <20060623125230.GD28956@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri Jun 23 07:58:50 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Jun 2006 16:58:50 +0200 Subject: Bank Data Secretly Reviewed by U.S. to Fight Terror Message-ID: <20060623145850.GI28956@leitl.org> http://www.nytimes.com/2006/06/22/washington/22cnd-intel.html?_r=1&ei=5094&en=3653468f88851bcd&hp=&ex=1151035200&oref=slogin&partner=homepage&pagewanted=all Bank Data Secretly Reviewed by U.S. to Fight Terror By ERIC LICHTBLAU and JAMES RISEN Published: June 22, 2006 Stuart Levey, an undersecretary at the Treasury Department, in a file photo. He said the program "has provided us with a unique and powerful window into the operations of terrorist networks." Graphic: A Money Transfer Related Site: Swift - Society for Worldwide Interbank Financial Telecommunication Data provided by the program helped identify Uzair Paracha, a Brooklyn man who was convicted on terrorism-related charges in 2005, officials said. Associated Press Among the program's successes was the capture of an Al Qaeda operative known as Hambali, believed to be the mastermind of the 2002 bombing of a Bali resort, several officials said. WASHINGTON, June 22 - Under a secret Bush administration program initiated weeks after the Sept. 11 attacks, counterterrorism officials have gained access to financial records from a vast international database and examined banking transactions involving thousands of Americans and others in the United States, according to government and industry officials. The program is limited, government officials say, to tracing transactions of people suspected of ties to Al Qaeda by reviewing records from the nerve center of the global banking industry, a Belgian cooperative that routes about $6 trillion daily between banks, brokerages, stock exchanges and other institutions. The records mostly involve wire transfers and other methods of moving money overseas or into and out of the United States. Most routine financial transactions confined to this country are not in the database. Viewed by the Bush administration as a vital tool, the program has played a hidden role in domestic and foreign terrorism investigations since 2001 and helped in the capture of the most wanted Qaeda figure in Southeast Asia, the officials said. The program, run out of the Central Intelligence Agency and overseen by the Treasury Department, "has provided us with a unique and powerful window into the operations of terrorist networks and is, without doubt, a legal and proper use of our authorities," Stuart Levey, an undersecretary at the Treasury Department, said in an interview Thursday. The program is grounded in part on the president's emergency economic powers, Mr. Levey said, and multiple safeguards have been imposed to protect against any unwarranted searches of Americans' records. The program, however, is a significant departure from typical practice in how the government acquires Americans' financial records. Treasury officials did not seek individual court-approved warrants or subpoenas to examine specific transactions, instead relying on broad administrative subpoenas for millions of records from the cooperative, known as Swift. That access to large amounts of sensitive data was highly unusual, several officials said, and stirred concerns inside the administration about legal and privacy issues. "The capability here is awesome or, depending on where you're sitting, troubling," said one former senior counterterrorism official who considers the program valuable. While tight controls are in place, the official added, "The potential for abuse is enormous." The program is separate from the National Security Agency's efforts to eavesdrop without warrants and collect domestic phone records, operations that have provoked fierce public debate and spurred lawsuits against the government and telecommunications companies. But all the programs grew out of the Bush administration's desire to exploit technological tools to prevent another terrorist strike, and all reflect attempts to break down longstanding legal or institutional barriers to the government's access to private information about Americans and others inside the United States. Officials described the Swift program as the biggest and most far-reaching of several secret efforts to trace terrorist financing. Much more limited agreements with other companies have provided access to A.T.M. transactions, credit card purchases and Western Union wire payments, the officials said. Nearly 20 current and former government officials and industry executives discussed aspects of the Swift operation with The New York Times on condition of anonymity because the program remains classified. Some of those officials expressed reservations about the program, saying that what they viewed as an urgent, temporary measure had become permanent nearly five years later without specific Congressional approval or formal authorization. Data from the Brussels-based banking consortium, formally known as the Society for Worldwide Interbank Financial Telecommunication, has allowed officials from the C.I.A., the Federal Bureau of Investigation and other agencies to examine "tens of thousands" of financial transactions, Mr. Levey said. While many of those transactions have occurred entirely on foreign soil, officials have also been keenly interested in international transfers of money by individuals, businesses, charities and other organizations under suspicion inside the United States, officials said. A small fraction of Swift's records involve transactions entirely within this country, but Treasury officials said they were uncertain whether any had been examined. Swift executives have been uneasy at times about their secret role, the government and industry officials said. By 2003, the executives told American officials they were considering pulling out of the arrangement, which began as an emergency response to the Sept. 11 attacks, the officials said. Worried about potential legal liability, the Swift executives agreed to continue providing the data only after top officials, including Alan Greenspan, then chairman of the Federal Reserve, intervened. At the same time, new controls were introduced. Among the program's safeguards, government officials said, is an outside auditing firm that verifies that the data searches are based on a link to terrorism intelligence. Swift and Treasury officials said they were aware of no abuses. But Mr. Levey, the Treasury official, said one person had been removed from the operation for conducting a search considered inappropriate. "We are not on a fishing expedition," Mr. Levey said. "We're not just turning on a vacuum cleaner and sucking in all the information that we can." Treasury officials said Swift was exempt from American laws restricting government access to private financial records because the cooperative was considered a messaging service, not a bank or financial institution. But at the outset of the operation, Treasury and Justice Department lawyers debated whether the program had to comply with such laws before concluding that it did not, people with knowledge of the debate said. Several outside banking experts, however, say that financial privacy laws are murky and sometimes contradictory and that the program raises difficult legal and public policy questions. The Bush administration has made no secret of its campaign to disrupt terrorist financing, and President Bush, Treasury officials and others have spoken publicly about those efforts. Administration officials, however, asked The New York Times not to publish this article, saying that disclosure of the Swift program could jeopardize its effectiveness. They also enlisted several current and former officials, both Democrat and Republican, to vouch for its value. Bill Keller, the newspaper's executive editor, said: "We have listened closely to the administration's arguments for withholding this information, and given them the most serious and respectful consideration. We remain convinced that the administration's extraordinary access to this vast repository of international financial data, however carefully targeted use of it may be, is a matter of public interest." Swift declined to discuss details of the program but defended its role in written responses to questions. "Swift has fully complied with all applicable laws," the consortium said. The organization said it insisted that the data be used only for terrorism investigations and had narrowed the scope of the information provided to American officials over time. A Crucial Gatekeeper Swift's database provides a rich hunting ground for government investigators. Swift is a crucial gatekeeper, providing electronic instructions on how to transfer money between 7,800 financial institutions worldwide. The cooperative is owned by more than 2,200 organizations, and virtually every major commercial bank, as well as brokerage houses, fund managers and stock exchanges, uses its services. Swift routes more than 11 million transactions each day, most of them across borders. The cooperative's message traffic allows investigators, for example, to track money from the Saudi bank account of a suspected terrorist to a mosque in New York. Using intelligence tips about specific targets, agents search the database in what one official described as a "24-7" operation. Customers' names, bank account numbers and other identifying information, can be retrieved, the officials said. The data does not allow the government to track routine financial activity, like A.T.M. withdrawals, confined to this country, or to see bank balances, Treasury officials said. And the information is not provided in real time - Swift generally turns it over several weeks later. Because of privacy concerns and the potential for abuse, the government sought the data only for terrorism investigations and prohibited its use for tax fraud, drug trafficking or other inquiries, the officials said. The Treasury Department was charged by President Bush, in a September 2001 executive order, with taking the lead role in efforts to disrupt terrorist financing. Mr. Bush has been briefed on the program and Vice President Dick Cheney has attended C.I.A. demonstrations, the officials said. The National Security Agency has provided some technical assistance. While the banking program is a closely held secret, administration officials have conducted classified briefings to some members of Congress and the Sept. 11 Commission, the officials said. More lawmakers were briefed in recent weeks, after the administration learned The Times was making inquiries for this article. Swift's 25-member board of directors, made up of representatives from financial institutions around the world, was previously told of the program, but it is not clear if other participants know that American intelligence officials can examine their message traffic. Because Swift is based overseas and has offices in the United States, it is governed both by European and American laws. Several international regulations and policies impose privacy restrictions on companies that are generally regarded as more stringent than those in this country. United States law establishes some protections for the privacy of Americans' financial data, but they are not ironclad. A 1978 measure, the Right to Financial Privacy Act, has a limited scope and a number of exceptions, and its role in national security cases remains largely untested. Several people familiar with the Swift program said they believed they were exploiting a "gray area" in the law and that a case could be made for restricting the government's access to the records on Fourth Amendment and statutory grounds. They also worried about the impact on Swift if the program were disclosed. "There was always concern about this program," a former official said. One person involved in the Swift program estimated that analysts have reviewed international transfers involving "many thousands" of people or groups in the United States. Two other officials also placed the figure in the thousands. Mr. Levey said he could not estimate the number. The Swift data has provided clues to terror money trails and ties between possible terrorists and organizations financing them, the officials said. In some instances, they said, the program has pointed them to new suspects, while in others it has buttressed cases already under investigation. Among the successes was the capture of a Qaeda operative, Riduan Isamuddin, better known as Hambali, believed to be the mastermind of the 2002 bombing of a Bali resort, several officials said. The Swift data identified a previously unknown figure in Southeast Asia who had financial dealings with a person suspected of being a member of Al Qaeda; that link helped locate Hambali in Thailand in 2003, they said. In the United States, the program has provided financial data in investigations into possible domestic terrorist cells as well as inquiries of Islamic charities with suspected of having links to extremists, the officials said. The data also helped identify a Brooklyn man who was convicted on terrorism-related charges last year, the officials said. The man, Uzair Paracha, who worked at a New York import business, aided a Qaeda operative in Pakistan by agreeing to launder $200,000 through a Karachi bank, prosecutors said. In terrorism prosecutions, intelligence officials have been careful to "sanitize," or hide the origins of evidence collected through the program to keep it secret, officials said. The Bush administration has pursued steps that may provide some enhanced legal standing for the Swift program. In late 2004, Congress authorized the Treasury Department to develop regulations requiring American banks to turn over records of international wire transfers. Officials say a preliminary version of those rules may be ready soon. One official described the regulations as an attempt to "formalize" access to the kind of information secretly provided by Swift, though other officials said the initiative was unrelated to the program. The Scramble for New Tools Like other counterterrorism measures carried out by the Bush administration, the Swift program began in the hectic days after the Sept. 11 attacks, as officials scrambled to identify new tools to head off further strikes. One priority was to cut off the flow of money to Al Qaeda. The Sept. 11 hijackers had helped finance their plot by moving money through banks. Nine of the hijackers, for instance, funneled money from Europe and the Middle East to SunTrust bank accounts in Florida. Some of the $130,000 they received was wired by people overseas with known links to Al Qaeda. Financial company executives, many of whom had lost friends at the World Trade Center, were eager to help federal officials trace terrorist money. "They saw 9/11 not just as an attack on the United States, but on the financial industry as a whole," said one former government official. Quietly, counterterrorism officials sought to expand the information they were getting from financial institutions. Treasury officials, for instance, spoke with credit card companies about devising an alert if someone tried to buy fertilizer and timing devices that could be used for a bomb, but they were told the idea was not logistically possible, a lawyer in the discussions said. The F.B.I. began acquiring financial records from Western Union and its parent company, First Data Corporation. The programs were alluded to in Congressional testimony by the F.B.I. in 2003 and described in more detail in a book released this week, "The One Percent Doctrine," by Ron Suskind. Using what officials described as individual, narrowly framed subpoenas and warrants, the F.B.I. has obtained records from First Data, which processes credit and debit card transactions, to track financial activity and try to locate suspects. Similar subpoenas for the Western Union data allowed the F.B.I. to trace wire transfers, mainly outside the United States, and to help Israel trace the financing of about a half-dozen possible terrorist plots there, an official said. The idea for the Swift program, several officials recalled, grew out of a suggestion by a Wall Street executive, who told a senior Bush administration official about Swift's database. Few government officials knew much about the consortium, which is led by a Brooklyn native, Leonard H. Schrank, but they quickly discovered it offered unparalleled access to international transactions. Swift, a former government official said, was "the mother lode, the Rosetta stone" for financial data. Intelligence officials were so eager to exploit the Swift data that they discussed having the C.I.A. covertly gain access to the system, several officials involved in the talks said. But Treasury officials resisted, the officials said, and favored going to Swift directly. At the same time, lawyers in the Treasury Department and the Justice Department were considering possible legal obstacles to the arrangement, the officials said. In 1976, the Supreme Court ruled that Americans had no constitutional right to privacy for their records held by banks or other financial institutions. In response, Congress passed the Right to Financial Privacy Act two years later, restricting government access to Americans' banking records. In considering the Swift program, some government lawyers were particularly concerned about whether the law prohibited officials from gaining access to records without a warrant or subpoena based on some level of suspicion about each target. For many years, law enforcement officials have relied on grand-jury subpoenas or court-approved warrants for such financial data. Since the Sept. 11 attacks, the F.B.I. has turned more frequently to an administrative subpoena, known as a national security letter, to demand such records. After an initial debate, Treasury Department lawyers, consulting with the Justice Department, concluded that the privacy laws applied to banks, not to a banking cooperative like Swift. They also said the law protected individual customers and small companies, not the major institutions that route money through Swift on behalf of their customers. Other state, federal and international regulations place different and sometimes conflicting restrictions on the government's access to financial records. Some put greater burdens on the company disclosing the information than on the government officials demanding it. Among their considerations, American officials saw Swift as a willing partner in the operation. But Swift said its participation was never voluntary. "Swift has made clear that it could provide data only in response to a valid subpoena," according to its written statement. Indeed, the cooperative's executives voiced early concerns about legal and corporate liability, officials said, and the Treasury Department's Office of Foreign Asset Control began issuing broad subpoenas for the cooperative's records related to terrorism. One official said the subpoenas were intended to give Swift some legal protection. Underlying the government's legal analysis was the International Emergency Economic Powers Act, which Mr. Bush invoked after the Sept. 11 attacks. The law gives the president what legal experts say is broad authority to "investigate, regulate or prohibit" foreign transactions in responding to "an unusual and extraordinary threat." But L. Richard Fischer, a Washington lawyer who wrote a book on banking privacy and is regarded as a leading expert in the field, said he was troubled that the Treasury Department would use broad subpoenas to demand large volumes of financial records for analysis. Such a program, he said, appears to do an end run around bank-privacy laws that generally require the government to show that the records of a particular person or group are relevant to an investigation. "There has to be some due process," Mr. Fischer said. "At an absolute minimum, it strikes me as inappropriate." Several former officials said they had lingering concerns about the legal underpinnings of the Swift operation. The program "arguably complies with the letter of the law, if not the spirit," one official said. Another official said: "This was creative stuff. Nothing was clear cut, because we had never gone after information this way before." Treasury officials would not say whether a formal legal opinion was prepared in authorizing the program, but they said they considered the government's authority to subpoena the Swift records to be clear. "People do not have a privacy interest in their international wire transactions," Mr. Levey, the Treasury under secretary, said. Tighter Controls Sought Within weeks of the Sept. 11 attacks, Swift began turning over records that allowed American analysts to look for evidence of terrorist financing. Initially, there appear to have been few formal limits on the searches. "At first, they got everything - the entire Swift database," one person close to the operation said. Intelligence officials paid particular attention to transfers to or from Saudi Arabia and the United Arab Emirates because most of the Sept. 11 hijackers were from those countries. The volume of data, particularly at the outset, was often overwhelming, officials said. "We were turning on every spigot we could find and seeing what water would come out," one former administration official said. "Sometimes there were hits, but a lot of times there weren't." Officials realized the potential for abuse, and soon narrowed the program's targets and put in more safeguards. Among them were the auditing firm, an electronic record of every search and a form documenting the intelligence that justified each data search. Mr. Levey said the program was used only to search the records of individuals or entities, not for broader data searches. Despite the controls, Swift executives became increasingly worried about their secret involvement with the American government, the officials said. By 2003, the cooperative's officials were discussing pulling out because of their concerns about legal and financial risks if the program were revealed, one government official said. "How long can this go on?" a Swift executive asked, according to the official. Even some American officials began to question the open-ended arrangement. "I thought there was a limited shelf life and that this was going to go away," the former senior official said. In 2003, administration officials asked Swift executives and some board members to come to Washington. They met with Mr. Greenspan, Robert S. Mueller III, the F.B.I. director, and Treasury officials, among others, in what one official described as "a full-court press." The executives agreed to continue supplying records after the Americans pledged to impose tighter controls. Swift representatives would be stationed alongside intelligence officials and could block any searches considered inappropriate, several officials said. The procedural change provoked some opposition at the C.I.A. because "the agency was chomping at the bit to have unfettered access to the information," a senior counterterrorism official said. But the Treasury Department saw it as a necessary compromise, the official said, to "save the program." -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From MULSHNL at hotmail.com Fri Jun 23 18:27:18 2006 From: MULSHNL at hotmail.com (Bernadine Mckinney) Date: Fri, 23 Jun 2006 19:27:18 -0600 Subject: Hate Study? pUcqFD Message-ID: <68KC87FE.0J24.MULSHNL@hotmail.com> Good News! Interested to obtain Bachelors', Masters', MBA's, Doctorate & Ph.D. degree= s available in your field in 2 weeks time? It's available now... Call Us and get yours today 1-484-693-8861 Our Education office has someone available 24 hours a day, 7 Days a week Why waiting? 1-484-693-8861 vgnOm From DTKUIAJZPINGAM at msn.com Fri Jun 23 13:32:57 2006 From: DTKUIAJZPINGAM at msn.com (Derek Ayala) Date: Fri, 23 Jun 2006 23:32:57 +0300 Subject: King of Pharrmacy Vu Message-ID: The most complete Phar. macy Online We carry all major medds at bargain price Viggra, Ci ialis, VaIium, Xa naax Phantermiine, Ulltraam and etc... SatiisfactIon Gua ranteeed http://discountofthecenturies.net/?wid=3D102 avT From dave at farber.net Sat Jun 24 04:09:03 2006 From: dave at farber.net (David Farber) Date: Sat, 24 Jun 2006 07:09:03 -0400 Subject: [IP] Greek cellular wiretapping scandal Message-ID: Begin forwarded message: From emc at artifact.psychedelic.net Sat Jun 24 09:31:38 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 24 Jun 2006 09:31:38 -0700 (PDT) Subject: Search Filtering at Ask.Com Message-ID: <200606241631.k5OGVco7009139@artifact.psychedelic.net> "This query does not comply with Ask.com Terms of Service" http://blog.searchenginewatch.com/blog/060623-090957 Amusingly, you can't search for "pedophilia", but "paedophilia" works fine. Apparently sexualizing European children isn't as filthy as sexualizing American children. You can't search for "naked children", but the first hit on "lolita," which you can search for, is an advertisement for pictures of naked children. "Preventing child pornography" is a no-no. "Sex offenders" works. "Protecting kids from sex offenders" doesn't. "Bestiality" is blocked. But "sodomized by a horse" returns all sorts of hits, including one about a man who died of massive internal injuries while tresspassing at a stud farm. Am I the only one who thinks ask.com is being silly here? For every blocked term, there is an nearly identical unblocked term you can search for. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From alex_crypto_newsletters at noemax.com Sat Jun 24 01:26:38 2006 From: alex_crypto_newsletters at noemax.com (Alexander Philippou) Date: Sat, 24 Jun 2006 11:26:38 +0300 Subject: Greek cellular wiretapping scandal Message-ID: > From a non-technical perspective, at least one death may be > linked to the incident. A communications expert who was working on the > switch apparently commited suicide, but this has been > questioned by some. It was recently concluded that there was no foul play involved in his tragic death. The arguments are convincing enough. However, it has not been concluded yet if he was somehow involved in or had knowledge about the wiretapping, and whether this might have been a factor in his suicide. > were in contact via phone calls and text messages with various > overseas destinations, namely the U.S., including Laurel, Md., the > Guess what's just to the east of Laurel, MD... On the other > hand, exposing links like that is clumsy -- could it be > disinformation? Yes, it might have been clumsy operation-wise. Clumsiness was involved in last year's incident in Italy: "it was a trail of casual cellphone use that tripped up the 19 purported CIA operatives wanted by Italian authorities in the alleged kidnapping of a radical Muslim cleric". http://www.cnn.com/2005/WORLD/europe/07/28/cia.phonetrail.ap/. On the other hand, no publicly available information has linked the locations of the phones involved in the Greek wiretapping with foreign agencies. Various opinions have been voiced on who might be behind this affair, but no accusations have been made against the US or any other government. > And one of the phones monitored was from the > American embassy in Athens -- or is that the disinformation? > Or is NSA spying on the embassy? You are in a maze of twisty > little spooks, all different. "One telephone was listed to an inconspicuous Greek-American at the US Embassy. Journalists learned the phone had been lent to the embassy's Greek police security detail." http://www.thenation.com/doc/20060320/kiesling > The attack was very sophisticated, and required a great deal > of arcane knowledge. Whoever did it had detailed knowledge > of Ericsson switches, and probably a test lab with the proper > Ericsson gear. It strongly suggests that Ericsson and/or > Vodafone insiders were involved -- my guess is both. But who > did it, and why, remains obscure. The investigation is still ongoing. It will be interesting to read the final report. Alexander Philippou --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From omjeoeyr at surfbest.net Sat Jun 24 16:05:27 2006 From: omjeoeyr at surfbest.net (Ofer) Date: Sat, 24 Jun 2006 18:05:27 -0500 Subject: Gifts for the whole family Message-ID: <516k439t.7289849@nycboe.net> ! withstood it della try lefty or bigelow ! indifferent -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 775 bytes Desc: not available URL: From coderman at gmail.com Sat Jun 24 18:25:13 2006 From: coderman at gmail.com (coderman) Date: Sat, 24 Jun 2006 18:25:13 -0700 Subject: missing info on "special collections service" Message-ID: <4ef5fec60606241825t4b1c5432g59630f1d61f323ab@mail.gmail.com> pages discussing the "special collections service" run by CIA/NSA appear to be 404'ing (with exception of cryptome archives perhaps). anyone have archives of the FAS docs, cetin.net.cn pages, etc? additional relevant details? "those who talk don't know, those who know don't talk"... From coderman at gmail.com Sat Jun 24 22:04:55 2006 From: coderman at gmail.com (coderman) Date: Sat, 24 Jun 2006 22:04:55 -0700 Subject: Scott Marcus Declaration on ATT/NSA Spying Message-ID: <4ef5fec60606242204w5f445fc1oa488a0cf0834308@mail.gmail.com> thanks JYA, http://cryptome.org/scott-marcus.pdf some interesting tidbits: 'Klein Exhibit C speaks of a private tap? backbone network, which appears to be partitioned from AT&T's main Internet backbone, the CBB.[15] This suggests the presence of a private network. The most plausible inference is that this was a covert network that was used to ship data of interest to one or more central locations for still more intensive analysis. I return to the capabilities of the Tap? Configurations later in this Declaration, under "Capabilities of the Tap? Configuration."' words with a '?' are my guess as to the censored content. funny tidbit, they forgot to blank out "Narus" in "the Narus system" in one spot, can you find it? :) [let's play a game of fill in the blanks!] interesting that on-network links were not tapped, as seems to be inferred. also interesting that AT&T began selling "internet protect" that uses similar methods (profile/anomaly based). From jya at pipeline.com Sat Jun 24 22:29:16 2006 From: jya at pipeline.com (John Young) Date: Sat, 24 Jun 2006 22:29:16 -0700 Subject: missing info on "special collections service" In-Reply-To: <4ef5fec60606241825t4b1c5432g59630f1d61f323ab@mail.gmail.co m> Message-ID: The FAS file on SCS and the Jason Vest article from the Village Voice, archived in May 2002: http://cryptome.org/fas-scsfac.zip (240KB) Three eyeballs of SCS: http://eyeball-series.org/scs-eyeball.htm http://eyeball-series.org/scsbig-eyeball.htm http://eyeball-series.org/scs-birdseye.htm Anything new you turn would be welcomed. According to Ron Susskind's new book SCS-type operations have greatly increased in number and type of invasion since 9/11, and may be the principal action against freedom fighters and their supporters. DoD is doing the black jobs now also with its own special operations units. Air Force Special Operations Command (AFSOC) delivers the undercover teams -- CIA and special forces from all the military branches -- worldwide and provides protection as well as operates the murderous UAVs. A few hi-rez photos on the AFSOC website showing the UAVs being maintained and armed by contractors. Teams are reportedly in Iran, North Korea, China, Syria and some contentious parts of the former Soviet Union -- bases are located in the various central Asia 'stans, Taiwan, Japan. Some working on North Korea are coming from China with that government's okay, but others are working parts of China without an okay. Venezuela is doomed, the ninjas cackle. From rah at shipwright.com Sat Jun 24 20:37:11 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 24 Jun 2006 23:37:11 -0400 Subject: [Clips] U.S. Is Moving on Several Fronts To Police Financial Transactions Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 24 Jun 2006 23:34:16 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] U.S. Is Moving on Several Fronts To Police Financial Transactions Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal U.S. Is Moving on Several Fronts To Police Financial Transactions By GLENN R. SIMPSON June 24, 2006 The Treasury Department's newly disclosed program to track suspected terrorists by examining records of international financial transactions is just one component of an expanding effort by American security officials to more closely monitor suspect financial dealings. U.S. officials also are privately asking the banking industry to change the ways that banks record international transactions so the data are more complete and more accurate, several executives and industry officials said. Regulators are concerned that banks in some cases aren't producing records that disclose all information about senders and recipients of wire transfers, prompting regulators from the Federal Reserve and other agencies to raise questions about record-keeping practices in recent examinations. Officials are also weighing new regulations to make U.S. banks disclose details of all cross-border transfers to law-enforcement agencies. At the moment, American banks aren't required to report when they make financial transfers less than $3,000 between the U.S. and other countries. These new steps come on the heels of a variety of new reporting requirements put into place by U.S. regulators shortly after the Sept. 11, 2001, terrorist attacks. While many are aimed at thwarting terrorists and their supporters, U.S. officials also have other goals. They aim to use cross-border transaction data to enforce U.S. economic sanctions and to apply U.S. tax laws to American citizens who move money offshore. The initiatives rely on a patchwork of existing laws that allow the government to take these steps, and their legality generally isn't disputed. Still, the government's financial-surveillance activities may face new scrutiny following the disclosure this past week of the Treasury Department's secret Terrorist Finance Tracking Program. Using it on behalf of American intelligence and law-enforcement officials, the Treasury seeks information from a database of international wire transactions maintained by a Belgian firm known as Swift, an industry cooperative that serves as a clearinghouse for the majority of overseas transactions on behalf of banks and financial institutions. The Treasury program's existence was acknowledged on the record by U.S. officials for the first time on Thursday. "I am particularly proud of our Terrorist Finance Tracking Program which, based on intelligence leads, carefully targets financial transactions of suspected foreign terrorists," Treasury Secretary John Snow said at a news conference Friday. Some congressional Democrats and some civil-liberties activists criticized the program as a privacy threat, but most law-enforcement and banking-industry officials, and many political leaders, joined the Bush administration in defending it as appropriate. "Financial institutions are seeking to cooperate with law enforcement in this very critical fight against terrorist financing," said Lawrence Uhlick of the Institute for International Bankers. "I think this is a pretty clear case of the right kind of cooperation within the legal process." David Caruso, a former Secret Service agent and banking consultant, called the program "an aggressive but pretty wise use of power." Swift, which stands for the Society for Worldwide Interbank Financial Telecommunication, processes the millions of electronic messages sent daily by banks and brokerages to coordinate international transactions. While law-enforcement officials have traditionally subpoenaed individual banks when seeking information, the newly disclosed program involves broad government subpoenas to Swift for data on specific terrorists. While the reaction to disclosure of the program was generally muted, some banking executives say they still are concerned that the government's broader campaign to scoop up wire-transfer data from Swift and others could trigger a backlash. That might even weaken the dollar if institutions decide transactions made in dollars are more likely to attract the attention of American investigators. For now, U.S. officials remain interested in extracting more detail on international transactions that could involve criminal activity or suspect individuals. Most cross-border wire transfers contain sets of instructions in one of two standard Swift formats, and officials are concerned that in some cases people and groups are using a format that allows them to improperly hide their identities, several people with direct knowledge of the matter said. The issue arose after Treasury discovered that ABN Amro of the Netherlands improperly used a Swift form designed for large bank-to-bank transfers to deliberately hide transactions with Iran, a longtime target of U.S. economic sanctions. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sat Jun 24 20:37:26 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sat, 24 Jun 2006 23:37:26 -0400 Subject: [Clips] American Executive in Brussels Aided Terrorist-Tracking Program Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sat, 24 Jun 2006 23:35:54 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] American Executive in Brussels Aided Terrorist-Tracking Program Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal American Executive in Brussels Aided Terrorist-Tracking Program By GLENN R. SIMPSON June 24, 2006 The Treasury Department's secret terrorist-tracking program depended in part on the cooperation of Leonard "Lenny" Schrank, an American executive who heads the Belgium-based banking cooperative known as Swift. A gregarious technology whiz who graduated from the Massachusetts Institute of Technology, the Brooklyn-born Mr. Schrank ended up working closely with U.S. intelligence officials on the project when Swift received subpoenas from the Treasury Department following the Sept. 11, 2001, attacks, people familiar with the program said. Mr. Schrank, who described Swift's general operations in a meeting with a Wall Street Journal reporter last year, declined Friday to be interviewed regarding the terrorist-tracking program. Swift stands for the Society for Worldwide Interbank Financial Telecommunication. The firm, based in the Brussels suburb of La Hulpe, was founded in 1973 to promote "a common language for international financial transactions," according to the Swift Web site. Within the banking industry, Mr. Schrank is credited with developing the financial-telecommunications cooperative into a vital if obscure cog in the globalization of financial services since becoming chief executive in 1992. An expert in information technology who has degrees in computer science and electrical engineering, Mr. Schrank has been involved in the technology business since founding a software company in the 1970s. At Swift, he implemented a reliable, secure and high-capacity messaging network that has enabled banks and brokerages to move money around the globe almost effortlessly. Under Mr. Schrank, a fan of the U.S. space program, Swift adopted the Apollo mission motto, "Failure Is Not an Option." Last year, Swift brought Apollo 13 astronaut Alan Bean to speak at its headquarters to help promote its "culture of commitment to provide services of the highest security, reliability and resilience," according to Swift's most recent annual report. Mr. Schrank is one of the best-known American businessmen in Brussels, where he also serves as president of the American Chamber of Commerce in Belgium. He is planning to retire next year. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Sat Jun 24 21:40:13 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 25 Jun 2006 00:40:13 -0400 Subject: [Clips] Sealand in ruins after blaze Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sun, 25 Jun 2006 00:38:45 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Sealand in ruins after blaze Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com EADT - 05:28 > Sunday 25th June 2006 Sealand in ruins after blaze 24 June 2006 | 09:21 CRAIG ROBINSON A FORMER wartime fortress which is now a self-proclaimed independent state has been left devastated after a fierce blaze tore through the structure. The so-called Principality of Sealand, seven miles off the coast of Felixstowe and Harwich, was evacuated at lunchtime yesterdayafter a generator caught fire. Thames Coastguard, Harwich RNLI lifeboat, Felixstowe Coastguard rescue teams, firefighting tug Brightwell, the RAF rescue helicopter from Wattisham and 15 Suffolk based firefighters from the National Maritime Incident Response Group (MIRG) were all called into action to tackle the blaze. One man, believed to be a security guard, was airlifted from the scene and taken to Ipswich Hospital with smoke inhalation but no one else was on the Second World War gun emplacement. Emergency services were first alerted to the drama just after midday when eyewitnesses noticed huge clouds of black smoke billowing out of the concrete structure, which is owned by self-styled King Roy Bates. Brian Ironman, who was fishing just off Sealand along with his dog Rosie, said he noticed something was wrong around 11.30am. "I'd been fishing nearby since 7am for smoothhound and tope and just before lunchtime I noticed there was a lot of smoke coming from the back end of the tower," he said. "I immediately thought something was wrong and called the coastguard straight away. They were here fairly quickly and there were about five or six extinguishers trying to put the fire out. "The helicopter also arrived and I think it picked up one person who was on the platform." Andrew Beal, a council worker from Trimley who watched events unfold from his beach hut at Brackenbury, said: "There was thick black smoke billowing out of the gun emplacement. Air sea rescue was heading out at high speed and hovered over the platform and appeared to be taking someone off. "There were several other vessels heading out, including a lifeboat, and there was a boat out there hosing it down. The smoke was hundreds of feet high in the air." Rod Markham, who runs angling trips out of Felixstowe Ferry in his boat Tracy Jane, was able to see the excitement from his house. "At first I just thought they were stoking up the generators because there is always a bit of smoke - I never realised it was on fire," he said. "But when I looked back after I'd messed about a bit in the garden I saw there was a big deluge of black and that's when I saw the lifeboat and tug were there." Firefighting tug Brightwell from the port of Felixstowe was despatched to the scene and doused the flames with vast amounts of water. A team of 15 off-shore firefighters from the National Maritime Incident Response Group (MIRG) were also assembled but after a reconnaissance of the area from the air it was decided it was too dangerous to land. Keith Churchman, of Harwich Royal National Lifeboat Institution, said: "The damage is very extensive. The fire started in a generator and spread quickly to the accommodation. "There have been a number of explosions on board as the fire has engulfed gas bottles and batteries. Only one person was on Sealand at the time, whom we understand to be a watchman whose job was to maintain the generators and equipment. "A team of firefighters was flown to the scene but because of the damage to the structure they decided not to go on board. "A firefighting tug sprayed the whole structure with water in the hope this would eventually cool the fire and starve it of oxygen." A spokesperson for Suffolk Fire Service confirmed the fire was left to burn itself out and was under control by 3.10pm. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tkuhn at cid-sa.com Sat Jun 24 17:50:14 2006 From: tkuhn at cid-sa.com (Leona Hooper) Date: Sun, 25 Jun 2006 03:10:14 +0180 Subject: with T0m r0b 's market indicated J0hn Message-ID: <8584673536.20060625031014@cid-sa.com> AGA Resources Climbs 33% after announcing the Acquisition Of Triumph Research LTD and Beijing Tangde International Film and Culture Co. LTD This is climbing move now. AGA Resources Inc. A G A 0 Open: $2.25 Close: $3.00 Up: 33% AGA announced its Acquisition of a B.V.I. company to become involved in a Media and Entertainment Joint Venture in China. This agreement gives them controlling shares of Triumph and all its investment ventures in China. this has also drawn attention to AGA's current exploration of minerals in there acquired properties in British Columbia, in which recent purchase of Diamond Core drilling equipment that can explore to a depth of 1400 feet, has excited its current investors and today brought more investors to the table. With an increase in price of 33% and the excitement building on this company, we strongly encourage you to review the recent news releases and get on board while the price is still low. Place your bid first thing Monday morning. From coderman at gmail.com Sun Jun 25 18:37:34 2006 From: coderman at gmail.com (coderman) Date: Sun, 25 Jun 2006 18:37:34 -0700 Subject: [dave@farber.net: [IP] Greek cellular wiretapping scandal] In-Reply-To: <20060625201705.GL28956@leitl.org> References: <20060625201705.GL28956@leitl.org> Message-ID: <4ef5fec60606251837l53179714gdb25a2d8abfce663@mail.gmail.com> On 6/25/06, Eugen Leitl wrote: > ... > The problem was discovered when some people had problems sending text > messages; the link between the two issues is unclear. all circuits busy! oops. the problem with one way conferences like this is that you tie up significant switch resources (a "conference resource" or other such name, in addition to the outbound spans required for covert relay to destination). the problems with text messages probably occurred during peak usage periods when contention for finite switch resources (provisioned _without_ clandestine circuits in use :) hits service affecting limits. > The bug itself wasn't simply a matter of turning on Lawful Intercept > That software did exist in the switch, but everyone says it wasn't > activated and Ericsson wasn't paid for it. (Aside: Greece does have a > CALEA-like law, which means it should have been enabled.) we are so familiar with license codes to activate functionality in enterprise software i don't see why this is much of a point. of course there is CALEA like functionality. the focus on CALEA is more a bureaucratic aspect; the technical implementation of a one way conference is trivial, the proper controls and administration for CALEA implementation using such a technique is probably 10x to 100x more effort to satisfy all the legal requirements and user friendly feature richness. > ... In > addition, the attack required some other software that activated the > Lawful Intercept but hid its existence. In other words, it was a rootkit > running on a phone switch. bingo. a very practical approach assuming you have the insider access to implement. maybe even hired a grey/black hat to code it (as SMB mentioned the free reign hackers have enjoyed on telco neworks in the past). > I have more than a passing aquaintance with > the complexity of phone switch software; doing that was *hard* for > anyone, especially anyone not a switch developer. it definitely appears to be the work of an Ericson telco coder working in conjunction with the Vodafone tech to get the configuration and deployment of the eavesdropping implemented. the basic prerequisites: - one telco coder who knows the API / state machine of the soft switch to code to, either at an API level (sounds like it, as this was a process working with the legitimate soft switch programs on a unix host) but could be done at a network level (process monitoring and injecting call process commands directly to switch hardware at a low level - harder to do, but can be more stealthy) - one technician who can supply the current switch configuration (spans from towers / carriers, their signalling characteristics, etc) - telco test configuration (a softswitch configuration as close to target configuration as possible, a tsunami or other bulk call generator / call test harness) - time and money. work out the proper configuration for identifying incoming calls of interest, bridge to available one way conference, connect conference outbound to pool of relay/destination cell phones. > Installing the rogue software > quite likely involved "authorized access to Vodafone's networks". that suicide looks really suspicious, doesn't it? > ... the prepaid phones that could pick up the calls > were in contact via phone calls and text messages with various > overseas destinations, namely the U.S., including Laurel, Md., LOL, ROFFLE, etc. > the U.K., Sweden and Australia, according to the ADAE preliminary > report. Some of these calls and messages were initiated and > received directly from the 14 interceptor phones and some were > relayed via a second group of at least three other prepaid phones > that also were in contact with the 14 interceptor phones. the nature of this relay would be interesting to discover. was this a forwarded type relay (i.e. handset not active, forward to this number?) or a store and forward, like voicemail, or what? > Guess what's just to the east of Laurel, MD... On the other hand, > exposing links like that is clumsy -- could it be disinformation? it was intentional, there's no way that was an accident. perhaps it was intentional so they could say of course we didn't do it because we're not that stupid? or perhaps it's all an elaborate ruse to make us think in that direction, and clearly i shouldn't choose the cup in front of me! .. er, back to the story: > And one > of the phones monitored was from the American embassy in Athens -- or is > that the disinformation? Or is NSA spying on the embassy? You are in a > maze of twisty little spooks, all different. mission accomplished, too many contradictions and potential deceits and distractions. need to talk to someone with knowledge of the activity (oh wait, that problem is neatly resolved by convenient suicide) oh well, speculation is more fun anyway... > The attack was very sophisticated, and required a great deal of arcane > knowledge. not arcane, just highly specialized and complicated. people do this all the time all over the world for a living. ho hum, soft switching hasn't been rocket science since the 1990's :P > Whoever did it had detailed knowledge of Ericsson switches, > and probably a test lab with the proper Ericsson gear. It strongly > suggests that Ericsson and/or Vodafone insiders were involved -- my > guess > is both. yup, agreed on all counts. since the Vodafone insider is "expired" perhaps the Ericsson / telco coder will surface with a additional digging. i'd bet on powerball before that outcome though... From rah at shipwright.com Sun Jun 25 18:41:47 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 25 Jun 2006 21:41:47 -0400 Subject: [Clips] Iraq soldiers' phones hacked Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Sun, 25 Jun 2006 20:53:42 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Iraq soldiers' phones hacked Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Daily Telegraph Iraq soldiers' phones hacked June 26, 2006 MOBILE phone calls home made by British soldiers in Iraq may have been intercepted by insurgents, it was reported yesterday. Soldiers have been warned of the danger of insurgents using electronic equipment to intercept their calls and obtain the numbers of their family in the UK. The Ministry of Defence confirmed there was concern over reports of "nuisance calls" to servicemen's families. It played down suggestions that the calls had included death threats. A Territorial Army document warned that insurgents in southern Iraq had managed to obtain the home telephone numbers of British soldiers using electronic intercept devices. It said there had been "many instances in the last weeks of relatives and friends of personnel serving abroad on operations getting nuisance phone calls". The newspaper report suggested that the calls had included claims that a father or son serving in Iraq is dead or will soon be killed, as well as verbal abuse or silence. The Ministry of Defence said: "There have been reports of nuisance calls to the families of service personnel. To our knowledge, nuisance calls have been just that - nuisance calls. "We are not currently aware of any reports of anything more sinister." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Sun Jun 25 12:51:24 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 25 Jun 2006 21:51:24 +0200 Subject: [dewayne@warpspeed.com: [Dewayne-Net] Is the NSA spying on U.S. Internet traffic?] Message-ID: <20060625195124.GD28956@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From eugen at leitl.org Sun Jun 25 13:17:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 25 Jun 2006 22:17:05 +0200 Subject: [dave@farber.net: [IP] Greek cellular wiretapping scandal] Message-ID: <20060625201705.GL28956@leitl.org> ----- Forwarded message from David Farber ----- From CoravGBarber at westsound.com Sun Jun 25 12:53:34 2006 From: CoravGBarber at westsound.com (jesat_17) Date: Sun, 25 Jun 2006 23:53:34 +0400 Subject: You can have a Rolex for under $500 20 Message-ID: Low priced replicas available in all styles. Mens, womans and childrens. These watches are of great quality and are replicated to mirror the real thing. Excellent prices that cannot be passed up Take a look at our selection of watches http://uym.rolzbulgari.com/ All those problems, they weren't us. Many are called but few are chosen Yao and myself, Chien-Po and Su... Mea culpa -Oh, please. -Ting Ting, please! Meat and two veg From RJGIYQDIERUQQA at hotmail.com Sun Jun 25 23:19:31 2006 From: RJGIYQDIERUQQA at hotmail.com (Juana Steiner) Date: Mon, 26 Jun 2006 03:19:31 -0300 Subject: LV,Tiffany & Co 8o-% Off Message-ID: <68TT87FE.0Q24.RJGIYQDIERUQQA@hotmail.com> Perfect Gift for your spouse and family - Luxury Watches, Handbags and Mont Blanc accs. - Finest quality assured - 101% like original You Name It, We have It all at 8o-% Price Reduction Join millions of happy users now http://043.fladmingodiingo.com From jstyre at jstyre.com Mon Jun 26 08:44:23 2006 From: jstyre at jstyre.com (James S. Tyre) Date: Mon, 26 Jun 2006 08:44:23 -0700 Subject: Salon article on AT&T network monitoring Message-ID: At 10:45 AM 6/26/2006 -0400, Perry E. Metzger wrote: >Quoting: > > In a pivotal network operations center in metropolitan St. Louis, AT&T > has maintained a secret, highly secured room since 2002 where > government work is being conducted, according to two former AT&T > workers once employed at the center. > >http://www.salon.com/news/feature/2006/06/21/att_nsa/index_np.html By coincidence, the day after that article appeared, we released the (partially redacted) Declaration of J. Scott Marcus, our expert in EFF's case against AT&T, http://www.eff.org/legal/cases/att/marcus-decl-redact.pdf. The Salon reporter then followed with this piece, http://www.salon.com/news/feature/2006/06/23/internet_expert/index_np.html -------------------------------------------------------------------- James S. Tyre jstyre at jstyre.com Law Offices of James S. Tyre 310-839-4114/310-839-4602(fax) 10736 Jefferson Blvd., #512 Culver City, CA 90230-4969 Co-founder, The Censorware Project http://censorware.net Policy Fellow, Electronic Frontier Foundation http://www.eff.org --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- Is the NSA spying on U.S. Internet traffic? Salon exclusive: Two former AT&T employees say the telecom giant has maintained a secret, highly secure room in St. Louis since 2002. Intelligence experts say it bears the earmarks of a National Security Agency operation. By Kim Zetter Jun. 21, 2006 | In a pivotal network operations center in metropolitan St. Louis, AT&T has maintained a secret, highly secured room since 2002 where government work is being conducted, according to two former AT&T workers once employed at the center. In interviews with Salon, the former AT&T workers said that only government officials or AT&T employees with top-secret security clearance are admitted to the room, located inside AT&T's facility in Bridgeton. The room's tight security includes a biometric "mantrap" or highly sophisticated double door, secured with retinal and fingerprint scanners. The former workers say company supervisors told them that employees working inside the room were "monitoring network traffic" and that the room was being used by "a government agency." The details provided by the two former workers about the Bridgeton room bear the distinctive earmarks of an operation run by the National Security Agency, according to two intelligence experts with extensive knowledge of the NSA and its operations. In addition to the room's high-tech security, those intelligence experts told Salon, the exhaustive vetting process AT&T workers were put through before being granted top-secret security clearance points to the NSA, an agency known as much for its intense secrecy as its technological sophistication. "It was very hush-hush," said one of the former AT&T workers. "We were told there was going to be some government personnel working in that room. We were told, 'Do not try to speak to them. Do not hamper their work. Do not impede anything that they're doing.'" The importance of the Bridgeton facility is its role in managing the "common backbone" for all of AT&T's Internet operations. According to one of the former workers, Bridgeton serves as the technical command center from which the company manages all the routers and circuits carrying the company's domestic and international Internet traffic. Therefore, Bridgeton could be instrumental for conducting surveillance or collecting data. If the NSA is using the secret room, it would appear to bolster recent allegations that the agency has been conducting broad and possibly illegal domestic surveillance and data collection operations authorized by the Bush administration after the terrorist attacks of Sept. 11, 2001. AT&T's Bridgeton location would give the NSA potential access to an enormous amount of Internet data -- currently, the telecom giant controls approximately one-third of all bandwidth carrying Internet traffic to homes and businesses across the United States. The nature of the government operation using the Bridgeton room remains unknown, and could be legal. Aside from surveillance or data collection, the room could conceivably house a federal law enforcement operation, a classified research project, or some other unknown government operation. The former workers, both of whom were approached by and spoke separately to Salon, asked to remain anonymous because they still work in the telecommunications industry. They both left the company in good standing. Neither worked inside the secured room or has access to classified information. One worked in AT&T's broadband division until 2003. The other asked to be identified only as a network technician, and worked at Bridgeton for about three years. The disclosure of the room in Bridgeton follows assertions made earlier this year by a former AT&T worker in California, Mark Klein, who revealed that the company had installed a secret room in a San Francisco facility and reconfigured its circuits, allegedly to help collect data for use by the government. In detailed documents he provided to the Electronic Frontier Foundation, Klein also alleged there were other secret rooms at AT&T facilities in other U.S. cities. NSA expert Matthew Aid, who has spent the last decade researching a forthcoming three-volume history of the agency, said of the Bridgeton room: "I'm not a betting man, but if I had to plunk $100 down, I'd say it's safe that it's NSA." Aid told Salon he believes the secret room is likely part of "what is obviously a much larger operation, or series of interrelated operations" combining foreign intelligence gathering with domestic eavesdropping and data collection. "You're talking about a backbone for computer communications, and that's NSA," Russ Tice, a former high-level NSA intelligence officer, told Salon. Tice, a 20-year veteran of multiple U.S. intelligence agencies, worked for the NSA until spring 2005. "Whatever is happening there with the security you're talking about is a whole lot more closely held than what's going on with the Klein case" in San Francisco, he said. (The San Francisco room is secured only by a special combination lock, according to the Klein documents.) Tice added that for an operation requiring access to routers and gateways, "the obvious place to do it is right at the source." In a statement provided to Salon, NSA spokesman Don Weber said: "Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues as it would give those wishing to do harm to the United States insight that could potentially place Americans in danger; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law." Since last December, news reports have asserted that the NSA has conducted warrantless spying on the phone and e-mail communications of thousands of people inside the U.S., and has been secretly collecting the phone call records of millions of Americans, using data provided by major telecommunications companies, including AT&T. Such operations would represent a fundamental shift in the NSA's secretive mission, which over the last three decades is widely understood to have focused exclusively on collecting signals intelligence from abroad. The reported operations have sparked fierce protest by lawmakers and civil liberties advocates, and have raised fundamental questions about the legality of Bush administration policies, including their consequences for the privacy rights of Americans. The Bush administration has acknowledged the use of domestic surveillance operations since Sept. 11, 2001, but maintains they are conducted within the legal authority of the presidency. Several cases challenging the legality of the alleged spying operations are now pending in federal court, including suits against the federal government, and AT&T, among other telecom companies. In a statement provided to Salon, AT&T spokesman Walt Sharp said: "If and when AT&T is asked by government agencies for help, we do so strictly within the law and under the most stringent conditions. Beyond that, we can't comment on matters of national security." According to the two former AT&T workers and the Klein documents, the room in the pivotal Bridgeton facility was set up several months before the room in San Francisco. According to the Klein documents, the work order for the San Francisco room came from Bridgeton, suggesting that Bridgeton has a more integral role in operations using the secured rooms. The company's Bridgeton network operations center, where approximately 100 people work, is located inside a one-story brick building with a small two-story addition connected to it. The building shares a parking lot with a commercial business and is near an interstate highway. According to the two former workers, the secret room is an internal structure measuring roughly 20 feet by 40 feet, and was previously used by employees of the company's WorldNet division. In spring 2002, they said, the company moved WorldNet employees to a different part of the building and sealed up the room, plastering over the window openings and installing steel double doors with no handles for moving equipment in and out of the room. The company then installed the high-tech mantrap, which has opaque Plexiglas-like doors that prevent anyone outside the room from seeing clearly into the mantrap chamber, or the room beyond it. Both former workers say the mantrap drew attention from employees for being so high-tech. Telecom companies commonly use mantraps to secure data storage facilities, but they are typically less sophisticated, requiring only a swipe card to pass through. The high-tech mantrap in Bridgeton seems unusual because it is located in an otherwise low-key, small office building. Tice said it indicates "something going on that's very important, because you're talking about an awful lot of money" to pay for such security measures. The vetting process for AT&T workers granted access to the room also points to the NSA, according to Tice and Aid. The former network technician said he knows at least three AT&T employees who have been working in the room since 2002. "It took them six months to get the top-security clearance for the guys," the network technician said. "Although they work for AT&T, they're actually doing a job for the government." He said that each of them underwent extensive background checks before starting their jobs in the room. The vetting process included multiple polygraph tests, employment history reviews, and interviews with neighbors and school instructors, going as far back as elementary school. Aid said that type of vetting is precisely the kind NSA personnel who receive top-secret SCI (Sensitive Compartmented Information) clearance go through. "Everybody who works at NSA has an SCI clearance," said Aid. It's possible the Bridgeton room is being used for a federal law enforcement operation. According to the Communications Assistance for Law Enforcement Act of 1994, telecom companies are required to assist law enforcement officials who have legal authorization to conduct electronic surveillance, either in pursuit of criminal suspects or for the protection of national security. The companies must design or modify their systems to make such surveillance possible, essentially by making them wiretap-ready. The FBI is the primary federal agency that tracks and apprehends terrorist suspects within the U.S. Yet, there are several indications that the Bridgeton room does not involve the FBI. "The FBI, which is probably the least technical agency in the U.S. government, doesn't use mantraps," Aid said. "But virtually every area of the NSA's buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them." The description of the opaque Plexiglas-like doors in Bridgeton, Aid said, indicates that the doors are likely infused with Kevlar for bulletproofing -- another signature measure that he said is used to secure NSA facilities: "You could be inside and you can't kick your way out. You can't shoot your way out. Even if you put plastique explosives, all you could do is blow a very small hole in that opaque glass." Jameel Jaffer, deputy director of the American Civil Liberties Union's national security program, said it is unlikely that the FBI would set up an ongoing technical operation -- in this case, for several years running -- inside a room of a telecommunications company. The Foreign Intelligence Surveillance Act, passed by Congress in 1978, requires law enforcement officials to obtain warrants from a secret federal court for domestic surveillance operations involving the protection of national security. If the FBI (or another federal agency) wanted data, it would more likely be targeting a specific individual or set of individuals suspected of engaging in criminal or terrorist activities. The agency would obtain a warrant and then call AT&T, or show up in person with the warrant and ask for the wiretap to be engaged. According to Jaffer, the FBI, NSA or any other federal agency could also legally tap into communications data under federal guidelines using technical means that would not require technical assistance of a telecom company. In an e-mail statement to Salon, FBI spokesperson Paul Bresson said: "The FBI does not confirm whether or not we are involved in an alleged ongoing operational activity. In all cases, FBI operations are conducted in strict accordance with established Department of Justice guidelines, FBI policy, and the law." Rather than specifically targeted surveillance, it is also possible that the Bridgeton room is being used for a classified government project, such as data mining, with which the Pentagon has experimented in the past. Data mining uses automated methods to search through large volumes of data, looking for patterns that might help identify terrorist suspects, for example. According to Tice, private sector employees who work on classified government projects for the NSA are required to undergo the same kind of top-secret security clearance that AT&T workers in the Bridgeton room underwent. According to the former network technician, all three AT&T employees he knows who work inside the room have network technician and administration backgrounds -- not research backgrounds -- suggesting that those workers are only conducting maintenance or technical operations inside the room. Furthermore, Tice said it is much more likely that any classified project using data collected via a corporate facility would take place in separate facilities: "The information that you garner from something like a room siphoning information and filtering it would be sent to some place where you'd have people thinking about what to do with that data," he said. Dave Farber, a respected computer scientist at Carnegie Mellon University and former chief technologist for the Federal Communications Commission, also said it is likely that data collected in a facility like the Bridgeton center would be used elsewhere, once the facility is set up to divert the data. "If I own the routers, I can put code in there to have them monitor for certain data. That's not a particularly difficult job," said Farber, who is considered one of the pioneers of Internet architecture. Farber said that "packets" of data can essentially be copied and then sent to some other location for use. "Most of the problems would have to do with keeping your staff from knowing too much about it." According to the former network technician, workers at Bridgeton, at the direction of government officials, could conceivably collect data using any AT&T router around the country, which he says number between 1,500 and 2,000. To do so, the company would need to install a wiretap-like device at select locations for "sniffing" the desired data. That could explain the purpose of the San Francisco room divulged by Klein, as well as the secret rooms he alleged existed at AT&T facilities in other U.S. cities. "The network sniffer with the right software can capture anything," the former network technician said. "You can get people's e-mail, VoIP phone calls, [calls made over the Internet] -- even passwords and credit card transactions -- as long as you have the right software to decrypt that." In theory, surveillance involving Internet communications can be executed legally under federal law. "But with most of these things," Farber said, "the problem is that it just takes one small step to make it illegal." New light on NSA spying A former Internet expert for the FCC concludes that a secret AT&T installation was most likely used for government surveillance. By Kim Zetter Jun. 23, 2006 | A federal court in California released a previously sealed 40-page document on Thursday in the Electronic Frontier Foundation's lawsuit against AT&T, which bolsters allegations that the telecommunications giant built secret rooms to allow the National Security Agency to conduct widespread surveillance of Internet traffic. The document also paints a detailed scenario of how the NSA may be conducting the top-secret operation, which closely matches information given to Salon by a former AT&T employee who worked at the company's network operations center in Bridgeton, Mo. The document, a statement by J. Scott Marcus, a former senior advisor for Internet technology to the Federal Communications Commission, was filed under seal on April 5 on behalf of the EFF to support its class-action suit against AT&T, which alleges that the company violated a number of federal laws in aiding the government's domestic spying operation against AT&T customers. The court sealed the document because it contained proprietary AT&T information, then ordered AT&T and EFF to work together to produce a redacted version to place in the public record, which they did on Thursday. EFF asked Marcus to examine records from a former AT&T technician in California named Mark Klein that describe how AT&T reconfigured its network in San Francisco and installed special computer systems in a secret room, allegedly to divert and collect Internet traffic to help the NSA conduct warrantless surveillance. Were the records authentic and was it feasible that they described a government surveillance program, or could the reconfiguration and systems have been put in place for more innocuous uses? Marcus concludes in his statement that the documents are authentic and, after considering a number of possible reasons for the reconfiguration -- such as legitimate network monitoring and maintenance -- writes that the system AT&T installed in a secret San Francisco room, and likely other cities, was "exceptionally well suited to a massive, distributed surveillance activity" and that "no other application provides as good an explanation for the combination of engineering choices that were made." He considered that the system might be set up to accommodate lawful traffic intercepts under the Communications Assistance for Law Enforcement Act, but deemed this not a credible scenario, since there are far simpler and less expensive solutions for meeting CALEA, which required Internet service providers to make their networks wiretap-ready. He also concludes that given how cash strapped AT&T was in 2002 and 2003 when the expensive changes and additions to the system were made, it is "exceedingly unlikely" that AT&T financed the project on its own. "I therefore conclude that it is highly probable that funding came from an outside source, and consider the U.S. Government to be the most likely source," he writes in the document. Over several pages that are redacted at key points, Marcus discusses technical details in the Klein documents that have previously been unavailable. (The Klein documents are under seal, and although some of them have made it to the Internet, others, judging by details revealed by Marcus, have never been made public.) According to Marcus, the Klein documents refer to a "private ... backbone network, which appears to partition from AT&T's main Internet backbone." This suggests the presence of a private network, Marcus writes, whose existence is "not consistent with normal AT&T practice." "The most plausible inference is that this was a covert network that was used to ship data of interest to one or more central locations for still more intensive analysis," Marcus writes. The most interesting aspect of the Marcus statement is the clear, though speculative, scenario he provides for how the National Security Agency is likely conducting its surveillance and data collection through that network. Marcus, currently a consultant with WIK-Consult GmbH in Bad Honnef, Germany, was unavailable for comment. But in the statement, he suggests that the secret San Francisco room is connected to two separate networks -- the regular commercial network on which e-mail, Web surfing and voice-over Internet Protocol traffic runs, and the second private, covert network that is partitioned off from the regular network and is used to divert traffic that has been copied and sent back to a central collection place. He suggests that massive amounts of data are collected at 15 to 20 locations around the country, where it is automatically screened and winnowed down to only "data of interest" by a special system installed in San Francisco (and likely elsewhere) before it is shipped off to one or two central collection points, where it is processed by powerful computers and analyzed by skilled staff. This agrees with what several sources told Salon this week. A former AT&T network technician who is well acquainted with AT&T's common backbone and asked to remain anonymous, told Salon about a secret, heavily secured room located in AT&T's Bridgeton facility, where the company runs its technical command center from which it manages all of its backbone. From that facility, the company could send commands to any of its 1,500 to 2,000 routers around the country to filter and divert traffic from those locations. To do that, the technician said, AT&T would need to physically place network "sniffers" at key points in the company's backbone. "There are 10 or 15 data centers located in major cities around the country," he said. "So they would need to stick [a sniffer] in each of those data centers to capture all the information." Then the company could easily send commands from the Bridgeton room to the routers in those locations. The commands would indicate what data to collect and where to divert it afterward. Marcus writes that although the configuration in San Francisco was deployed in early 2003, given AT&T processes, the planning for it was probably underway six to 12 months earlier. This coincides with the timing of the Bridgeton Network Operation Center, which was put in place about eight months before the San Francisco room was configured and was the place from which the work order for the secret room in San Francisco originated. The Bridgeton room, guarded with a high-tech mantrap with retinal and fingerprint scanners, is restricted to government workers and AT&T employees with top-secret security clearances and is likely just used for remotely monitoring and maintaining the secret rooms around the country and sending commands. Russ Tice, a former NSA officer and senior analyst until last year, told Salon that the data once collected is probably not sent to Bridgeton but instead is diverted to an NSA facility where powerful processing equipment can analyze it. As for the kind of data collected, Marcus infers from the Klein documents that the configuration in place in San Francisco would enable surveillance of "both overseas and purely domestic traffic." But the Klein evidence suggests that only "off net" traffic was being collected in San Francisco at the time the documents were written. "Off net" refers to traffic sent between AT&T customers and customers of other ISPs; "on net" traffic is sent strictly between one AT&T customer and another AT&T customer. Still, this amounts to a lot of data, Marcus says. It would mean that any traffic that passed through AT&T's network from another ISP or network would be intercepted. He suggests the possibility, however, that authorities could conceivably weed out domestic traffic to collect only international traffic exchanged between an AT&T customer and noncustomer, given that software programs exist that can help distinguish domestic Internet traffic from traffic that travels from outside the United States. But he writes that even with such weeding, some purely domestic traffic would likely slip through the filter. A hearing on the EFF lawsuit against AT&T is being held in San Francisco Friday to determine whether the case should be thrown out. The Department of Justice has interfered in the case, calling on the court to dismiss it on grounds that national security secrets would be exposed if a trial were to proceed. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Jun 26 03:43:38 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Jun 2006 12:43:38 +0200 Subject: [alex_crypto_newsletters@noemax.com: RE: Greek cellular wiretapping scandal] Message-ID: <20060626104338.GE28956@leitl.org> ----- Forwarded message from Alexander Philippou ----- From coderman at gmail.com Mon Jun 26 14:04:22 2006 From: coderman at gmail.com (coderman) Date: Mon, 26 Jun 2006 14:04:22 -0700 Subject: Scott Marcus Declaration In-Reply-To: References: <20060626160445.GU28956@leitl.org> Message-ID: <4ef5fec60606261404u1e3e426dseb8d67754a85c92a@mail.gmail.com> On 6/26/06, John Young wrote: > A fair amount of the redactions of the Scott Marcus declaration > can be restored by using the various Klein statements, releases > and declarations, the ATT filing which had liftable redactions, > Wired's releases, and the recent Salon article. > > For example, Coderman guessed here a 3-letter redaction could > be "tap," while it is actually "SG3," the acronym for "Study Group 3." doh, mea culpa (i realized this later yesterday when trying to correlate the titles of redacted exhibits with the names of the exhibits that were relased previously...) > ... > We're restoring others and will share or put on Cryptome. Help > welcomed. what kind of help would be useful (sending in one-off edits as discovered, or is there a group collaborating elsewhere)? is there a running archive of all the relevant docs / articles or at least pointers to them? (to appease the copyright cartels) From jya at pipeline.com Mon Jun 26 16:27:45 2006 From: jya at pipeline.com (John Young) Date: Mon, 26 Jun 2006 16:27:45 -0700 Subject: Scott Marcus Declaration In-Reply-To: <20060626160445.GU28956@leitl.org> Message-ID: A fair amount of the redactions of the Scott Marcus declaration can be restored by using the various Klein statements, releases and declarations, the ATT filing which had liftable redactions, Wired's releases, and the recent Salon article. For example, Coderman guessed here a 3-letter redaction could be "tap," while it is actually "SG3," the acronym for "Study Group 3." This is disclosed in the ATT filing which had a liftable redaction referring to a redacted sentence in the Marcus declaration. "Study Group 3" is also one of the common redactions in the Marcus doc. We're restoring others and will share or put on Cryptome. Help welcomed. From bemieyiusujn at netzero.net Mon Jun 26 15:19:52 2006 From: bemieyiusujn at netzero.net (Melchior Proulx) Date: Mon, 26 Jun 2006 17:19:52 -0500 Subject: Tiffany, Handbags, Pens and more.. Message-ID: <186h907x.0564274@awnline.net> but whereabout and concede it aerodynamic the jewel a resume -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 805 bytes Desc: not available URL: From jya at pipeline.com Mon Jun 26 17:39:28 2006 From: jya at pipeline.com (John Young) Date: Mon, 26 Jun 2006 17:39:28 -0700 Subject: Scott Marcus Declaration In-Reply-To: <4ef5fec60606261404u1e3e426dseb8d67754a85c92a@mail.gmail.co m> References: <20060626160445.GU28956@leitl.org> Message-ID: I don't know who else may be working on restoring redactions. Just pick a heavily redacted paragraph or page and post it here, retaining the paragraph number. We're moving very slowly on it. Exhibit A is not identifiable. Based on references by Marcus: Klein Exhibit B appears to be Wired's release of Klein's "Study Group 3, LGX/Splitter Wiring, San Francisco, Issue 1, 12/20/2002." This 4-page excerpt appears to be taken from a longer, 40-page document referred to by Marcus. Klein Exhibit C appears to be Wired's release of Klein's "SIMS, Splitter Cut-In and Test Procedures, Issue 2, 01/13/03." This is a 4-page document. Most of the Klein and ATT documents are in this file: http://cryptome.org/klein-decl.htm Or linked, where we made an earlier stab at restoring Klein's redactions Or the Exhibits B and C can be downloaded at Wired, Ryan Singel's blog. The recent Scott Marcus declaration, as noted earlier, is here: http://cryptome.org/scott-marcus.pdf Klein's statement released through his lawyer is in the Cryptome file as well, or can be downloaded from Wired, Ryan Singel's blog. A lot of the Marcus redactions concern "SG3" and "LGX," with SG3 customarily used with "Configuration." LGX usually refers to the "LGX room" or "LGX/Splitter" project. As Marcus notes, LGX is short for LGX/Splitter. After chewing the bone, it looks as though most of the stuff can be recovered or PG guessed. From eugen at leitl.org Mon Jun 26 09:04:46 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Jun 2006 18:04:46 +0200 Subject: [jstyre@jstyre.com: Re: Salon article on AT&T network monitoring] Message-ID: <20060626160445.GU28956@leitl.org> ----- Forwarded message from "James S. Tyre" ----- From itvetbmzahoi at cet.com Mon Jun 26 16:07:40 2006 From: itvetbmzahoi at cet.com (Ainsley) Date: Mon, 26 Jun 2006 18:07:40 -0500 Subject: Ephedra for your body Message-ID: <347k920k.5965422@theritz.us> it amass in ephemeral ! description , napkin some newborn -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1472 bytes Desc: not available URL: From eugen at leitl.org Mon Jun 26 09:18:55 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Jun 2006 18:18:55 +0200 Subject: Los Angeles Sheriff's UAV Runs Headfirst Into the FAA Message-ID: <20060626161855.GV28956@leitl.org> http://lemonodor.com/archives/001405.html The Los Angeles Sheriff's Dept. has been working for several years with a defense contractor, Ocatron, to develop a specialized UAV for police work. Last week they gave reporters a demo. The stealth quality of the SkySeer is a big advantage, according to police. b The plane is virtually silent and invisible,b said Heal. b It will give us a vertical perspective that we have never had.b The Los Angeles Sheriff's Department operates a fleet of 18 helicopters, priced between three and five million dollars each. The SkySeer will cost between 25,000 and 30,000 dollars. b We never have enough helicopters,b said Heal. The police helicopters are in near-constant use, and the SkySeer would alleviate some of this pressure. Unmanned surveillance crafts may become the norm in urban policing, says Heal. I think he's completely correct and UAVs will probably become standard, even ubiquitous pieces of equipment for police. Especially as the industry picks up and prices fall way below the $20-30K estimate for the SkySeer. The only possible obstacle seems to be a regulatory one, and I don't mean any kind of protection of privacy. It turns out that the FAA is upset with the Sheriff's dept. for not getting clearance for the flight, even though it was just a demonstration for reporters. b I wouldn't want to term us as peeved, but we were definitely surprised,b FAA spokeswoman Laura Brown said. Sheriff's officials were told "that we were more than willing to sit down and talk about a certificate b but that was before their first flight.b The FAA is now investigating Friday's demonstration to determine whether the Sheriff's Department should face disciplinary action. b A private citizen can go to the store and buy one of those model airplanes and fly them around. But because we're doing it as a public service, we have to deal with the FAA?b said Sheriff's Cmdr. Sid Heal. Once they b take a deep breath and realize there was no malice intended, it will get back on track.b >From what I understand, it's true that if a hobbyist flies a drone (and lots of people are already flying homebrew drones) below 500', the FAA generally doesn't care. But the hobbyists have their own regulatory worriesbthe Academy of Model Aeronautics has its own rules for members, and they're very worried about the FAA's reaction to widespread hobbyist UAVs. Therefore the AMA prohibits models with autonomous navigation, and requires operators of remotely piloted vehicles to b maintain un-enhanced visual contact with the aircraft throughout the entire flight.b >From an article about a possible new FAA classification scheme for UAVs: The new classifications would also include a category being referred to as b lightly restrictedb to cover aircraft currently restricted to flight within visual sight as the primary basis of risk mitigation. This category includes radio-controlled model aircraft, particularly model helicopters adapted for commercial use in aerial photography; small blimps used for advertising; and agricultural UAVs. The b lightly restrictedb classification represents systems that b are giving us a good deal of problems right now and we are really wrestling, on a daily basis, with this particular groupb , says Steve Swartz, from the FAAbs recently established unmanned aircraft programme office. I think even the regulatory issues involved in the integration of autonomous vehicles into our society are completely fascinating. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From NathanielLu at ieway.com Mon Jun 26 13:03:27 2006 From: NathanielLu at ieway.com (ironman32) Date: Mon, 26 Jun 2006 21:03:27 +0100 Subject: Prestige Repli$a Watches 55 Message-ID: <96BF73AE.4425BE6@ieway.com> Low priced replicas available in all styles. Mens, womans and childrens. These watches are of great quality and are replicated to mirror the real thing. Excellent prices that cannot be passed up Take a look at our selection of watches http://xcr.mannertime.com/ Just for that, I'm not talking to you! On the game Let's get jamming on the toe jam. On your jack No pinchy shoes? On your toes From s.schear at comcast.net Mon Jun 26 22:56:39 2006 From: s.schear at comcast.net (Steve Schear) Date: Mon, 26 Jun 2006 22:56:39 -0700 Subject: Los Angeles Sheriff's UAV Runs Headfirst Into the FAA In-Reply-To: <20060626161855.GV28956@leitl.org> References: <20060626161855.GV28956@leitl.org> Message-ID: <6.0.1.1.0.20060626213838.04a89978@mail.comcast.net> At 09:18 AM 6/26/2006, Eugen Leitl wrote: > From what I understand, it's true that if a hobbyist flies a drone (and lots >of people are already flying homebrew drones) below 500', the FAA generally >doesn't care. That's great. So, if John Wiseman's understanding is correct it should be OK to have low altitude, terrain avoiding, citizen owned and operated cruise missile contests. Steve From mctylr at gmail.com Tue Jun 27 07:21:16 2006 From: mctylr at gmail.com (michael taylor) Date: Tue, 27 Jun 2006 10:21:16 -0400 Subject: Canada's high-tech spies (CSE) leave (commissioner) Lamer in the Message-ID: dark Canada's high-tech spies leave Lamer in the dark JIM BRONSKILL Canadian Press [The Globe and Mail, June 27, 2006] Ottawa b The watchdog over Canada's eavesdropping agency says he's not getting the detailed information he needs to be sure the secretive spy outfit is obeying the rules. In his annual report, Antonio Lamer laments a "lack of clarity" in the information the Communications Security Establishment provides when seeking ministerial permission for sensitive operations. The disagreement raises questions about whether Mr. Lamer, as CSE commissioner, can provide full assurances that the spy agency is meeting all legal requirements. The Ottawa-based CSE, an ultra-secret wing of the Defence Department, monitors foreign radio, telephone, fax, satellite and computer traffic for information of interest to Canada. The intelligence is used in support of Canadian crime-fighting, defence and trade policies. Military listening posts assist the agency's efforts to intercept the communications of foreign states and organizations, as well as the phone calls and messages of suspected terrorists, drug traffickers and smugglers. The CSE has long been prohibited from directing its surveillance at Canadians or anybody in Canada. However, the Anti-Terrorism Act of 2001 gave the CSE authority to tap into conversations and messages even if those communications begin or end in Canada. For instance, the CSE could now intercept a phone call from a member of Osama bin Laden's al-Qaeda network somewhere in Asia to a residence in Montreal. Various safeguards, including the need for the defence minister's approval, were built into the practice. Mr. Lamer, a former Supreme Court chief justice, recently concluded his term as CSE commissioner, an independent watchdog who scrutinizes the spy agency's activities to ensure compliance with the law. In his final report, he says there should be a clear linkage between the government's intelligence priorities, the targets chosen and the activities for which ministerial approval is needed. But supporting documentation provided by the CSE as part of its requests for authorization address foreign intelligence requirements "only in general terms." The dispute stems from differing legal interpretations held by Mr. Lamer's independent counsel and the deputy minister of Justice, whose department provides legal direction to the CSE. "The lack of clarity in this regard has made it difficult for my staff to assess compliance with certain of the conditions that the legislation requires to be satisfied before a ministerial authorization is given." Mr. Lamer says he has "offered specific recommendations" to the defence minister and CSE to iron out "ambiguities" in the legislation governing the CSE. As a result, Mr. Lamer qualifies his finding that CSE activities 2005-06 complied with the law "as it is currently interpreted by the Department of Justice." CSE spokesman Adrian Simpson said Monday that, as a government agency, the organization "must follow the interpretation" of the Justice Department. Mr. Simpson added that the CSE "takes great pains to comply with all of the laws of Canada." Mr. Lamer says his one regret is leaving the post "without a resolution of the legal interpretation issues that have bedevilled this office since December 2001." "I wish my successor well in bringing this matter to a satisfactory conclusion for all concerned." Defence Minister Gordon O'Connor's office had no immediate comment. A spokesman for Mr. Lamer was unavailable. Mr. Lamer's concerns emerge as the CSE's American counterpart, the National Security Agency, faces the glare of controversy. In December, the New York Times disclosed that U.S. President George W. Bush had authorized the NSA to eavesdrop on Americans and others inside the United States without court-approved warrants, as has been the recognized practice there. Despite pointed criticism from privacy advocates, U.S. officials have defended the program. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rah at shipwright.com Tue Jun 27 08:26:30 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 27 Jun 2006 11:26:30 -0400 Subject: [Clips] Montana mother fights al-Qa'eda from her sitting room Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Tue, 27 Jun 2006 11:12:37 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Montana mother who is fighting al-Qa'eda from her sitting room Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Telegraph Montana mother who is fighting al-Qa'eda from her sitting room By Francis Harris in Helena (Filed: 26/06/2006) Radical Islamists may not know it but their global jihad has more to fear from Shannen Rossmiller, an American mother-of-three, than from a squadron of F16s. The former cheerleader doesn't phrase it quite like that. That isn't her style. Shannen Rossmiller turned freelance spy after 9/11 Yet a summary of case histories and transcripts seen by The Daily Telegraph reveals that she has uncovered the whereabouts of al-Qa'eda fighters in the lawless highlands of Pakistan, shopped groups of would-be terrorists from Liverpool to Lebanon, tracked down an Islamist designing a nuclear device and much, much more. For four years, she has alternated her day jobs of mother and magistrate in the mountain state of Montana with a night-time role as a hunter of terrorists. Mrs Rossmiller first turned freelance spy after September 11. Donning a range of virtual disguises, she uses her functional, self-taught Arabic, and customised software that masks her true identity and whereabouts, to navigate into radical internet chat rooms frequented by real terrorists or any fanatic with a computer and a grudge. In her first interview with a British newspaper, the 37-year-old said that at first she kept her nocturnal sleuthing secret: "I didn't want my family to know because they'd call me crazy and this was just too damn interesting." Now she finds it hard to escape the world she has entered. Asked whether she seeks a way out, she said: "I've tried a couple of times to back off, but it just hasn't been the right time. "I remember the time I screamed 'Can't these guys take a weekend off?' But humanity is such a precious thing that you don't want to see [terrorist attacks] happen to anybody, to any country, any people." She has proved increasingly useful to the Federal Bureau of Investigation, which now supplies her with handlers, Arabic translators and security, in case the terrorists seek revenge. They have reason to be angry: in America alone, the authorities have made several arrests based on Mrs Rossmiller's work. In her best known case, she secured a life sentence for a treacherous soldier, Pte Ryan Anderson, who was trying to transmit the weaknesses of the M1 Abrams tank to al-Qa'eda. It was when she was called to give evidence in that case that her cover was blown. "I didn't have the choice of remaining anonymous," she said, despite earlier pledges from the authorities that her name would never be made public. On many occasions she has encountered terrorists overseas. Three times she has lured young British Islamists into unmasking themselves, including one group in Liverpool. The FBI passed the material to British intelligence, after which she heard nothing more. She brushes off the possible threat to her and her family from terrorist reprisal. She pointed out that in Montana's little towns, strangers stick out and the locals are armed. "There have to be risks taken, otherwise you can't get anything done." The FBI refuses to comment on her work and she has not been offered public thanks by members of the Bush administration. Behind-the-scenes however, intelligence staffers acknowledge her role. One American newspaper reported that "federal intelligence sources confirmed that for several years she has provided the FBI and the CIA with useful information". Another was told "she's legitimate" by an unnamed FBI agent. That has helped to make Mrs Rossmiller a star of Right-wing internet sites, but she disavowed any political motivation beyond plain patriotism. "I'm not a Republican, I'll tell you that right now. But at the same time you get tired of seeing your government looking like a bunch of walking idiots." Mrs Rossmiller is understandably discreet about her current operations, but said that as the years have passed she has become more ambitious and made "her" fictional Islamists more senior. But when things get sticky she can be ruthless. "I kill off certain identities, make them martyrs, so [the radicals] think 'so-and-so is dead'. When I've had an idea that's worked well for some time but things are getting fishy, I'll move him into Ramadi or Basra and have him martyred." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Jun 27 09:08:46 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 27 Jun 2006 12:08:46 -0400 Subject: [Clips] That's Your Cue Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Tue, 27 Jun 2006 12:02:08 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] That's Your Cue Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com TCS Daily - That's Your Cue By Arnold Kling : BIO| 27 Jun 2006 "These sacred truths are unverifiable, and unfalsifiable, but the faithful nevertheless accept them to be unquestionable. In doing so, like assemblies of the faithful since the dawn of language, they bind themselves together for protection or common action against unbelievers and their lies." --Nicholas Wade, Before the Dawn, p. 165-166 When people in business meet for the first time to discuss a transaction, they often exchange what I call "trust cues" in order to reduce mutual suspicion. For example, they may recite empty phrases from popular business books, such as "win-win," "synergy," "principles," "customer-driven," or "raising the bar." Nicholas Wade provides a readable, wide-ranging survey of the impact of recent advances in genetics on anthropology. In one chapter, he argues that the origins of what I observe in business behavior can be found in early religious rituals. Religions produce trust cues. Trust cues are necessary for large societies and trade among strangers to emerge. They serve to protect people from cheaters and liars. What I am going to suggest in this essay is that political beliefs can serve the function of trust cues. Political beliefs may have at best a tenuous empirical basis, but they function to demonstrate one's membership in a trusted group. Wade says that the evolutionary value of trust cues is that they facilitate peaceful interactions among strangers. When I offer a trust cue, I am saying that even though we do not know one another, I am a member of a trustworthy group. I value my membership in that group, and I know that lying to or cheating another member of that group could cause me to be excommunicated from the group. Since you are also a member of the group, you can trust me not to lie to you or to cheat you. The most trustworthy groups are groups where membership is valuable and excommunication is costly. They are groups that monitor the behavior of their members closely. The most trustworthy individuals are individuals who regularly show a willingness to sacrifice for the group. Attending religious worship every week, paying a tithe, and participating in ritual fasts are examples of demonstrating religious loyalty. These sorts of sacrifices are indicators that the individual values membership in the group, and they show that the individual would fear excommunication from the group. The best trust cues are those that can be presented at low cost by members of the group but would be costly to fake for non-members. Thus, odd dialects and unusual phrases can serve as trust cues. Empiricism Empiricism is a rigorous approach to the subject of truth. Frederick Crews, author of Follies of the Wise, a book that attacks Freudian psychology and other weak intellectual fads, describes empiricism as "the ethic of respecting what is known, acknowledging what is still unknown, and acting as if one cared about the difference."(p. 305) In modern philosophy, the empiricist tradition is often traced to John Locke and David Hume. Hume argued that truths are either matters of logic (such as mathematical theorems) or matters of observation (such as the law of gravity). Beliefs that cannot be verified by examining data or by reference to logic constitute dogma. Although empiricism has become a standard philosophy in the West, dogma persists. I believe that the main reason that non-verifiable ideas survive is that they serve as trust cues. People still need to demonstrate their commitment to membership in groups, and recitation of dogma is a low-cost method of doing so. Political Trust Cues Wade writes, "Modern states now accomplish by other means many of the early roles performed by religion, which is why religion has become of less relevance in some societies. But because the propensity for religious belief is still wired into the human mind, religion continues to be a potent force in societies that still struggle for cohesion." (p. 164) This raises the possibility that political beliefs serve primarily as trust cues. For example, those who favor an increase in the minimum wage are sending trust cues to people on the Left, and those who oppose an increase in the minimum wage are sending trust cues to people on the Right. The actual consequences of raising the minimum wage are rarely discussed. In other words, political debates often ignore what I call Type C arguments (from empiricism) and turn instead to type M arguments, which accuse one's opponent of belonging to an outcast group. The reason for this is that people are not trying to persuade each other rationally. Instead, they are using trust cues to indicate that failure to agree implies excommunication from the group. Academic Trust Cues An empirical argument attempts to convince you using logic and observation. A trust cue threatens you with loss of membership in a valuable group unless you take a given position. One might hope that colleges and universities might espouse empiricism rather than excommunicate those who question dogma. However, the Lawrence Summers case offers a dramatic counter-example. His discussion of women in tenured positions in science seems reasonable from an empiricist standpoint. However, from the standpoint of trust cues, it was out of bounds. Both Crews and Wade cite examples of widespread use of trust cues rather than empiricism in academia. Crews describes the failure of the American Psychological Association to hold to empirical standards the practice of psychoanalysis as well as such fads as "recovered memory." On another topic, describing trends in humanities departments, Crews mentions "Marxism and psychoanalysis that acquired survival value from the passions they aroused and from the pliability of their concepts and propositions. Each has constituted what Michael Polanyi once termed a dynamo-objective coupling -- that is, a doctrine whose normative claims can always be invoked when its scientific claims appear threatened, and vice versa." (p. 300) Perhaps another example of dynamo-objective coupling is the statement "I believe that humans cause global warming." It serves both as an apparent empirical statement and a trust cue. The fact that opinions on global warming tend to align with political beliefs suggests that trust cues are playing a larger role than empirical research at this stage of the debate. Wade writes, "According to the American Sociological Association, race apparently does not even have a biological foundation, since it is a 'social construct.' The association's official statement on race warns that 'Although racial categories are legitimate subjects of empirical sociological investigation, it is important to recognize the danger of contributing to the popular conception of race as biological.'" (p. 191) "But," Wade continues, "people can now be objectively assigned to their continent of origin, in other words to their race, by genetic markers." However, because the scientific observation conflicts with an important trust cue, major academic disciplines choose to ignore the evidence. What is odd is that an association of academics should find it productive to take an "official position" on anything. I do not need an "official position" of physicists to convince me of the law of gravity. I do not believe in the laws of supply and demand because they are the "official position" of the American Economic Association (to my knowledge, the AEA has never stated an official position in favor of them). A book or article that reports observations and analysis is a scientific statement. An "official position" is a trust cue. In economics, the use of mathematical language has become a trust cue. Modern economists complain, rightly, that in the old days of "literary economics," a lot of muddled gibberish found its ways into economics journals. Today, journals publish muddled gibberish dressed up with mathematical symbols. I believe that societies need trust cues. I cannot imagine being able to get along without them. However, we also need empiricism. Progress comes from accepting empirical observations when they conflict with trust cues, while finding other ways to preserve social cohesion. Arnold Kling is a TCS contributing editor and adjunct scholar with the Cato Institute. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From tkovacs at krmc-law.com Tue Jun 27 04:05:18 2006 From: tkovacs at krmc-law.com (Vanessa Washburn) Date: Tue, 27 Jun 2006 13:25:18 +0180 Subject: with JIMMY the pillow 's please indicated ALEX Message-ID: <200606271325.k5RDPAQs009317@proton.jfet.org> 7TOLUC5 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 420 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: NKYHG0.PNG Type: image/png Size: 7574 bytes Desc: not available URL: From uitdhvuuej at hotmail.com Tue Jun 27 09:03:19 2006 From: uitdhvuuej at hotmail.com (Adolfo Manning) Date: Tue, 27 Jun 2006 15:03:19 -0100 Subject: Look...Here sWjr2R Message-ID: <121.04e558d5.2a9WJR44@sol.com> The most complete Phar. macy Online We carry all major medds at bargain price Viggra, Ci ialis, VaIium, Xa naax Phantermiine, Ulltraam and etc... SatiisfactIon Gua ranteeed http://holysaleness.com/?wid=3D102 dUbZP From eugen at leitl.org Tue Jun 27 08:08:48 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 27 Jun 2006 17:08:48 +0200 Subject: [mctylr@gmail.com: Canada's high-tech spies (CSE) leave (commissioner) Lamer in the dark] Message-ID: <20060627150848.GD28956@leitl.org> ----- Forwarded message from michael taylor ----- From cmsnaysp at poetism.com Tue Jun 27 22:09:25 2006 From: cmsnaysp at poetism.com (Arthur) Date: Tue, 27 Jun 2006 21:09:25 -0800 Subject: Best Bonuses In The World Message-ID: <1-1449830-ETGeuFA6OxBE5niQHAOMt80@tqx.mydreams.tv> You've been selected to Play at the HI-ROLLER CASIN0! Benefits include: * Up to $888 real money to gamble with * Fastest growing/most trusted online company * Play all your favorite games: Poker, Hold'em, Black Jack, Slots, etc. * Play at no-cost to see how exciting and easy it is * Rapid payouts to all clientele & 24/7 support * Great games, Big Winnings, & thousands of players This is a limited chance that expires at the end of the month. Play where the world is Playing: http://losingourhomesoon.com/d1/total death room From rah at shipwright.com Tue Jun 27 19:09:36 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 27 Jun 2006 22:09:36 -0400 Subject: [Clips] Google Gets Ready to Test GBuy, A New Online-Payment Option Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Tue, 27 Jun 2006 21:59:41 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Google Gets Ready to Test GBuy, A New Online-Payment Option Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal Google Gets Ready to Test GBuy, A New Online-Payment Option By MYLENE MANGALINDAN June 27, 2006; Page D3 For years, consumers who didn't want to give Web merchants their credit-card information faced limited options when it came to making purchases online. This week, consumers could get access to another electronic-payment option -- and one that offers a mail-in rebate incentive to boot. Web-search giant Google Inc. is set to introduce a test version of its GBuy online-payment service as early as this week, according to people briefed on the situation. The service, which would challenge eBay Inc.'s PayPal online-payment service and others, has been expected for several months. To attract consumers, Google plans to offer an unspecified rebate to people who complete online purchases using GBuy, according to one person briefed on the company's plans. Here is how the service will work: Consumers who search for items like "shoes" or "strollers" on Google's search site will see text ads with a symbol or icon designating advertisers that accept GBuy payments. Shoppers normally would have clicked on an ad and been linked to that merchant's Web site. Now, while they will still be linked to the merchant's site, they will go through a different checkout process integrated with Google if they choose GBuy for their transaction. Details of the service could still change before Google's official GBuy announcement. The expected arrival of GBuy presages a shake-up in the online-payments market. Until now, consumers have only had payment options such as PayPal, which lets consumers pay using their credit card or a bank-account transfer without disclosing their account information to the merchant or individual receiving the payment. Consumers have also been able to use online checks and online credit options, such as Bill Me Later. Bill Me Later allows consumers to pay for purchases without disclosing their credit-card number, instead disclosing pieces of personal information that lets the company match up the person's identity with their credit information. Chris Mario, a Damascus, Md., resident, says he "would 100% use Google payments" because he likes the company's technology. He says he uses PayPal now but would prefer using an independent third-party payment service when making some online purchases, as opposed to the PayPal unit of eBay, which runs auction and other e-commerce Web sites. Though PayPal has more than 100 million users, it faces maturing growth and is now trying to expand its market from its payments business related to eBay purchases. A PayPal spokeswoman says the company doesn't comment on rivals' services and has managed to thrive despite strong competition. At the same time, Google's new payment service will be a test as to whether the company can be hugely successful outside its core search-technology market. A Google spokesman notes that billing and payments have been part of the company's services for some time and can be used in conjunction with several products now. Google plans to charge merchants a 2.2% commission on a sale, plus 30 cents per transaction using its payment service, according to people briefed on Google's pricing. That is higher than Pay-Pal's lowest published rate of a 1.9% commission plus 30 cents per transaction. Google's rate doesn't include the discount pricing that the company will give to merchants participating in its AdWords advertising program, according to these people. Merchants who spend money on Google's ad program could get the cost of payment processing through Google dropped to nothing, these people said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From AllenBrown at creative.net Wed Jun 28 01:43:16 2006 From: AllenBrown at creative.net (liumang9803) Date: Wed, 28 Jun 2006 10:43:16 +0200 Subject: Buy a Rolex for under $300 dollars! 47 Message-ID: <1f8f01c69a9f$a9ac0b60$96b51491@AllenBrown> Low priced replicas available in all styles. Mens, womans and childrens. These watches are of great quality and are replicated to mirror the real thing. Excellent prices that cannot be passed up Take a look at our selection of watches http://vyt.rolzbulgari.com/ General Hardhead, that's what they should call him. Bet your bottom dollar It's so beautiful. Between two stools Who will be next to challenge the undefeated Shi Rongkai? Beware of Greeks bearing gifts From maurice at birdkiller.com Wed Jun 28 12:37:27 2006 From: maurice at birdkiller.com (Jerald Cantrell) Date: Wen, 28 Jun 2006 18:37:27 -0100 Subject: Take just a candy and become ready for 36 hours of love Message-ID: <200606281632.k5SGWkc4025711@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://ko6.chumcod.info/ct AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From greening at bigtribe.com Thu Jun 29 03:39:17 2006 From: greening at bigtribe.com (Dan R. Greening) Date: Thu, 29 Jun 2006 03:39:17 -0700 Subject: [Geowanking] On geo privacy policies Message-ID: Just a comment on advance policy work on geoprivacy, like Geopriv: I think developing privacy laws and policies in a vacuum is a recipe for disaster. Europe adopted some seemingly harmless geoprivacy laws back in 2002 (OK I howled about it then, including to the EU privacy czar, but no one cared). When last I checked, EU law precludes things like geography-based personalization, like the stuff Nathan Eagle does, because you cannot store location-tracking information with user-identification in the EU ... like EVER... even if you inform the consumer. A whole class of applications is now verboten there. Rather I think we should adopt the "agile" methods: being reasonable about privacy as companies, describing company privacy policies explicitly on web sites and so forth, testing applications and policies out in the market, and refining. Sue the companies if they fail to implement the policies they claim they have. There are many reasons for doing it this way, but one reason is that people and society adapt to technology; it isn't just technology having to adapt to "the way people will always think". For example, I am on the middle-aged side and I have watched society adapt to the "privacy invasion" that I think is almost inevitable with the Internet. While I myself am a "transparent society" type, thinking it is fine if everyone knows my personal life (as long the behavior of authorities is also transparent), I am still amazed at how open my younger peers are as a whole class of people. From Facebook to MySpace, there is plenty of evidence that people are revealing more personal aspects of themselves in a more public way than ever before, fearlessly. I think this openness provides for a more rational and human-diversity respecting society, and celebrate it. And yet, when I reveal information about myself in this same way, it just feels a little weird. Don't get me wrong; I think people should be able to choose to turn location-tracking on and off whenever they want. It's just that when you try to develop laws or broadly-applied policies in advance of technology, you often fail. I guess a great example is P3P "Platform for Privacy Preferences", which is the "encoded privacy policy" system standardized by W3C and embedded in IE. It is largely ignored today, and the consumer doesn't even know it is there. I mean the consumer can turn on-and- off access to different web sites based on the encoded policy, but who actually does this? I think about the vast effort put behind this P3P technology in the late 90s and think it was just a huge waste. Dan R. Greening, Ph.D., CEO BigTribe Corporation, http:// dan.greening.name/contact.htm On Jun 28, 2006, at 8:00 PM, Andrew Turner wrote: >>At the same time, the sociotechnical problems that have long been >>expected >>from these systemsbprivacy invasion, privacy confusion, LBSpam, >>data-quality >>control issuesbare not yet real on a large scale, however well- >>characterized >>they may be. This is partly because LBS developers have adopted >>successful >>design patterns from other "read/write web" contexts, but also >>because the >>user base is just not that large or diverse yet. > >THis seems like just the time to start developing standards that make >sense and look to the future. Lets not design another static HTML, >that then has to wait 10 years for Javascript to make it dynamic >(without flash). There isn't "lock-in" yet, so we can develop GeoPriv, >anti-map-spam, etc. _______________________________________________ Geowanking mailing list Geowanking at lists.burri.to http://lists.burri.to/mailman/listinfo/geowanking ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From s.schear at comcast.net Thu Jun 29 07:52:33 2006 From: s.schear at comcast.net (Steve Schear) Date: Thu, 29 Jun 2006 07:52:33 -0700 Subject: Swedish pirates provide RIAA insurance In-Reply-To: <20060629105557.GH12291@leitl.org> References: <20060629105557.GH12291@leitl.org> Message-ID: <6.0.1.1.0.20060629074839.051f1cd8@mail.comcast.net> From /. http://yro.slashdot.org/article.pl?sid=06/06/28/2316236 An anonymous reader writes "A new insurance company in Sweden is offering a new policy to protect you from the RIAA. For a mere 140 SEK ($19 USD) per year, they will pay all your fines and give you a t-shirt if you get convicted for file sharing. Interesting development in Sweden indeed." [Swedish] http://www.tankafritt.nu/ From eugen at leitl.org Thu Jun 29 00:00:39 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 29 Jun 2006 09:00:39 +0200 Subject: /. [ACLU Files for Info on New Brain-Scan Tech] Message-ID: <20060629070039.GM12291@leitl.org> Link: http://slashdot.org/article.pl?sid=06/06/28/1946217 Posted by: ScuttleMonkey, on 2006-06-28 21:11:00 An anonymous reader writes "According to their website, the ACLU has filed a FOIA request seeking information on the new [1]Functional Magnetic Resonance Imaging service being made available to the government for use on suspected terrorists which can produce 'live, real-time images of people's brains as they answer questions, view images, listen to sounds, and respond to other stimuli. [...] These brain-scanning technologies are far from ready for forensic uses and if deployed will inevitably be misused and misunderstood.", said Barry Steinhardt, Director of the ACLU's Technology and Liberty Project. "This technology must not be deployed until it is proven effective -- and we are a long way away from that point, according to scientists in the field,"'" References 1. http://www.aclu.org/privacy/medical/26035prs20060628.html ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From royal at planetnet.com Thu Jun 29 05:55:36 2006 From: royal at planetnet.com (Gay Powers) Date: Thu, 29 Jun 2006 11:55:36 -0100 Subject: Unique Logos / customer recognition (ID1178519) Message-ID: <200606290955.k5T9tYrd017616@proton.jfet.org> 3uj Our art team creates a custom logo for you, based on your needs. Years of experience have taught us how to create a logo that makes a statement that is unique to you. In a professional manner we learn about your image and how you would like the world to perceive you and your company. With this information we then create a logo that is not only unique but reflects the purpose of you and your company. For value and a logo that reflects your image, take a few minutes and visit Logo Maker! http://anorthite.com.try-logosxd.biz Sincerely, Logo Design Team attention cockleshell bodybuilder From eugen at leitl.org Thu Jun 29 03:55:57 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 29 Jun 2006 12:55:57 +0200 Subject: [greening@bigtribe.com: [Geowanking] On geo privacy policies] Message-ID: <20060629105557.GH12291@leitl.org> ----- Forwarded message from "Dan R. Greening" ----- From James.Hughes at trincoll.edu Thu Jun 29 14:03:47 2006 From: James.Hughes at trincoll.edu (Hughes, James J.) Date: Thu, 29 Jun 2006 17:03:47 -0400 Subject: [technoliberation] Vernor Vinge on computers, freedom and privacy Message-ID: http://technology.guardian.co.uk/weekly/story/0,,1807882,00.html Big Brother takes a controlling interest in chips A chilling novel details how everyday technologies could gradually lead to a far more invasive society than even Orwell dreamed of Wendy Grossman Thursday June 29, 2006 The Guardian Science fiction writers love to ask "What if?" What if a super-intelligent alien race had planted a pair of devices to boost our development at key moments? What if new technologies such as television and electronics become pervasive? George Orwell's answer to the latter, in 1948's 1984, was to show the apparently perfect, controlled society they could enable. But one thing usually missing is the "how?" At the Computers, Freedom, and Privacy (CFP) conference, held in Washington, DC, last month, Vernor Vinge, a retired computer scientist and the author of Rainbows End, provided a compelling explanation of how developing technology and powerful interests could create a society far more invasive and controlled than anything Orwell dreamed of. The scenario he describes is the background he researched for Rainbows End. Set in 2025, the characters are surrounded by logical extensions of today's developing technology. Wearable computing is commonplace. Tagging and ubiquitous networked sensors mean you can look at the landscape with your choice of overlay and detail. People send each other silent messages and Google for information within conversations with participants who may be physically present or might be remote projections. One character's projection is hijacked and becomes the front for three people. The owner of another remote intelligence is unknown. Several continents' top intelligence operatives try to solve a smart biological attack that infects a test population with the willingness to obey orders. Assumptions Vinge makes two opening assumptions: no grand physical disaster occurs, and today's computing and communications trends continue. He added a third trend: "The great conspiracy against human freedom." As novelist Doris Lessing has observed, barons on opposite sides of the river don't need to be in cahoots if their interests coincide. In our case, defence, homeland security, financial crime enforcement, police, tax collectors and intellectual property rights holders offer reasons to want to control the hardware we use. Then there are geeks, who can be tempted to forget the consequences if the technology is cool enough. Vinge quotes the most famous line from the comic strip Pogo: "We have met the enemy, and he is us." Vinge's technology to satisfy these groups' dreams is the Secure Hardware Environment (She), which dedicates some bandwidth and a small portion of every semiconductor for regulatory use. Deployment is progressive, as standards are implemented. Built into new chips, She will spread inevitably through its predecessors' obsolescence. This part is terribly plausible. It sounds much like the Trusted Computing Platform, implemented in Intel chips and built into machines from Dell, Fujitsu-Siemens and others. Most people don't realise their new computer contains a chip designed to block the operation of any software not certified by the group. Now enhance that and build it into RFID chips, networked embedded systems, shrink and distribute as "smart dust". All are current trends or works in progress. Geeks are willing to fight Trusted Computing on the grounds that it could be used to block open-source software or to enforce draconian digital rights management. But what if accepting it meant less visible security, less bureaucracy, even slight profit? She automatically sends taxes, enables much less noticeable surveillance and gets you through security checkpoints with no waiting. There's less crime, because legislative reality can be enforced on physical reality. Fewer false convictions. Make regulation automatic, and it seems to go away. New laws can be downloaded as a regulatory upgrade. "She," Vinge concluded at the conference, "fits the trajectory that economics and technical progress are following. The infrastructure for such control will probably arrive in any case." He also calls his scenario optimistic. This is, however, one of the paths to Technological Singularity, which Vinge wrote up in a 1993 essay. It's the moment superhuman intelligence is achieved, either through systems we build or human augmentation. The Singularity changes everything; nothing after it is predictable. In the world of Rainbows End, he thinks, they are either on the verge of Singularity or it is happening. This caused its own singularity in science fiction. Charlie Stross, whose novel Accelerando attempts to depict living through the Singularity, has called it "the turd in the punchbowl of near-future SF - you may politely pretend it isn't there, but everyone has to deal with it." Author Ken MacLeod places the Singularity in the context of post-2001 hopelessness. "When human beings feel they can't change the future, they begin to imagine that maybe superhuman beings can: gods, angels, aliens - and now artificial intelligences (AI). The idea of the Singularity is just a sophisticated version of this ancient ... superstition, that human history is or soon will be made by something other and better than human beings." Way to believe Vinge doesn't dispute the notion that humans look for a way to believe things will be better. Year 2000 software remediation is an example: "Prudent apprehension caused an awful lot of money to be spent ... and was one reason there were no significant problems." Most people assume the cause of the Singularity, if it happens, will be the effect of Moore's Law (that the number of transistors that can fit in a given space on a semiconductor doubles every 18 months). It's also usually connected to AI. In his essay, however, Vinge suggested four or five paths to the Singularity, only one of which was unitary AI. But here is where Vinge's thinking gets optimistic (unlike the CFP conference, which saw surveillant databases everywhere). The road to technological Gaia is full of frictional costs that could stop it. "It's not going to work very well," he says, "but it will be attempted, both by the state and by civil special interest petitioners." The drug laws provide a perfect illustration: "The ideal job to have in government is something everybody is convinced is essential to be done successfully that cannot be done successfully and the government is the only entity that can do it. Every time you fail, you say, 'The problem is much larger than we imagined, give us some more money.'" "The leaders of most powerful countries are coming to realise that the most important natural resources are not factories or the size of armies. Economic power is in the size of the population that is well-educated, creative and generally happy enough to be optimistic enough to want to do something creative." "The illusion of freedom becomes a strange thing when a government is dealing with ... thousands of people who are as bright as the smartest people running the government. Together, they outclass the people running the show. The turning point is the notion that to provide this illusion of freedom for such a group would wind up being more like real freedom than anything in human history." Or, as he thinks Pogo might say for the 21st century, "We have met what's going to save our ass and it is us." ------------------------ Yahoo! Groups Sponsor --------------------~--> See what's inside the new Yahoo! Groups email. http://us.click.yahoo.com/2pRQfA/bOaOAA/yQLSAA/XgSolB/TM --------------------------------------------------------------------~-> Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/technoliberation/ <*> To unsubscribe from this group, send an email to: technoliberation-unsubscribe at yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rah at shipwright.com Thu Jun 29 20:00:18 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 29 Jun 2006 23:00:18 -0400 Subject: [Clips] EMC to Acquire RSA Security For About $2.3 Billion Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Thu, 29 Jun 2006 22:57:16 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] EMC to Acquire RSA Security For About $2.3 Billion Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The Wall Street Journal EMC to Acquire RSA Security For About $2.3 Billion By CHARLES FORELLE June 30, 2006 EMC Corp. won a bidding war for RSA Security Inc., buying the computer-security company for about $2.3 billion. EMC, once primarily a vendor of data-storage hardware to big corporations, has taken steps to broaden its scope because prices are tumbling for big-business tech gear. Security has become a critical area for corporations, worried about hackers, viruses and information theft. EMC of Hopkinton, Mass., said it makes sense to sell both storage equipment and security for the data that go on it. RSA of Bedford, Mass., is the maker of the SecurID tokens used to authenticate users on corporate networks. RSA licensed 4.7 million of the credentials last year, when it had $310 million in revenue. Sales have been fairly stagnant; in 2005 the company's revenue edged up just 1%. Revenue in 2005 was just 10% higher than in 2001. In 4 p.m. composite trading yesterday on the Nasdaq Stock Market, RSA shares jumped $3.52, or 18%, to $22.88 after the New York Times reported that RSA was being pursued by suitors, which the company confirmed yesterday morning. That made RSA costly. EMC agreed to pay $28 a share, a premium of 22% to Thursday's 4 p.m. price and 45% to Wednesday's 4 p.m. price, before news of a potential deal. Investors appeared worried about the price, knocking EMC shares down 45 cents, or 4%, to $10.80 in after-hours trading. EMC shares haven't traded below $11 since 2004. On a conference call with company managers, several analysts pointedly questioned EMC Chief Executive Joe Tucci about the price. Mr. Tucci said the company and the space are "incredibly hot. There were other companies that noticed this." He added that it was "a very competitive situation." He said security and storage "dominate the top" of the list of priorities for corporate-technology managers. He added that EMC's relationships with high-level technology managers could spur sales of the RSA devices. Storage and security outfits have combined before. Last year security and antivirus vendor Symantec Corp. of Cupertino, Calif., bought Veritas Software, a Mountain View, Calif., maker of data-backup technologies. RSA's chief executive, Art Coviello, will become an executive vice president of EMC. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From cypherpunks at lne.com Fri Jun 30 00:34:05 2006 From: cypherpunks at lne.com (cypherpunks at lne.com) Date: Fri, 30 Jun 2006 03:34:05 -0400 Subject: Women will want to take a closer look at how Viagra Soft Tabs worked for you! Message-ID: <200606300734.k5U7Y5WO016727@proton.jfet.org> $urprise her with Viagr@ Soft T at bs effect! You can see you are getting older: gray hair, wrinkles on your forehead, glasses for reading, worse hearing and NO the worst thing Erectile Dysfunction. Maybe your doctor can help you with all these problems but we are sure that our Soft Viagra tabs can help you with the last problem. http://ilfjkmbdgh.occurbucket.com/?acebdghxwrnoyilzvtfjkm Were not discussing @nything here, its t0o risky, From jbartas at speakeasy.net Fri Jun 30 03:38:22 2006 From: jbartas at speakeasy.net (John Bartas) Date: June 30, 2006 3:38:22 AM EDT Subject: The Newbie's Guide to Detecting the NSA Message-ID: Dave, This entry from the blog at wired.com might be good for the IP list. The best part is at the end. Good old traceroute! -------------------------------------------------------- The Newbie's Guide to Detecting the NSA http://blog.wired.com/27BStroke6/#1510938 ... "With that in mind, here's the 27B Stroke 6 guide to detecting if your traffic is being funneled into the secret room on San Francisco's Folsom street. If you're a Windows user, fire up an MS-DOS command prompt. Now type tracert followed by the domain name of the website, e-mail host, VoIP switch, or whatever destination you're interested in. Watch as the program spits out your route, line by line. C:\> tracert nsa.gov 1 2 ms 2 ms 2 ms 12.110.110.204 [...] 7 11 ms 14 ms 10 ms as-0-0.bbr2.SanJose1.Level3.net [64.159.0.218] 8 13 12 19 ms ae-23-56.car3.SanJose1.Level3.net [4.68.123.173] 9 18 ms 16 ms 16 ms 192.205.33.17 10 88 ms 92 ms 91 ms tbr2-p012201.sffca.ip.att.net [12.123.13.186] 11 88 ms 90 ms 88 ms tbr1-cl2.sl9mo.ip.att.net [12.122.10.41] 12 89 ms 97 ms 89 ms tbr1-cl4.wswdc.ip.att.net [12.122.10.29] 13 89 ms 88 ms 88 ms ar2-a3120s6.wswdc.ip.att.net [12.123.8.65] 14 102 ms 93 ms 112 ms 12.127.209.214 15 94 ms 94 ms 93 ms 12.110.110.13 16 * * * 17 * * * 18 * * In the above example, my traffic is jumping from Level 3 Communications to AT&T's network in San Francisco, presumably over the OC-48 circuit that AT&T tapped on February 20th, 2003, according to the Klein docs. The magic string you're looking for is sffca.ip.att.net. If it's present immediately above or below a non-att.net entry, then -- by Klein's allegations -- your packets are being copied into room 641A, and from there, illegally, to the NSA. Of course, if Marcus is correct and AT&T has installed these secret rooms all around the country, then any att.net entry in your route is a bad sign. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rah at shipwright.com Fri Jun 30 02:46:58 2006 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 30 Jun 2006 05:46:58 -0400 Subject: [Clips] Google Aims to Speed the Online Checkout Line Message-ID: --- begin forwarded text Delivered-To: rah at shipwright.com Delivered-To: clips at philodox.com Date: Fri, 30 Jun 2006 04:40:19 -0400 To: Philodox Clips List From: "R.A. Hettinga" Subject: [Clips] Google Aims to Speed the Online Checkout Line Reply-To: clips-chat at philodox.com Sender: clips-bounces at philodox.com The New York Times June 29, 2006 Google Aims to Speed the Online Checkout Line By SAUL HANSELL In its quest to "organize the world's information," Google now wants to keep track of your credit card number and where you live. The company is introducing Google Checkout today, a service that will allow users to make purchases from online stores using payment and shipping information they keep on file with Google. Google's aim, said Eric E. Schmidt, the chief executive, is to make it easier and faster for people to buy products advertised on Google - thus attracting more advertisers. "The goal here is to make it be one nanosecond from the time the customer decides to buy to the time the transaction is complete and the product is on the way," Mr. Schmidt said. For consumers, this sort of service, often referred to as an online wallet, is hardly new. Microsoft, AOL and Yahoo have offered similar wallets, which proved to have limited appeal. While the PayPal service of eBay has attracted widespread use, it offers additional features like the ability to transfer money from checking accounts. But for merchants, the service comes with a twist: Google will waive some or all of the transaction fees for companies that buy advertising from it. That may give the service a leg up on competitors like PayPal and several smaller companies that help online merchants accept credit cards. It will also add another entry to the list of businesses that have been shaken up by Google's innovations, a list that already includes publishing, advertising and desktop software. Google is charging merchants 20 cents plus 2 percent of the purchase price to process card transactions, less than most businesses pay for credit card processing. Banking industry executives say that credit card processors typically pay MasterCard and Visa a fee of 30 cents and 1.95 percent for every purchase, so Google will be subsidizing many transactions. What is more, for every $1 a company spends on search advertising, Google will waive the fees on $10 worth of purchases. Factoring in the 2 percent fee, that represents a rebate of at least 20 percent of advertising spending. Mr. Schmidt said the company was willing to lose money on transaction fees because it felt the package would increase advertising spending. "The math works because we can have lower prices and higher volume," he said. Google's decision to give free transaction processing to advertisers has the potential to disrupt its carefully cultivated electronic auction for ad placement. Google has worked hard to ensure that the auction treats all advertisers equally, sometimes to the dismay of big companies that are used to discounts for major purchases. It has not offered commissions to advertising agencies, as most media companies do. Online merchants that do not want to use Google Checkout "might be a little peeved," said Kevin Lee, chief executive of Did-it.com, a search advertising agency. "They might say if you give that credit to some people for credit card processing, give it to me for something else." Mr. Schmidt said Google had not considered this issue. While Google's tactics may be seen as aggressive competition, the company is unlikely to run afoul of antitrust laws because it does not have a monopoly in the market. Yahoo, the other main seller of advertising on search results, recently announced an alliance with eBay that among other things will encourage Yahoo advertisers to use PayPal for payment processing. PayPal will also be promoted as the online wallet for use on Yahoo services. Both companies declined to give financial details of the deal. Google expects that most sites that use Google Checkout will also continue to use their existing method of processing credit cards and may accept PayPal as well. Advertisements on Google.com from companies that accept Google Checkout will display a small image of a shopping cart. Clicking on the ad will take customers to the advertiser's Web site, as it does now. When customers decide to buy something, they will be offered the option to sign into Google Checkout and use the credit card and address information on file there. Customers that do not have accounts with Google will be encouraged to set them up. Google may get several additional benefits from the checkout service. It will encourage more users to register and give it personal data, allowing Google to display advertising based on specific attributes of the viewer. More broadly, the data the company gets from transactions could help it improve the way it chooses which advertising to show to which users. Google says it does not currently plan to use transaction data in this way. For merchants, one concern is whether Google's system, which is unfamiliar to users, will reduce the number of people who complete purchases on their sites, a measure known as the conversion rate. "You have people in your most valuable area and suddenly you are switching them off your site to something no one has ever done before," said John Bresee, the president of Backcountry.com, an online seller of sporting goods that has been testing Google Checkout. "The cost will be stunningly high, if they are not great at what they do." Mr. Bresee said Backcountry would have people watching the performance of Google Checkout around the clock. "If they convert at the same rate, and the fees are lower, we will put up the biggest Google Checkout button you have ever seen," he said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Thu Jun 29 23:33:17 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 30 Jun 2006 08:33:17 +0200 Subject: [selected.by.rael@rael-science.org: [rael-science] Blair laid bare: the article that may get you arrested] Message-ID: <20060630063317.GV26630@leitl.org> Source: http://news.independent.co.uk/uk/politics/article1129827.ece BBllaaiirr llaaiidd bbaarree:: tthhee aarrttiiccllee tthhaatt mmaayy ggeett yyoouu aarrrreesstteedd IInn tthhee gguuiissee ooff ffiigghhttiinngg tteerrrroorriissmm aanndd mmaaiinnttaaiinniinngg ppuubblliicc oorrddeerr,, TToonnyy BBllaaiirr''ss GGoovveerrnnmmeenntt hhaass qquuiieettllyy aanndd ssyysstteemmaattiiccaallllyy ttaakkeenn ppoowweerr ffrroomm PPaarrlliiaammeenntt aanndd tthhee BBrriittiisshh ppeeooppllee.. TThhee aauutthhoorr cchhaarrttss aa nniinnee--yyeeaarr aassssaauulltt oonn cciivviill lliibbeerrttiieess tthhaatt rreevveeaallss tthhee ddaannggeerr ooff ttrraaddiinngg ffrreeeeddoomm ffoorr sseeccuurriittyy -- aanndd mmuusstt hhaavvee CChhuurrcchhiillll ssppiinnnniinngg iinn hhiiss ggrraavvee BByy HHeennrryy PPoorrtteerr PPuubblliisshheedd:: 2299 JJuunnee 22000066 In the shadow of Winston Churchill's statue opposite the House of Commons, a rather odd ritual has developed on Sunday afternoons. A small group of people - mostly young and dressed outlandishly - hold a tea party on the grass of Parliament Square. A woman looking very much like Mary Poppins passes plates of frosted cakes and cookies, while other members of the party flourish blank placards or, as they did on the afternoon I was there, attempt a game of cricket. Sometimes the police move in and arrest the picnickers, but on this occasion the officers stood at a distance, presumably consulting on the question of whether this was a demonstration or a non-demonstration. It is all rather silly and yet in Blair's Britain there is a kind of nobility in the amateurishness and persistence of the gesture. This collection of oddballs, looking for all the world as if they had stepped out of the Michelangelo Antonioni film Blow- Up, are challenging a new law which says that no one may demonstrate within a kilometre, or a little more than half a mile, of Parliament Square if they have not first acquired written permission from the Commissioner of the Metropolitan Police. This effectively places the entire centre of British government, Whitehall and Trafalgar Square, off-limits to the protesters and marchers who have traditionally brought their grievances to those in power without ever having to ask a policeman's permission. The non-demo demo, or tea party, is a legalistic response to the law. If anything is written on the placards, or if someone makes a speech, then he or she is immediately deemed to be in breach of the law and is arrested. The device doesn't always work. After drinking tea in the square, a man named Mark Barrett was recently convicted of demonstrating. Two other protesters, Milan Rai and Maya Evans, were charged after reading out the names of dead Iraqi civilians at the Cenotaph, Britain's national war memorial, in Whitehall, a few hundred yards away. On that dank spring afternoon I looked up at Churchill and reflected that he almost certainly would have approved of these people insisting on their right to demonstrate in front of his beloved Parliament. "If you will not fight for the right," he once growled, "when you can easily win without bloodshed, if you will not fight when your victory will be sure and not so costly, you may come to the moment when you will have to fight with all the odds against you and only a precarious chance for survival. There may be a worse case. You may have to fight when there is no chance of victory, because it is better to perish than to live as slaves." Churchill lived in far more testing times than ours, but he always revered the ancient tradition of Britain's "unwritten constitution". I imagined him becoming flesh again and walking purposefully toward Downing Street - without security, of course - there to address Tony Blair and his aides on their sacred duty as the guardians of Britain's Parliament and the people's rights. For Blair, that youthful baby-boomer who came to power nine years ago as the embodiment of democratic liberalism as well as the new spirit of optimism in Britain, turns out to have an authoritarian streak that respects neither those rights nor, it seems, the independence of the elected representatives in Parliament. And what is remarkable - in fact almost a historic phenomenon - is the harm his government has done to the unwritten British constitution in those nine years, without anyone really noticing, without the press objecting or the public mounting mass protests. At the inception of Cool Britannia, British democracy became subject to a silent takeover. Last year - rather late in the day, I must admit - I started to notice trends in Blair's legislation which seemed to attack individual rights and freedoms, to favour ministers (politicians appointed by the Prime Minister to run departments of government) over the scrutiny of Parliament, and to put in place all the necessary laws for total surveillance of society. There was nothing else to do but to go back and read the Acts - at least 15 of them - and to write about them in my weekly column in The Observer. After about eight weeks, the Prime Minister privately let it be known that he was displeased at being called authoritarian by me. Very soon I found myself in the odd position of conducting a formal e-mail exchange with him on the rule of law, I sitting in my London home with nothing but Google and a stack of legislation, the Prime Minister in No 10 with all the resources of government at his disposal. Incidentally, I was assured that he had taken time out of his schedule so that he himself could compose the thunderous responses calling for action against terrorism, crime, and antisocial behaviour. The day after the exchange was published, the grudging truce between the Government and me was broken. Blair gave a press conference, in which he attacked media exaggeration, and the then Home Secretary, Charles Clarke, weighed in with a speech at the London School of Economics naming me and two other journalists and complaining about "the pernicious and even dangerous poison" in the media. So, I guess this column comes with a health warning from the British Government, but please don't pay it any mind. When governments attack the media, it is often a sign that the media have for once gotten something right. I might add that this column also comes with the more serious warning that, if rights have been eroded in the land once called "the Mother of Parliaments", it can happen in any country where a government actively promotes the fear of terrorism and crime and uses it to persuade people that they must exchange their freedom for security. Blair's campaign against rights contained in the Rule of Law - that is, that ancient amalgam of common law, convention, and the opinion of experts, which makes up one half of the British constitution - is often well concealed. Many of the measures have been slipped through under legislation that appears to address problems the public is concerned about. For instance, the law banning people from demonstrating within one kilometre of Parliament is contained in the Serious Organised Crime and Police Act of 2005. The right to protest freely has been affected by the Terrorism Act of 2000, which allows police to stop and search people in a designated area - which can be anywhere - and by antisocial behaviour laws, which allow police to issue an order banning someone from a particular activity, waving a banner, for instance. If a person breaks that order, he or she risks a prison sentence of up to five years. Likewise, the Protection from Harassment Act of 1997 - designed to combat stalkers and campaigns of intimidation - is being used to control protest. A woman who sent two e-mails to a pharmaceutical company politely asking a member of the staff not to work with a company that did testing on animals was prosecuted for "repeated conduct" in sending an e-mail twice, which the Act defines as harassment. There is a demonic versatility to Blair's laws. Kenneth Clarke, a former Conservative chancellor of the exchequer and home secretary, despairs at the way they are being used. "What is assured as being harmless when it is introduced gets used more and more in a way which is sometimes alarming," he says. His colleague David Davis, the shadow Home Secretary, is astonished by Blair's Labour Party: "If I had gone on the radio 15 years ago and said that a Labour government would limit your right to trial by jury, would limit - in some cases eradicate - habeas corpus, constrain your right of freedom of speech, they would have locked me up." Indeed they would. But there's more, so much in fact that it is difficult to grasp the scope of the campaign against British freedoms. But here goes. The right to a jury trial is removed in complicated fraud cases and where there is a fear of jury tampering. The right not to be tried twice for the same offence - the law of double jeopardy - no longer exists. The presumption of innocence is compromised, especially in antisocial behaviour legislation, which also makes hearsay admissible as evidence. The right not to be punished unless a court decides that the law has been broken is removed in the system of control orders by which a terrorist suspect is prevented from moving about freely and using the phone and internet, without at any stage being allowed to hear the evidence against him - house arrest in all but name. Freedom of speech is attacked by Section Five of the Criminal Justice and Public Order Act, which preceded Blair's Government, but which is now being used to patrol opinion. In Oxford last year a 21-year-old graduate of Balliol College named Sam Brown drunkenly shouted in the direction of two mounted police officers, "Mate, you know your horse is gay. I hope you don't have a problem with that." He was given one of the new, on-the-spot fines - #80 - which he refused to pay, with the result that he was taken to court. Some 10 months later the Crown Prosecution Service dropped its case that he had made homophobic remarks likely to cause disorder. There are other people the police have investigated but failed to prosecute: the columnist Cristina Odone, who made a barely disparaging aside about Welsh people on TV (she referred to them as "little Welshies"); and the head of the Muslim Council of Great Britain, Sir Iqbal Sacranie, who said that homosexual practices were "not acceptable" and civil partnerships between gays were "harmful". The remarks may be a little inappropriate, but I find myself regretting that my countrymen's opinions - their bloody-mindedness, their truculence in the face of authority, their love of insult and robust debate - are being edged out by this fussy, hairsplitting, second-guessing, politically correct state that Blair is trying to build with what he calls his "respect agenda". Do these tiny cuts to British freedom amount to much more than a few people being told to be more considerate? Shami Chakrabarti, the petite whirlwind who runs Liberty believes that "the small measures of increasing ferocity add up over time to a society of a completely different flavour". That is exactly the phrase I was looking for. Britain is not a police state - the fact that Tony Blair felt it necessary to answer me by e-mail proves that - but it is becoming a very different place under his rule, and all sides of the House of Commons agree. The Liberal Democrats' spokesman on human rights and civil liberties, David Heath, is sceptical about Blair's use of the terrorist threat. "The age- old technique of any authoritarian or repressive government has always been to exaggerate the terrorist threat to justify their actions," he says. "I am not one to underestimate the threat of terrorism, but I think it has been used to justify measures which have no relevance to attacking terrorism effectively." And Bob Marshall-Andrews - a Labour MP who, like quite a number of others on Blair's side of the House of Commons, is deeply worried about the tone of government - says of his boss, "Underneath, there is an unstable authoritarianism which has seeped into the [Labour] Party." Chakrabarti, who once worked as a lawyer in the Home Office, explains: "If you throw live frogs into a pan of boiling water, they will sensibly jump out and save themselves. If you put them in a pan of cold water and gently apply heat until the water boils they will lie in the pan and boil to death. It's like that." In Blair you see the champion frog boiler of modern times. He is also a lawyer who suffers acute impatience with the processes of the law. In one of his e-mails to me he painted a lurid - and often true - picture of the delinquency in some of Britain's poorer areas, as well as the helplessness of the victims. His response to the problem of societal breakdown was to invent a new category of restraint called the antisocial behaviour order, or Asbo. "Please speak to the victims of this menace," he wrote. "They are people whose lives have been turned into a daily hell. Suppose they live next door to someone whose kids are out of control: who play their music loud until 2 am; who vilify anyone who asks them to stop; who are often into drugs or alcohol? Or visit a park where children can't play because of needles, used condoms, and hooligans hanging around. "It is true that, in theory, each of these acts is a crime for which the police could prosecute. In practice, they don't. It would involve in each case a disproportionate amount of time, money and commitment for what would be, for any single act, a low-level sentence. Instead, they can now use an Asbo or a parenting order or other measures that attack not an offence but behaviour that causes harm and distress to people, and impose restrictions on the person doing it, breach of which would mean they go to prison." How the Asbo works is that a complaint is lodged with a magistrates' court which names an individual or parent of a child who is said to be the source of antisocial behaviour. The actions which cause the trouble do not have to be illegal in themselves before an Asbo is granted and the court insists on the cessation of that behaviour - which may be nothing more than walking a dog, playing music, or shouting in the street. It is important to understand that the standards of evidence are much lower here than in a normal court hearing because hearsay - that is, rumour and gossip - is admissible. If a person is found to have broken an Asbo, he or she is liable to a maximum of five years in prison, regardless of whether the act is in itself illegal. So, in effect, the person is being punished for disobedience to the state. Blair is untroubled by the precedent that this law might offer a real live despot, or by the fact that Asbos are being used to stifle legitimate protest, and indeed, in his exchange with me, he seemed to suggest that he was considering a kind of super-Asbo for more serious criminals to "harry, hassle and hound them until they give up or leave the country". It was significant that nowhere in this rant did he mention the process of law or a court. He offers something new: not a police state but a controlled state, in which he seeks to alter radically the political and philosophical context of the criminal-justice system. "I believe we require a profound rebalancing of the civil liberties debate," he said in a speech in May. "The issue is not whether we care about civil liberties but what that means in the early 21st century." He now wants legislation to limit powers of British courts to interpret the Human Rights Act. The Act, imported from the European Convention on Human Rights, was originally inspired by Winston Churchill, who had suggested it as a means to entrench certain rights in Europe after the war. Blair says that this thinking springs from the instincts of his generation, which is "hard on behaviour and soft on lifestyle." Actually, I was born six weeks before Blair, 53 years ago, and I can categorically say that he does not speak for all my generation. But I agree with his other self-description, in which he claims to be a moderniser, because he tends to deny the importance of history and tradition, particularly when it comes to Parliament, whose powers of scrutiny have suffered dreadfully under his government. There can be few duller documents than the Civil Contingencies Act of 2004 or the Inquiries Act of 2005, which is perhaps just as well for the Government, for both vastly extend the arbitrary powers of ministers while making them less answerable to Parliament. The Civil Contingencies Act, for instance, allows a minister to declare a state of emergency in which assets can be seized without compensation, courts may be set up, assemblies may be banned, and people may be moved from, or held in, particular areas, all on the belief that an emergency might be about to occur. Only after seven days does Parliament get the chance to assess the situation. If the minister is wrong, or has acted in bad faith, he cannot be punished. One response might be to look into his actions by holding a government investigation under the Inquiries Act, but then the minister may set its terms, suppress evidence, close the hearing to the public, and terminate it without explanation. Under this Act, the reports of government inquiries are presented to ministers, not, as they once were, to Parliament. This fits very well into a pattern where the executive branch demands more and more unfettered power, as does Charles Clarke's suggestion that the press should be subject to statutory regulation. I realise that it would be testing your patience to go too deeply into the Legislative and Regulatory Reform Bill, which the Government has been trying to smuggle through Parliament this year, but let me just say that its original draft would have allowed ministers to make laws without reference to elected representatives. Imagine the President of the United States trying to neuter the Congress in this manner, so flagrantly robbing it of its power. Yet until recently all this has occurred in Britain with barely a whisper of coverage in the British media. Blair is the lowest he has ever been in the polls, but he is still energetically fighting off his rival, Gordon Brown, with a cabinet reshuffle and a stout defence of his record. In an e-mail to me, Blair denied that he was trying to abolish parliamentary democracy, then swiftly moved to say how out of touch the political and legal establishments were, which is perhaps the way that he justifies these actions to himself. It was striking how he got one of his own pieces of legislation wrong when discussing control orders - or house arrest - for terrorist suspects in relation to the European Convention on Human Rights, which is incorporated into British law under the Human Rights Act. "The point about the Human Rights Act," he declared, "is that it does allow the courts to strike down the act of our 'sovereign Parliament'." As Marcel Berlins, the legal columnist of The Guardian, remarked, "It does no such thing." How can the Prime Minister get such a fundamentally important principle concerning human rights so utterly wrong, especially when it so exercised both sides of the House of Commons? The answer is that he is probably not a man for detail, but Charles Moore, the former editor of The Daily Telegraph, now a columnist and the official biographer of Margaret Thatcher, believes that New Labour contains strands of rather sinister political DNA. "My theory is that the Blairites are Marxist in process, though not in ideology - well, actually it is more Leninist." It is true that several senior ministers had socialist periods. Charles Clarke, John Reid, recently anointed Home Secretary, and Jack Straw, the former foreign secretary, were all on the extreme left, if not self-declared Leninists. Moore's implication is that the sacred Blair project of modernising Britain has become a kind of ersatz ideology and that this is more important to Blair than any of the country's political or legal institutions. "He's very shallow," says Moore. "He's got a few things he wants to do and he rather impressively pursues them." One of these is the national ID card scheme, opposition to which brings together such disparate figures as the Earl of Onslow, a Conservative peer of the realm; Commander George Churchill-Coleman, the famous head of New Scotland Yard's anti-terrorist unit during the worst years of IRA bombings; and Neil Tennant, one half of the hugely successful pop group Pet Shop Boys. The idea of the ID card seems sensible in the age of terrorism, identity theft, and illegal immigration until you realise that the centralised database - the National Identity Register - will log and store details of every important action in a person's life. When the ID card is swiped as someone identifies himself at, say, a bank, hospital, pharmacy, or insurance company, those details are retained and may be inspected by, among others, the police, tax authorities, customs, and MI5, the domestic intelligence service. The system will locate and track the entire adult population. If you put it together with the national system of licence-plate-recognition cameras, which is about to go live on British highways and in town centres, and understand that the ID card, under a new regulation, will also carry details of a person's medical records, you realise that the state will be able to keep tabs on anyone it chooses and find out about the most private parts of a person's life. Despite the cost of the ID card system - estimated by the Government as being about #5.8bn and by the London School of Economics as being between #10bn and #19bn - few think that it will attack the problems of terrorism and ID theft. George Churchill-Coleman described it to me as an absolute waste of time. "You and I will carry them because we are upright citizens. But a terrorist isn't going to carry [his own]. He will be carrying yours." Neil Tennant, a former Labour donor who has stopped giving money to and voting for Labour because of ID cards, says: "My specific fear is that we are going to create a society where a policeman stops me on the way to Waitrose on the King's Road and says, 'Can I see your identity card?' I don't see why I should have to do that." Tennant says he may leave the country if a compulsory ID card comes into force. "We can't live in a total-surveillance society," he adds. "It is to disrespect us." Defending myself against claims of paranoia and the attacks of Labour's former home secretary, I have simply referred people to the statute book of British law, where the evidence of what I have been saying is there for all to see. But two other factors in this silent takeover are not so visible. The first is a profound change in the relationship between the individual and the state. Nothing demonstrates the sense of the state's entitlement over the average citizen more than the new laws that came in at the beginning of the year and allow anyone to be arrested for any crime - even dropping litter. And here's the crucial point. Once a person is arrested he or she may be fingerprinted and photographed by the police and have a DNA sample removed with an oral swab - by force if necessary. And this is before that person has been found guilty of any crime, whether it be dropping litter or shooting someone. So much for the presumption of innocence, but there again we have no reason to be surprised. Last year, in his annual Labour Party conference speech, Blair said this: "The whole of our system starts from the proposition that its duty is to protect the innocent from being wrongly convicted. Don't misunderstand me. That must be the duty of any criminal justice system. But surely our primary duty should be to allow law-abiding people to live in safety. It means a complete change of thinking. It doesn't mean abandoning human rights. It means deciding whose come first." The point of human rights, as Churchill noted, is that they treat the innocent, the suspect, and the convict equally: "These are the symbols, in the treatment of crime and criminals, which mark and measure the stored-up strength of a nation, and are a sign and proof of the living virtue in it." The DNA database is part of this presumption of guilt. Naturally the police support it, because it has obvious benefits in solving crimes, but it should be pointed out to any country considering the compulsory retention of the DNA of innocent people that in Britain 38 per cent of all black men are represented on the database, while just 10 percent of white men are. There will be an inbuilt racism in the system until - heaven forbid - we all have our DNA taken and recorded on our ID cards. Baroness Kennedy, a lawyer and Labour peer, is one of the most vocal critics of Blair's new laws. In the annual James Cameron Memorial Lecture at the City University, London, in April she gave a devastating account of her own party's waywardness. She accused government ministers of seeing themselves as the embodiment of the state, rather than, as I would put it, the servants of the state. "The common law is built on moral wisdom," she said, "grounded in the experience of ages, acknowledging that governments can abuse power and when a person is on trial the burden of proof must be on the state and no one's liberty should be removed without evidence of the highest standard. By removing trial by jury and seeking to detain people on civil Asbo orders as a pre- emptive strike, by introducing ID cards, the Government is creating new paradigms of state power. Being required to produce your papers to show who you are is a public manifestation of who is in control. What we seem to have forgotten is that the state is there courtesy of us and we are not here courtesy the state." The second invisible change that has occurred in Britain is best expressed by Simon Davies, a fellow at the London School of Economics, who did pioneering work on the ID card scheme and then suffered a wounding onslaught from the Government when it did not agree with his findings. The worrying thing, he suggests, is that the instinctive sense of personal liberty has been lost in the British people. "We have reached that stage now where we have gone almost as far as it is possible to go in establishing the infrastructures of control and surveillance within an open and free environment," he says. "That architecture only has to work and the citizens only have to become compliant for the Government to have control. "That compliance is what scares me the most. People are resigned to their fate. They've bought the Government's arguments for the public good. There is a generational failure of memory about individual rights. Whenever Government says that some intrusion is necessary in the public interest, an entire generation has no clue how to respond, not even intuitively And that is the great lesson that other countries must learn. The US must never lose sight of its traditions of individual freedom." Those who understand what has gone on in Britain have the sense of being in one of those nightmares where you are crying out to warn someone of impending danger, but they cannot hear you. And yet I do take some hope from the picnickers of Parliament Square. May the numbers of these young eccentrics swell and swell over the coming months, for their actions are a sign that the spirit of liberty and dogged defiance are not yet dead in Britain. This article is taken from the current issue of Vanity Fair CChhaarrggeedd ffoorr qquuoottiinngg GGeeoorrggee OOrrwweellll iinn ppuubblliicc In another example of the Government's draconian stance on political protest, Steven Jago, 36, a management accountant, yesterday became the latest person to be charged under the Serious Organised Crime and Police Act. On 18 June, Mr Jago carried a placard in Whitehall bearing the George Orwell quote: "In a time of universal deceit, telling the truth is a revolutionary act." In his possession, he had several copies of an article in the American magazine Vanity Fair headlined "Blair's Big Brother Legacy", which were confiscated by the police. "The implication that I read from this statement at the time was that I was being accused of handing out subversive material," said Mr Jago. Yesterday, the author, Henry Porter, the magazine's London editor, wrote to Sir Ian Blair, the Metropolitan Police Commissioner, expressing concern that the freedom of the press would be severely curtailed if such articles were used in evidence under the Act. Mr Porter said: "The police told Mr Jago this was 'politically motivated' material, and suggested it was evidence of his desire to break the law. I therefore seek your assurance that possession of Vanity Fair within a designated area is not regarded as 'politically motivated' and evidence of conscious law-breaking." Scotland Yard has declined to comment. EEnneemmiieess ooff tthhee ssttaattee?? MMaayyaa EEvvaannss25 The chef was arrested at the Cenotaph in Whitehall reading out the names of 97 British soldiers killed in Iraq. She was the first person to be convicted under section 132 of the Serious Organised Crime and Police Act, which requires protesters to obtain police permission before demonstrating within one kilometre of Parliament. HHeelleenn JJoohhnn68, and SSyyllvviiaa BBooyyeess 62 The Greenham Common veterans were arrested in April by Ministry of Defence police after walking 15ft across the sentry line at the US military base at Menwith Hill in North Yorkshire. Protesters who breach any one of 10 military bases across Britain can be jailed for a year or fined #5,000. BBrriiaann HHaaww56 Mr Haw has become a fixture in Parliament Square with placards berating Tony Blair and President Bush. The Serious Organised Crime and Police Act 2005 was designed mainly with his vigil in mind. After being arrested, he refused to enter a plea. However, Bow Street magistrates' court entered a not guilty plea on his behalf in May. WWaalltteerr WWoollffggaanngg82 The octogenarian heckled Jack Straw, the Foreign Secretary, during his speech to the Labour Party conference. He shouted "That's a lie" as Mr Straw justified keeping British troops in Iraq. He was manhandled by stewards and ejected from the Brighton Centre. He was briefly detained under Section 44 of the 2000 Terrorism Act. In the shadow of Winston Churchill's statue opposite the House of Commons, a rather odd ritual has developed on Sunday afternoons. A small group of people - mostly young and dressed outlandishly - hold a tea party on the grass of Parliament Square. A woman looking very much like Mary Poppins passes plates of frosted cakes and cookies, while other members of the party flourish blank placards or, as they did on the afternoon I was there, attempt a game of cricket. Sometimes the police move in and arrest the picnickers, but on this occasion the officers stood at a distance, presumably consulting on the question of whether this was a demonstration or a non-demonstration. It is all rather silly and yet in Blair's Britain there is a kind of nobility in the amateurishness and persistence of the gesture. This collection of oddballs, looking for all the world as if they had stepped out of the Michelangelo Antonioni film Blow- Up, are challenging a new law which says that no one may demonstrate within a kilometre, or a little more than half a mile, of Parliament Square if they have not first acquired written permission from the Commissioner of the Metropolitan Police. This effectively places the entire centre of British government, Whitehall and Trafalgar Square, off-limits to the protesters and marchers who have traditionally brought their grievances to those in power without ever having to ask a policeman's permission. The non-demo demo, or tea party, is a legalistic response to the law. If anything is written on the placards, or if someone makes a speech, then he or she is immediately deemed to be in breach of the law and is arrested. The device doesn't always work. After drinking tea in the square, a man named Mark Barrett was recently convicted of demonstrating. Two other protesters, Milan Rai and Maya Evans, were charged after reading out the names of dead Iraqi civilians at the Cenotaph, Britain's national war memorial, in Whitehall, a few hundred yards away. On that dank spring afternoon I looked up at Churchill and reflected that he almost certainly would have approved of these people insisting on their right to demonstrate in front of his beloved Parliament. "If you will not fight for the right," he once growled, "when you can easily win without bloodshed, if you will not fight when your victory will be sure and not so costly, you may come to the moment when you will have to fight with all the odds against you and only a precarious chance for survival. There may be a worse case. You may have to fight when there is no chance of victory, because it is better to perish than to live as slaves." Churchill lived in far more testing times than ours, but he always revered the ancient tradition of Britain's "unwritten constitution". I imagined him becoming flesh again and walking purposefully toward Downing Street - without security, of course - there to address Tony Blair and his aides on their sacred duty as the guardians of Britain's Parliament and the people's rights. For Blair, that youthful baby-boomer who came to power nine years ago as the embodiment of democratic liberalism as well as the new spirit of optimism in Britain, turns out to have an authoritarian streak that respects neither those rights nor, it seems, the independence of the elected representatives in Parliament. And what is remarkable - in fact almost a historic phenomenon - is the harm his government has done to the unwritten British constitution in those nine years, without anyone really noticing, without the press objecting or the public mounting mass protests. At the inception of Cool Britannia, British democracy became subject to a silent takeover. Last year - rather late in the day, I must admit - I started to notice trends in Blair's legislation which seemed to attack individual rights and freedoms, to favour ministers (politicians appointed by the Prime Minister to run departments of government) over the scrutiny of Parliament, and to put in place all the necessary laws for total surveillance of society. There was nothing else to do but to go back and read the Acts - at least 15 of them - and to write about them in my weekly column in The Observer. After about eight weeks, the Prime Minister privately let it be known that he was displeased at being called authoritarian by me. Very soon I found myself in the odd position of conducting a formal e-mail exchange with him on the rule of law, I sitting in my London home with nothing but Google and a stack of legislation, the Prime Minister in No 10 with all the resources of government at his disposal. Incidentally, I was assured that he had taken time out of his schedule so that he himself could compose the thunderous responses calling for action against terrorism, crime, and antisocial behaviour. The day after the exchange was published, the grudging truce between the Government and me was broken. Blair gave a press conference, in which he attacked media exaggeration, and the then Home Secretary, Charles Clarke, weighed in with a speech at the London School of Economics naming me and two other journalists and complaining about "the pernicious and even dangerous poison" in the media. So, I guess this column comes with a health warning from the British Government, but please don't pay it any mind. When governments attack the media, it is often a sign that the media have for once gotten something right. I might add that this column also comes with the more serious warning that, if rights have been eroded in the land once called "the Mother of Parliaments", it can happen in any country where a government actively promotes the fear of terrorism and crime and uses it to persuade people that they must exchange their freedom for security. Blair's campaign against rights contained in the Rule of Law - that is, that ancient amalgam of common law, convention, and the opinion of experts, which makes up one half of the British constitution - is often well concealed. Many of the measures have been slipped through under legislation that appears to address problems the public is concerned about. For instance, the law banning people from demonstrating within one kilometre of Parliament is contained in the Serious Organised Crime and Police Act of 2005. The right to protest freely has been affected by the Terrorism Act of 2000, which allows police to stop and search people in a designated area - which can be anywhere - and by antisocial behaviour laws, which allow police to issue an order banning someone from a particular activity, waving a banner, for instance. If a person breaks that order, he or she risks a prison sentence of up to five years. Likewise, the Protection from Harassment Act of 1997 - designed to combat stalkers and campaigns of intimidation - is being used to control protest. A woman who sent two e-mails to a pharmaceutical company politely asking a member of the staff not to work with a company that did testing on animals was prosecuted for "repeated conduct" in sending an e-mail twice, which the Act defines as harassment. There is a demonic versatility to Blair's laws. Kenneth Clarke, a former Conservative chancellor of the exchequer and home secretary, despairs at the way they are being used. "What is assured as being harmless when it is introduced gets used more and more in a way which is sometimes alarming," he says. His colleague David Davis, the shadow Home Secretary, is astonished by Blair's Labour Party: "If I had gone on the radio 15 years ago and said that a Labour government would limit your right to trial by jury, would limit - in some cases eradicate - habeas corpus, constrain your right of freedom of speech, they would have locked me up." Indeed they would. But there's more, so much in fact that it is difficult to grasp the scope of the campaign against British freedoms. But here goes. The right to a jury trial is removed in complicated fraud cases and where there is a fear of jury tampering. The right not to be tried twice for the same offence - the law of double jeopardy - no longer exists. The presumption of innocence is compromised, especially in antisocial behaviour legislation, which also makes hearsay admissible as evidence. The right not to be punished unless a court decides that the law has been broken is removed in the system of control orders by which a terrorist suspect is prevented from moving about freely and using the phone and internet, without at any stage being allowed to hear the evidence against him - house arrest in all but name. Freedom of speech is attacked by Section Five of the Criminal Justice and Public Order Act, which preceded Blair's Government, but which is now being used to patrol opinion. In Oxford last year a 21-year-old graduate of Balliol College named Sam Brown drunkenly shouted in the direction of two mounted police officers, "Mate, you know your horse is gay. I hope you don't have a problem with that." He was given one of the new, on-the-spot fines - #80 - which he refused to pay, with the result that he was taken to court. Some 10 months later the Crown Prosecution Service dropped its case that he had made homophobic remarks likely to cause disorder. There are other people the police have investigated but failed to prosecute: the columnist Cristina Odone, who made a barely disparaging aside about Welsh people on TV (she referred to them as "little Welshies"); and the head of the Muslim Council of Great Britain, Sir Iqbal Sacranie, who said that homosexual practices were "not acceptable" and civil partnerships between gays were "harmful". The remarks may be a little inappropriate, but I find myself regretting that my countrymen's opinions - their bloody-mindedness, their truculence in the face of authority, their love of insult and robust debate - are being edged out by this fussy, hairsplitting, second-guessing, politically correct state that Blair is trying to build with what he calls his "respect agenda". Do these tiny cuts to British freedom amount to much more than a few people being told to be more considerate? Shami Chakrabarti, the petite whirlwind who runs Liberty believes that "the small measures of increasing ferocity add up over time to a society of a completely different flavour". That is exactly the phrase I was looking for. Britain is not a police state - the fact that Tony Blair felt it necessary to answer me by e-mail proves that - but it is becoming a very different place under his rule, and all sides of the House of Commons agree. The Liberal Democrats' spokesman on human rights and civil liberties, David Heath, is sceptical about Blair's use of the terrorist threat. "The age- old technique of any authoritarian or repressive government has always been to exaggerate the terrorist threat to justify their actions," he says. "I am not one to underestimate the threat of terrorism, but I think it has been used to justify measures which have no relevance to attacking terrorism effectively." And Bob Marshall-Andrews - a Labour MP who, like quite a number of others on Blair's side of the House of Commons, is deeply worried about the tone of government - says of his boss, "Underneath, there is an unstable authoritarianism which has seeped into the [Labour] Party." Chakrabarti, who once worked as a lawyer in the Home Office, explains: "If you throw live frogs into a pan of boiling water, they will sensibly jump out and save themselves. If you put them in a pan of cold water and gently apply heat until the water boils they will lie in the pan and boil to death. It's like that." In Blair you see the champion frog boiler of modern times. He is also a lawyer who suffers acute impatience with the processes of the law. In one of his e-mails to me he painted a lurid - and often true - picture of the delinquency in some of Britain's poorer areas, as well as the helplessness of the victims. His response to the problem of societal breakdown was to invent a new category of restraint called the antisocial behaviour order, or Asbo. "Please speak to the victims of this menace," he wrote. "They are people whose lives have been turned into a daily hell. Suppose they live next door to someone whose kids are out of control: who play their music loud until 2 am; who vilify anyone who asks them to stop; who are often into drugs or alcohol? Or visit a park where children can't play because of needles, used condoms, and hooligans hanging around. "It is true that, in theory, each of these acts is a crime for which the police could prosecute. In practice, they don't. It would involve in each case a disproportionate amount of time, money and commitment for what would be, for any single act, a low-level sentence. Instead, they can now use an Asbo or a parenting order or other measures that attack not an offence but behaviour that causes harm and distress to people, and impose restrictions on the person doing it, breach of which would mean they go to prison." How the Asbo works is that a complaint is lodged with a magistrates' court which names an individual or parent of a child who is said to be the source of antisocial behaviour. The actions which cause the trouble do not have to be illegal in themselves before an Asbo is granted and the court insists on the cessation of that behaviour - which may be nothing more than walking a dog, playing music, or shouting in the street. It is important to understand that the standards of evidence are much lower here than in a normal court hearing because hearsay - that is, rumour and gossip - is admissible. If a person is found to have broken an Asbo, he or she is liable to a maximum of five years in prison, regardless of whether the act is in itself illegal. So, in effect, the person is being punished for disobedience to the state. Blair is untroubled by the precedent that this law might offer a real live despot, or by the fact that Asbos are being used to stifle legitimate protest, and indeed, in his exchange with me, he seemed to suggest that he was considering a kind of super-Asbo for more serious criminals to "harry, hassle and hound them until they give up or leave the country". It was significant that nowhere in this rant did he mention the process of law or a court. He offers something new: not a police state but a controlled state, in which he seeks to alter radically the political and philosophical context of the criminal-justice system. "I believe we require a profound rebalancing of the civil liberties debate," he said in a speech in May. "The issue is not whether we care about civil liberties but what that means in the early 21st century." He now wants legislation to limit powers of British courts to interpret the Human Rights Act. The Act, imported from the European Convention on Human Rights, was originally inspired by Winston Churchill, who had suggested it as a means to entrench certain rights in Europe after the war. Blair says that this thinking springs from the instincts of his generation, which is "hard on behaviour and soft on lifestyle." Actually, I was born six weeks before Blair, 53 years ago, and I can categorically say that he does not speak for all my generation. But I agree with his other self-description, in which he claims to be a moderniser, because he tends to deny the importance of history and tradition, particularly when it comes to Parliament, whose powers of scrutiny have suffered dreadfully under his government. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Fri Jun 30 05:40:08 2006 From: dave at farber.net (David Farber) Date: Fri, 30 Jun 2006 08:40:08 -0400 Subject: [IP] The Newbie's Guide to Detecting the NSA Message-ID: Begin forwarded message: From eugen at leitl.org Thu Jun 29 23:46:31 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 30 Jun 2006 08:46:31 +0200 Subject: [James.Hughes@trincoll.edu: [technoliberation] Vernor Vinge on computers, freedom and privacy] Message-ID: <20060630064631.GX26630@leitl.org> ----- Forwarded message from "Hughes, James J." ----- From eugen at leitl.org Fri Jun 30 01:40:33 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 30 Jun 2006 10:40:33 +0200 Subject: /. [NH Man Arrested for Videotaping Police] Message-ID: <20060630084033.GZ26630@leitl.org> Not so very reversible, the panopticon, eh, Brin? Link: http://slashdot.org/article.pl?sid=06/06/29/188221 Posted by: Zonk, on 2006-06-29 19:27:00 macinrack writes to mention a story about a New Hampshire man who was [1]arrested for videotaping police on his doorstep, using a fairly standard security camera system. He was officially charged with 'two felony counts of violating state eavesdropping and wiretap law by using an electronic device.' From the article: "The security cameras record sound and audio directly to a videocassette recorder inside the house, and the Gannons posted warnings about the system, Janet Gannon said. On Tuesday night, Michael Gannon brought a videocassette to the police department, and asked to speak with someone in 'public relations,' his wife said and police reported. Gannon wanted to lodge a complaint against Karlis, who had come to the family's house while investigating their sons, Janet Gannon said. She said Karlis showed up late at night, was rude, and refused to leave when they asked him." References 1. http://www.nashuatelegraph.com/apps/pbcs.dll/article?AID=/20060629/NEWS01/106 290121 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Fri Jun 30 05:48:09 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 30 Jun 2006 14:48:09 +0200 Subject: [dave@farber.net: [IP] The Newbie's Guide to Detecting the NSA] Message-ID: <20060630124809.GQ26630@leitl.org> Which idiot would assume his specific location is excluded? Especially, if it's a long-distance (transcontinental) link? ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri Jun 30 09:45:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 30 Jun 2006 18:45:05 +0200 Subject: /. [Congress May Add Record Requirements to MySpace] Message-ID: <20060630164505.GI26630@leitl.org> Whee! Link: http://slashdot.org/article.pl?sid=06/06/30/1336243 Posted by: Zonk, on 2006-06-30 14:26:00 An anonymous reader writes "CNet is reporting that Congress may be working to [1]extend the record retention requirements they're already working on for ISPs to social networking sites. Sites such as MySpace or FaceBook would be required to hold onto content access records for an unspecified length of time." From the article: "In those meetings, Justice Department representatives went beyond the argument that data retention was necessary to protect children--and claimed it would aid in terrorism investigations as well. During Wednesday's hearing, politicians also claimed that social-networking sites were not doing enough to verify that their users who claimed to be a certain age were telling the truth. (Recent news reports have said that sex predators are using MySpace and similar sites to meet up with teens.)" References 1. http://news.com.com/Congress+targets+social-networking+sites/2100-1028-608957 4.html?part=dht&tag=nl.e433 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]