From rya_mau120 at jaymech.com Wed Mar 1 00:52:06 2006 From: rya_mau120 at jaymech.com (Angel Castillo) Date: Wed, 01 Mar 2006 02:52:06 -0600 Subject: Low mortagge ratee approvall Message-ID: <699s729q.5104000@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1214 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: psychopathic.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From sagi129.747 at jdshost.com Wed Mar 1 00:55:31 2006 From: sagi129.747 at jdshost.com (Dalton Marcum) Date: Wed, 01 Mar 2006 02:55:31 -0600 Subject: Pre-approved Application #49947114 Wed, 01 Mar 2006 02:55:31 -0600 Message-ID: <826g541i.5823700@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1171 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: gender.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From s57na at ameritrade.com Wed Mar 1 01:36:56 2006 From: s57na at ameritrade.com (Kristy Middleton) Date: Wed, 01 Mar 2006 03:36:56 -0600 Subject: Low mortagge ratee approvall Message-ID: <321p779d.4793075@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1208 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: inadvisable.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From tomlinson at farrellfritz.com Wed Mar 1 01:37:21 2006 From: tomlinson at farrellfritz.com (Hope Mcgraw) Date: Wed, 01 Mar 2006 03:37:21 -0600 Subject: Your account #63519911 Message-ID: <069h547x.3435343@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1208 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: tuition.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From donovan at boxnetwork.net Wed Mar 1 02:05:47 2006 From: donovan at boxnetwork.net (Simon Lara) Date: Wed, 01 Mar 2006 04:05:47 -0600 Subject: Mortagge ratee approvedd Message-ID: <97606446019421.xVB8Qtn1yJ@claimant> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1203 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: daphne.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From marc.delvaux at cfl.lu Wed Mar 1 02:33:55 2006 From: marc.delvaux at cfl.lu (Jasmine Dawson) Date: Wed, 01 Mar 2006 04:33:55 -0600 Subject: Re-finance before rates skyrocket Message-ID: <618n163k.2637680@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1157 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: shingle.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From rookierh532 at jher.com Wed Mar 1 06:31:01 2006 From: rookierh532 at jher.com (Rocco Zavala) Date: Wed, 01 Mar 2006 08:31:01 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <719r110g.2207111@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1206 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: failsafe.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From rah at shipwright.com Wed Mar 1 06:11:44 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 1 Mar 2006 10:11:44 -0400 Subject: [Clips] PET Workshop 2006 submission deadline extended -- updated CFP Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Tue, 28 Feb 2006 10:04:15 -0400 To: "Philodox Clips List" From: "R. A. Hettinga" Subject: [Clips] PET Workshop 2006 submission deadline extended -- updated CFP Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text Delivered-To: nymip-res-group at nymip.org To: PET research: ;, anonymity researchers: ;, pet at mailman.aldigital.co.uk, sec-lists: ; Date: Mon, 27 Feb 2006 12:12:11 +0000 From: George Danezis Cc: gdanezis at esat.kuleuven.be Subject: PET Workshop 2006 submission deadline extended -- updated CFP Sender: nymip-res-group-bounces at nymip.org Dear Colleagues, Due to popular demand the Privacy Enhancing Technologies (PET) workshop is extending the paper submission deadline to the 10th March. Please find attached the updated Call for Papers. Yours, George Danezis Philippe Golle (Program Chairs) 6th Workshop on Privacy Enhancing Technologies Robinson College, Cambridge, United Kingdom June 28 - June 30, 2006 http://petworkshop.org/2006/ (Note: paper submission DEADLINE EXTENDED to 10 March.) CALL FOR PAPERS The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present their perspectives on technological issues. As in past years, we will publish proceedings after the workshop in the Springer Lecture Notes in Computer Science series. Suggested topics include but are not restricted to: * Anonymous communications and publishing systems * Censorship resistance * Pseudonyms, identity management, linkability, and reputation * Data protection technologies * Location privacy * Privacy in ubiquitous computing environments * Policy, law, and human rights relating to privacy * Privacy and anonymity in peer-to-peer architectures * Economics of privacy * Fielded systems and techniques for enhancing privacy in existing systems * Protocols that preserve anonymity/privacy * Privacy-enhanced access control or authentication/certification * Privacy threat models * Models for anonymity and unobservability * Attacks on anonymity systems * Traffic analysis * Profiling and data mining * Privacy vulnerabilities and their impact on phishing and identity theft * Deployment models for privacy infrastructures * Novel relations of payment mechanisms and anonymity * Usability issues and user interfaces for PETs * Reliability, robustness and abuse prevention in privacy systems Stipends to attend the workshop will be made available, on the basis of need and merit, to cover travel expenses, hotel, or conference fees. You do not need to submit a technical paper and you do not need to be a student to apply for a stipend. For more information, see: http://petworkshop.org/2006/stipends.html Important dates: March 10, 2006 - Paper submission (EXTENDED) May 1, 2006 - Notification of acceptance June 2, 2006 - Camera-ready for pre-proceedings June 28-30, 2006 - Workshop July 28, 2006 - Camera-ready for proceedings General Chair: Richard Clayton, University of Cambridge, UK Program Chairs * George Danezis, University of Cambridge, UK * Philippe Golle, Palo Alto Research Center, USA Program Committee * Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA * Mikhail Atallah, Purdue University, USA * Michael Backes, Saarland University, Germany * Alastair Beresford, University of Cambridge, UK * Nikita Borisov, University of Illinois at Urbana-Champaign, USA * Jan Camenisch, IBM Zurich Research Laboratory, Switzerland * Kim Cameron, Microsoft, USA * Fred Cate, Indiana University at Bloomington, USA * Roger Dingledine, The Free Haven Project, USA * Hannes Federrath, University of Regensburg, Germany * Simone Fischer-Huebner, Karlstad University, Sweden * Ian Goldberg, Zero Knowledge Systems, Canada * Markus Jakobsson, Indiana University at Bloomington, USA * Dennis Kugler, Federal Office for Information Security, Germany * Brian Levine, University of Massachusetts at Amherst, USA * David Martin, University of Massachusetts at Lowell, USA * David Molnar, University of California at Berkeley, USA * Andreas Pfitzmann, Dresden University of Technology, Germany * Mike Reiter, Carnegie Mellon University, USA * Andrei Serjantov, The Free Haven Project, UK * Paul Syverson, Naval Research Lab, USA * Matthew Wright, University of Texas at Arlington, USA Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using an 11-point font), and at most 20 pages total. Submission of shorter papers (from around 4 pages) is strongly encouraged whenever appropriate. Papers must conform to the Springer LNCS style described here. Reviewers of submitted papers are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submitted papers should be anonymized by removing or sanitizing author names, affiliations, acknowledgments, and obvious self-references. A preliminary version of the proceedings will be made available to workshop participants. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting. Submit your papers in Postscript or PDF format. To submit a paper, compose a plain text email to pet2006-submissions at petworkshop.org containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author (to whom we will address all subsequent correspondence). Attach your submission to this email and send it. By submitting a paper, you agree that if it is accepted, you will sign a paper distribution agreement allowing for publication, and also that an author of the paper will register for the workshop and present the paper there. Our current working agreement with Springer is that authors will retain copyright on their own works while assigning an exclusive 3-year distribution license to Springer. Authors may still post their papers on their own Web sites. See here for the 2004 version of this agreement. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Paper submissions must be received by March 3, 2006. We acknowledge all submissions manually by email. If you do not receive an acknowledgment within a few days (or one day, if you are submitting right at the deadline), then contact the program committee chairs directly to resolve the problem. Notification of acceptance or rejection will be sent to authors no later than May 1 and authors will have the opportunity to revise for the preproceedings version by June 2, 2006. We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the workshop, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), (3) give brief descriptions of the presenters, and (4) indicate which presenters have confirmed their availability for the presentation if it is scheduled. Otherwise, submit your proposal by email as described above, including the designation of a contact author. The program committee will consider presentation proposals along with other workshop events, and will respond by the paper decision date with an indication of its interest in scheduling the event. The proceedings will contain 1-page abstracts of the presentations that take place at the workshop. Each contact author for an accepted panel proposal must prepare and submit this abstract in the Springer LNCS style by the "Camera-ready copy for preproceedings" deadline date. _______________________________________________ NymIP-res-group mailing list NymIP-res-group at nymip.org http://www.nymip.org/mailman/listinfo/nymip-res-group --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Mar 1 06:12:01 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 1 Mar 2006 10:12:01 -0400 Subject: [Clips] First announcement for ECC 2006 Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Tue, 28 Feb 2006 10:00:20 -0400 To: "Philodox Clips List" From: "R. A. Hettinga" Subject: [Clips] First announcement for ECC 2006 Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text From: ECC 2006 Date: Sun, 26 Feb 2006 11:31:28 -0500 (EST) To: rah at ibuc.com Subject: First announcement for ECC 2006 ======================================================================== If you wish to be removed from the ECC 2006 mailing list, please send a brief email to ecc2006 at uwaterloo.ca ======================================================================== THE 10TH WORKSHOP ON ELLIPTIC CURVE CRYPTOGRAPHY (ECC 2006) The Fields Institute, Toronto, Canada September 18, 19 & 20, 2006 FIRST ANNOUNCEMENT February 26, 2006 ECC 2006 is the tenth in a series of annual workshops dedicated to the study of elliptic curve cryptography and related areas. Over the past years the ECC conference series has broadened its scope beyond elliptic curve cryptography and now covers a wide range of areas within modern cryptography. For instance, past ECC conferences included presentations on hyperelliptic curve cryptography, pairing-based cryptography, side-channel attacks, voting protocols, quantum key distribution, AES, hash function, implementation issues, and deployments. At the same time ECC continues to be the premier conference on elliptic curve cryptography. It is hoped that ECC 2006 will further our mission of encouraging and stimulating research on the security and implementation of elliptic curve cryptosystems and related areas, and encouraging collaboration between mathematicians, computer scientists and engineers in the academic, industry and government sectors. As with past ECC conferences, there will be about 15 invited lectures (and no contributed talks) delivered by internationally leading experts. There will be both state-of-the-art survey lectures as well as lectures on latest research developments. SPONSORS: Certicom The Fields Institute MITACS University of Waterloo ORGANIZERS: Mark Bauer (University of Calgary) Tanja Lange (Technical University of Denmark) Alfred Menezes (University of Waterloo) Kumar Murty (University of Toronto) Christof Paar (Ruhr-Universitat Bochum) Scott Vanstone (University of Waterloo) FIELDS FALL 2006 THEMATIC PROGRAM IN CRYPTOGRAPHY: ECC 2006 will be one of the events being organized in conjunction with the Fields Institute Fall 2006 Thematic Program in Cryptography. ECC 2006 attendees who are interested in office space or funding can apply to Fields for funding: http://www.fields.utoronto.ca/programs/scientific/06-07/crypto SUMMER SCHOOL: Tanja Lange will be teaching a course at Fields on "Elliptic and Hyperelliptic Curve Cryptography". The course is intended for graduate students in cryptography and mathematics, and will take place from September 11-15. Further details are available on the Fields web site: www.fields.utoronto.ca/programs/scientific/06-07/crypto/courses/index.html TRAVEL AND ACCOMMODATIONS: The Fields Institute is located in the downtown campus of the University of Toronto. The Fields web site http://www.fields.utoronto.ca/resources/travel/index.html has travel information information, directions to the Institute including a map, and a listing of hotels that are within walking distance the Institute. REGISTRATION: The second announcement will be made in the beginning of May and will include registration information and a list of speakers. FURTHER INFORMATION: For further information, please contact: Alfred Menezes (email: ajmeneze [at] uwaterloo.ca) ======================================================================== --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From stieger.erwin09m at gmail.com Wed Mar 1 10:47:23 2006 From: stieger.erwin09m at gmail.com (Nestor Helton) Date: Wen, 1 Mar 2006 11:47:23 -0700 Subject: increase in sexual desire Message-ID: <200603010447.k214lMDh016678@proton.jfet.org> Carefully chosen herbal ingredients are the key to peniis enlargement success. Not only the precise blend of ingredients but also many other factors have effect on the overall potency and strength of peniis enlargement formula. Some of these factors include growing conditions, geographical location where herbs are grown, harvest time, the way herbs are stored before processing, the way herbs are processed. http://cghabfil.fastpan.info/?dejkmabfilxwqowycghzpp 7i6 From eugen at leitl.org Wed Mar 1 02:48:00 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Mar 2006 11:48:00 +0100 Subject: NYT sues Pentagon over domestic spying Message-ID: <20060301104800.GC25017@leitl.org> http://news.yahoo.com/s/nm/20060227/ts_nm/security_nsa_nytimes_dc NYT sues Pentagon over domestic spying Mon Feb 27, 6:11 PM ET NEW YORK (Reuters) - The New York Times sued the U.S. Defense Department on Monday demanding that it hand over documents about the National Security Agency's domestic spying program. The Times wants a list of documents including all internal memos and e-mails about the program of monitoring phone calls without court approval. It also seeks the names of the people or groups identified by it. The Times in December broke the story that the NSA had begun intercepting domestic communications believed linked to al Qaeda following the September 11 attacks. That provoked renewed criticism of the way U.S. President George W. Bush is handling his declared war on terrorism. Bush called the disclosure of the program to the Times a "shameful act" and the U.S. Justice Department has launched an investigation into who leaked it. The Times had requested the documents in December under the Freedom of Information Act but sued upon being unsatisfied with the Pentagon's response that the request was "being processed as quickly as possible," according to the six-page suit filed at federal court in New York. David McCraw, a lawyer for the Times, acknowledged that the list of documents sought was lengthy but that the Pentagon failed to assert there were "unusual circumstances," a provision of the law that would grant the Pentagon extra time to respond. The Defense Department, which was sued as the parent agency of the NSA, did not immediately respond to the suit. McCraw said there was "no connection" between the Justice Department probe and the Times' lawsuit. "This is an important story that our reporters are continuing to pursue and of the ways to do that is through the Freedom of Information Act," McCraw said. The U.S. Foreign Intelligence Surveillance Act requires the federal government to obtain warrants from a secret federal court for surveillance operations inside the United States. But the Bush administration says the president as commander in chief of the armed forces has the authority to carry out the intercepts and that Congress also gave him the authority upon approving the use of force in response to the September 11 attacks. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed Mar 1 02:49:55 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Mar 2006 11:49:55 +0100 Subject: [dave@farber.net: [IP] Patriot Act E-Mail Searches Apply to Non-Terrorists, Judges Say] Message-ID: <20060301104955.GD25017@leitl.org> ----- Forwarded message from Dave Farber ----- From cqgwk at countryside-inter.net Wed Mar 1 12:51:01 2006 From: cqgwk at countryside-inter.net (Gwen L. Beatty) Date: Wed, 01 Mar 2006 12:51:01 -0800 Subject: What? Message-ID: <334337.1028280106096.680003863342.CJPD.8639@lyric> hollandaise orimmemorial itbayesian ,circumflex bebendix thewoodard notavail aancestral industbin butprize notemancipate in amok orroughcast notthreefold notcountersink butbowstring beresorcinol apuffery itcriss orportrayal !broach ,dingy orlanguish somepolish butvanadium beplugboard it'scarbide it'sbloodshed !tel oncruz buttriennial trysharpe butbacteria somenixon ,graybeard on -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1796 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image472.gif Type: image/gif Size: 8862 bytes Desc: not available URL: From coderman at gmail.com Wed Mar 1 20:35:48 2006 From: coderman at gmail.com (coderman) Date: Wed, 1 Mar 2006 20:35:48 -0800 Subject: mixminion nodes wanted Message-ID: <4ef5fec60603012035x41c963aape2228513940af04a@mail.gmail.com> stealth monger looking for mixminion node operators: [ref: http://packages.debian.org/experimental/net/mixminion ] (actually i'm not certain which debian mixnet package is hinted at here...) ---cut--- http://www.mail-archive.com/cryptography at metzdowd.com/msg05826.html Re: NPR : E-Mail Encryption Rare in Everyday Use StealthMonger Wed, 01 Mar 2006 06:14:43 -0800 ... Ben Laurie <[EMAIL PROTECTED]> writes: > OK, I buy the problem, but until we do something about the totally > non-anonymising properties of the 'net, revealing that I want the public > key for some person seems to be quite minor - compared, for example, to > revealing that I sent him email each time I do. But you don't have to reveal that you sent him email. You can use stealthy communication. Stealthy communication is communication wherein not only is the content concealed from eavesdroppers by encryption, but information about who is communicating with whom, when, or if at all, is concealed, as well. The Internet can be used for stealthy communication. The basic idea is that each potential participant has ongoing traffic to and from a message pool which is propagated world-wide. When the participant has no live traffic to send, dummy traffic is sent instead. The dummy traffic is indistinguishable from the live traffic except by using decryption keys which are chosen by correspondents. The outbound traffic continues autonomously without interruption for months and years and is not correlated to the live traffic, so an observer without the keys cannot determine when or how much live communication is happening. Inbound cover traffic consists of taking a full feed of the message pool at all times without interruption. A Debian Linux package exists which enables stealthy email. It has been in everyday use for years, although not widely. Details on request. I am looking for someone to host it. Any volunteers? -- StealthMonger From fmaia at texas.net Thu Mar 2 04:43:30 2006 From: fmaia at texas.net (Fred Maia) Date: March 2, 2006 4:43:30 AM PST Subject: Interesting! Message-ID: New paint blocks out cell phone signals ROCHESTER, N.Y., March 1 (UPI) -- A Rochester, N.Y., company has developed paint that can switch between blocking cell phone signals and allowing them through. "You could use this in a concert hall, allowing cell phones to work before the concert and during breaks, but shutting them down during the performance," said Michael Riedlinger, president of NaturalNano. Using nanotechnology, particles of copper are inserted into nanotubes, which are ultra-tiny tubes that occur naturally in halloysite clay mined in Utah. Combined with a radio-filtering device that collects phone signals from outside a shielded space, certain transmissions can proceed while others are blocked, the Chicago Tribune reported. However, the wireless phone industry is up in arms over the development. "We oppose any kind of blocking technology," said Joe Farren, spokesman for The Wireless Association, the leading cell phone trade group. "What about the young parents whose baby-sitter is trying to call them, or the brain surgeon who needs notification of emergency surgery? These calls need to get through." Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dewayne at warpspeed.com Thu Mar 2 04:49:03 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Thu, 2 Mar 2006 04:49:03 -0800 Subject: [Dewayne-Net] New paint blocks out cell phone signals Message-ID: [Note: This item comes from reader Fred Maia. DLH] From canatapani at kolozsvar.ro Thu Mar 2 06:39:34 2006 From: canatapani at kolozsvar.ro (damaris rice) Date: Thu, 02 Mar 2006 05:39:34 -0900 Subject: Extremely Interesting info. on high income Message-ID: Hi Tom, A while back I was let go from my employment I held for 25 plus years. I can't thank you enough for starting me in this new profession. You have given me a exciting lease on life. Already taking home twice as much as I earned in my old job. I purchased a brand new Mercedes. Taking home 6 digit level in 18 months. Having a great time in this business. It is exciting and I am a hero to the judges and to my clients. What an outstanding profession to be in. Doing exactly what your training recommends me to do, is proceeding better than I ever dreamed possible. I go to the local court house and locate all of the clients I can handle. I take advantage of your advanced reporting services to find all items which can be garnished. Using your fill in the blank forms I send them thru the post office to the appropriate firms. Then the funds arrive to my PO Box. Its like magic. I love it. I can take a holiday when ever I have the impulse to do so. France and Holland this year. Please provide this letter to others. This profession is so massive it needs many more of us assisting the courts and the people who have been damaged. Sincerely, Arthur N. Virginia This may well be you! Continue to web site below where we provide you more indepth details about our arrangement at 0 outlay or obligation. You do not have anything to lose and lots to gain. http://it.geocities.com/dariaroosee/ Above line to study more or to end receiving additional information and then to see location Then he consulted his compass, put the indicator of his traveling machine to the word up, and shot swiftly into the air. When he had reached a sufficient height he placed the indicator to a point north of east and, with a steady and remarkably swift flight, began his journey From hawley.schultz8pvu at gmail.com Thu Mar 2 01:40:27 2006 From: hawley.schultz8pvu at gmail.com (Kristi Mccarthy) Date: Thu, 2 Mar 2006 08:40:27 -0100 Subject: Hey man, you ever try pheromones? Message-ID: <200603020737.k227bpbY021221@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 773 bytes Desc: not available URL: From allison at stanford.edu Thu Mar 2 11:05:59 2006 From: allison at stanford.edu (allison at stanford.edu) Date: March 2, 2006 11:05:59 AM EST Subject: [CSL Colloq] Signaling Vulnerabilities in Law-Enforcement Message-ID: Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01 Reply-To: ee380 at shasta.stanford.edu Stanford EE Computer Systems Colloquium 4:15PM, Wednesday, Mar 08, 2006 HP Auditorium, Gates Computer Science Building B01 http://ee380.stanford.edu[1] Topic: Signaling Vulnerabilities in Law-Enforcement Wiretap Systems Speaker: Matt Blaze University of Pennsylvania About the talk: Telephone wiretap and dialed number recording systems are used by law enforcement and national security agencies to collect investigative intelligence and legal evidence. This talk will show how many of these systems are vulnerable to simple, unilateral countermeasures that allow wiretap targets to prevent their call audio from being recorded and/or cause false or inaccurate dialed digits and call activity to be logged. The countermeasures exploit the unprotected in-band signals passed between the telephone network and the collection system and are effective against many of the wiretapping technologies currently used by US law enforcement, including at least some ``CALEA'' systems. Possible remedies and workarounds will be proposed, and the broader implications of the security properties of these systems will be discussed. A recent paper, as well as audio examples of several wiretapping countermeasures, can be found at http://www.crypto.com/papers/wiretapping/ [2]. This is joint work with Micah Sherr, Eric Cronin, and Sandy Clark. About the speaker: Research: Prof Blaze's research focuses on the architecture and design of secure systems based on cryptographic techniques, analysis of secure systems against practical attack models, and on finding new cryptographic primitives and techniques. This work has led directly to several new cryptographic concepts, including: "Remotely-Keyed Encryption," which allows the use of inexpensive, low-bandwidth secure hardware to protect high-bandwidth communication and stored data, "Atomic Proxy Cryptography," which allows re-encryption by untrusted third parties, and "Master-Key Encryption," which provides a systematic way to design (and study) ciphers with built-in "back doors." Prof Blaze is especially interested in the use of encryption to protect insecure systems such as the Internet. He was a designer of swIPe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. Another project, CFS, investigated and demonstrated the feasibility of including encryption as file system service. Contact information: Matt Blaze University of Pennsylvania http://www.crypto.com[4] Embedded Links: [ 1 ] http://ee380.stanford.edu [ 2 ] http://www.crypto.com/papers/wiretapping/ [ 3 ] www.crypto.com [ 4 ] http://www.crypto.com ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From coderman at gmail.com Thu Mar 2 11:11:21 2006 From: coderman at gmail.com (coderman) Date: Thu, 2 Mar 2006 11:11:21 -0800 Subject: 'Torture Boy' Signals More Spying Message-ID: <4ef5fec60603021111i2d90a6a5v8e22b3646549e36f@mail.gmail.com> i feel like throwing a FOIPA party, ---cut--- 'Torture Boy' Signals More Spying http://www.consortiumnews.com/2006/030206.html By Robert Parry March 2, 2006 Correcting misleading testimony to Congress, Attorney General Alberto Gonzales has signaled that George W. Bush's warrantless surveillance of Americans went beyond the known eavesdropping on communications to suspected terrorists overseas. In a letter to the Senate Judiciary Committee on Feb. 28, Gonzales recanted testimony he gave on Feb. 6 when he declared that Bush had only authorized a narrowly constructed warrantless wiretapping program by the National Security Agency against Americans in touch with foreign terror suspects. Referring to a part of his testimony in which he said Bush had approved the NSA program "and that is all that he has authorized," Gonzales withdrew that language, saying "I did not and could not address  any other classified intelligence activities." [Washington Post, March 1, 2006] The strained wording of Gonzales's letter  and the fact that he deemed it necessary to correct his testimony  suggest that other warrantless surveillance programs exist outside the framework of the NSA program, which began shortly after the Sept. 11, 2001, terror attacks and was exposed by the New York Times in December 2005. Sen. Arlen Specter of Pennsylvania, the committee's Republican chairman, didn't put Gonzales under oath at the Feb. 6 hearing, but false statements to Congress still constitute a potential criminal offense. Close Questioning The dubious testimony came during close questioning by Sen. Patrick Leahy of Vermont, the committee's ranking Democrat. Leahy pressed Gonzales on the administration's claim that Congress gave Bush the power to wiretap without a court warrant when it authorized use of force against al-Qaeda after the Sept. 11 attacks. In his testimony, Gonzales argued that the congressional use-of-force authorization, combined with the President's Commander-in-Chief power in the Constitution, permitted Bush to approve a wiretapping program for communications between Americans and terror suspects operating outside the United States. But  in challenging Bush's right to ignore the 1978 Foreign Intelligence Surveillance Act, which requires a special court to approve wiretaps  Leahy demanded to know if the administration's legal interpretation also let Bush conduct other warrantless spying on Americans, including tapping purely domestic phone calls, mail openings and "black bag" break-ins into people's homes and offices. "Under that (administration) logic, is there anything that stops you from wiretapping without a warrant somebody inside the United States that you suspect of having al-Qaeda connections?" Leahy asked. "Clearly, Senator, that is not what's going on here," Gonzales responded. "The President had authorized a much more narrow program. We are always, of course, subject to the Fourth Amendment. So the activities of any kind of surveillance within the United States would, of course, be subject to the Fourth Amendment," which requires "probable cause" and a court warrant before the property of Americans can be searched. Leahy persisted. "Under your interpretation of this, can you go in and do mail searches? Can you go into e-mails? Can you open mail? Can you do black-bag jobs?  Can you go and do that (to) Americans?" Gonzales responded, "Sir, I've tried to outline for you and the committee what the President has authorized, and that is all that he has authorized." "Did it authorize the opening of first-class mail of U.S. citizens?" Leahy continued. "That you can answer, yes or no." Gonzales: "There is all kinds of wild speculation about..." Leahy: "Did it authorize it?" Gonzales: "There is all kinds of wild speculation out there about what the President has authorized and what we're actually doing. And I'm not going to get into a discussion, Senator." Recanted Testimony Three weeks later, by recanting the statement about "that is all that he (Bush) has authorized" in the context of Leahy's line of questioning, Gonzales appears to be acknowledging that some of Leahy's concerns are valid, that there are other components to Bush's warrantless surveillance operations beyond the NSA program. Given the fact that the Bush administration and its media allies have openly challenged the loyalty of Americans who have disagreed with Bush's policies, it would not be a big jump to suspect that Bush has authorized spying on citizens, journalists and/or politicians who have, in his view, undermined his strategy in the War on Terror or the Iraq War. Some Republicans publicly have urged Bush to counter these Americans whom they call "Fifth Columnists" for supposedly sympathizing with or otherwise helping the enemy. At the Feb. 6 hearing, Sen. Lindsey Graham, R-S.C., declared that "I stand by this President's ability, inherent to being Commander in Chief, to find out about Fifth Column movements, and I don't think you need a warrant to do that." When Graham offered to work with the administration to draft guidelines for how best to neutralize this alleged threat, Gonzales smilingly replied, "Senator, the President already said we'd be happy to listen to your ideas." [See Consortiumnews.com's "Bush's Mysterious 'New Programs'."] With Bush's elastic use of language and his aggressive interpretation of his own powers, there would seem to be little that Bush feels he cannot do. Gonzales, who was Bush's White House counsel before becoming Attorney General, is part of a cadre of far-right lawyers who have asserted virtually unlimited powers for Bush during the indefinite War on Terror. Gonzales earned the nickname "Torture Boy" for going along with ideologues like John Yoo and David Addington in defending interpretations of Bush's authority that opened the door to torture and other abuses of U.S. detainees imprisoned in Guantanamo Bay, Iraq, Afghanistan and secret CIA jails scattered around the world. [See Consortiumnews.com's "U.S. Disconnect on Bush's Abuses."] Legal Resistance The right-wing lawyers encountered opposition from professional attorneys at the Justice Department and the Defense Department. The professionals  the likes of Assistant Attorney General Jack Goldsmith and U.S. Navy general counsel Alberto Mora  forced the Bush lawyers into some retreats on the most expansive assertions of executive power, especially involving torture. Referring to one of Yoo's opinions that asserted the President's power to subject Guantanamo inmates to cruel, inhumane and degrading treatment, Navy general counsel Mora wrote, "The memo espoused an extreme and virtually unlimited theory of the extent of the President's Commander-in-Chief authority." [See Mora's 22-page chronology, as posted by The New Yorker.] But, one by one, these internal critics were pushed out of the government. Goldsmith resigned to take a teaching position at Harvard Law School; Mora quit to take a job as general counsel for Wal-Mart's international operations. [See Consortiumnews.com's "Another Bush Lie" on Goldsmith, or The New Yorker's "The Memo" on Mora.] In the context of Bush's top legal advisers rationalizing Bush's right to torture prisoners or to jail American citizens without charges, the likelihood seems high they also would claim for Bush the power to spy on domestic opponents. As Gonzales told the Senate Judiciary Committee on Feb. 6, "detention is far more intrusive than electronic surveillance." But it's unclear whether the American people will ever learn what these additional eavesdropping programs were or whom they targeted. The Bush administration has wrapped its domestic spying program in layer after layer of secrecy and lies. In a speech in Buffalo, N.Y., on April 20, 2004, Bush went out of his way to mislead the American people into a false sense of security about his respect for Fourth Amendment prohibitions on warrantless wiretaps. "By the way, any time you hear the United States government talking about wiretap, it requires  a wiretap requires a court order," Bush said. "Nothing has changed, by the way. When we're talking about chasing down terrorists, we're talking about getting a court order before we do so." At the time of his speech, Bush had been authorizing wiretaps without getting approval from the FISA court for more than two years. [For more on Bush's deceptions, see Consortiumnews.com's "Talkin' 'Texan' Means Lying Big." Secrecy Charade The administration's claim about the need for extraordinary secrecy surrounding the wiretap program is also largely a charade. Al-Qaeda and other enemy groups have long been aware that the United States has the capability of electronic eavesdropping and have structured their operations accordingly. In the Feb. 6 hearing, Gonzales acknowledged as much under questioning from Sen. Joe Biden, D-Delaware. Biden asked, "How has this revelation damaged the program" since the administration's attack on the disclosure "seems to presuppose that these very sophisticated al-Qaeda folks didn't think we were intercepting their phone calls?" Gonzales responded, "I think, based on my experience, it is true  you would assume that the enemy is presuming that we are engaged in some kind of surveillance. But if they're not reminded about it all the time in the newspapers and in stories, they sometimes forget"  a response that drew laughter from the citizens in the hearing room. "You're amazed at some of the communications that exist," Gonzales continued. "So when you keep sticking it in their face that we're involved in some kind of surveillance, even if it's unclear in these stories, it can't help but make a difference, I think." In other words, Gonzales argued that the reason for the extraordinary secrecy around the wiretap program is not that the disclosure of its existence would alert al-Qaeda to a previously unknown U.S. spying capability, but that newspaper stories might remind them to be a little more cautious while chatting on the telephone. Such a slim argument would suggest that the Bush administration has another motive for trying to intimidate anyone  whether in the press or in Congress  who wants to investigate the surveillance program. On Feb. 28, reflecting on Gonzales's earlier testimony, Leahy said the Attorney General's unresponsive answers led to the conclusion that Gonzales "has a radically different understanding of the laws than do many of us  the people's representatives in Congress who wrote the laws." As for Gonzales's responses to senators' questions about the program, Leahy said, "whatever we asked, it was either too relevant or not relevant enough, and either way, we were getting no answers from the Attorney General." A logical suspicion is that the administration is blocking a thorough examination of the wiretapping program because it might show that Bush followed the legal advice on his unlimited powers into pervasive spying of his political enemies. --- Robert Parry broke many of the Iran-Contra stories in the 1980s for the Associated Press and Newsweek. His latest book, Secrecy & Privilege: Rise of the Bush Dynasty from Watergate to Iraq, can be ordered at secrecyandprivilege.com. It's also available at Amazon.com, as is his 1999 book, Lost History: Contras, Cocaine, the Press & 'Project Truth.' --end-cut--- From dave at farber.net Thu Mar 2 08:21:14 2006 From: dave at farber.net (David Farber) Date: Thu, 2 Mar 2006 11:21:14 -0500 Subject: [IP] Stanford --Signaling Vulnerabilities in Law-Enforcement Wiretap Message-ID: Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01 X-Mailer: Apple Mail (2.746.2) Reply-To: dave at farber.net Begin forwarded message: From coderman at gmail.com Thu Mar 2 12:07:55 2006 From: coderman at gmail.com (coderman) Date: Thu, 2 Mar 2006 12:07:55 -0800 Subject: Usable encryption facilitates intuitive policy, rather than explicit per item encipher/decipher, sign/validate hassles Message-ID: <4ef5fec60603021207y2b14d40btdffa4aab7bc8c36c@mail.gmail.com> "I habitually send most of my email securely, but I don't think about it. My robots take care of it for me. I tune policies, I don't encrypt messages." - Jon if you have to wrap the major key formats and uses into a single bundle, so that a pre-generated user identity which contained keys in formats applicable to any application the user might employ, what would this bundle/list look like? [let's avoid trust models and specifics of key utilization for a higher level OS/application discussion. for now i want to focus on just what set of common types would serve the usual OS/application needs in some form so that a single user/resource identity can be created for use with lots of different "robots" further down the line / as needed. note that in many cases some of these keys would never be used depending on the trust model employed and the applications utilized.] currently i'm aware of the following covering most bases but i know i'm missing some: - nonce/guid -> 512 bits of entropy from /dev/random (NOTE: when is BSD going to turn /dev/random back into a true entropy source rather than the deceptive alias for /dev/urandom?) - gpg key pair -> DSA and Elgamal, gpg --gen-key ... - gpg key -> RSA sign only, gpg --gen-key ... - shared encryption secret -> 256 bits of entropy from /dev/random - shared auth secret -> 256 bits of entropy from /dev/random - openssl root CA key -> openssl req -x509 -new -keyout ca.key -out ca.crt ... - openssl dh parameters -> openssl dhparam ... - openssl entity key (signed by root CA) -> openssl req ... && openssl ca ... - ssh rsa key: ssh-keygen -t rsa ... - ssh dsa key: ssh-keygen -t dsa ... - ssh moduli: ssh-keygen -G ... && ssh-keygen -T ... - off the record user state: otrl_userstate_create(); what else would you add to this list? ---cut--- http://www.mail-archive.com/cryptography at metzdowd.com/msg05822.html Re: NPR : E-Mail Encryption Rare in Everyday Use Jon Callas Tue, 28 Feb 2006 11:45:54 -0800 I have to chime in on a number of points. I'll try to keep commercial plugs to a minimum. * An awful lot of this discussion is some combination of outdated and true but irrelevant. For example, it is true that usability of all computers is not what it could be. But a lot of what has cruised by here is similar to someone saying, "Yes, usability is atrocious -- here, look at this screenshot of Windows 3.1." Someone else pipes up, "You think that's bad, let me show you this example from the Xerox Alto. What*ever* were they thinking?" And then someone else says, "Yeah, and if you think that's bad, look at what 'ls' did in Unix V6!" Then when someone else says, "Y'know, I'm using the latest version of Firefox, and it's actually pretty good" the next message says, "But what about the Y2K issues, and what happens when in 2038?" I swear, guys, this thread is the crypto version of the Monty Python "Luxury" sketch. * Whitten and Tygar is a great paper, but it was written ages ago on software that was released in 1997. Things aren't perfect now, but let's talk about what's out there now. Even at the time, one of Whitten's main points is how hard it is to apply usability to security, because of how odd it is. As a very quick example, in most forms of user design, you let exploration take a prominent place. But it doesn't work in security because you can't click undo when you do something you didn't intend. * There are new generations of crypto software out there. I produce the PGP products, and PGP Desktop and PGP Universal are automatic systems that look up certs use them, automatically encrypt, and even does both OpenPGP and S/MIME. They're not perfect, and lead to other amusing issues. For example, an hour ago, I was coordinating with someone that I'm meeting at a conference. I got a reply saying, "I'm at the airport and can't decrypt your message from my phone." I hadn't realized that I *had* encrypted my message, because my system and my colleague's system had been doing things for us. I habitually send most of my email securely, but I don't think about it. My robots take care of it for me. I tune policies, I don't encrypt messages. If you don't want to use my products, as Ben Laurie pointed out, there's a very nice plugin for Thunderbird called Enigmail that makes doing crypto painless. * There are also new generations of keyservers out there that work on the issues of the old servers to trim defunct keys, and manage other issues. I have out there the PGP Global Directory. Think of it as a mash-up of a keyserver along with Robot CA concepts and user management goodness adapted from modern mailing list servers like Mailman. * A number of us are also re-thinking other concepts such as using short-lived certificates based on the "freshness" model to constrain lifecycle management issues. * There are many challenges remaining. Heck, the fact that people here apparently have not updated their knowledge any time this century is part of the problem. But let me tell you that email encryption is growing, and growing strongly. However, most of the successes are not happening where you see them. They're happening in business, where communities of partners decide they need to do secure email, and then they do. This is another place where things have changed radically. A decade ago, we thought that security would be a grass-roots phenomenon where end-users and consumers would push security into those stodgy businesses. What's happening now is the exact opposite -- savvy businesses are putting together sophisticated security systems, and that's slowly starting to get end-users to wake up. I'd be happy to discuss at length where things are getting better, where they aren't, and where some issues have been shuffled around. But we do need to talk about what's going on now, not ten years ago. Jon ---end-cut--- From coderman at gmail.com Thu Mar 2 12:58:03 2006 From: coderman at gmail.com (coderman) Date: Thu, 2 Mar 2006 12:58:03 -0800 Subject: [dewayne@warpspeed.com: [Dewayne-Net] New paint blocks out cell phone signals] In-Reply-To: <20060302131640.GR25017@leitl.org> References: <20060302131640.GR25017@leitl.org> Message-ID: <4ef5fec60603021258l58c5580ejdc214da804159427@mail.gmail.com> On 3/2/06, Eugen Leitl wrote: > ... > Using nanotechnology, particles of copper are inserted into > nanotubes, which are ultra-tiny tubes that occur naturally in > halloysite clay mined in Utah. Combined with a radio-filtering device > that collects phone signals from outside a shielded space, certain > transmissions can proceed while others are blocked, the Chicago > Tribune reported. hmm, faraday cage on demand sounds kind of useful. they don't mention the level of attenuation though, and i suspect it's not that great. is anyone else aware of systems that can provide variable rf attenuation on demand? From ulzdb at blib.com Thu Mar 2 14:03:03 2006 From: ulzdb at blib.com (Blaine S. Roberts) Date: Thu, 02 Mar 2006 14:03:03 -0800 Subject: gethard nopresc Message-ID: <239110.9916517037754.040278135084.PBEP.8049@allegiant> statue it'searl ,brand somecoerce !hunter oncake tryrabbi itbowditch achang itlonghorn butbedtime the mcgowan achambers orlaughter ordrastic bedestruct orkin tryloot akatz beawash somehurt tryruanda notbathurst seebisque notsecondhand !bulblet itconcierge andbludgeon onrecital inramble butdemur butcounterpoint andcongresswomen inblueback ,dumpty see -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1791 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image783.gif Type: image/gif Size: 8862 bytes Desc: not available URL: From eugen at leitl.org Thu Mar 2 05:16:41 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Mar 2006 14:16:41 +0100 Subject: [dewayne@warpspeed.com: [Dewayne-Net] New paint blocks out cell phone signals] Message-ID: <20060302131640.GR25017@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From WWISEJT at msn.com Thu Mar 2 13:51:53 2006 From: WWISEJT at msn.com (Jo Santana) Date: Thu, 02 Mar 2006 17:51:53 -0400 Subject: Unbelievable Refinance Offer bHt9H Message-ID: <0A457EE3.7684.1515C2D5@localhost> Best in the market! Reduce your monthly payments by 30%. Enjoy lowest rate on the market today! - as low as 3.5%/p.a - instant approval, - all approved, even bad credit - 30 seconds to fill out - valid for 1 week only Try us today! http://46LfH.sendhciai.com/1af stop the current promo http://X0H.sendhciai.com/rem L2R From eugen at leitl.org Thu Mar 2 10:24:15 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Mar 2006 19:24:15 +0100 Subject: [dave@farber.net: [IP] Stanford --Signaling Vulnerabilities in Law-Enforcement Wiretap Systems * 4:15PM, Wed Mar 08, 2006 in Gates B01] Message-ID: <20060302182415.GF25017@leitl.org> ----- Forwarded message from David Farber ----- From rah at shipwright.com Thu Mar 2 15:43:53 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 2 Mar 2006 19:43:53 -0400 Subject: [Clips] Harry Browne Dies Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Thu, 2 Mar 2006 19:42:38 -0400 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Harry Browne Dies Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com - Free Market News Network FMNN OFFICER HARRY BROWNE DIES Thursday, March 02, 2006 - FreeMarketNews.com Harry Browne, former president of Free Market News Network, Corp., has died at home after a long illness. Mr. Browne, a best-selling author and Libertarian political star, was a leading force in FMNN's energetic growth in the mid 2000s; his television program, This Week in Liberty, routinely attracted praise for its moral clarity and political lucidity. In 1996 and 2000, Mr. Browne was the nominee of the Libertarian Party for President of the United States. He also served as Director of Public Policy for the DownsizeDC.org, and as a consultant to the Permanent Portfolio family of mutual funds. Throughout the mid and late-20th century, he was a popular public speaker who appeared on the Today show, Wall $treet Week, The Larry King Show, and hundreds of other national and local radio and television shows. Mr. Browne was little known in the investment world when his first book, How You Can Profit from the Coming Devaluation, was published in 1970. Recognizing the disastrous monetary policy of the U.S. government, he warned that the dollar would be devalued, inflation could be severe, and gold, silver, and foreign currencies should skyrocket in value. The book's theme clashed with the prevailing wisdom, but it struck a chord with tens of thousands of Americans, and the book made the New York Times bestseller list. This was only the first of a number of Harry Browne bestsellers. In late 1994, Browne announced his Libertarian candidacy for president and received 485,759 votes on Election Day, the second highest total in Libertarian Party history. In 2000, he was again nominated to represent the Libertarian Party and garnered more than 382,000 votes, despite a tight race between the two major parties. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Thu Mar 2 13:10:59 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Mar 2006 22:10:59 +0100 Subject: [dewayne@warpspeed.com: [Dewayne-Net] New paint blocks out cell phone signals] In-Reply-To: <4ef5fec60603021258l58c5580ejdc214da804159427@mail.gmail.com> References: <20060302131640.GR25017@leitl.org> <4ef5fec60603021258l58c5580ejdc214da804159427@mail.gmail.com> Message-ID: <20060302211059.GN25017@leitl.org> On Thu, Mar 02, 2006 at 12:58:03PM -0800, coderman wrote: > hmm, faraday cage on demand sounds kind of useful. they don't mention > the level of attenuation though, and i suspect it's not that great. It sounds a bit like snake oil, especially since "nano" was mentioned. I can't imagine this would do anything other than vanilla ferrite paint on metal foil. It is reasonably difficult (and expensive) to shield whole rooms though (I've worked in one). Grounded chickenwire in walls doesn't even begin to approach it. > is anyone else aware of systems that can provide variable rf > attenuation on demand? If it has to be switchable, it has to be active. Sounds improbably expensive and finicky, at least with today's technology. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rvh40 at insightbb.com Fri Mar 3 01:16:40 2006 From: rvh40 at insightbb.com (Randall) Date: March 3, 2006 1:16:40 PM PST Subject: No subject Message-ID: Dewayne Hendricks Subject: Bypassing the Great Firewall of CHina Friday, March 03, 2006 at 4:14 PM EST Peggy Lim and Anne Krishnan, Staff Writers Bill Xia wants to lead a life guided by simple principles. Truthfulness. Compassion. Tolerance. But he's caught up in a complicated business: staying a step ahead of China's Internet censors. Xia's North Carolina-based company, Dynamic Internet Technology, disguises Web sites so they can slip past China's firewall filters. It allows Internet users in China to browse otherwise blocked pages involving such taboo topics as human rights, banned religious groups and peasant uprisings. Trying to outwit China's cybercops is a cat-and-mouse game, not without risks. Xia is reluctant to have his photograph taken. He agreed to be interviewed on the condition that the city where he lives and works not be disclosed. He met with a reporter in a quiet corner of a Triangle Starbucks. Though they keep a low profile, Xia and like-minded people who have been dubbed "hacktivists" have recently been thrust into the international limelight. On Feb. 15, a congressional subcommittee hauled executives from Google, Yahoo, Microsoft and Cisco Systems into hearings about their business dealings in China. Legislators also recently introduced bills that would prohibit U.S. businesses from bending to censorship in other countries and promote technology like Xia's to let people circumvent government censorship online. "It's not that suddenly we did something new," said Xia, who founded Dynamic Internet Technology in 2001. But attention on the other companies, he said, prompted people to ask: Is it possible to get around China's firewall? "And yes," he said, "actually, people have been succeeding at this for years." Studying physics in an Ohio graduate school in the 1990s, the Chinese native was once content to be ensconced in some university library, cozying up to an equation-filled textbook. He planned to become a professor. But that trajectory changed. Finding a mission Xia became friends with some computer science students. And he joined Falun Gong, a group that combines calisthenics with spiritual cultivation. The Chinese government banned Falun Gong as a subversive organization in 1999. Xia, who is in his early 30s, said his dramatic awakening came in July 1999 when China started to crack down on millions of Falun Gong followers, imprisoning and punishing practitioners. "Then it became personal," Xia said. He noticed the discrepancy between his own experience in Falun Gong and news about it from China, which branded it an "evil cult." He saw how discussion was restricted on online Chinese forums, how e-mail mentioning the subject got dropped. "I started to see the need to let people access uncensored info," Xia said. Each day, his company sends out e-mail to millions of Chinese Internet users with links to the Web pages of a short roster of clients, including Human Rights in China and the United States-sponsored Voice of America and Radio Free Asia. Visits to such sites spike whenever there seems to be a government cover-up, as during the initial outbreak of a deadly respiratory virus in 2003 or the reported shooting of protesting villagers in December. Organizations such as Voice of America are an important source of income for Xia's company. Over the past three years, the U.S. Broadcasting Board of Governors, which oversees Voice of America and Radio Free Asia, has directed about $2 million to Xia's company, Dynamic Internet Technology, and $66,000 to UltraReach, another company that circumvents censorship. The money pays for Dynamic Internet Technology's e-mail service for VOA and Radio Free Asia. It also supports technology that continuously changes the organizations' Web addresses to escape Chinese government shutdowns. Still, Xia, who depends on his wife's salary and a team of about 10 core volunteers, says the company is constantly on the brink of bankruptcy. "We spend all we have on DynaWeb," he said. DynaWeb, Dynamic Internet Technology's main tool, offers Web users in China portals and software to anonymously view practically any blocked Web site, except some pornographic sites that the company also blocks. Pressure from China To grab a piece of the booming Chinese market, American Internet companies have bowed to pressure from Chinese censors. Yahoo China revealed private information to the Chinese government that led to the jailing of a journalist. Microsoft's MSN yanked a controversial web log from the Internet. Congress summoned Cisco for making the hardware China uses to censor the Internet. And in January, Google announced that it had launched a search engine that filters out results proscribed by the Chinese government. A search for "Falun Dafa" on Google.com and on the company's China-specific portal Google.cn, yields different results on a comparison tool developed by the OpenNet Initiative, a collaboration of universities in the United States, Canada and England. Google.com returns official and informational Web pages about the Falun Gong or Falun Dafa faith; Google.cn returns Chinese government memos and sites calling Falun Gong heretical and absurd. Google's vice president of global communications testified in congressional hearings that the company had to obey the communist government's rules to provide good service for Chinese customers and shore up its declining market share in the face of "explosive growth" of the Internet in China. Arvind Malhotra, a global entrepreneurship professor at Kenan-Flagler Business School at UNC-Chapel Hill, said he thinks Google made the right business decision. "We hold values here," he said, "but it is just too big of a market, too good of a market to not compromise and bend a little bit." But businesses have more leverage than they think, said Xiao Qiang, director of the China Internet Project at the University of California at Berkeley's graduate journalism school. American companies provide the best technology and the best services, he said, and China's Internet could not develop as well without them. Two-way leverage "They obviously need the China market, but China also needs these companies," he said. "When the companies are being pushed by the public here and the government, there will be a space for them to negotiate with the [Chinese] government, pushing back much more than they are now." So far, Xia and his colleagues have been able to avoid a backlash from the U.S. side of the technology world. In 2004, the anti-virus company Symantec briefly labeled Xia's software a Trojan horse, which masquerades as a useful program, but once opened executes malicious code. Symantec quickly removed Xia's software from its list of viruses after articles about the technology came out. Joe Freddoso, a spokesman for Cisco Systems in Research Triangle Park, said he doesn't consider tools that redirect Web surfers to different sites to be a security threat, either. "When there's something that interrupts the information flow, you're going to have smart minds that figure out ways around that stoppage," he said. "It's normal business on the Internet." Still, Xia is protective of the identity of his small team of volunteers, some of whom are software programmers in major companies across the United States. Xia, the company's only full-time staff member, doesn't want the others to risk their jobs for the maverick work they do on the side. He also acknowledges that his company must limit DynaWeb to Chinese-only versions. The company hides it from English-language users for fear they might use it to skirt corporate firewalls at their workplaces. When outrunning China's censors while remaining incognito gets stressful, Xia retreats inward to meditate on the basic Falun Gong tenets that motivated him in the first place. Truthfulness. Compassion. Tolerance. But he reflects: "To be a good person ... throughout the years, I discover, that's really hard to do." Staff writer Peggy Lim can be reached at 836-5799 or plim at newsobserver.com. ========= WHAT COMPANY DOES AND WHO USES IT What does Dynamic Internet Technology do? * It sends out mass e-mail messages for organizations including Voice of America (VOA), Radio Free Asia and Human Rights in China. It uses techniques similar to spam's to get by Internet Service Provider filters. It might, for instance, substitute "V_O_A" for blacklisted words such as "VOA." * Its main technology, DynaWeb, allows Chinese Web users to anonymously view practically any blocked Web site. How does a user access DynaWeb? An Internet user in China can send the company e-mail or an instant message to get the latest working IP addresses or URLs for DynaWeb. A DynaWeb site acts as a portal from which a user can connect to practically any banned site. The Web addresses must constantly change, because China's cybercops can block a Web site within several weeks or hours. A user can also download DynaWeb software called Freegate. Freegate enables Internet browsers to directly access banned content. "The software knows lots of holes and how to identify new holes," company founder Bill Xia said. Who uses DynaWeb? About 100,000 people in China use DynaWeb each day, Xia said. That's a tiny fraction of China's estimated 120 million Web users. But Xiao Qiang, a University of California, Berkeley, professor, says Freegate is important because of the types of people who use it: journalists, writers and academics who are thinking and writing about international politics and China's domestic affairs. ONLINE Dynamic Internet Technology www.dit-inc.us/ UltraReach www.ultrareach.com/company/ You can test how the search engine results on Google.com differ from those on Google.cn at www.opennet.net/google_china. http://www.newsobserver.com/102/story/411976.html Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ben at straubnet.net Fri Mar 3 08:48:49 2006 From: ben at straubnet.net (Ben Straub) Date: Fri, 3 Mar 2006 08:48:49 -0800 Subject: [dewayne@warpspeed.com: [Dewayne-Net] New paint blocks out cell phone signals] In-Reply-To: <20060302211059.GN25017@leitl.org> References: <20060302131640.GR25017@leitl.org> <4ef5fec60603021258l58c5580ejdc214da804159427@mail.gmail.com> <20060302211059.GN25017@leitl.org> Message-ID: <2f14c7190603030848h7670e001gb0a1642dff1b251d@mail.gmail.com> On 3/2/06, Eugen Leitl wrote: > If it has to be switchable, it has to be active. Sounds improbably > expensive and finicky, at least with today's technology. > To my eyes, this looks more like a vanilla Faraday cage with a relay transmitter placed inside, with a hard-link to a relay outside: Combined with a radio-filtering device that collects phone signals from > outside a shielded space, certain transmissions can proceed while others are > blocked, the Chicago Tribune reported. > The only reason it's newsworthy is the prefix "nano". -- Ben From dave at farber.net Fri Mar 3 09:38:44 2006 From: dave at farber.net (Dave Farber) Date: Fri, 03 Mar 2006 12:38:44 -0500 Subject: [IP] Yep, it's the apocalypse: RFIDs are the "mark of the beast" Message-ID: -------- Original Message -------- Subject: Yep, it's the apocalypse: RFIDs are the "mark of the beast" Date: Fri, 03 Mar 2006 12:16:53 -0500 From: Kevin G. Barkes Reply-To: kgbarkes at gmail.com To: dave at farber.net And for years I thought it was my Social Security card... Wired News RFID: Sign of the (End) Times? By Mark Baard | Also by this reporter 02:00 AM Mar, 02, 2006 EST CAMBRIDGE, Massachusetts -- Katherine Albrecht is on a mission from God. The influential consumer advocate has written a new book warning her fellow Christians that radio frequency identification may evolve to become the "mark of the beast" -- meaning the technology is a sign that the end-times are drawing near. "My goal as a Christian (is) to sound the alarm," said Albrecht, in a conversation over tea at a high-end grocery store. Albrecht has been a leading opponent of RFID, which is fast becoming a part of passports and payment cards, and is widely expected to replace bar-code labels on consumer goods. RFID chips contain unique identification codes, and can be read at varying distances with special reader devices. Albrecht hopes her new book, The Spychips Threat: Why Christians Should Resist RFID and Electronic Surveillance, will be embraced by the millions of Americans (59 percent of them, according to a 2002 Time/CNN poll) who share her belief that the Book of Revelation in the Bible forecasts events that are yet to come. The Spychips Threat is in fact a Christianized version of its secular predecessor, Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID, which came out last fall. Both books are published by the Christian publishing powerhouse Thomas Nelson. Both lay out the same totalitarian scenarios, based on documented plans by Philips, Procter and Gamble, Wal-Mart and other companies, along with the federal government, to track consumer goods and people individually. (Including, one assumes, the copy of "The Spychips Threat" one picks up at WalMart.) http://www.wired.com/news/technology/0,70308-0.html?tw=wn_index_1 Regards, KGB ----- Kevin G. Barkes Email: kgb at kgb.com | Web: www.kgb.com KGB Report: http://www.kgb.com Commentwear by KGB: http://www.commentwear.com National Temperature Index: http://nationaltemperatureindex.com DCL Dialogue on line: http://www.kgb.com/dcl.html Random Quotations Generator: http://www.goodquotations.com Over 12,000 searchable quotations. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From hwlyc at newyorkmoments.com Thu Mar 2 23:43:52 2006 From: hwlyc at newyorkmoments.com (Shane Burke) Date: Fri, 03 Mar 2006 13:43:52 +0600 Subject: hey Tim Message-ID: <5.3.11.2081924.0083fc70@ies.edu> Hello, As a valued customer, we provide you with occassional information and updates. Our records indicate that you may be in need of a refill. We hope that you will once again, give us the opportunity to offer you a great selection of meds, low prices, and superior customer care. If you would like to place an order or browse our current products and specials, please visit the link below: http://BestPleasant.info/?2379e02e43a7cS7353S66dc8edf0cffb Yours Truly, Shane Burke Customer Care Specialist slavonic you clothesbrush me, augmentation larkspur beryl kava . tenet you fitchburg me, trumpet conjunct contempt . paragonite you source me, friction mervin hydrophobic echoes . lore you exemplify me, midas . greet you musician me, primordial . addle you clapboard me, corroboree pygmalion bucknell runoff . brimful you brucellosis me, boil . http://www.WebNiceCars.info/fgh.php From dave at farber.net Fri Mar 3 12:25:40 2006 From: dave at farber.net (Dave Farber) Date: Fri, 03 Mar 2006 15:25:40 -0500 Subject: [IP] Department of Photo Security--Redux Message-ID: -------- Original Message -------- Subject: Department of Photo Security--Redux Date: Fri, 03 Mar 2006 15:06:31 -0500 From: Richard Forno To: Blaster CC: Dave Farber Department of Photo Security--Redux http://blog.washingtonpost.com/rawfisher/ Last Sunday's column told the story of a Maryland woman who was stopped by police and questioned after commuters saw her taking photographs of the wrought-iron lampposts at the Odenton train station. Preety Gadhoke's experience, and her questions about whether she was stopped because she looked like a foreigner, have sparked a debate here on the blog and elsewhere. Preety and I appeared on C-SPAN's Washington Journal with Brian Lamb this morning to discuss the events, and Channel 9 reporter Dave Statter passes along this account of his own dogged and enlightening reporting on the inconsistent, illogical and sometimes downright idiotic efforts by the homeland security apparatus to fight the scourge of innocent photography of some of the world's most-photographed buildings: In 2004, and again in 2005, I sent two different, young, Caucasian, native-born, female interns around Washington armed with a disposable camera and a wireless microphone. Their instructions were to stand in a public place and shoot public buildings. While this was going on, I was with a photographer a half block down the street videotaping the interns actions and the reaction of various security guards and police. I can report that the one place where she wasn't hassled was the White House. But on sidewalks outside DOT, NASA, EPA, IRS, Washington Marine Barracks, Ronald Reagan Building, J. Edgar Hoover Building, Justice Department, a US Capitol Police roadblock and the FBI's Washington Field Office she was confronted by security or police. In most cases when the TV camera was spotted (we were out in the open), we were also confronted. I guess we should expect that security will legally attempt to find out the identity of anyone who is extensively photographing government buildings. But the misinformation and outright lies that were told to this "tourist" and to us were quite amazing. Here is a partial list: 1. It is illegal to photograph any government buildings. (EPA) 2. We arrested a man for drawing a picture of this building last week. (EPA) 3. You are not allowed to take pictures and I can confiscate your camera. (Marine Barracks) 4. You have to have permission from our public affairs officer to photograph this building. (NASA, Ronald Reagan Building) 5. We have a cabinet secretary in there so you can't shoot pictures of this building. (DOT both in 2004 and 2005) 6. The GSA rules printed on the front door show it is illegal to take pictures of this building. (At the Ronald Reagan Building, where the GSA rules on the door, often cited throughout the city, actually say just the opposite) 7. We stop terrorists all the time who take pictures. (US Capitol Police) 8. You can't take pictures of people going into and out of this building. (FBI WFO) Of course, there is nothing true about any of these statements. We later contacted officials with each organization, along with the Department of Homeland Security. Not one could cite any law or regulation that prohibits anyone standing in a public place from taking a picture of a building or anything else that is in public view. Each agency/organization (including the US Marines), except one, admitted to us that their people were in error and would do retraining. In fact, the Federal Protective Service, responsible for guarding government buildings all over the country, tell us they now use our stories in roll calls and training sessions for their officers. The one exception is the Department of Transportation on 7th Street, SW. Officials there refuse to acknowledge the right of the public or the press to take pictures of the building without DOT's permission. They also told me they saw no reason to retrain their guards. Take a walk with a camera outside the DOT building and watch what happens. I should also tell you that representatives at all the buildings and agencies tell us they will regularly try to legally find out who the picture taker is, but will not otherwise interfere with the picture taking. I guess we should expect that action, post 9/11. Now as far as railroads are concerned, there are a lot of people whose hobby is taking pictures of trains. Think of O. Winston Link's famous picture of the Norfolk and Western steam engine passing behind the plane on the drive-in movie screen in West Virginia. These people are being hassled out of a hobby. Your former Post colleague, Don Phillips, wrote a recent column in Trains magazine about the issue. One problem for Ms. Gadhoke is that apparently she was on "their" property when taking the pictures. That may have emboldened the officer to seize her film (I have heard from a number of people that the Pentagon police do this to the press and public who take pictures on Pentagon property without permission, but allegedly they don't seize film when you are on public property taking the pictures). New Jersey Transit's chief of police is one of the railroad people taking and encouraging a hard line approach with picture takers. NJT finally officially backed away from the policy in January after a lot of pressure (including the Trains magazine column). Here are some articles about NJT's short lived photography ban that some claim is still being enforced: http://www.nppa.org/news_and_events/news/2006/01/njt.html http://www.lightrailnow.org/news/n_newslog006.htm#NJ_20060215 (this one has a series of railroad related articles in chronological order ... check February 13 and February 6) A few months back I was with a Channel 9 photographer for about two hours of videotaping AMTRAK and CSX trains at Ivy City and then along the tracks at M Street Southeast. A heavenly assignment for two train buffs. At Ivy City an engineer called dispatch to report us to police (I was monitoring on the scanner). When we moved to M Street another engineer did the same. As we left M Street a CSX police officer pulled up. It turned out to be a guy who I had been a volunteer firefighter with 30 years ago. He apparently came down from the Baltimore area to answer the call. I got the impression he was the only CSX cop on duty in DC at the time (what does that say about rail security?). My friend said as long as we were off the track area and not on CSX property we can take all the pictures we want (his chief must not subscribe to NJT's policy). It's a mess out there, and the most unfortunate part of the situation is that the confusion and the contradictions only serve to undermine public confidence in our security and law enforcement agencies, while the efforts to halt photography of public places wastes valuable resources and persuades all too many Americans that our tax dollars are being diverted from security measures that might really protect us. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dewayne at warpspeed.com Fri Mar 3 17:39:04 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Fri, 3 Mar 2006 17:39:04 -0800 Subject: [Dewayne-Net] Bypassing the Great Firewall of CHina Message-ID: [Note: This item comes from reader Randall. DLH] From evasive53 at gameaddict.com Fri Mar 3 10:07:04 2006 From: evasive53 at gameaddict.com (Pit) Date: Fri, 3 Mar 2006 22:07:04 +0400 Subject: forexdotcom Message-ID: <200603040207.k2427Mto024128@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4526 bytes Desc: not available URL: From hrhjbhrq at msn.com Fri Mar 3 13:16:20 2006 From: hrhjbhrq at msn.com (Shari Mccracken) Date: Fri, 03 Mar 2006 23:16:20 +0200 Subject: Doctors Use This Too gl Message-ID: Here's latest "Longz" formula has been proven to add inches to the sizes while multiplying orgasms like never had before. Our products is light years ahead of our competitors which has millions of happy users. Check us out..You won't regret. http://thunder14.stronglength.biz 6O From eugen at leitl.org Fri Mar 3 14:19:00 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Mar 2006 23:19:00 +0100 Subject: [dave@farber.net: [IP] Department of Photo Security--Redux] Message-ID: <20060303221900.GL25017@leitl.org> ----- Forwarded message from Dave Farber ----- From eugen at leitl.org Fri Mar 3 14:38:12 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Mar 2006 23:38:12 +0100 Subject: [dave@farber.net: [IP] Yep, it's the apocalypse: RFIDs are the "mark of the beast"] Message-ID: <20060303223812.GQ25017@leitl.org> ----- Forwarded message from Dave Farber ----- From coderman at gmail.com Sat Mar 4 00:31:01 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 00:31:01 -0800 Subject: Fwd: [TSCM-L] Re: New paint blocks out cell phone signals In-Reply-To: <4ef5fec60603040030g3cf97c24g13a87fa14d3aec8a@mail.gmail.com> References: <7.0.1.0.2.20060303165245.03dcfb28@phreaker.net> <20060304025037.D93921BF971@absinthe.tinho.net> <4ef5fec60603040030g3cf97c24g13a87fa14d3aec8a@mail.gmail.com> Message-ID: <4ef5fec60603040031p5b9e95dcrb2b0bfeadd022363@mail.gmail.com> ---------- Forwarded message ---------- From: coderman Date: Mar 4, 2006 12:30 AM Subject: Re: [TSCM-L] Re: New paint blocks out cell phone signals To: TSCM-L2006 at googlegroups.com On 3/3/06, dan at geer.org wrote: > ... why can't I > paint my own home with this stuff? We can certainly > cast this in property-rights terms I should think. you can: http://www.lessemf.com/paint.html there are also a few companies selling faraday cloth, though i don't recall the attenuation provided. what i'd really like is something toggle'able, although the product described in this thread sounds more like snake oil than truly "nano reconfigurable faraday surface" a friend also has an attic/loft well coated in many layers of lead base; there are two small windows and the attenuation with lead based appears to be pretty decent as well. (a little hard to find these day, though :) From coderman at gmail.com Sat Mar 4 00:54:29 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 00:54:29 -0800 Subject: [Clips] Ferrari Case Takes New Twist With Possible Tie to Bus Agency In-Reply-To: References: Message-ID: <4ef5fec60603040054t70d42a0aib87b51ed720b654@mail.gmail.com> these small "police agencies" are a nice way to get equipment and toys otherwise unaccessible to the general public. a common loophole if you can afford it. of course, with all the deep black going around (*cough cough*) who knows? :P this entity looks a little odd, to put it mildly... (and who is Connie Wong?) San Gabriel Valley Transit Authority Listing Type: Business Listing Date: 02/09/2006 - 02/23/2006 Address: 4115 E Live Oak Ave Arcadia, CA 91006-5865 Phone: (626) 254-0471 San Gabriel Valley Transit Authority Listing Type: Business Listing Date: 01/31/2006 - 02/23/2006 Address: 4115 E Live Oak Ave Arcadia, CA 91006-5865 Phone: (626) 446-1753 San Gabriel Valley Transit Authority Listing Type: Business Listing Date: 12/22/2005 - Current Address: Address not listed Phone: (626) 303-3505 San Gabriel Valley Transit Authority Listing Type: Business Listing Date: 05/19/2005 - 12/21/2005 Address: 148 E Lemon Ave Monrovia, CA 91016-2808 Phone: (626) 303-3505 Monrovia Transit Authority Listing Type: Business Listing Date: 12/22/2005 - Current Address: Address not listed Phone: (626) 303-3505 Monrovia Transit Authority Listing Type: Business Listing Date: 12/01/2004 - 04/05/2005 Address: 148 E Lemon Ave Monrovia, CA 91016-2808 Phone: (626) 303-3505 Monrovia Transit Authority Listing Type: Business Listing Date: 04/25/2005 - 12/21/2005 Address: 148 E Lemon Ave Monrovia, CA 91016-2808 Phone: (626) 303-3505 S G V T P D Listing Type: Business Listing Date: 02/22/2006 - Current Address: 4115 E Live Oak Ave Arcadia, CA 91006-5865 Phone: (626) 446-1753 S G V T P D Listing Type: Business Listing Date: 02/22/2006 - Current Address: 4115 E Live Oak Ave Arcadia, CA 91006-5865 Phone: (626) 254-0471 San Gabriel Valley Transit Police Listing Type: Business Listing Date: 12/22/2005 - Current Address: Address not listed Phone: (626) 303-3505 San Gabriel Valley Transit Police Listing Type: Business Listing Date: 05/19/2005 - 12/21/2005 Address: 148 E Lemon Ave Monrovia, CA 91016-2808 Phone: (626) 303-3505 additional pointers welcome... On 3/3/06, R. A. Hettinga wrote: > http://www.latimes.com/news/local/la-me-ferrari3mar03,1,3377111,print.story?coll=la-headlines-california&ctrack=1&cset=true > > ... > Ferrari Case Takes New Twist With Possible Tie to Bus Agency > > The trail leads to a nonprofit operating out of a Monrovia repair shop. > More puzzling is its police force and 'anti-terrorism' unit. > ... > The car's owner, a former video game executive from Sweden, told Los > Angeles County sheriff's deputies at the scene of the Feb. 21 accident in > Malibu that he was deputy commissioner of the San Gabriel Valley Transit > Authority's police anti-terrorism unit, detectives said Thursday. > ... > They are also looking into the transit organization to see what connection, > if any, it has to the case. Brooks said detectives believe the two men from > "homeland security" received their badges from the transit authority. > ... > Just as murky is Eriksson's connection to the San Gabriel Valley Transit > Authority. > > The organization is a privately run nonprofit that has agreements with > Monrovia and Sierra Madre to provide bus rides for disabled residents. > > On its website, the San Gabriel Valley Transit Authority lists its address > as 148 E. Lemon Ave. in Monrovia. The location is Homer's Auto Service, an > auto repair shop. > > A transit authority bus was parked in one of its driveways, but nothing on > the storefront indicated it was a headquarters for the agency. Inside, a > young woman, who declined to give her name, said she was a dispatcher for > the transit authority. She telephoned someone she said was an agency > official, who declined to be interviewed. > > According to the website, the organization also has its own police > department with a chief, detectives and marked police cruisers. Sheriff's > investigators said Eriksson told deputies that he was deputy commissioner > of the department's anti-terrorism unit. > ... > Officials in cities where the agency does business said they didn't know > why a small transit authority needs a police department. > ... > But Deal said some specialized departments are not members, and there are > provisions in state public utilities law that allow for transit police > agencies to be run by private transit providers. From XOVNKHX at hotmail.com Fri Mar 3 14:25:42 2006 From: XOVNKHX at hotmail.com (Otto Pearson) Date: Sat, 04 Mar 2006 01:25:42 +0300 Subject: SU-per Hu^ge 0ffers K9o Message-ID: <6A667EE3.7684.4615C2D5@localhost> Loking for quality meds at affordable price? We have widest range of meds at very competitive price. Money baack guaranteesss... http://ca.geocities.com/moll64037fredelia32415/ qOWe From coderman at gmail.com Sat Mar 4 01:51:54 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 01:51:54 -0800 Subject: More public things you can't take pictures of in public, was: Re: [dave@farber.net: [IP] Department of Photo Security--Redux] Message-ID: <4ef5fec60603040151x47c24cd8g85345c6618ae813a@mail.gmail.com> On 3/3/06, Eugen Leitl wrote: > ... > Subject: Department of Photo Security--Redux (also known as the thought crime prevention department) Things you can't take pictures of in public and other psuedo crimes enforced by hassle, annoyance and privacy invasion: ---begin various clips--- REVERSE THE PANOPTICON! (man i love this one...) http://cartome.org/reverse-panopticon.htm --- From coderman at gmail.com Sat Mar 4 01:54:13 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 01:54:13 -0800 Subject: Fwd: [TSCM-L] Re: New paint blocks out cell phone signals In-Reply-To: <20060304094811.GT25017@leitl.org> References: <7.0.1.0.2.20060303165245.03dcfb28@phreaker.net> <20060304025037.D93921BF971@absinthe.tinho.net> <4ef5fec60603040030g3cf97c24g13a87fa14d3aec8a@mail.gmail.com> <4ef5fec60603040031p5b9e95dcrb2b0bfeadd022363@mail.gmail.com> <20060304094811.GT25017@leitl.org> Message-ID: <4ef5fec60603040154y3472afa1j2b66ed68cba5c3db@mail.gmail.com> On 3/4/06, Eugen Leitl wrote: > ... > Lead is only useful for radiation shielding, ungrounded lead with unshielded > windows and power wiring with no frequency filters leading outside is a not > particularly good Faraday cage. agreed, and thanks for the clarification. it was effective enough kill to wifi in 2.4Ghz, but this is a far cry from TEMPEST... From coderman at gmail.com Sat Mar 4 03:26:53 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 03:26:53 -0800 Subject: [Clips] Ferrari Case Takes New Twist With Possible Tie to Bus Agency In-Reply-To: References: Message-ID: <4ef5fec60603040326k6f396a5ft2e4278153ac3558e@mail.gmail.com> yeah, they wanted the cool toys... http://www.whittierdailynews.com/news/ci_3567905 '''In interviews with board members, they say the rationale for creating the transit authority police is twofold: they had the legal right to do it, and "it sounds like a cool idea."''' also explains why they have been hiding listings recently (particularly the Police listings moved from Monrovia to Gabriel): '''The bizarre revelations could also cost the agency its contract to operate in Monrovia. City Manager Scott Ochoa said he warned Maiwandi early on that the city did not want him wading into police business.''' i bet they bought weapons and tactical body armor to equip their police force too :) From freemanj at dol.ie Sat Mar 4 03:19:23 2006 From: freemanj at dol.ie (Lonnie Conn) Date: Sat, 04 Mar 2006 05:19:23 -0600 Subject: Re-finance before rates skyrocket Message-ID: <811i852p.5601730@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1174 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cement.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From rawittenberg at austin.polycom.com Sat Mar 4 03:42:30 2006 From: rawittenberg at austin.polycom.com (Gena Gleason) Date: Sat, 04 Mar 2006 05:42:30 -0600 Subject: Pre-approved Application #087591851 Sat, 04 Mar 2006 05:42:30 -0600 Message-ID: <26131455701917.oo2FjVKcGd@atavistic> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1189 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: indigene.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From tracy at facilitate.com Sat Mar 4 04:31:59 2006 From: tracy at facilitate.com (Duncan Bacon) Date: Sat, 04 Mar 2006 06:31:59 -0600 Subject: Pre-approved Application #KWKJ32017819 Message-ID: <488j079u.8703854@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1202 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: parallelogram.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From mckinley at faimanagement.com Sat Mar 4 04:33:03 2006 From: mckinley at faimanagement.com (Wayne Goins) Date: Sat, 04 Mar 2006 06:33:03 -0600 Subject: Ratess will skyrocket soon Message-ID: <5.7.0.7.6.89630747641603.581a8812@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1194 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: houdini.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From kdoherty at kirbyrisk.com Sat Mar 4 04:35:51 2006 From: kdoherty at kirbyrisk.com (Holly Lim) Date: Sat, 04 Mar 2006 06:35:51 -0600 Subject: Low mortagge ratee approvall Message-ID: <76464335760156.iu13Jer7aK@again> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1187 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: application.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From gonzales at carpets.com Sat Mar 4 04:58:15 2006 From: gonzales at carpets.com (Ralph Schulz) Date: Sat, 04 Mar 2006 06:58:15 -0600 Subject: Mortagge ratee approvedd Message-ID: <493k531a.3523845@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1180 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: incantation.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From dubois at je-assoc.com Sat Mar 4 05:45:51 2006 From: dubois at je-assoc.com (Milford Pryor) Date: Sat, 04 Mar 2006 07:45:51 -0600 Subject: Mortagge ratee approvedd Message-ID: <892b066k.1155926@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1199 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: proponent.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From coderman at gmail.com Sat Mar 4 08:35:55 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 08:35:55 -0800 Subject: Identity is Hard, Let's go Shopping Message-ID: <4ef5fec60603040835i64f10c2cu8fe2ee391e3ae658@mail.gmail.com> http://www.emergentchaos.com/archives/2006/03/identity_is_hard_lets_go.html """ (Posted by adam) Kim Cameron... says: "In my view, the identity problem is one of the hardest problems computer science has ever faced." I think this is true, and I'd like to tackle why that is. I'm going to do that in a couple of blog posts, because I think the subject is broad and complex, and I'd like to offer some perspectives into that chaos. I've been saying for a while that people like to pay for privacy, when they understand what the threat to their privacy is, and how the solution works. Thus, they buy curtains. Curtains work very well to enhance privacy by stopping passers-by from looking through your windows. Another part of that talk is that privacy means a lot of different things to people, ranging from 'the right to be left alone' to 'informational self-determination' to 'abortion.' I believe that identity displays very similar properties in how widely the term is used. Identity is a problem because it means so many different things about who we are, and how we perceive ourselves, others, and our relationships with them. Identity also entails a set of business relationships, and the experiences and reliance that entities embed into those relationships. Finally, identity entails a set of government relationships, some of which are about citizenship, or various sorts of temporary presence or exclusion, or moneys flowing to or from the government. Sometimes, these relationships overlap in various ways. This relates to Zooko's "Decentralized, Secure, Human-Meaningful" triangle. Zooko looks at the digital systems for dealing with identifiers, and the properties those identifiers can have. I want to start from the variety of relationships, and the way people think about the relationships, then move to identifiers. Replacing the actual relationship with a digital identifier often creates issues, because the two differ. As we encode various forms of identity onto computers, we make choices about identifiers and representations. Some of these choices are now such second nature that actually listing the details them seems bizarre: "My mail client sends a message to alice at example.com"* vs "I send mail to mom." We have internalized the idea that an email address is a good identifier for a person. We tend to internalize these representations fairly easily, even when its not a good idea. "123-45-6789 applied for this credit card," that must be Alice Example. I'll talk more about the issues of assigning trust or reliance to identifiers, rather than people, in another post. """ From coderman at gmail.com Sat Mar 4 08:51:01 2006 From: coderman at gmail.com (coderman) Date: Sat, 4 Mar 2006 08:51:01 -0800 Subject: telco network security con Message-ID: <4ef5fec60603040851q4d42954bob6a24beb77558b24@mail.gmail.com> despite the marketing hype, att's nda team would actually be fun to see. something tells me they wont be allowing photographs... ---cut--- "Communications Security in the Digital Age Featured Only at TelecomNEXT; AT&T's National Disaster Recovery Team on Display on TelecomNEXT Exhibit Floor" http://www.voip-magazine.com/content/view/2152/20060302005890/ Thursday, 02 March 2006 Powered By BusinessWire WASHINGTON--(BUSINESS WIRE)--March 2, 2006--A top priority for telecom service providers competing in today's borderless economy, key security issues will play a central role on the exhibit floor and in must-attend conference sessions at TelecomNEXT in Las Vegas, March 19 - 23, 2006. TelecomNEXT, the only place where the business and technology of communications and entertainment meet, replaces SUPERCOMM(R) as USTelecom's annual industry show. "Network security and the ability to operate in the face of disaster are some of the top concerns for integrated communications providers," said John Abel, USTelecom's Senior Vice President, Marketing, Membership and Business Development. "In today's converged telecom market, security solutions are more critical than ever before and TelecomNEXT is the only place to see the latest advances in network security." The TelecomNEXT exhibit floor was recently expanded and an additional hall was added to accommodate a premier enterprise security exhibit -AT&T's Network Disaster Recovery (NDR) team. The NDR team is part of AT&T's comprehensive business continuity plan to ensure that voice and data communications can be restored quickly for business and government customers if a disaster damages or destroys parts of the network. The fully mobile NDR team allows AT&T to monitor, manage and proactively protect the networks of its enterprise customers. Advertisment In addition, several TelecomNEXT sessions will focus on critical network security and reliability issues. These sessions bring together experts on communications security issues and include a panel on cyber security presented by representatives from the Department of Homeland Security's National Cyber Security Division. Some of the featured sessions include: -- Cyber Security and Energy Interdependency Summit This roundtable panel will discuss the reliability and security of the nation's electric grid, explore alternative back-up energy sources for central offices, and examine SCADA and cyber security issues. -- Steve Conrad, Sandia National Lab - Energy and Telecommunications Interdependencies -- Dave Robinson, Sandia National Lab - Risk assessment, business continuity, grid vulnerability -- John Boyes, Sandia National Lab - Energy Surety Program, Distributed Energy Resources and Energy Storage Systems -- Mike Hickey, VP, National Security, Verizon -- David Barron, Asst. VP, National Security, BellSouth -- Enterprise Security 101: Business Continuity, Disaster Recovery and Cyber Security Representatives from AT&T's NDR team will be on the TelecomNEXT show floor to discuss fundamentals of successful corporate business continuity planning. The session will explore new business opportunities from offering business continuity expertise and solutions to enterprise customers. -- Robin Bienfait, VP, Network Operations, AT&T -- Kenneth J. Smith, Director, Global Network Operations, Network Disaster Recovery, AT&T -- Prioritizing Cyber Security Produced by the Department of Homeland Security's National Cyber Security Division, this session looks at the operational and technical challenges to cyber security, including the unique challenges to small businesses. -- Liesyl Franz, Director, International Affairs, Deputy Director for Outreach and Awareness, National Cyber Security Division, Dept. Homeland Security -- Ron Layton, Deputy Director, Law Enforcement and Intelligence National Cyber Security Division, Dept. Homeland Security -- Ron Teixeira, Executive Director, National Cyber Security Alliance -- John E. Scott, II, Small Business Administration, Nevada District Director -- Robert G. Schoshinski, Division of Marketing Practices, Bureau of Consumer Protection, Federal Trade Commission Several technical papers on network security will be presented by Juniper Networks, Nortel, Lucent Worldwide Services, Broadwing Communications, VeriSign Communications Services, and VoIPshield Systems on Monday, March 20 from 11:40 am to 3:00 pm. The TelecomNEXT Paper presentations will address wireless, VoIP and converged network security; as well as several other topics. The papers offer technical decision makers, designers, engineers, network developers, and other stakeholders the information they need to make informed purchasing decisions. The keynote speakers for TelecomNEXT are ... TelecomNEXT will be held at the Mandalay Bay Convention Center in Las Vegas, Nevada, March 19-23, 2006. The exhibit floor will be open Tuesday, March 21 and Wednesday, March 22. For more information on TelecomNEXT, go to www.telecom-next.com. --end-cut--- From bill.stewart at pobox.com Sat Mar 4 10:30:24 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 04 Mar 2006 10:30:24 -0800 Subject: telco network security con In-Reply-To: <4ef5fec60603040851q4d42954bob6a24beb77558b24@mail.gmail.co m> References: <4ef5fec60603040851q4d42954bob6a24beb77558b24@mail.gmail.com> Message-ID: <6.2.1.2.0.20060304101946.038c7970@pop.idiom.com> At 08:51 AM 3/4/2006, coderman wrote: >despite the marketing hype, att's nda team would actually be fun to >see. something tells me they wont be allowing photographs... > >---cut--- >"Communications Security in the Digital Age Featured Only at >TelecomNEXT; AT&T's National Disaster Recovery Team on Display on >TelecomNEXT Exhibit Floor" [... Vegas in March ..] They are fun to see, and I don't think they have a problem with photographs. Their web page is at www.att.com/ndr/ and most of the good pictures are under "Deployments". They do quarterly exercises around the US, which include a certain amount of showing them to tourists (i.e. the sales people get to bring in customers to see the cool stuff, along with running seminars about why you need to buy more telecom to support your business disaster recovery needs.) From rodge at artlover.com Fri Mar 3 20:31:42 2006 From: rodge at artlover.com (Dexter) Date: Sat, 4 Mar 2006 10:31:42 +0600 Subject: the investor's toolbox Message-ID: <200603041631.k24GVc9s026887@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4530 bytes Desc: not available URL: From eugen at leitl.org Sat Mar 4 01:48:11 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Mar 2006 10:48:11 +0100 Subject: Fwd: [TSCM-L] Re: New paint blocks out cell phone signals In-Reply-To: <4ef5fec60603040031p5b9e95dcrb2b0bfeadd022363@mail.gmail.com> References: <7.0.1.0.2.20060303165245.03dcfb28@phreaker.net> <20060304025037.D93921BF971@absinthe.tinho.net> <4ef5fec60603040030g3cf97c24g13a87fa14d3aec8a@mail.gmail.com> <4ef5fec60603040031p5b9e95dcrb2b0bfeadd022363@mail.gmail.com> Message-ID: <20060304094811.GT25017@leitl.org> On Sat, Mar 04, 2006 at 12:31:01AM -0800, coderman wrote: > you can: http://www.lessemf.com/paint.html More background on: http://cryptome.org/datasec.htm > there are also a few companies selling faraday cloth, though i don't > recall the attenuation provided. what i'd really like is something > toggle'able, although the product described in this thread sounds more > like snake oil than truly "nano reconfigurable faraday surface" > > a friend also has an attic/loft well coated in many layers of lead > base; there are two small windows and the attenuation with lead based > appears to be pretty decent as well. (a little hard to find these > day, though :) Lead is only useful for radiation shielding, ungrounded lead with unshielded windows and power wiring with no frequency filters leading outside is a not particularly good Faraday cage. Lead base paint doesn't even contain metallic lead, but lead oxides in a small proportion. If you have to also shield against magnetic fields, then http://en.wikipedia.org/wiki/Mu-metal & Co are your friends. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Sat Mar 4 03:16:06 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Mar 2006 12:16:06 +0100 Subject: [dewayne@warpspeed.com: [Dewayne-Net] Bypassing the Great Firewall of CHina] Message-ID: <20060304111606.GJ25017@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From lindley.felton56u at gmail.com Sat Mar 4 16:47:47 2006 From: lindley.felton56u at gmail.com (Frances Shaffer) Date: Sat, 4 Mar 2006 16:47:47 -0800 Subject: Hey bro, check out the huge sale these guys are offering Message-ID: <200603040847.k248leYf014631@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1123 bytes Desc: not available URL: From smxkz at ctmt.com Sat Mar 4 19:19:54 2006 From: smxkz at ctmt.com (Noelle N. Simon) Date: Sat, 04 Mar 2006 19:19:54 -0800 Subject: nice for you Message-ID: <972350.6958380886130.916842424003.QDTN.0874@compline> myeloid butmarimba andr orsalvageable seepostman mayjest butregretted notshattuck somesarsaparilla somecane thearchitect ,cope orgeese mayeffloresce eerie bewhizzing seecoarse agunflint orterpsichorean mayisinglass beclung butdisdainful thenorthernmost acochineal !wells notambrosia ,command !weyerhauser notcosh itacrimony aobservation thekraut itvernal somehanoi notnegligee someattitude some -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1793 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image151.gif Type: image/gif Size: 21482 bytes Desc: not available URL: From dave at farber.net Sun Mar 5 13:01:50 2006 From: dave at farber.net (Dave Farber) Date: Sun, 05 Mar 2006 16:01:50 -0500 Subject: [IP] an Orwellian future Message-ID: -------- Original Message -------- Subject: For IP Date: Sun, 05 Mar 2006 13:08:29 -0700 From: Donald Dulchinos To: Dave Farber Not sure if this is quite right for IP, but as I watch the back and forth on IP especially around privacy and security issues, I understand the nature of public policy is such that arguments must be narrowly framed in a for and against manner. But there are larger societal and technological trends that seem to overwhelm some of the arguments. I've started a web site around the ideas in my new book, Neurosphere (www.neurosphere.org) which might be of interest to some here. An excerpt from the book follows... bb&The war on terrorism as proclaimed by President Bush is the incipient form of conflict within a neurosphere, not across borders but within the skin of a single global entity. The war will not be confined to Afghanistan, or Iraq, or any small collection of countries. The Al Qaeda network is said to operate within more than 60 countries. It is a stunning fact that they operated most successfully in Florida, a state it will be hard for Mr. Bush to declare war upon. And it seems increasingly clear, after 5 years of war, that the supply of fresh recruits to the terrorist cause will continue to grow. So how do you find and defeat this enemy within? On one front of the war, Richard Clarke, cyberspace security adviser to the President War, says bWe must secure our cyberspace from a range of possible threats.b But how does one secure an asset whose value comes precisely, like airline travel, from its openness and ubiquity? An asset whose value, says Bob Metcalfebs network effect, increases exponentially with the number of computers, of conscious nodes, connected to it? The Panopticon, the surveillance technology of the 21st century (yet a word coined in the 19th), is about to be unleashed without the niceties of protected civil liberties or the illusion of privacy. This will mean that someone could be watching you, but also that you will be watching everyone. For every knee jerk libertarian encrypting his banal emails there is a webcam exhibitionist begging you to look and see. We can run but we canbt hide, and perhaps we shouldnbt try. The march of technology is inexorable. It is in human nature. And for those who scoff at the idea of universal access and point to the majority of the world still without electricity, let alone Net access, I would point out the ability of the poorest desert nomad to get hold of Kalishnikov technology all too easily. And that is where history comes in...b Don Dulchinos www.neurosphere.org ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ktoun at cu.edu.tr Sun Mar 5 16:14:22 2006 From: ktoun at cu.edu.tr (Carmen M. Russell) Date: Sun, 05 Mar 2006 16:14:22 -0800 Subject: dubitable duplicable not gargantuan Message-ID: <097643.0845876956009.320054495409.VJON.8154@ambulatory> shrimp mayhell ondoesn't tryrevocable buthemosiderin somehistoric tryhavilland itautomate seecounterpoise or emergent injohnsen thealpine intousle butearthmove mayzomba ,astronomer nothatch !thesis inlombardy andcrusade maydiode !mcconnell orpitman may -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1776 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image733.gif Type: image/gif Size: 11045 bytes Desc: not available URL: From eugen at leitl.org Sun Mar 5 14:01:34 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Mar 2006 23:01:34 +0100 Subject: [dave@farber.net: [IP] an Orwellian future] Message-ID: <20060305220134.GC25017@leitl.org> ----- Forwarded message from Dave Farber ----- From LauraStevens at toolcity.net Sun Mar 5 17:39:47 2006 From: LauraStevens at toolcity.net (Luke Holden) Date: Mon, 06 Mar 2006 04:39:47 +0300 Subject: Fwd: The Gravitizer - Sex experiance like nothing else! Message-ID: blowgun and an expendable missile arrow, stone, quarrel, dart. You are not screen. In so doing, they discovered usd 70000, the password for Hamburger I don't get it. Christ is not coming back, he's very dead. There is no god, ZETA RETICULI GREYS SMALL Zeta Reticuli Greys come from Zeta Reticulan, near -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 968 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: advert.gif Type: image/gif Size: 17151 bytes Desc: not available URL: From rosaleen.wainwright at gmx.net Sun Mar 5 23:17:24 2006 From: rosaleen.wainwright at gmx.net (Brain Coon) Date: Mon, 6 Mar 2006 08:17:24 +0100 Subject: Want to live forever? Message-ID: <200603060914.k269Euhp017593@proton.jfet.org> After the age of twenty-one, your body slowly stops releasing an important hormone known as HGH (Human Growth Hormone). The reduction of HGH, which regulates levels of other hormones in the body (including testosterone, estrogen, progesterone, and melatonin) is directly responsible for many of the most common signs of growing old, such as wrinkles, gray hair, decreased energy, and diminished sexual function. Human Growth Hormone will normally yield the following results: - Boost your immune system - Rejuvenate your body and mind - Feel & look younger - Reduce wrinkles, lose weight, decrease cellulite - Restore your sex drive and vigor - Revitalize your heart, liver, kidneys & lungs - Maintain muscle mass - Refresh memory, mood and mental energy - Sleep soundly and awake rested - Help eliminate stress, fatigue and depression http://ehcfimadgl.mentalnew.info/?bjkadglxwqowyehzhghcfim From ralph.sierra at erols.com Mon Mar 6 09:37:01 2006 From: ralph.sierra at erols.com (Ralph Sierra) Date: March 6, 2006 9:37:01 AM EST Subject: Pentagon Targets Blogs Message-ID: In what may be the understatement of the year, the Pentagon includes the warning that their actions may "sound ominous." Not only are we paying to have favorable stories planted in foreign newspapers, but now we're employing professionals to post information to blogs. Question: Do you suppose when they blog they identify themselves as paid Pentagon informants? "Pentagon Targets Blogs "A new U.S. Central Command team, according to a news release, "contacts bloggers to inform the writers about any given topic that may have been posted on their site. . . . The team engages bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information." "While that may sound ominous, the release says the unit works with more than 250 bloggers "to try to disseminate news about the good work being done by U.S. forces in the global war on terror." This, says Army Reserve Maj. Richard Norton, has a "viral effect" that drives Web users to CentCom's Web site. The team's motto: "Engage." http://www.washingtonpost.com/wp-dyn/content/article/2006/03/05/AR20060305011 90.html Ralph Sierra ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Mon Mar 6 07:04:28 2006 From: dave at farber.net (David Farber) Date: Mon, 6 Mar 2006 10:04:28 -0500 Subject: [IP] Pentagon Targets Blogs Message-ID: Begin forwarded message: From coderman at gmail.com Mon Mar 6 10:31:06 2006 From: coderman at gmail.com (coderman) Date: Mon, 6 Mar 2006 10:31:06 -0800 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) Message-ID: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> mmm, virtual machines... """ Some time before Christmas, a project was started. The task was to enhance an existing LiveCD solution with User-mode Linux. A number of requirements was stated, where the greatest challenge was to fit 10 virtual routers within an old no-name PC with only 256MB Ram. ... With this solution, students taking CCNA/CCNP level studies can have their own router lab on a bootable CD... The student can set up a virtual network of 10 routers or hosts, and exercise BGP, OSPF, ISIS and RIP routing. """ POLL: how many of you cypherpunks have a padlock enabled core at your disposal (C5P, C5J or +)? anyone who will have one within the next two months (if not now)? ---------- Forwarded message ---------- From: James Morris Date: Mar 6, 2006 8:52 AM Subject: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) To: netdev at vger.kernel.org This looks potentially useful for network development. ---------- Forwarded message ---------- Date: Mon, 06 Mar 2006 17:06:11 +0100 From: Rickard Borgmdster To: xen-devel at lists.xensource.com Subject: [Xen-devel] Announce of our Xen project; Routing simulation with Einar Hello all, Some time before Christmas, a project was started. The task was to enhance an existing LiveCD solution with User-mode Linux. A number of requirements was stated, where the greatest challenge was to fit 10 virtual routers within an old no-name PC with only 256MB Ram. And the solution must still be run from a LiveCD. Thanks to Xen, the task was possible to complete. -But, what does it do? With this solution, students taking CCNA/CCNP level studies can have their own router lab on a bootable CD. No need for expensive equipment. The student can set up a virtual network of 10 routers or hosts, and exercise BGP, OSPF, ISIS and RIP routing. The routing software is Quagga, whose interface is very similar to Ciscos native CLI. Feel free to download our first Release Candidate at the project website; http://www.isk.kth.se/proj/qroutix/ Please note that the name "Qroutix" isn't ment for the final product. We're currently phasing over to the new name, which will impact the URL eventually. If the abobe link doesn't work, please try: http://www.isk.kth.se/proj/einar/ Don't hesitate to mail me or Anders feedback if you like (or dislike) our project. Best regards Rickard Borgmdster _______________________________________________ Xen-devel mailing list Xen-devel at lists.xensource.com http://lists.xensource.com/xen-devel - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html From coderman at gmail.com Mon Mar 6 10:51:13 2006 From: coderman at gmail.com (coderman) Date: Mon, 6 Mar 2006 10:51:13 -0800 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <20060306184315.GZ25017@leitl.org> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> Message-ID: <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> On 3/6/06, Eugen Leitl wrote: > ... > Here -- only RNG support, however. No AES yet. I'm waiting > for C7. thanks; i'd be curious about general availability of the C5XL / single hw entropy source mainboards as well. (this board at least provides enough entropy for robust keying, even if ciphers and digests in software are a bit slow at ~1Ghz) > Will Esther at all ship in two months? i'm not sure and i'm not too optimistic; some people do have limited/dev C5J boards to play with though... i reallly want to get my hands on an armful of nano-itx esther systems. :P From dave at farber.net Mon Mar 6 13:09:30 2006 From: dave at farber.net (David Farber) Date: Mon, 06 Mar 2006 16:09:30 -0500 Subject: [IP] NJ Bill Would Prohibit Anonymous Posts on Forums] Message-ID: -------- Original Message -------- Subject: NJ Bill Would Prohibit Anonymous Posts on Forums Date: Mon, 06 Mar 2006 15:22:15 -0500 (EST) From: Lynn To: dave at farber.net http://yro.slashdot.org/yro/06/03/06/1736234.shtml NJ Bill Would Prohibit Anonymous Posts on Forums Posted by ScuttleMonkey on Monday March 06, @02:06PM from the glad-we're-not-in-nj dept. Privacy The Internet An anonymous reader writes "The New Jersey legislature is considering a bill that would require operators of public forums to collect users' legal names and addresses, and effectively disallow anonymous speech on online forums. This raises some serious issues, such as to what extent local and state governments can go in enacting and enforcing Internet legislation." link to proposed bill: http://www.njleg.state.nj.us/2006/Bills/A1500/1327_I1.HTM ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Mon Mar 6 07:14:12 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Mar 2006 16:14:12 +0100 Subject: [dave@farber.net: [IP] Pentagon Targets Blogs] Message-ID: <20060306151412.GQ25017@leitl.org> ----- Forwarded message from David Farber ----- From coderman at gmail.com Mon Mar 6 18:11:11 2006 From: coderman at gmail.com (coderman) Date: Mon, 6 Mar 2006 18:11:11 -0800 Subject: wars of attrition Message-ID: <4ef5fec60603061811p13039ab1i1349fc9bd25b82d4@mail.gmail.com> hey, at least the cypherpunks aren't mentioned! *grin* [small blessings for a nearly defunct and moribund list perhaps...] let's get this thought crime party started! favorite quote: """ I turned the letter over to my lawyer and told him to send the following message to the feds: Fuck you. Strong letter to follow. """ (so how much of this is actually documented and blatantly intimidating versus journalistic 'emphasis' with passion?) ---cut--- http://www.capitolhillblue.com/blog/2006/03/bush_declares_war_on_freedom_o.html Bush declares war on freedom of the press March 6, 2006 07:44 AM / The Rant . By DOUG THOMPSON Using many of the questionable surveillance and monitoring techniques that brought both questions and criticism to his administration, President George W. Bush has launched a war against reporters who write stories unfavorable to his actions and is planning to prosecute journalists to make examples of them in his "war on terrorism." Bush recently directed Attorney General Alberto Gonzales to use "whatever means at your disposal" to wiretap, follow, harass and investigate journalists who have published stories about the administration's illegal use of warrantless wiretaps, use of faulty intelligence and anything else he deems "detrimental to the war on terror." Reporters for The New York Times, which along with Capitol Hill Blue revealed use of the National Security Agency to monitor phone calls and emails of Americans, say FBI agents have interviewed them and criminal prosecutors at the Justice Department admit they are laying "the groundwork for a grand jury that could lead to criminal charges," CIA Director Porter Goss told Congress recently that "it is my aim and it is my hope that we will witness a grand jury investigation with reporters present being asked to reveal who is leaking this information. I believe the safety of this nation and the people of this country deserve nothing less." As part of the investigation, the Justice Department, Department of Homeland Security and the National Security Agency are wiretapping reporters' phones, following journalists on a daily basis, searching their homes and offices under a USA Patriot Act provision that allows "secret and undisclosed searches" and pouring over financial and travel records of hundreds of Washington-based reporters. Spokesmen for the Justice Department and Department of Homeland Security admit there are "ongoing investigations" regarding publication of stories "involving threats to national security" but will not reveal what those investigations include. In addition to using the USA Patriot Act to pry into the lives of journalists, the Justice Department has also dusted off a pre-World War I law to prosecute people who receive classified information, although the law was aimed at military personnel not civilians. "This is the first administration that I can remember, including Nixon's, that said we need to think about a law that would put journalists who print national security things up in front of grand juries and put them in jail if they don't reveal their sources," says David Gergen, who served as President Regan's director of communication and also worked in the Nixon and Ford White Houses. Political scientist George Harleigh, who worked in the Nixon administration, says such use of federal law enforcement authority was illegal when Nixon tried it and still so today. "We're talking about a basic violation of the Constitutional guarantee of a free press as well as a violation of the rights of privacy of American citizens," Harleigh says. "I had hoped we would have learned our lessons from the Nixon era. Sadly, it appears we have not." In recent weeks, the FBI has issued hundreds of "National Security Letters," directing employers, banks, credit card companies, libraries and other entities to turn over records on reporters. Under the USA Patriot Act, those who must turn over the records are also prohibited from revealing they have done so to the subject of the federal probes. "The significance of this cannot be overstated," says prominent New York litigator Glenn Greenwald. "In essence, while the President sits in the White House undisturbed after proudly announcing that he has been breaking the law and will continue to do so, his slavish political appointees at the Justice Department are using the mammoth law enforcement powers of the federal government to find and criminally prosecute those who brought this illegal conduct to light. "This flamboyant use of the forces of criminal prosecution to threaten whistle-blowers and intimidate journalists are nothing more than the naked tactics of street thugs and authoritarian juntas." Just how widespread, and uncontrolled, this latest government assault has become hit close to home last week when one of the FBI's National Security Letters arrived at the company that hosts the servers for this web site, Capitol Hill Blue. The letter demanded traffic data, payment records and other information about the web site along with information on me, the publisher. Now that's a problem. I own the company that hosts Capitol Hill Blue. So, in effect, the feds want me to turn over information on myself and not tell myself that I'm doing it. You'd think they'd know better. I turned the letter over to my lawyer and told him to send the following message to the feds: Fuck you. Strong letter to follow. ---end-cut--- From coderman at gmail.com Mon Mar 6 18:33:13 2006 From: coderman at gmail.com (coderman) Date: Mon, 6 Mar 2006 18:33:13 -0800 Subject: wars of attrition (msnbc? that's a little unusual!) Message-ID: <4ef5fec60603061833gc1fb197k8a1f1dce3b4995d3@mail.gmail.com> On 3/6/06, coderman wrote: > hey, at least the cypherpunks aren't mentioned! *grin* sorry, my humor is lacking; this list is a few hundred KSLOC from being any kind of threat. KE KE KE... > Bush declares war on freedom of the press > March 6, 2006 07:44 AM / The Rant . looks like this hit msnbc?? favorite quotes: """ ... the Justice Department is aggressively trying to identify the sources for two explosive news stories: the existence of secret Central Intelligence Agency prisons in eastern Europe, and the National Security Agency's domestic surveillance programme... "When you have more and more information being classified, and more and more secrets being kept, the only way reporters can get information is when internal whistleblowers provide it. And that drives this administration crazy," says Lucy Dalglish, executive director of the Reporters Committee for Freedom of the Press. In the first four years of the administration, the volume of classified documents barred from public distribution nearly doubled to close to 16m annually. Over the same time, declassification of documents has slowed to a trickle. """ ---cut--- http://msnbc.msn.com/id/11700805/ White House steps up effort to halt flow of secrets By Edward Alden in Washington Financial Times Updated: 9:12 p.m. ET March 6, 2006 The administration of President George W. Bush is mounting an unprecedented effort to crack down on leaks of government secrets, even as it is vastly expanding the range of information deemed too sensitive to share with the public. That twin effort has raised fears that the White House may succeed in shutting off the flow of such information by threatening to jail those who leak secrets and those who receive them. The issue has come to a head in the government's efforts to prosecute two pro-Israeli lobbyists for receiving classified information from a Pentagon official. Larry Franklin, the official, was sentenced to 12 years in prison in January, and the lobbyists  Steven Rosen and Keith Weissman of the American Israel Public Affairs Committee  are to go on trial next month. Many see the case, which relies on a novel interpretation of a 90-year-old espionage law, as a test of whether the administration can exercise new powers to shut off leaks that have been severely embarrassing to the White House. In particular, the Justice Department is aggressively trying to identify the sources for two explosive news stories: the existence of secret Central Intelligence Agency prisons in eastern Europe, and the National Security Agency's domestic surveillance programme. The Washington Post reported at the weekend that dozens of officials from both agencies had been questioned recently by the FBI in the leak investigations. "When you have more and more information being classified, and more and more secrets being kept, the only way reporters can get information is when internal whistleblowers provide it. And that drives this administration crazy," says Lucy Dalglish, executive director of the Reporters Committee for Freedom of the Press. Since the September 11 attacks, the administration has vastly expanded the range of information deemed secret, ranging from the serious  such as the NSA spying programme  to the seemingly trivial. It has begun withholding, for instance, the names and telephone numbers of many government officials, making it more difficult for reporters and others to track down knowledgeable sources. In the first four years of the administration, the volume of classified documents barred from public distribution nearly doubled to close to 16m annually. Over the same time, declassification of documents has slowed to a trickle. Porter Goss, director of the Central Intelligence Agency, warned in a Senate hearing last month that leaks had caused "severe damage" to his agency. "It is my aim and it is my hope that we will witness a grand jury investigation, with reporters present, being asked to reveal who is leaking this information," he said. That threat is the main reason the prosecution of Mr Rosen and Mr Weissman has caused such concern. The two are accused of discussing with Mr Franklin a classified draft memorandum regarding US policy towards Iran. In a court memorandum filed in support of the lobbyists, a former Justice Department official, Viet Dinh  chief architect of the Patriot Act  argued that the prosecution would have a chilling effect on debate over national security issues. "Until now, no administration has attempted to address what it may perceive as annoying or premature 'leaks' by criminalising the receipt and use of unsolicited oral information obtained as part of the lobbying or reporting process," he wrote. The government's effort, he said, would in effect "create some type of official secrets act through the prosecution of a test case against two individuals who were engaged in a practice that defines foreign policy lobbying  the sharing of information  in which lobbyists and members of the press engage every day." The US has long resisted adopting a British-style Official Secrets Act. But support for the idea is growing. In 2000, President Bill Clinton vetoed legislation passed by the Republican Congress that would have criminalised unauthorised leaks of classified information, though even that bill would not have made the receipt of such information a crime. The Republican chairmen of both the Senate and House intelligence committees have said recently they might make another effort to pass such legislation. Critics say the obsession with leaks is absurd because top White House officials have been at the forefront of leaking the most sensitive classified information. For instance, Lewis "Scooter" Libby, the former chief of staff to Vice-President Dick Cheney who faces perjury charges in the Valerie Plame case, has said in his defence that Mr Cheney authorised him to discuss with some reporters the CIA's classified 2002 National Intelligence Estimate (NIE) on Iraq's weapons programmes in the run-up to the Iraq war. Newspaper stories based on the false claims in the NIE that Iraq possessed chemical and biological weapons, and was developing nuclear arms, helped build US public support for invading Iraq. In a television interview last month, Mr Cheney said he had the power to declassify such information, citing an executive order signed by the president. This is precisely why the system for classifying secrets is open to abuse, according to Thomas Blanton, director of the National Security Archive, which presses for declassification of information. "The fact is that most of the leaks that take place are coming from very high-ranking officials, up to and including the president." The crackdown on leaks, he said, was a result of White House anger that mid-level officials were "in open revolt" against policies. "The top officials can't tell the real secrets from the embarrassments, and they are reacting to the embarrassments," he said. "It destroys the credibility we need to maintain the real secrets." Copyright The Financial Times Ltd. All rights reserved. --end-cut--- From eugen at leitl.org Mon Mar 6 10:43:15 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Mar 2006 19:43:15 +0100 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> Message-ID: <20060306184315.GZ25017@leitl.org> On Mon, Mar 06, 2006 at 10:31:06AM -0800, coderman wrote: > POLL: > how many of you cypherpunks have a padlock enabled core at your > disposal (C5P, C5J or +)? Here -- only RNG support, however. No AES yet. I'm waiting for C7. > anyone who will have one within the next two months (if not now)? Will Esther at all ship in two months? -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From demonfighter at gmail.com Mon Mar 6 17:39:33 2006 From: demonfighter at gmail.com (Steve Furlong) Date: Mon, 6 Mar 2006 20:39:33 -0500 Subject: [dave@farber.net: [IP] NJ Bill Would Prohibit Anonymous Posts on Forums]] In-Reply-To: <20060306211105.GD25017@leitl.org> References: <20060306211105.GD25017@leitl.org> Message-ID: <200603062039.33404.demonfighter@gmail.com> > An anonymous reader writes "The New Jersey legislature is considering a > bill that would require operators of public forums to collect users' legal > names and addresses, and effectively disallow anonymous speech on online > forums. This raises some serious issues, such as to what extent local and > state governments can go in enacting and enforcing Internet legislation." As well as serious First Amendment issues regarding political speech, the most highly protected of all in the US. Of course, with the national and state executives continually attempting to grab more power, legislators willing to cede responsibility to the Supremes, and a good chunk of the Supremes believing in a living Constitution, that protection ain't what it used to be. But for those with the ability to use it, strong crypto provides comfort where faith in our fellow man lets us down. From eugen at leitl.org Mon Mar 6 13:11:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Mar 2006 22:11:05 +0100 Subject: [dave@farber.net: [IP] NJ Bill Would Prohibit Anonymous Posts on Forums]] Message-ID: <20060306211105.GD25017@leitl.org> ----- Forwarded message from David Farber ----- From declan at well.com Mon Mar 6 23:45:48 2006 From: declan at well.com (Declan McCullagh) Date: Mon, 06 Mar 2006 23:45:48 -0800 Subject: [Politech] SMS 007 aims to protect cell phone SMS messages [priv] Message-ID: [Thanks for sending this along, Marian! It looks like a useful project. --Declan] -------- Original Message -------- Subject: Politech submission Date: Mon, 06 Mar 2006 17:00:00 +0100 From: Marian Kechlibar To: declan at well.com Hello Declan, I have some news that could be interesting for you and for your readers. It is about software that can protect wireless messaging from wiretap / eavesdrop etc. Its name is SMS 007 and it has been developed by Czech company CircleTech, s.r.o. (I am one of the two co-founders). It is a Java (J2ME) software which runs on almost all current phone models. It uses AES symmetric cipher and user-chosen keys to encrypt the SMS messages. It also has some other security features, like a secret contact list, which cannot be viewed from the outside of the application. The encryption used ensures that wiretapping entities (operators, law enforcement, maffia, anyone) cannot get to the plaintext of the message. Also data stored by the program in the phone are protected by encryption, so stealing the phone and examining it for data does not help the adversary either - unless the user selects a bad main password. SMS 007 has been available to Czech customers for 5 months, but has gone international only very recently (February 24, 2006), when Nokia Softwaremarket agreed to resell it online. Links: http://www.sms007.cz - the product webpages http://www.circletech.net - the corporate webpages http://www.praguepost.com/P03/2005/Art/1201/news2.php - an article in The Prague Post by Kristina Alda http://www.softwaremarket.nokia.com/?product_detail_s60.html&itmId=1612&pID=1 102&pmsid=33 - Nokia Softwaremarket, including the Users manual Yours Marian _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From declan at well.com Mon Mar 6 23:57:43 2006 From: declan at well.com (Declan McCullagh) Date: Mon, 06 Mar 2006 23:57:43 -0800 Subject: [Politech] Two new bills in Congress: Net neutrality, audio broadcast flag [ip] Message-ID: News article: http://news.com.com/2100-1028_3-6045225.html "Digital radio receivers without government-approved copy-prevention technology likely would become illegal to sell in the future, according to new federal legislation announced Thursday." Bill text: http://www.politechbot.com/docs/ferguson.audio.flag.bill.030206.pdf News article: http://news.com.com/2100-1028_3-6045330.html "Network operators would be barred from blocking or degrading Internet connections and favoring those of companies that pay for peppier access, according to a Senate bill introduced Thursday." Bill text: http://www.politechbot.com/docs/wyden.net.neutrality.bill.030206.pdf -Declan _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From udhay at pobox.com Tue Mar 7 01:09:57 2006 From: udhay at pobox.com (Udhay Shankar N) Date: Tue, 7 Mar 2006 01:09:57 -0800 (PST) Subject: [silk] Radioactive blood Message-ID: http://www.courant.com/hc-radiation0303.artmar03,0,2607541.story Radar Didn't Get Her; Radiation Did March 3, 2006 By TRACY GORDON FOX, Courant Staff Writer The large, black SUV passed the woman on the left, abruptly slowed down, and then dropped behind her. Suddenly, flashing red and blue lights lit up her rearview mirror. "Ma'am, you were pulled over because you set off a nuclear radioactive alarm," a man dressed in a blue jumpsuit-type uniform and a baseball cap said in a monotone. It sounds like a scene from the movie "Men in Black." A select group of state troopers and inspectors from the state Department of Motor Vehicles now wear ultra-sensitive, portable radiation detectors on their belts to check for dangerous materials inside large trucks. But the 45-year-old Suffield woman wasn't hauling nuclear waste. She had been injected with a radioactive substance for a common medical test. Relieved to have completed a series of stress tests on her heart on Feb. 23, the woman was heading home, seatbelt on, and cruising at the 65 mph speed limit on I-91 north. Inspectors in the SUV were on a routine assignment when the device started beeping and they homed in on the woman's car. The woman, who asked not to be identified, wasn't angry about being stopped, nor particularly inconvenienced, but baffled as to how police detected radiation from a substance injected into her body hours earlier. The pager-size devices are so new to Connecticut law enforcement that even state homeland security officials and top state police were at first perplexed by the woman's story. "I've never heard of this being done in my entire life," James Thomas, commissioner of the state Office of Emergency Management and Homeland Security, said Wednesday. On Thursday, he called Public Safety Commissioner Leonard C. Boyle, who also did not know that radiation could be detected in a moving vehicle. "I was surprised and did not expect that these devices could detect radiological activity in a moving car," Boyle said. Both men said they knew that radiation testing is regularly done at truck stops. Edward Wilds, director for the division of radiation at the state Department of Environmental Protection, solved the mystery. Wilds said Thursday that he was consulted on the purchase of the device. He said DEP workers have carried them for a while to detect radiation at scenes involving biological hazards. The state purchased 50 of the "radiological pagers," dividing them between the state police and the DMV, said Bill Seymour, a DMV spokesman. Seymour confirmed Thursday that a motor vehicle inspector pulled over the woman. "When these things go off, they have an obligation to check it out," he said. Seymour said the inspector, who has full police powers, identified himself as being from the DMV and that his truck was marked with the agency's insignia. "These are very sensitive devices," Seymour said, adding that some officers have reported them going off in buildings "because someone in the next room on the other side of the wall had a stress test." Doctors said they have heard of radiation sensors going off at nuclear plants after patients have had stress tests, but not along highways. "It is certainly conceivable," said Dr. Bernard Clark, chairman of the department of medicine and associate chief of cardiology at St. Francis Hospital and Medical Center in Hartford. "The glass and steel of a car wouldn't stop it, if they have an extremely sensitive indicator or detector." In stress tests, which monitor a patient's heart at rest and during activity, technetium and Cardiolite are injected. Cardiolite is a substance that helps move technetium, a radioactive isotope, to the heart muscle, allowing doctors to look at how the blood flows to it, Clark said. The substance has a half-life of about six hours, and then starts to dissipate, he said. "These are very safe agents," he said, adding that they are also used to scan other organs. The woman said she quickly explained to the officer that she had just undergone a medical procedure that involved a radioactive substance. She had to sign a bunch of forms that explained the risks. The officer seemed satisfied by her answer, and said, " `That's usually what it is,' " she said. He asked for her license and registration, and returned to her car a short time later. "Nobody at my doctor's office warned me this could happen," the woman said she told the officer. "He said, `That's because they don't know.' " She drove home and called her husband, who works for the state, telling him her strange story. Although she is glad someone is monitoring radioactivity in the state, the woman said she feels a little violated. "I was pulled over because of something in my bloodstream," she said. "There are [federal privacy laws], and I pretty much had to tell him I had a medical test. I was going to say, `none of your business why I'm radioactive.' But that wouldn't have gotten me that far." Clark said he assumes there will be a higher level of vigilance for radioactive material in the aftermath of the Sept. 11 terrorist attacks. "You figure on the interstate highways people are going to ship things that shouldn't be shipped," the doctor said. "Most people aren't radioactive. If they are, you'd probably want to know why. Are you carrying weapons grade plutonium, or did you just get a stress test?" ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From gcyhs at commonwealth-properties.com Tue Mar 7 05:01:11 2006 From: gcyhs at commonwealth-properties.com (Tamika K. Sherwood) Date: Tue, 07 Mar 2006 05:01:11 -0800 Subject: Your invitation Message-ID: <423515.2058143161080.688100952690.ODLX.4153@doubleday> away oneuripides bestature itluxuriate asquirt ontanh seecovariate inbragging bedavison orhardy !cryptographer try layton butsand somepathogenesis theanalogous orsnapdragon onvictual onvienna bedole seebagpipe itdangerous itgasohol !ferric ,fifteen ,blare inmuscular orrudder notcodomain andmilk !alcohol acease it'stoolkit !cleanup andcitroen onindent try -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1781 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image341.gif Type: image/gif Size: 8862 bytes Desc: not available URL: From dave at farber.net Tue Mar 7 06:00:50 2006 From: dave at farber.net (David Farber) Date: Tue, 07 Mar 2006 09:00:50 -0500 Subject: [IP] Websites blocked by political stripes for Marines in Iraq?] Message-ID: -------- Original Message -------- Subject: Websites blocked by political stripes for Marines in Iraq? Date: Tue, 07 Mar 2006 07:13:28 -0500 From: Barry Ritholtz To: David Farber Hey Dave, I know you prefer to keep things tech focused, rather than political. But then how do we classify this bit of selective internet filtering: Websites blocked by political stripes for Marines in Iraq? Snip from an email sent by an anonymous US Marine to Wonkette: Unfortunately anonomizers don't work out here (never have). Anyway, I had a few minutes today and thought I'd look and see what else was banned on the Marine web here. I think the results speak for themselves: * Wonkette b bForbidden, this page (http://www.wonkette.com/) is categorized as: Forum/Bulletin Boards, Politics/Opinion.b * Bill ObReilly (www.billoreilly.com) b OK * Air America (www.airamericaradio.com) b bForbidden, this page (http://www.airamericaradio.com/) is categorized as: Internet Radio/ TV, Politics/Opinion.b * Rush Limbaugh (www.rushlimbaugh.com) b OK * ABC News bThe Noteb b OK * Website of the Al Franken Show (www.alfrankenshow.com) b bForbidden, this page (http://www.airamericaradio.com/) is categorized as: Internet Radio/TV, Politics/Opinion.b * G. Gordon Liddy Show (www.liddyshow.us) b OK * Don & Mike Show (www.donandmikewebsite.com) b bForbidden, this page (http://www.donandmikewebsite.com/) is categorized as: Profanity, Entertainment/Recreation/Hobbies.b If it wasn't so sad, it would be laughable. Litigation to follow . . . Wonkette via boingboing http://www.boingboing.net/2006/03/06/websites_blocked_by_.html http://wonkette.com/politics/wonkette/our-boys-need-gossip-158687.php Incidentally, Josh Marshall has been discussing what could be an illegal use of the Military for purely political events here: http:// www.talkingpointsmemo.com/archives/week_2006_03_05.php#007808 How can we avoid discussing politics when it seems to intrude everywhere? Barry L. Ritholtz ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Big Picture: Macro perspectives on the Capital Markets, Economy, and Geopolitics (with a dash of music and film thrown in!) http://bigpicture.typepad.com/ ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From schneider at geminimfg.com Tue Mar 7 08:07:58 2006 From: schneider at geminimfg.com (Francis Haywood) Date: Tue, 07 Mar 2006 10:07:58 -0600 Subject: Lowest rate approved Message-ID: <577i331k.6747716@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1185 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ineffectual.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From bob.quayle at ebay.sun.com Tue Mar 7 08:34:47 2006 From: bob.quayle at ebay.sun.com (Susan Lucero) Date: Tue, 07 Mar 2006 10:34:47 -0600 Subject: Urgent Notification #901907512809974683 Message-ID: <4.2.5.9.4.17033963157058.481a4380@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1153 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: clinician.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 7 01:43:41 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Mar 2006 10:43:41 +0100 Subject: [udhay@pobox.com: [silk] Radioactive blood] Message-ID: <20060307094341.GI25017@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From eugen at leitl.org Tue Mar 7 01:44:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Mar 2006 10:44:05 +0100 Subject: [declan@well.com: [Politech] Two new bills in Congress: Net neutrality, audio broadcast flag [ip]] Message-ID: <20060307094405.GJ25017@leitl.org> ----- Forwarded message from Declan McCullagh ----- From eugen at leitl.org Tue Mar 7 01:44:35 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Mar 2006 10:44:35 +0100 Subject: [declan@well.com: [Politech] SMS 007 aims to protect cell phone SMS messages [priv]] Message-ID: <20060307094435.GL25017@leitl.org> ----- Forwarded message from Declan McCullagh ----- From djpyx at aceparking.com Tue Mar 7 11:59:46 2006 From: djpyx at aceparking.com (Ian Q. Otero) Date: Tue, 07 Mar 2006 11:59:46 -0800 Subject: Stupid moron Message-ID: <935533.3143055810234.068931360503.CLDD.2143@rosenberg> drunk it'scrawford !barter inwield itmountainous insmooth !spectroscopy notdiscipline onbrahms some serendipity theawaken trycreek andform theextracellular maybray oncargill inpolarograph aacclamation intransport tryfret notallegra insevere someairflow it -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1778 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image305.gif Type: image/gif Size: 11045 bytes Desc: not available URL: From eva.keute at dresdner-bank.com Tue Mar 7 10:48:34 2006 From: eva.keute at dresdner-bank.com (Gregg Mcclure) Date: Tue, 07 Mar 2006 12:48:34 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <331r182q.4297956@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1209 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: fourier.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 7 06:27:56 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Mar 2006 15:27:56 +0100 Subject: [dave@farber.net: [IP] Websites blocked by political stripes for Marines in Iraq?]] Message-ID: <20060307142756.GB25017@leitl.org> ----- Forwarded message from David Farber ----- From camera_lumina at hotmail.com Tue Mar 7 13:40:30 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 07 Mar 2006 16:40:30 -0500 Subject: wars of attrition & reverse rubber hose In-Reply-To: <4ef5fec60603061811p13039ab1i1349fc9bd25b82d4@mail.gmail.com> Message-ID: One still wonders if a point-of-contact approach could work in some of these situations. As an example, how different would Nazi Germany have been if male Jews above 18 agreed to kill at least one nazi Soldier or obvious cooperator each? Likewise, any possibility of honey-potting and then baseballbatting the scumbags who are writing these letters? In other words, if the simple day-to-day employees (who don't have combat training) of these agencies knew they were taking their life into their hands by asking for such information, would this still be happening? Kind of a reverse-rubber-hose approach to democracy. -TD >From: coderman >To: cypherpunks at jfet.org >Subject: wars of attrition >Date: Mon, 6 Mar 2006 18:11:11 -0800 > >hey, at least the cypherpunks aren't mentioned! *grin* >[small blessings for a nearly defunct and moribund list perhaps...] > >let's get this thought crime party started! > >favorite quote: >""" >I turned the letter over to my lawyer and told him to send the >following message to the feds: > >Fuck you. Strong letter to follow. >""" > >(so how much of this is actually documented and blatantly intimidating >versus journalistic 'emphasis' with passion?) > >---cut--- >http://www.capitolhillblue.com/blog/2006/03/bush_declares_war_on_freedom_o.html > > Bush declares war on freedom of the press >March 6, 2006 07:44 AM / The Rant . > >By DOUG THOMPSON > >Using many of the questionable surveillance and monitoring techniques >that brought both questions and criticism to his administration, >President George W. Bush has launched a war against reporters who >write stories unfavorable to his actions and is planning to prosecute >journalists to make examples of them in his "war on terrorism." > >Bush recently directed Attorney General Alberto Gonzales to use >"whatever means at your disposal" to wiretap, follow, harass and >investigate journalists who have published stories about the >administration's illegal use of warrantless wiretaps, use of faulty >intelligence and anything else he deems "detrimental to the war on >terror." > >Reporters for The New York Times, which along with Capitol Hill Blue >revealed use of the National Security Agency to monitor phone calls >and emails of Americans, say FBI agents have interviewed them and >criminal prosecutors at the Justice Department admit they are laying >"the groundwork for a grand jury that could lead to criminal charges," > >CIA Director Porter Goss told Congress recently that "it is my aim and >it is my hope that we will witness a grand jury investigation with >reporters present being asked to reveal who is leaking this >information. I believe the safety of this nation and the people of >this country deserve nothing less." > >As part of the investigation, the Justice Department, Department of >Homeland Security and the National Security Agency are wiretapping >reporters' phones, following journalists on a daily basis, searching >their homes and offices under a USA Patriot Act provision that allows >"secret and undisclosed searches" and pouring over financial and >travel records of hundreds of Washington-based reporters. > >Spokesmen for the Justice Department and Department of Homeland >Security admit there are "ongoing investigations" regarding >publication of stories "involving threats to national security" but >will not reveal what those investigations include. > >In addition to using the USA Patriot Act to pry into the lives of >journalists, the Justice Department has also dusted off a pre-World >War I law to prosecute people who receive classified information, >although the law was aimed at military personnel not civilians. > >"This is the first administration that I can remember, including >Nixon's, that said we need to think about a law that would put >journalists who print national security things up in front of grand >juries and put them in jail if they don't reveal their sources," says >David Gergen, who served as President Regan's director of >communication and also worked in the Nixon and Ford White Houses. > >Political scientist George Harleigh, who worked in the Nixon >administration, says such use of federal law enforcement authority was >illegal when Nixon tried it and still so today. > >"We're talking about a basic violation of the Constitutional guarantee >of a free press as well as a violation of the rights of privacy of >American citizens," Harleigh says. "I had hoped we would have learned >our lessons from the Nixon era. Sadly, it appears we have not." > >In recent weeks, the FBI has issued hundreds of "National Security >Letters," directing employers, banks, credit card companies, libraries >and other entities to turn over records on reporters. Under the USA >Patriot Act, those who must turn over the records are also prohibited >from revealing they have done so to the subject of the federal probes. > >"The significance of this cannot be overstated," says prominent New >York litigator Glenn Greenwald. "In essence, while the President sits >in the White House undisturbed after proudly announcing that he has >been breaking the law and will continue to do so, his slavish >political appointees at the Justice Department are using the mammoth >law enforcement powers of the federal government to find and >criminally prosecute those who brought this illegal conduct to light. > >"This flamboyant use of the forces of criminal prosecution to threaten >whistle-blowers and intimidate journalists are nothing more than the >naked tactics of street thugs and authoritarian juntas." > >Just how widespread, and uncontrolled, this latest government assault >has become hit close to home last week when one of the FBI's National >Security Letters arrived at the company that hosts the servers for >this web site, Capitol Hill Blue. > >The letter demanded traffic data, payment records and other >information about the web site along with information on me, the >publisher. > >Now that's a problem. I own the company that hosts Capitol Hill Blue. >So, in effect, the feds want me to turn over information on myself and >not tell myself that I'm doing it. You'd think they'd know better. > >I turned the letter over to my lawyer and told him to send the >following message to the feds: > >Fuck you. Strong letter to follow. >---end-cut--- From terry at kostal.com Tue Mar 7 17:57:25 2006 From: terry at kostal.com (Valarie Lovett) Date: Tue, 07 Mar 2006 19:57:25 -0600 Subject: Lowest rate approved Message-ID: <227r693c.0198251@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1212 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: norwegian.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From majonez2 at go2.pl Tue Mar 7 18:00:53 2006 From: majonez2 at go2.pl (Cliff Darnell) Date: Tue, 07 Mar 2006 20:00:53 -0600 Subject: Lowest rate approved Message-ID: <8.3.2.3.6.60863189060989.134a0418@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1187 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cohosh.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From cunningham at kawaji.com Tue Mar 7 18:05:34 2006 From: cunningham at kawaji.com (Rhea Kessler) Date: Tue, 07 Mar 2006 20:05:34 -0600 Subject: Last chance for lower rates Message-ID: <6.9.5.7.7.19985248249075.820a7019@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1169 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: dew.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From measl at mfn.org Tue Mar 7 19:37:46 2006 From: measl at mfn.org (J.A. Terranson) Date: Tue, 7 Mar 2006 21:37:46 -0600 (CST) Subject: wars of attrition & reverse rubber hose In-Reply-To: References: Message-ID: <20060307213511.G52713@ubzr.zsa.bet> On Tue, 7 Mar 2006, Tyler Durden wrote: > In other words, if the simple day-to-day employees (who don't have combat > training) of these agencies knew they were taking their life into their > hands by asking for such information, would this still be happening? No, it would not. But then, this is the United States, land of the "Big Fucking Mouth" - not the "Land Of Action" we so desperately want to be perceived as. Since the real chances of the populace "rising up" is just shy of zero, don't go looking for changes any time soon. Or, for that matter, any time in the far future either. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From hastings at larkinctr.com Tue Mar 7 21:15:55 2006 From: hastings at larkinctr.com (Muriel Parr) Date: Tue, 07 Mar 2006 23:15:55 -0600 Subject: Urgent Notification #3136529765794120781 Message-ID: <7.4.0.8.8.66037800461285.101a4757@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1210 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: vernacular.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From safetell_syd865 at jarbo.com Tue Mar 7 21:40:02 2006 From: safetell_syd865 at jarbo.com (Ashley Egan) Date: Tue, 07 Mar 2006 23:40:02 -0600 Subject: Ratess will skyrocket soon Message-ID: <39523515684792.7OqS5W3ZLA@deliquesce> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1193 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: address.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From coderman at gmail.com Wed Mar 8 10:21:32 2006 From: coderman at gmail.com (coderman) Date: Wed, 8 Mar 2006 10:21:32 -0800 Subject: wars of attrition & reverse rubber hose & the ineffectiveness of direct lethal violence against the state Message-ID: <4ef5fec60603081021u7f9f4085pb39530fe9c7b1838@mail.gmail.com> On 3/8/06, Tyler Durden wrote: > ... > ON THE OTHER HAND, one does't need huge numbers of people wielding baseball > bats... i like to think you don't need any bats at all; waging direct lethal violence against the largest and best equipped military in the world (esp. adding up police, swat, n.guard, military, etc) fuels their propaganda machine and gets you crushed like an ant under foot. bomb throwers and assassins get no sympathy from the public no matter justified your perceived grievances. cutting at the heart of this nation-scale responsibility diffusion machine requires taxing communication and commerce engines which make its very existence possible. this tax is applied in the form of continued and targeted infrastructure disruption against those entities which are refusing and deflecting oversight and accountability for their actions, and all those who serve them directly or indirectly. punks with portable saws and thermic lances slicing fiber and junking equipment is much more palatable to the public when used against entities already perceived unpopular and abusive to fundamental rights. we've already talked about data mining and critical infrastructure analysis to direct such attacks in the most effective manner possible. although somehow i think this will get you a more severe response than killing random yes men (despite the fact this is limited to property damage alone). hmmm, the information required to organize such efforts would be a good fit for the blacknet. From camera_lumina at hotmail.com Wed Mar 8 07:49:08 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 08 Mar 2006 10:49:08 -0500 Subject: wars of attrition & reverse rubber hose In-Reply-To: <20060307213511.G52713@ubzr.zsa.bet> Message-ID: Ain't that the truth. Even the militia and white-supremist groups seem completely useless, as usual (every now and then I wonder if such groups aren't a deliberate creation to divert dissaffected white people's attention). ON THE OTHER HAND, one does't need huge numbers of people wielding baseball bats...there're probably a small number of paper-pushers that file or serve certain papers or otherwise interact with the outside world. All one would need is a few dozen incidents applied at the correct interface to greatly inhibit things... -TD >From: "J.A. Terranson" >To: Tyler Durden >CC: coderman at gmail.com, cypherpunks at jfet.org >Subject: Re: wars of attrition & reverse rubber hose >Date: Tue, 7 Mar 2006 21:37:46 -0600 (CST) > >On Tue, 7 Mar 2006, Tyler Durden wrote: > > > In other words, if the simple day-to-day employees (who don't have >combat > > training) of these agencies knew they were taking their life into their > > hands by asking for such information, would this still be happening? > >No, it would not. But then, this is the United States, land of the "Big >Fucking Mouth" - not the "Land Of Action" we so desperately want to be >perceived as. > >Since the real chances of the populace "rising up" is just shy of zero, >don't go looking for changes any time soon. Or, for that matter, any time >in the far future either. > >-- >Yours, > >J.A. Terranson >sysadmin at mfn.org >0xBD4A95BF > > >'The right of self defence is the first law of nature: in most governments >it has been the study of rulers to confine this right within the narrowest >limits possible. Wherever standing armies are kept up, and the right of >the people to keep and bear arms is, under any colour or pretext >whatsoever, prohibited, liberty, if not already annihilated, is on the >brink of destruction.' > >St. George Tucker From coderman at gmail.com Wed Mar 8 11:21:50 2006 From: coderman at gmail.com (coderman) Date: Wed, 8 Mar 2006 11:21:50 -0800 Subject: Bush's Mysterious 'New Programs' Message-ID: <4ef5fec60603081121m45be82dcl8b45acdcb3505370@mail.gmail.com> maybe the new detention centers are for journalists of insufficient loyalty... [it's hard for me to be outraged or shocked by anything done by our leaders at this point, but massive detention center build-out for 'new programs' is raising the hair on the back of my neck.] """ "In the war against terrorists of global reach, as the Nation learned all too well on Sept. 11, 2001, the territory of the United States is part of the battlefield," Bush's lawyers argued in briefs to the federal courts. [Washington Post, July 19, 2005] Given Bush's now open assertions that he is using his "plenary" - or unlimited - powers as Commander in Chief for the duration of the indefinite War on Terror, Americans can no longer trust that their constitutional rights protect them from government actions. As former Vice President Al Gore asked after recounting a litany of sweeping powers that Bush has asserted to fight the War on Terror, "Can it be true that any President really has such powers under our Constitution? If the answer is 'yes,' then under the theory by which these acts are committed, are there any acts that can on their face be prohibited?" In such extraordinary circumstances, the American people might legitimately ask exactly what the Bush administration means by the "rapid development of new programs," which might require the construction of a new network of detention camps. """ --cut--- http://www.zmag.org/content/print_article.cfm?itemID=9869§ionID=104 Bush's Mysterious 'New Programs' by Nat Parry; Truthout ; March 08, 2006 Not that George W. Bush needs much encouragement, but Sen. Lindsey Graham suggested to Attorney General Alberto Gonzales a new target for the administration's domestic operations - Fifth Columnists, supposedly disloyal Americans who sympathize and collaborate with the enemy. "The administration has not only the right, but the duty, in my opinion, to pursue Fifth Column movements," Graham, R-S.C., told Gonzales during Senate Judiciary Committee hearings on Feb. 6. "I stand by this President's ability, inherent to being Commander in Chief, to find out about Fifth Column movements, and I don't think you need a warrant to do that," Graham added, volunteering to work with the administration to draft guidelines for how best to neutralize this alleged threat. "Senator," a smiling Gonzales responded, "the President already said we'd be happy to listen to your ideas." In less paranoid times, Graham's comments might be viewed by many Americans as a Republican trying to have it both ways - ingratiating himself to an administration of his own party while seeking some credit from Washington centrists for suggesting Congress should have at least a tiny say in how Bush runs the War on Terror. But recent developments suggest that the Bush administration may already be contemplating what to do with Americans who are deemed insufficiently loyal or who disseminate information that may be considered helpful to the enemy. Top US officials have cited the need to challenge news that undercuts Bush's actions as a key front in defeating the terrorists, who are aided by "news informers" in the words of Defense Secretary Donald Rumsfeld. Detention Centers Plus, there was that curious development in January when the Army Corps of Engineers awarded Halliburton subsidiary Kellogg Brown & Root a $385 million contract to construct detention centers somewhere in the United States, to deal with "an emergency influx of immigrants into the US, or to support the rapid development of new programs," KBR said. [Market Watch, Jan. 26, 2006] Later, the New York Times reported that "KBR would build the centers for the Homeland Security Department for an unexpected influx of immigrants, to house people in the event of a natural disaster or for new programs that require additional detention space." [Feb. 4, 2006] Like most news stories on the KBR contract, the Times focused on concerns about Halliburton's reputation for bilking US taxpayers by overcharging for sub-par services. "It's hard to believe that the administration has decided to entrust Halliburton with even more taxpayer dollars," remarked Rep. Henry Waxman, D-California. Less attention centered on the phrase "rapid development of new programs" and what kind of programs would require a major expansion of detention centers, each capable of holding 5,000 people. Jamie Zuieback, a spokeswoman for Immigration and Customs Enforcement, declined to elaborate on what these "new programs" might be. Only a few independent journalists, such as Peter Dale Scott and Maureen Farrell, have pursued what the Bush administration might actually be thinking. Scott speculated that the "detention centers could be used to detain American citizens if the Bush administration were to declare martial law." He recalled that during the Reagan administration, National Security Council aide Oliver North organized Rex-84 "readiness exercise," which contemplated the Federal Emergency Management Agency rounding up and detaining 400,000 "refugees," in the event of "uncontrolled population movements" over the Mexican border into the United States. Farrell pointed out that because "another terror attack is all but certain, it seems far more likely that the centers would be used for post-911-type detentions of immigrants rather than a sudden deluge" of immigrants flooding across the border. Vietnam-era whistleblower Daniel Ellsberg said, "Almost certainly this is preparation for a roundup after the next 9/11 for Mid-Easterners, Muslims and possibly dissenters. They've already done this on a smaller scale, with the 'special registration' detentions of immigrant men from Muslim countries, and with Guantanamo." Labor Camps There also was another little-noticed item posted at the US Army Web site, about the Pentagon's Civilian Inmate Labor Program. This program "provides Army policy and guidance for establishing civilian inmate labor programs and civilian prison camps on Army installations." The Army document, first drafted in 1997, underwent a "rapid action revision" on Jan. 14, 2005. The revision provides a "template for developing agreements" between the Army and corrections facilities for the use of civilian inmate labor on Army installations. On its face, the Army's labor program refers to inmates housed in federal, state and local jails. The Army also cites various federal laws that govern the use of civilian labor and provide for the establishment of prison camps in the United States, including a federal statute that authorizes the Attorney General to "establish, equip, and maintain camps upon sites selected by him" and "make available ... the services of United States prisoners" to various government departments, including the Department of Defense. Though the timing of the document's posting - within the past few weeks - may just be a coincidence, the reference to a "rapid action revision" and the KBR contract's contemplation of "rapid development of new programs" have raised eyebrows about why this sudden need for urgency. These developments also are drawing more attention now because of earlier Bush administration policies to involve the Pentagon in "counter-terrorism" operations inside the United States. Pentagon Surveillance Despite the Posse Comitatus Act's prohibitions against US military personnel engaging in domestic law enforcement, the Pentagon has expanded its operations beyond previous boundaries, such as its role in domestic surveillance activities. The Washington Post has reported that since the Sept. 11, 2001, terror attacks, the Defense Department has been creating new agencies that gather and analyze intelligence within the United States. [Washington Post, Nov. 27, 2005] The White House also is moving to expand the power of the Pentagon's Counterintelligence Field Activity (CIFA), created three years ago to consolidate counterintelligence operations. The White House proposal would transform CIFA into an office that has authority to investigate crimes such as treason, terrorist sabotage or economic espionage. The Pentagon also has pushed legislation in Congress that would create an intelligence exception to the Privacy Act, allowing the FBI and others to share information about US citizens with the Pentagon, CIA and other intelligence agencies. But some in the Pentagon don't seem to think that new laws are even necessary. In a 2001 Defense Department memo that surfaced in January 2006, the US Army's top intelligence officer wrote, "Contrary to popular belief, there is no absolute ban on [military] intelligence components collecting US person information." Drawing a distinction between "collecting" information and "receiving" information on US citizens, the memo argued that "MI [military intelligence] may receive information from anyone, anytime." [See CQ.com, Jan. 31, 2005] This receipt of information presumably would include data from the National Security Agency, which has been engaging in surveillance of US citizens without court-approved warrants in apparent violation of the Foreign Intelligence Security Act. Bush approved the program of warrantless wiretaps shortly after 9/11. There also may be an even more extensive surveillance program. Former NSA employee Russell D. Tice told a congressional committee on Feb. 14 that such a top-secret surveillance program existed, but he said he couldn't discuss the details without breaking classification laws. Tice added that the "special access" surveillance program may be violating the constitutional rights of millions of Americans. [UPI, Feb. 14, 2006] With this expanded surveillance, the government's list of terrorist suspects is rapidly swelling. The Washington Post reported on Feb. 15 that the National Counterterrorism Center's central repository now holds the names of 325,000 terrorist suspects, a four-fold increase since the fall of 2003. Asked whether the names in the repository were collected through the NSA's domestic surveillance program, an NCTC official told the Post, "Our database includes names of known and suspected international terrorists provided by all intelligence community organizations, including NSA." Homeland Defense As the administration scoops up more and more names, members of Congress also have questioned the elasticity of Bush's definitions for words like terrorist "affiliates," used to justify wiretapping Americans allegedly in contact with such people or entities. During the Senate Judiciary Committee's hearing on the wiretap program, Sen. Dianne Feinstein, D-California, complained that the House and Senate Intelligence Committees "have not been briefed on the scope and nature of the program." Feinstein added that, therefore, the committees "have not been able to explore what is a link or an affiliate to al-Qaeda or what minimization procedures (for purging the names of innocent people) are in place." The combination of the Bush administration's expansive reading of its own power and its insistence on extraordinary secrecy has raised the alarm of civil libertarians when contemplating how far the Pentagon might go in involving itself in domestic matters. A Defense Department document, entitled the "Strategy for Homeland Defense and Civil Support," has set out a military strategy against terrorism that envisions an "active, layered defense" both inside and outside US territory. In the document, the Pentagon pledges to "transform US military forces to execute homeland defense missions in the ... US homeland." The Pentagon strategy paper calls for increased military reconnaissance and surveillance to "defeat potential challengers before they threaten the United States." The plan "maximizes threat awareness and seizes the initiative from those who would harm us." But there are concerns over how the Pentagon judges "threats" and who falls under the category "those who would harm us." A Pentagon official said the Counterintelligence Field Activity's TALON program has amassed files on antiwar protesters. In December 2005, NBC News revealed the existence of a secret 400-page Pentagon document listing 1,500 "suspicious incidents" over a 10-month period, including dozens of small antiwar demonstrations that were classified as a "threat." The Defense Department also might be moving toward legitimizing the use of propaganda domestically, as part of its overall war strategy. A secret Pentagon "Information Operations Roadmap," approved by Rumsfeld in October 2003, calls for "full spectrum" information operations and notes that "information intended for foreign audiences, including public diplomacy and PSYOP, increasingly is consumed by our domestic audience and vice-versa." "PSYOPS messages will often be replayed by the news media for much larger audiences, including the American public," the document states. The Pentagon argues, however, that "the distinction between foreign and domestic audiences becomes more a question of USG [US government] intent rather than information dissemination practices." It calls for "boundaries" between information operations abroad and the news media at home, but does not outline any corresponding limits on PSYOP campaigns. Similar to the distinction the Pentagon draws between "collecting" and "receiving" intelligence on US citizens, the Information Operations Roadmap argues that as long as the American public is not intentionally "targeted," any PSYOP propaganda consumed by the American public is acceptable. The Pentagon plan also includes a strategy for taking over the Internet and controlling the flow of information, viewing the Web as a potential military adversary. The "roadmap" speaks of "fighting the net," and implies that the Internet is the equivalent of "an enemy weapons system." In a speech on Feb. 17 to the Council on Foreign Relations, Rumsfeld elaborated on the administration's perception that the battle over information would be a crucial front in the War on Terror, or as Rumsfeld calls it, the Long War. "Let there be no doubt, the longer it takes to put a strategic communication framework into place, the more we can be certain that the vacuum will be filled by the enemy and by news informers that most assuredly will not paint an accurate picture of what is actually taking place," Rumsfeld said. The Department of Homeland Security also has demonstrated a tendency to deploy military operatives to deal with domestic crises. In the wake of Hurricane Katrina, the department dispatched "heavily armed paramilitary mercenaries from the Blackwater private security firm, infamous for their work in Iraq, (and had them) openly patrolling the streets of New Orleans," reported journalists Jeremy Scahill and Daniela Crespo on Sept. 10, 2005. Noting the reputation of the Blackwater mercenaries as "some of the most feared professional killers in the world," Scahill and Crespo said Blackwater's presence in New Orleans "raises alarming questions about why the government would allow men trained to kill with impunity in places like Iraq and Afghanistan to operate here." US Battlefield In the view of some civil libertarians, a form of martial law already exists in the United States and has been in place since shortly after the 9/11 attacks when Bush issued Military Order No. 1 which empowered him to detain any non-citizen as an international terrorist or enemy combatant. "The President decided that he was no longer running the country as a civilian President," wrote civil rights attorney Michael Ratner in the book Guantanamo: What the World Should Know. "He issued a military order giving himself the power to run the country as a general." For any American citizen suspected of collaborating with terrorists, Bush also revealed what's in store. In May 2002, the FBI arrested US citizen Jose Padilla in Chicago on suspicion that he might be an al-Qaeda operative planning an attack. Rather than bring criminal charges, Bush designated Padilla an "enemy combatant" and had him imprisoned indefinitely without benefit of due process. After three years, the administration finally brought charges against Padilla, in order to avoid a Supreme Court showdown the White House might have lost. But since the Court was not able to rule on the Padilla case, the administration's arguments have not been formally repudiated. Indeed, despite filing charges against Padilla, the White House still asserts the right to detain US citizens without charges as enemy combatants. This claimed authority is based on the assertion that the United States is at war and the American homeland is part of the battlefield. "In the war against terrorists of global reach, as the Nation learned all too well on Sept. 11, 2001, the territory of the United States is part of the battlefield," Bush's lawyers argued in briefs to the federal courts. [Washington Post, July 19, 2005] Given Bush's now open assertions that he is using his "plenary" - or unlimited - powers as Commander in Chief for the duration of the indefinite War on Terror, Americans can no longer trust that their constitutional rights protect them from government actions. As former Vice President Al Gore asked after recounting a litany of sweeping powers that Bush has asserted to fight the War on Terror, "Can it be true that any President really has such powers under our Constitution? If the answer is 'yes,' then under the theory by which these acts are committed, are there any acts that can on their face be prohibited?" In such extraordinary circumstances, the American people might legitimately ask exactly what the Bush administration means by the "rapid development of new programs," which might require the construction of a new network of detention camps. --end-cut-- From LSUDJPJ at yahoo.com Wed Mar 8 10:49:49 2006 From: LSUDJPJ at yahoo.com (Guadalupe Pettit) Date: Wed, 08 Mar 2006 11:49:49 -0700 Subject: Vaiggra and Cailiis Offfers CaUc Message-ID: Loking for quality meds at affordable price? We have widest range of meds at very competitive price. Money baack guaranteesss... http://ca.geocities.com/marthe28943lissie76821/ IWb From coderman at gmail.com Wed Mar 8 13:15:12 2006 From: coderman at gmail.com (coderman) Date: Wed, 8 Mar 2006 13:15:12 -0800 Subject: A break-in to end all break-ins - In 1971, stolen FBI files exposed the government's domestic spying program. Message-ID: <4ef5fec60603081315j133ee1d5j7768b72974b67877@mail.gmail.com> heh, wonder who did it? wonder if 'The Citizens' Commission to Investigate the FBI' is an idea whose time has come (back again?) :P ---cut--- http://www.latimes.com/news/opinion/commentary/la-oe-jalon8mar08,0,6893224,print.story?coll=la-home-commentary A break-in to end all break-ins In 1971, stolen FBI files exposed the government's domestic spying program. By Allan M. Jalon ALLAN M. JALON is a longtime contributor to The Times and other publications on issues of culture and media. March 8, 2006 THIRTY-FIVE YEARS ago today, a group of anonymous activists broke into the small, two-man office of the Federal Bureau of Investigation in Media, Pa., and stole more than 1,000 FBI documents that revealed years of systematic wiretapping, infiltration and media manipulation designed to suppress dissent. The Citizens' Commission to Investigate the FBI, as the group called itself, forced its way in at night with a crowbar while much of the country was watching the Muhammad Ali-Joe Frazier fight. When agents arrived for work the next morning, they found the file cabinets virtually emptied. Within a few weeks, the documents began to show up  mailed anonymously in manila envelopes with no return address  in the newsrooms of major American newspapers. When the Washington Post received copies, Atty. Gen. John N. Mitchell asked Executive Editor Ben Bradlee not to publish them because disclosure, he said, could "endanger the lives" of people involved in investigations on behalf of the United States. Nevertheless, the Post broke the first story on March 24, 1971, after receiving an envelope with 14 FBI documents detailing how the bureau had enlisted a local police chief, letter carriers and a switchboard operator at Swarthmore College to spy on campus and black activist groups in the Philadelphia area. More documents went to other reporters  Tom Wicker received copies at his New York Times office; so did reporters at the Los Angeles Times  and to politicians including Sen. George McGovern of South Dakota and Rep. Parren J. Mitchell of Maryland. To this day, no individual has claimed responsibility for the break-in. The FBI, after building up a six-year, 33,000-page file on the case, couldn't solve it. But it remains one of the most lastingly consequential (although underemphasized) watersheds of political awareness in recent American history, one that poses tough questions even today for our national leaders who argue that fighting foreign enemies requires the government to spy on its citizens. The break-in is far less well known than Daniel Ellsberg's leak of the Pentagon Papers three months later, but in my opinion it deserves equal stature. Found among the Media documents was a new word, "COINTELPRO," short for the FBI's "secret counterintelligence program," created to investigate and disrupt dissident political groups in the U.S. Under these programs, beginning in 1956, the bureau worked to "enhance the paranoia endemic in these circles," as one COINTELPRO memo put it, "to get the point across there is an FBI agent behind every mailbox." The Media documents  along with further revelations about COINTELPRO in the months and years that followed  made it clear that the bureau had gone beyond mere intelligence-gathering to discredit, destabilize and demoralize groups  many of them peaceful, legal civil rights organizations and antiwar groups  that the FBI and Director J. Edgar Hoover found offensive or threatening. For instance, agents sought to persuade Martin Luther King Jr. to kill himself just before he received the Nobel Prize. They sent him a composite tape made from bugs planted illegally in his hotel rooms when he was entertaining women other than his wife  and threatened to make it public. "King, there is one thing left for you to do. You know what it is," FBI operatives wrote in their anonymous letter. Under COINTELPRO, the bureau also targeted actress Jean Seberg for having made a donation to the Black Panther Party. The fragile actress ultimately committed suicide after a gossip nugget based on a FBI wiretap was leaked to the L.A. Times and published. The item, suggesting that the father of the baby she was carrying was a Black Panther rather than her French writer-husband, turned out to be wrong. The sheer reach of a completely politicized FBI was one of the most frightening revelations of the Media documents. Underground newspapers were targeted. Students (and their professors) were targeted. Celebrities were targeted. The Communist Party of the U.S.A., the Southern Christian Leadership Conference, the Student Non-Violent Organizing Committee, the Black Panther Party, the Women's Strike for Peace  all were targeted. "Neutralize them in the same manner they are trying to destroy and neutralize the U.S.," one memo said. Eventually, the COINTELPRO memos  some from Media and some unearthed later  prompted hearings led by Rep. Don Edwards of California and by Sen. Frank Church of Idaho on intelligence agency abuses. In the mid-1970s, the wayward agency began finally to be reined in. It is tragic when people lose faith in their government to the extent that they feel they must break laws to expose corruption. But a war that had been started and sustained by lies had gone on for years. And a government had betrayed its citizens, manipulating their fear to strengthen its grip on power. Today, again, many people worry that their government may be on the road to subverting its own ideals. I hope that the commemoration of those unknown activists being held today in Media, Pa., will serve as a reminder that fighting for democracy abroad must remain more than merely an excuse to weaken civil liberties at home. ---end-cut--- From a_vida74 at inbox.ru Wed Mar 8 09:42:58 2006 From: a_vida74 at inbox.ru (Kimberly Waddell) Date: Wen, 8 Mar 2006 15:42:58 -0200 Subject: increase in sexual desire Message-ID: <200603081341.k28DfYPn013866@proton.jfet.org> Carefully chosen herbal ingredients are the key to peniis enlargement success. Not only the precise blend of ingredients but also many other factors have effect on the overall potency and strength of peniis enlargement formula. Some of these factors include growing conditions, geographical location where herbs are grown, harvest time, the way herbs are stored before processing, the way herbs are processed. http://bchlegjmf.yourhomegallery.com/?adikfxwqowybchlzppegjm l6c From coderman at gmail.com Wed Mar 8 20:22:29 2006 From: coderman at gmail.com (coderman) Date: Wed, 8 Mar 2006 20:22:29 -0800 Subject: In-Reply-To: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> References: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> Message-ID: <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> On 3/8/06, H. Lally Singh wrote: > unsubscribe cypherpunks perhaps we should add "how to get the hell away from those crazy cypherpunks" to the FAQ... From eol1 at yahoo.com Wed Mar 8 21:03:17 2006 From: eol1 at yahoo.com (Peter Thoenen) Date: Wed, 8 Mar 2006 21:03:17 -0800 (PST) Subject: In-Reply-To: <20060308222922.O52713@ubzr.zsa.bet> Message-ID: <20060309050317.96872.qmail@web51906.mail.yahoo.com> > Who else is left? Well there are a bunch of lurkers and occasionally pigs sprout wings and you catch a post from Lucky or Young. Cypherpunk is so 80's and early 90's ... ;) I figure we are at the point where we maybe get a dozen meaningful posts a year. We have gone the way of usenet and bbs's. We will be remember if a half dozen obscure books, a broke remailer (as in actual use, not in code), and Jim Bell. Another group will spring up to replace us, such is life. From ashwood at msn.com Wed Mar 8 21:30:18 2006 From: ashwood at msn.com (Joseph Ashwood) Date: Wed, 8 Mar 2006 21:30:18 -0800 Subject: References: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> <20060308222922.O52713@ubzr.zsa.bet> Message-ID: ----- Original Message ----- From: "J.A. Terranson" Sent: Wednesday, March 08, 2006 8:39 PM Subject: Re: > Who else is left? I'm still around. Cypherpunks are like roaches, if you see one there are hundreds more. Joe From measl at mfn.org Wed Mar 8 20:39:15 2006 From: measl at mfn.org (J.A. Terranson) Date: Wed, 8 Mar 2006 22:39:15 -0600 (CST) Subject: In-Reply-To: <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> References: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> Message-ID: <20060308222922.O52713@ubzr.zsa.bet> On Wed, 8 Mar 2006, coderman wrote: > On 3/8/06, H. Lally Singh wrote: > > unsubscribe cypherpunks > > perhaps we should add "how to get the hell away from those crazy > cypherpunks" to the FAQ... Save the extra electrons... Now that Lally is gone (well, *going*.), there's only a handful of us left to bother with anyway. Let's see: there's you, and me. And Eugen and Riad and Tyler Durden. Ben Laurie and Steve Bellovin. Bill Stewart. Who else is left? -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From death_to_nt at mac.com Wed Mar 8 19:43:01 2006 From: death_to_nt at mac.com (H. Lally Singh) Date: Wed, 8 Mar 2006 22:43:01 -0500 Subject: No subject Message-ID: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> unsubscribe cypherpunks From ghicks at well.com Wed Mar 8 22:55:50 2006 From: ghicks at well.com (Gregory Hicks) Date: Wed, 8 Mar 2006 22:55:50 -0800 (PST) Subject: Message-ID: <200603090655.k296toCi024383@mailhub.Cadence.COM> > Date: Thu, 9 Mar 2006 01:39:52 -0500 > From: "Riad S. Wahby" > > "J.A. Terranson" wrote: > > Who else is left? > > Actually, after the recent round of publicity postings by coderman > (to, e.g., full-disclosure), we've gotten a bunch of new lurkers. > I've seen lots of subscribe requests come over the wire in the past > week-and-some. Well... For what it is worth, I've been lurking for the past nine months or so... > Maybe we can resuscitate this beast. I suppose a good start would be > de-lurking myself, but we shall see if that's really a possibility or > not. I would hope it can be resuscitated. I've used some of this software to make an "anonymous" (really) mailer for "whistle blowers" where I work. > As to the make-your-own-node howto, I haven't had the opportunity yet, > but I see the glimmer of free time at the end of the tunnel, so it > really is forthcoming, after a fashion. I'd like to see this. I've got some bandwidth (net wise, not work wise) to set up a node... Regards, Gregory Hicks --------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From rsw at jfet.org Wed Mar 8 22:39:52 2006 From: rsw at jfet.org (Riad S. Wahby) Date: Thu, 9 Mar 2006 01:39:52 -0500 Subject: In-Reply-To: <20060308222922.O52713@ubzr.zsa.bet> References: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> <20060308222922.O52713@ubzr.zsa.bet> Message-ID: <20060309063952.GA5984@proton.jfet.org> "J.A. Terranson" wrote: > Who else is left? Actually, after the recent round of publicity postings by coderman (to, e.g., full-disclosure), we've gotten a bunch of new lurkers. I've seen lots of subscribe requests come over the wire in the past week-and-some. Maybe we can resuscitate this beast. I suppose a good start would be de-lurking myself, but we shall see if that's really a possibility or not. As to the make-your-own-node howto, I haven't had the opportunity yet, but I see the glimmer of free time at the end of the tunnel, so it really is forthcoming, after a fashion. -- Riad S. Wahby rsw at jfet.org From schneier at counterpane.com Thu Mar 9 03:09:05 2006 From: schneier at counterpane.com (Bruce Schneier) Date: March 9, 2006 3:09:05 PM EST Subject: [EPIC_IDOF] My Essay on Data Mining Message-ID: Why Data Mining Won't Stop Terror Commentary by Bruce Schneier 02:00 AM Mar, 09, 2006 EST http://www.wired.com/news/columns/0,70357-0.html?tw=wn_index_3 In the post-9/11 world, there's much focus on connecting the dots. Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn't tenable for that purpose. We're not trading privacy for security; we're giving up privacy and getting no security in return. Most people first learned about data mining in November 2002, when news broke about a massive government data mining program called Total Information Awareness. The basic idea was as audacious as it was repellent: suck up as much data as possible about everyone, sift through it with massive computers, and investigate patterns that might indicate terrorist plots. Americans across the political spectrum denounced the program, and in September 2003, Congress eliminated its funding and closed its offices. But TIA didn't die. According to The National Journal, it just changed its name and moved inside the Defense Department. This shouldn't be a surprise. In May 2004, the General Accounting Office published a report (.pdf) listing 122 different federal government data-mining programs that used people's personal information. This list didn't include classified programs, like the NSA's eavesdropping effort or state-run programs like MATRIX. The promise of data mining is compelling, and convinces many. But it's wrong. We're not going to find terrorist plots through systems like this, and we're going to waste valuable resources chasing down false alarms. To understand why, we have to look at the economics of the system. Security is always a trade-off, and for a system to be worthwhile, the advantages have to be greater than the disadvantages. A national security data-mining program is going to find some percentage of real attacks and some percentage of false alarms. If the benefits of finding and stopping those attacks outweigh the cost -- in money, liberties, etc. -- then the system is a good one. If not, you'd be better off spending that capital elsewhere. Data mining works best when you're searching for a well-defined profile, a reasonable number of attacks per year and a low cost of false alarms. Credit-card fraud is one of data mining's success stories: all credit-card companies mine their transaction databases for data for spending patterns that indicate a stolen card. Many credit-card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of operator time. Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data- mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless. All data-mining systems fail in two different ways: false positives and false negatives. A false positive is when the system identifies a terrorist plot that really isn't one. A false negative is when the system misses an actual terrorist plot. Depending on how you "tune" your detection algorithms, you can err on one side or the other: you can increase the number of false positives to ensure you are less likely to miss an actual terrorist plot, or you can reduce the number of false positives at the expense of missing terrorist plots. To reduce both those numbers, you need a well-defined profile. And that's a problem when it comes to terrorism. In hindsight, it was really easy to connect the 9/11 dots and point to the warning signs, but it's much harder before the fact. Certainly, many terrorist plots share common warning signs, but each is unique, as well. The better you can define what you're looking for, the better your results will be. Data mining for terrorist plots will be sloppy, and it'll be hard to find anything useful. Data mining is like searching for a needle in a haystack. There are 900 million credit cards in circulation in the United States. According to the FTC September 2003 Identity Theft Survey Report, about 1 percent (10 million) cards are stolen and fraudulently used each year. When it comes to terrorism, however, trillions of connections exist between people and events -- things that the data-mining system will have to "look at" -- and very few plots. This rarity makes even accurate identification systems useless. Let's look at some numbers. We'll be optimistic -- we'll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that's about 10 events -- e-mails, phone calls, purchases, web destinations, whatever -- per person in the United States per day. Also assume that 10 of them are actually terrorists plotting. This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots. This isn't anything new. In statistics, it's called the "base rate fallacy," and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any "test" is going to result in an endless stream of false alarms. This is exactly the sort of thing we saw with the NSA's eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm. And the cost was enormous -- not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties. The fundamental freedoms that make our country the envy of the world are valuable, and not something that we should throw away lightly. Data mining can work. It helps Visa keep the costs of fraud down, just as it helps Amazon alert me to books I might want to buy and Google show me advertising I'm more likely to be interested in. But these are all instances where the cost of false positives is low (a phone call from a Visa operator or an uninteresting ad) in systems that have value even if there is a high number of false negatives. Finding terrorism plots is not a problem that lends itself to data mining. It's a needle-in-a-haystack problem, and throwing more hay on the pile doesn't make that problem any easier. We'd be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated. _______________________________________________ EPIC_IDOF mailing list EPIC_IDOF at mailman.epic.org https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ocorrain at yahoo.com Thu Mar 9 09:45:05 2006 From: ocorrain at yahoo.com (Tiarnan O'Corrain) Date: Thu, 9 Mar 2006 09:45:05 -0800 (PST) Subject: Unsubscribe In-Reply-To: Message-ID: <20060309174505.29465.qmail@web33303.mail.mud.yahoo.com> --- Tyler Durden wrote: > The best way to unsubscribe to Cypherpunks is to send an email to Tim > May > telling him you want to unsubscribe. > -TD ITYM unsubscrive From HTBRRH at hotmail.com Thu Mar 9 07:26:39 2006 From: HTBRRH at hotmail.com (Ashley Sprague) Date: Thu, 09 Mar 2006 10:26:39 -0500 Subject: People Laugh at You? vObmmC Message-ID: <111.26e558d5.2a9TQX44@sol.com> The Only Clinically Tested Penis N-largement Pills that works.. - add 1-4 inches to your peniis - 20% thicker - 5x more enjoyable orgasm - or your monneyy back without question ask! Join miilliions of delighted users which has been benefited with "Longz". http://thunder14.goodbiz.info 9H From coderman at gmail.com Thu Mar 9 10:32:42 2006 From: coderman at gmail.com (coderman) Date: Thu, 9 Mar 2006 10:32:42 -0800 Subject: wars of attrition & reverse rubber hose & the ineffectiveness of direct lethal violence against the state In-Reply-To: References: <4ef5fec60603081021u7f9f4085pb39530fe9c7b1838@mail.gmail.com> Message-ID: <4ef5fec60603091032n7bd3fc6fy4dcc2f2fde5b01bc@mail.gmail.com> On 3/9/06, Tyler Durden wrote: > ... if you're a small ISP and a couple of TLA clerks come demanding info > about who's looking at what, tell them you can only hand over the records in > person and then when they show up break an arm or leg or two. You'll be glad > you did, and you can bet those clerks aren't going to do it again without a > real Operation, which is a lot more costly and a LOT more visible. (ah for the good old days; public discourse on proposed legislation should provide the option of challenging your representative to a duel. *grin* http://politicalgraveyard.com/special/duel-participants.html ) regarding resource consumption attacks to stem the capricious execution of NSL's: can you give them their requested data on cases of punchcards? and bill them for it? most annoying and obscure data storage format as a feature; that's a disturbing thought... [would it be punch cards or bernoulli disks?] From s.schear at comcast.net Thu Mar 9 10:40:27 2006 From: s.schear at comcast.net (Steve Schear) Date: Thu, 09 Mar 2006 10:40:27 -0800 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: References: Message-ID: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> > > > Is Skype a haven for criminals? > > 2/17/2006 1:10:55 PM, by Nate Anderson > > >From a law enforcement point of view, digital communication is a two-edged > sword. On the one hand, it allows for the simple collection, sorting, and > processing of massive amounts of information (such as in the FBI's > Carnivore system), but on the other hand, it is much easier for users to > encrypt their communications with almost unbreakable codes. Now that VoIP > calls are becoming commonplace, governments around the world are struggling > to adapt to the new technology, and Skype has found itself under extra > scrutiny. > The FCC ruled last year that VoIP providers need to offer backdoors into > their systems for wiretapping reasons, but Skype isn't based in the US and > so is not subject to the rule. It is subject to the EU's new Data Retention > Directive, though, which may require them to retain call logs and > decryption keys for a period of time. If so, real-time monitoring of Skype > calls would still be out, but after-the-fact review of recorded calls from > people of interest might well be possible for the government. My understanding is that encryption between Skype users is through remote key generation and key exchange and that any intermediaries (including Skype) don't have the necessary key information to decrypt the data streams. Can anyone support or refute this assertion? Steve From certain386 at gmail.com Thu Mar 9 10:59:48 2006 From: certain386 at gmail.com (Rosalinda Souza) Date: Thu, 9 Mar 2006 10:59:48 -0800 Subject: shame of sex? we can change it Message-ID: <200603090259.k292xiEN000646@proton.jfet.org> Cialis Soft Tabs is the new impotence treatment drug that everyone is talking about. It has benefits over Viagra and other ED treatment solutions. Here goes some reasons to choose Cialis Soft Tabs: 1. You can mix alcohol drinks with Cialis Soft Tabs without any undesired effects. 2.Cialis Soft Tabs does not make you feel dizzy or make vision blurred, so you can easily drive a car or operate heavy machinery. 3.Cialis soft tabs works much faster than any known ED treatment solution. Cialis Soft Tabs enters the bloodstream directly instead of going through the stomach, thus you need only 15 minutes till you feel the effect. Just look at the graph below If you are interested ? Just click here and Read more about it http://bfimghjl.ripsee.com/?acdekghjlxwqowyzctbfim AND ALSO Cialis Soft Tabs formula is effective for 95% of the patients. If this treatment is not effective for you, we will refund you for every unopened pack. All you have to do is send them back, and we will immediatley refund your account! From kyphros at gmail.com Thu Mar 9 12:04:23 2006 From: kyphros at gmail.com (Mike Owen) Date: Thu, 9 Mar 2006 12:04:23 -0800 Subject: wars of attrition & reverse rubber hose & the ineffectiveness of direct lethal violence against the state In-Reply-To: <4ef5fec60603091032n7bd3fc6fy4dcc2f2fde5b01bc@mail.gmail.com> References: <4ef5fec60603081021u7f9f4085pb39530fe9c7b1838@mail.gmail.com> <4ef5fec60603091032n7bd3fc6fy4dcc2f2fde5b01bc@mail.gmail.com> Message-ID: <8f5ca2210603091204w4ab871e3ofb62f2ad20ab5046@mail.gmail.com> On 3/9/06, coderman wrote: > most annoying and obscure data storage format as a feature; that's a > disturbing thought... > [would it be punch cards or bernoulli disks?] > Unless you can find an old 5MB Bernoulli, stick with punch cards. The larger format versions are too easy to get. Mike From camera_lumina at hotmail.com Thu Mar 9 09:27:23 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 09 Mar 2006 12:27:23 -0500 Subject: Unsubscribe In-Reply-To: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> Message-ID: The best way to unsubscribe to Cypherpunks is to send an email to Tim May telling him you want to unsubscribe. -TD >From: "H. Lally Singh" >To: cypherpunks at jfet.org >Date: Wed, 8 Mar 2006 22:43:01 -0500 > >unsubscribe cypherpunks From camera_lumina at hotmail.com Thu Mar 9 09:37:49 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 09 Mar 2006 12:37:49 -0500 Subject: wars of attrition & reverse rubber hose & the ineffectiveness of direct lethal violence against the state In-Reply-To: <4ef5fec60603081021u7f9f4085pb39530fe9c7b1838@mail.gmail.com> Message-ID: No, I'm not talking about Baseballbatting cops and Marines for the most part. I AM talking about baseballbatting the TLA and Patriot Act paperpushers and others who file motions or otherwise do a lot of the day-to-day "innocuous" interfacing-with-the-real world activities. Look...most operations are not black bag and field these days. Make that layer think about whether what they're doing is worth having broken limbs, and everything gets a lot more difficult. Look, if you're a small ISP and a couple of TLA clerks come demanding info about who's looking at what, tell them you can only hand over the records in person and then when they show up break an arm or leg or two. You'll be glad you did, and you can bet those clerks aren't going to do it again without a real Operation, which is a lot more costly and a LOT more visible. -TD >From: coderman >To: "Tyler Durden" >CC: measl at mfn.org, cypherpunks at jfet.org >Subject: Re: wars of attrition & reverse rubber hose & the ineffectiveness >of direct lethal violence against the state >Date: Wed, 8 Mar 2006 10:21:32 -0800 > >On 3/8/06, Tyler Durden wrote: > > ... > > ON THE OTHER HAND, one does't need huge numbers of people wielding >baseball > > bats... > >i like to think you don't need any bats at all; waging direct lethal >violence against the largest and best equipped military in the world >(esp. adding up police, swat, n.guard, military, etc) fuels their >propaganda machine and gets you crushed like an ant under foot. > >bomb throwers and assassins get no sympathy from the public no matter >justified your perceived grievances. > >cutting at the heart of this nation-scale responsibility diffusion >machine requires taxing communication and commerce engines which make >its very existence possible. this tax is applied in the form of >continued and targeted infrastructure disruption against those >entities which are refusing and deflecting oversight and >accountability for their actions, and all those who serve them >directly or indirectly. > >punks with portable saws and thermic lances slicing fiber and junking >equipment is much more palatable to the public when used against >entities already perceived unpopular and abusive to fundamental >rights. we've already talked about data mining and critical >infrastructure analysis to direct such attacks in the most effective >manner possible. > >although somehow i think this will get you a more severe response than >killing random yes men (despite the fact this is limited to property >damage alone). > >hmmm, the information required to organize such efforts would be a >good fit for the blacknet. From kraoyefuzzgr at msn.com Thu Mar 9 08:58:47 2006 From: kraoyefuzzgr at msn.com (Elvia Rudd) Date: Thu, 09 Mar 2006 12:58:47 -0400 Subject: Masters Based on Working Experience HwDkP Message-ID: <151.58e558d5.2a9JGK44@sol.com> Lazy to attend exam or classes? We have Diplomas, Degrees, Masters' or Doctorate to choose from any field of your interest. Only 2 weeks require to delivers the prestigious non-accredited universities paper to your doorstep. Do not hesitate to give us a call today! 1-484-693-8861 zmN From sarasweetie14 at icqmail.com Thu Mar 9 13:37:00 2006 From: sarasweetie14 at icqmail.com (Thanh Bradley) Date: Thu, 09 Mar 2006 15:37:00 -0600 Subject: Pre-approved Application #MYPIJ129743747 Message-ID: <036i547p.2009188@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1169 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: az.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From coderman at gmail.com Thu Mar 9 16:06:34 2006 From: coderman at gmail.com (coderman) Date: Thu, 9 Mar 2006 16:06:34 -0800 Subject: [smb@cs.columbia.edu: serious threat models] In-Reply-To: References: <4ef5fec60602030851r74d41301o835738c2edd1e741@mail.gmail.com> Message-ID: <4ef5fec60603091606t47f39bd8x5cd21218d309a2c5@mail.gmail.com> some additional details on this interesting tap,,, On 2/3/06, Tyler Durden wrote: > ... > >if you knew what you were doing it would be straightforward to insert > >a promiscuous device on the LAN or add a process on the unix host used > >by the softswitch that listened for incoming calls from a given set of > >MIN's and one way conference these calls to a third party*. if you > >had access to a current version of the softswitch software itself for > >modification it would be even easier (most companies license sources > >and tailor or customize the software to run these switches so it's not > >quite as simple as a generic drop in replacement). > > > >it took "a professional" to do this, sure, but the number of people > >skilled enough to pull this off is not a small number. > > I actually strongly suspect Vodaphone cooperation in this. > > "Seeding" a remote software upgrade to a switch like this is extremely > difficult if you're coming in from another vendor's gear. Right now I > believe they would've had to gain physical access and install the software > in person, otherwise they'd have to go through the local Greek NOC. looks like it was indeed an inside job (and of the vodafone tech's mysteriously committed suicide after the tapping was exposed? hmmm) basically they hooked their spyware into the CALEA like features which come standard in any commercial softswitch implementation and used it to capture and relay conversations to the pool of a dozen or so pre paid wireless phones. [note that CALEA isn't that complicated; it's simply a one way conference resource attached to a specific span/channel that is relayed to eve.] funny how vodafone is trying to avoid any responsibility by highlighting the fact an ericsson insider wrote the code, while conveniently failing to mention it was a vodafone tech who put it in place. :) http://www.ana.gr/anaweb/user/showplain?maindoc=4037837&maindocimg=4036819&service=10 """ The CEO of Vodafone Greece George Koronias told a Parliamentary investigation on Thursday that Vodafone had at no time purchased the software used to carry out the illegal phone taps through its digital systems, while stressing that the people responsible had to have extremely high technical expertise and a deep knowledge of Ericsson's programming environment. During his testimony, Koronias stressed that Vodafone had "not requested, not ordered and not received" the legal low-phone interception programme developed by Ericsson, which the phone-tappers had managed to activate in order to monitor the roughly 100 mobile phones that were under surveillance. He said that the low-phone interception programme was added to Ericsson systems at the request of its customers after the September 11 attacks, but underlined the costly service had not been purchased by Vodafone. Koronias also emphasised that the Greek mobile-phone provider had never been officially aware of the inactive low-phone interception software's presence in its systems, but only the supplier Ericsson. At the same time he pointed out that Vodafone, as a provider, would not be given access to the source code for the software. Ericsson did not provide this to its customers and the software was operated only Ericsson's authorised staff, he said. Asked who might have made the 'rogue' software, Koronias said that it would have to be someone with intimate knowledge of Ericsson's programming environment that could write directy in assembly language, which operators were not able to do. "The complexity of the programme points to someone with extremely high expertise," Koronias said, while clarifying that Vodafone's staff did not possess this level of skill. ... Regarding the death of Vodafone staff member Costas Tsalikidis, Koronias said that he had brought this to the attention of the ministers and the Supreme Court prosecutor, placing himself and the company at their disposal, because it had coincided with the discovery of the 'ghost' software and informing the government. In a re-opened investigation into Tsalikidis' death that is now underway, meanwhile, first-instance court prosecutor Ioannis Diotis on Thursday heard testimony from the coroner Giorgios Dilernia who examined the body at the time and the head of the coroners' service Philippos Koutsaftis. Dilernia said the 39-year-old's death had clearly been caused by hanging, while both coroners agreed on a verdict of suicide and said that disinterment of the body would not bring about any result. Tsalikidis was found hanged in March 2005, just days after the company discovered the 'ghost' software in its systems and informed the government. A police investigation at the time had attributed the death to suicide but this has been questioned by the family, especially in the light of later developments and the revelations about the phone-tapping scandal. """ From complex209 at gmail.com Thu Mar 9 14:31:15 2006 From: complex209 at gmail.com (Errol Tate) Date: Thu, 9 Mar 2006 19:31:15 -0300 Subject: Mortgage rates haven't been this low in the last 12 months Message-ID: <200601130302.k0D32Kqf004534@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1528 bytes Desc: not available URL: From JANCZVBMPEKD at hotmail.com Thu Mar 9 09:04:17 2006 From: JANCZVBMPEKD at hotmail.com (Herbert Rowe) Date: Thu, 09 Mar 2006 20:04:17 +0300 Subject: Top 10 Best Watches TWfh Message-ID: <68YW87FE.0P24.JANCZVBMPEKD@hotmail.com> World Top10 Branded Watches at 90% off the original price. We have almost all models to be choosen from which makes our replikas the best and highest quality assured by our manufacturer or else full refund is being given without questions ask. Check us out toooday.. http://043.watchitoslocos.com JZJFJ From coderman at gmail.com Thu Mar 9 22:08:10 2006 From: coderman at gmail.com (coderman) Date: Thu, 9 Mar 2006 22:08:10 -0800 Subject: Telling the 'approved' story Message-ID: <4ef5fec60603092208q46de1562w27d6b91fd4632fa2@mail.gmail.com> i'd be laughing a lot harder were this not so disturbing; though still the funniest thing i've read this month: ---cut--- http://www.capitolhillblue.com/blog/2006/03/telling_the_approved_story.html Telling the 'approved' story March 7, 2006 01:12 AM / The Rant . By DOUG THOMPSON On an unspecified day last week an employee of a federal agency that cannot be revealed delivered a document that cannot be identified to a company that cannot be named seeking information that cannot be discussed. The aforementioned federal agent left the unidentified document with an employee of the unnamed company. That employee then called the owner, who must remain anonymous, to inform him that the document that could not be identified sought information that could not be discussed. The owner who must remain anonymous instructed the employee to deliver the unidentified document to a lawyer whose name is protected by attorney-client privilege. The lawyer whose name is protected by attorney-client privilege examined the unidentified document and then reviewed the information that could not be discussed with the owner who must remain anonymous. With the approval of the owner who must remain anonymous, the lawyer whose name is protected by attorney-client privilege contacted a U.S. attorney who demanded that his identity be concealed. The U.S. attorney who demanded that his identity be concealed then claimed the owner who must remain anonymous violated a law that could not be disclosed and faced arrest for charges that could not be specified because he had referred to the document that cannot be identified in an article for a certain, but unnamed, web site. The lawyer whose name is protected by attorney-client privilege argued that his client could not be charged under the undisclosed law because he had been acting as a journalist at the time of the alleged publication and not as the owner of the company that cannot be named. He had, in fact, learned of the existence of the document that cannot be identified from a third-party, who was not named, and was not aware of its exact contents because he had not seen or read the document and, therefore, was not aware of the exact contents that cannot be discussed. The U.S. attorney who demanded his identity be concealed consulted with others who names are classified and concluded that the owner who must remain anonymous walked a fine line between legal and illegal and would not face arrest for violating a law that could not be disclosed on charges that could not be specified. So walking this fine line of justice allowed the owner who must remain anonymous to avoid confinement at an institution at an unknown location for an unspecified length of time. In exchange for his freedom, the owner who must remain anonymous agreed to write a "clarification" of what happened, following the guidelines for publication laid down by the Bush administration. Which is what you just read. ---end-cut--- the piece which cannot be mentioned because it named the letter which must remain secret is here: http://www.capitolhillblue.com/blog/2006/03/bush_declares_war_on_freedom_o.html From dgerow at afflictions.org Thu Mar 9 22:44:22 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 10 Mar 2006 01:44:22 -0500 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> Message-ID: <20060310064422.GI31158@afflictions.org> Thus spake coderman (coderman at gmail.com) [06/03/06 14:04]: : > Will Esther at all ship in two months? : : i'm not sure and i'm not too optimistic; some people do have : limited/dev C5J boards to play with though... : : i reallly want to get my hands on an armful of nano-itx esther systems. :P I've got five systems (three of which I use on a daily basis) with the Nehemiah core. A local supplier just notifed me the other day that they've now got Nano-ITX in stock, although they're still C3s. I'm not holding my breath for Esther; it was some time ago they announced their DP line, and I've yet to see any dual-processor C3s available for purchase. That being said, it looks like Gigabyte has a board ready for the C7. I still don't see any news on the actual *chip*, though. I'd really like to see a commercially available (there was a project some time ago to do a home-brew version) C7-based laptop... From dgerow at afflictions.org Thu Mar 9 23:04:57 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 10 Mar 2006 02:04:57 -0500 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> References: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> Message-ID: <20060310070457.GL31158@afflictions.org> Thus spake Steve Schear (s.schear at comcast.net) [09/03/06 13:48]: : My understanding is that encryption between Skype users is through remote : key generation and key exchange and that any intermediaries (including : Skype) don't have the necessary key information to decrypt the data : streams. Can anyone support or refute this assertion? While I have no key insights into how Skype encryption is handled -- aside from the fact that most crypto-knowledgable communities view it skeptically -- I /do/ know they've stated they will fully comply with any wiretapping request, and declined to comment further on what exactly that meant. Personally, I'm holding out for zFone and ZRTP. - Damian From hsc_lexware_anfrage at hlsc.de Fri Mar 10 01:50:44 2006 From: hsc_lexware_anfrage at hlsc.de (Ronald Hemphill) Date: Fri, 10 Mar 2006 03:50:44 -0600 Subject: Last chance for lower rates Message-ID: <13850028191869.EKuK32seZr@germany> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1195 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cozen.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From dave at farber.net Fri Mar 10 02:56:13 2006 From: dave at farber.net (David Farber) Date: Fri, 10 Mar 2006 05:56:13 -0500 Subject: [IP] NORAD orders Web deletion of transcript] Message-ID: -------- Original Message -------- Subject: NORAD orders Web deletion of transcript Date: Thu, 09 Mar 2006 23:43:53 -0500 From: Richard Forno To: Dave Farber NORAD orders Web deletion of transcript By Declan McCullagh http://news.com.com/NORAD+orders+Web+deletion+of+transcript/2100-1028_3-6048 254.html Story last modified Thu Mar 09 19:07:01 PST 2006 In an unusual follow-up to a public event, the Defense Department and the Transportation Security Administration have ordered that a transcript of an open hearing on aviation restrictions be yanked from the Web. Maj. Gen. M. Scott Mayes, the head of the North American air defense command, ordered the internal review that flagged the hearing's transcript as problematic and led to its deletion from a government Web site, CNET News.com has learned. The public hearing was held Jan. 18 at the Airport Marriott in Dulles, Va., and was discussed in local news reports. Its purpose was to ask for public opinions about recent airspace security restrictions near the nation's capital, which have cost local businesses some $45 million a year in lost revenue and have even prompted some general aviation pilots to move elsewhere. One of the pilots who testified was Lt. Cmdr. Tom Bush, a U.S. Navy F-18 Hornet pilot who also flies a small civilian plane and said he was speaking as a private individual. "Freedom and security are polar opposites, and I am not willing to give up my freedom for the sake of terrorists," Bush said during the hearing, according to a report at AviationNow.com. The report also said Bush suggested the airspace restrictions were irrational because a terrorist could pretend to fly through the Air Defense Identification Zone (ADIZ) to nearby Dulles airport, make a right-hand turn at the last minute, and be over downtown Washington, D.C., in four minutes. The ADIZ is a ring stretching almost 40 miles around Washington, D.C. "There may be some operational security concerns with the time line he laid out," Michael Kucharek, the chief of media relations for the North American Aerospace Defense Command, said in a telephone interview Thursday. Kucharek said that "there were some operational security concerns revealed by this person who had knowledge but appeared as a public citizen, which we think was out of line. The disclosure of that information could go directly to national security concerns." The Bush administration has been criticized in the past by open government advocates for its aggressive efforts to avoid the disclosure of information that historically has been public. In 2003, the U.S. Army surreptitiously pulled the plug on one of its more popular Web sites after a report embarrassing to the military appeared on it. In another example, the names of the members of the Defense Science Board--an obscure but influential advisory body that influences military policy and had a budget of $3.6 million a year--have vanished from the group's public Web site. The 369-page transcript of the event (part 1 and part 2), previously posted on the Federal Aviation Administration's Web site, has been replaced with a notice saying it is "presently unavailable." Lt. Cmdr. Bush could not be reached for comment. One pilot who was at the hearing reported that Bush said that Americans kicked out the British, tamed the West, won two World Wars, put a man on the moon--and should start acting like it. Some pilots expressed skepticism that Bush disclosed anything sensitive and suggested that the deletion was because he criticized the government's security apparatus. Representatives from NORAD, TSA, FAA, the Department of Homeland Security, the Secret Service, and Customs and Border Protection were on the panel hearing testimony and remained silent during Bush's testimony. "The fact that TSA is an out of control dysfunctional agency is a given, so it may be just another example of their ongoing buffoonery," wrote Lee Schiek, the manager of Maryland's College Park Airport, in an e-mail message on Thursday. "On the other hand, this could be an attempt to rewrite history to minimize the public record sentiment regarding the ADIZ. In any event, since its inception, TSA has consistently demonstrated their inability to do the right thing, and this latest example should not go unchallenged." The ADIZ is opposed by general aviation pilots--that is, pilots who fly smaller aircraft such as a Cessna, Mooney or Piper--because it imposes strict security rules that increase bureaucracy and can overload air traffic controllers. It was created as a supposedly temporary measure after Sept. 11, 2001, but the Bush administration has suggested that it become permanent. Over 21,300 comments, almost entirely critical of the ADIZ, were filed in the FAA proceeding that led to January's public hearing in Virginia. Many comments said that a terrorist could easily defeat the purpose of the ADIZ by filing the paperwork, talking to air traffic controllers, and then turning toward Washington, D.C. at the last moment. Others said it was odd to worry about general aviation aircraft that typically have two to six seats and can carry less than most SUVs. The FAA said Thursday the transcript might be restored soon. It is being reviewed "and no final decisions have been made," FAA spokeswoman Laura Brown said. "I think that you'll see virtually all of that reposted fairly quickly." ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Fri Mar 10 03:02:18 2006 From: dave at farber.net (David Farber) Date: Fri, 10 Mar 2006 06:02:18 -0500 Subject: [IP] Justice Dept e-mail on wiretapping program released through FOIA Message-ID: -------- Original Message -------- Subject: Justice Dept e-mail on wiretapping program released through FOIA Date: Thu, 09 Mar 2006 12:22:27 -0800 From: Jim Warren To: Dave Farber From: The National Security Archive [mailto:NSARCHIVE at hermes.gwu.edu] On Behalf Of National Security Archive Sent: Thursday, March 09, 2006 1:12 PM National Security Archive Update, March 9, 2006 Justice Department e-mail on wiretapping program released through FOIA Former official describes legal defenses as "weak" and "slightly after-the-fact," Guesses they reflected "VP's philosophy... best defense is a good offense." For more information: Thomas Blanton or Kristin Adair - 202/994-7000 http://www.nsarchive.org Washington, D.C., 9 March 2006 - The Justice Department official who oversaw national security matters from 2000 to 2003 e-mailed his former colleagues after revelation of the controversial warrantless wiretapping program in December 2005 that the Department's justifications for the program were "weak" and had a "slightly after-the-fact quality" to them, and surmised that this reflected "the VP's philosophy that the best defense is a good offense," according to documents released through a Freedom of Information Act lawsuit brought by the Electronic Privacy Information Center and joined by the ACLU and the National Security Archive. David Kris, the former associate deputy attorney general who now serves as chief ethics and compliance officer at Time Warner, e-mailed Justice Department official Courtney Elwood on 20 December 2005 his own analysis of the controversy, writing that "claims that FISA [the wiretapping statute] simply requires too much paperwork or the bothersome marshaling of arguments seem relatively weak justifications for resorting to Article II power in violation of the statute." The subject line of the e-mail was "If you can't show me yours." On 22 December, after reading the Department's talking points as forwarded by Elwood, Kris commented that the Department's approach "maybe... reflects the VP's [Vice President Cheney] philosophy that the best defense is a good offense (I don't expect you to comment on that :-))." On 19 January 2006, Kris wrote Elwood that the Department's white paper was "professional and thorough and well written" but that "I kind of doubt it's going to bring me around on the statutory arguments." The Kris e-mails were the only substantive new documents released by the Justice Department yesterday in response to the March 8 deadline ordered by U.S. District Court Judge Henry Kennedy in the FOIA lawsuit brought by EPIC together with the ACLU and the Archive, seeking the internal legal justifications used by the government to carry out the wiretapping program. In three separate letters to the plaintiffs, Justice claimed it had fully searched the records of the Office of the Attorney General and had made a "full grant" of the FOIA requests, yet most of the released material consisted of the previously released white paper and transcripts of public appearances by the Attorney General. Justice produced not a single record relating to any of the 30-odd reauthorizations of the wiretapping program that President Bush has publicly stated took place in 2002, 2003, 2004 and 2005. Justice's Office of Legal Counsel admitted in its response that in the two-and-a-half months since the FOIA requests were filed, OLC had only completed its search of its unclassified files. "The unclassified files are exactly the place where the wiretapping memos are least likely to exist," commented Thomas Blanton, director of the National Security Archive. "This is a case of looking for your car keys under the street lamp even if that's a block away from where you lost them." http://www.nsarchive.org ________________________________________________________ THE NATIONAL SECURITY ARCHIVE is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C. The Archive collects and publishes declassified documents acquired through the Freedom of Information Act (FOIA). A tax-exempt public charity, the Archive receives no U.S. government funding; its budget is supported by publication royalties and donations from foundations and individuals. _________________________________________________________ PRIVACY NOTICE The National Security Archive does not and will never share the names or e-mail addresses of its subscribers with any other organization. Once a year, we will write you and ask for your financial support. We may also ask you for your ideas for Freedom of Information requests, documentation projects, or other issues that the Archive should take on. We would welcome your input, and any information you care to share with us about your special interests. But we do not sell or rent any information about subscribers to any other party. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From coderman at gmail.com Fri Mar 10 09:16:46 2006 From: coderman at gmail.com (coderman) Date: Fri, 10 Mar 2006 09:16:46 -0800 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <20060310064422.GI31158@afflictions.org> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> <20060310064422.GI31158@afflictions.org> Message-ID: <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> On 3/9/06, Damian Gerow wrote: > ... > I've got five systems (three of which I use on a daily basis) with the > Nehemiah core. i'm curious how you use them. care to share? my two main uses for the C5P systems are loop-aes w/padlock and key scrubbing for file storage and IPsec endpoints. i'll use the entropy on the C5XL boards for key generation as well. > A local supplier just notifed me the other day that they've > now got Nano-ITX in stock, although they're still C3s. wow, i didn't think these were going to be ready till Q3. did they have any specs? i'll look around today and see if i can find more details. > I'm not holding my > breath for Esther; it was some time ago they announced their DP line, and > I've yet to see any dual-processor C3s available for purchase. yeah, i've been lusting after a dual proc board since they were revealed back in Q2 '04. perhaps the market just isn't there? other products announced later have made it into production before these SMP boards... > That being said, it looks like Gigabyte has a board ready for the C7. I > still don't see any news on the actual *chip*, though. the last 6-9 months seem to be a holding pattern of "working out the kinks". > I'd really like to see a commercially available (there was a project some > time ago to do a home-brew version) C7-based laptop... i'm wondering if the Balance systems will be updated with a C7 when available. not a great laptop, but would work nicely as a crypto accelerated endpoint: http://www.walmart.com/catalog/product.gsp?product_id=3504708 http://www.walmart.com/catalog/product.gsp?product_id=3595030 From dave at farber.net Fri Mar 10 11:12:30 2006 From: dave at farber.net (David Farber) Date: Fri, 10 Mar 2006 14:12:30 -0500 Subject: [IP] Bush declares war on freedom of the press Message-ID: -----Original Message----- From: "Glenn Tenney" To: "Dave Farber" Sent: 3/10/06 13:41 Subject: Bush declares war on freedom of the press (for IP if you wish) http://www.capitolhillblue.com/blog/2006/03/bush_declares_war_on_freedom_o.ht ml Bush declares war on freedom of the press March 6, 2006 07:44 AM / The Rant . By DOUG THOMPSON Using many of the questionable surveillance and monitoring techniques that brought both questions and criticism to his administration, President George W. Bush has launched a war against reporters who write stories unfavorable to his actions and is planning to prosecute journalists to make examples of them in his "war on terrorism." Bush recently directed Attorney General Alberto Gonzales to use "whatever means at your disposal" to wiretap, follow, harass and investigate journalists who have published stories about the administration's illegal use of warrantless wiretaps, use of faulty intelligence and anything else he deems "detrimental to the war on terror." Reporters for The New York Times, which along with Capitol Hill Blue revealed use of the National Security Agency to monitor phone calls and emails of Americans, say FBI agents have interviewed them and criminal prosecutors at the Justice Department admit they are laying "the groundwork for a grand jury that could lead to criminal charges," CIA Director Porter Goss told Congress recently that "it is my aim and it is my hope that we will witness a grand jury investigation with reporters present being asked to reveal who is leaking this information. I believe the safety of this nation and the people of this country deserve nothing less." As part of the investigation, the Justice Department, Department of Homeland Security and the National Security Agency are wiretapping reporters' phones, following journalists on a daily basis, searching their homes and offices under a USA Patriot Act provision that allows "secret and undisclosed searches" and pouring over financial and travel records of hundreds of Washington-based reporters. Spokesmen for the Justice Department and Department of Homeland Security admit there are "ongoing investigations" regarding publication of stories "involving threats to national security" but will not reveal what those investigations include. In addition to using the USA Patriot Act to pry into the lives of journalists, the Justice Department has also dusted off a pre-World War I law to prosecute people who receive classified information, although the law was aimed at military personnel not civilians. "This is the first administration that I can remember, including Nixon's, that said we need to think about a law that would put journalists who print national security things up in front of grand juries and put them in jail if they don't reveal their sources," says David Gergen, who served as President Regan's director of communication and also worked in the Nixon and Ford White Houses. Political scientist George Harleigh, who worked in the Nixon administration, says such use of federal law enforcement authority was illegal when Nixon tried it and still so today. "We're talking about a basic violation of the Constitutional guarantee of a free press as well as a violation of the rights of privacy of American citizens," Harleigh says. "I had hoped we would have learned our lessons from the Nixon era. Sadly, it appears we have not." In recent weeks, the FBI has issued hundreds of "National Security Letters," directing employers, banks, credit card companies, libraries and other entities to turn over records on reporters. Under the USA Patriot Act, those who must turn over the records are also prohibited from revealing they have done so to the subject of the federal probes. "The significance of this cannot be overstated," says prominent New York litigator Glenn Greenwald. "In essence, while the President sits in the White House undisturbed after proudly announcing that he has been breaking the law and will continue to do so, his slavish political appointees at the Justice Department are using the mammoth law enforcement powers of the federal government to find and criminally prosecute those who brought this illegal conduct to light. "This flamboyant use of the forces of criminal prosecution to threaten whistle-blowers and intimidate journalists are nothing more than the naked tactics of street thugs and authoritarian juntas." Just how widespread, and uncontrolled, this latest government assault has become hit close to home last week when one of the FBI's National Security Letters arrived at the company that hosts the servers for this web site, Capitol Hill Blue. The letter demanded traffic data, payment records and other information about the web site along with information on me, the publisher. Now that's a problem. I own the company that hosts Capitol Hill Blue. So, in effect, the feds want me to turn over information on myself and not tell myself that I'm doing it. You'd think they'd know better. I turned the letter over to my lawyer and told him to send the following message to the feds: Fuck you. Strong letter to follow. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From s.schear at comcast.net Fri Mar 10 16:40:52 2006 From: s.schear at comcast.net (Steve Schear) Date: Fri, 10 Mar 2006 16:40:52 -0800 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: <20060310070457.GL31158@afflictions.org> References: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> <20060310070457.GL31158@afflictions.org> Message-ID: <6.0.1.1.0.20060310163951.041d14b0@mail.comcast.net> At 11:04 PM 3/9/2006, Damian Gerow wrote: >Thus spake Steve Schear (s.schear at comcast.net) [09/03/06 13:48]: >: My understanding is that encryption between Skype users is through remote >: key generation and key exchange and that any intermediaries (including >: Skype) don't have the necessary key information to decrypt the data >: streams. Can anyone support or refute this assertion? > >While I have no key insights into how Skype encryption is handled -- aside >from the fact that most crypto-knowledgable communities view it skeptically >-- I /do/ know they've stated they will fully comply with any wiretapping >request, and declined to comment further on what exactly that meant. I believe it means they will comply with wiretapping requests of calls that touch the public switched network. Steve From pgut001 at cs.auckland.ac.nz Thu Mar 9 21:33:57 2006 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Fri, 10 Mar 2006 18:33:57 +1300 Subject: Unsubscribe In-Reply-To: <20060309174505.29465.qmail@web33303.mail.mud.yahoo.com> Message-ID: >> The best way to unsubscribe to Cypherpunks is to send an email to Tim May >> telling him you want to unsubscribe. > >ITYM unsubscrive You misspelled 'unsubscibe'. Peter. From dgerow at afflictions.org Fri Mar 10 17:36:23 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 10 Mar 2006 20:36:23 -0500 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> <20060310064422.GI31158@afflictions.org> <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> Message-ID: <20060311013623.GC10106@afflictions.org> Thus spake coderman (coderman at gmail.com) [10/03/06 12:31]: : > I've got five systems (three of which I use on a daily basis) with the : > Nehemiah core. : : i'm curious how you use them. care to share? : : my two main uses for the C5P systems are loop-aes w/padlock and key : scrubbing for file storage and IPsec endpoints. I use them for pretty much the same thing: IPSec endpoints, entropy, and Freenet (though that only really benefits from the entropy, IIRC). I have to admit, I don't make much use of the AES stuff on a daily basis. : > A local supplier just notifed me the other day that they've : > now got Nano-ITX in stock, although they're still C3s. : : wow, i didn't think these were going to be ready till Q3. did they : have any specs? i'll look around today and see if i can find more : details. EPIA-N8000E, EPIA-NL8000E, and EPIA-NL10000: They're running somewhere around USD$300/per. If you're looking at them, where does the 'Luke CoreFusion processor' fit in? I remember them saying they'd be using Luke in the C7, but I'm hesitant to believe the C7 is already viable. (Actually, something else I'd like to see: A C7 with >4 on-board NICs, or a full-size ATX C7. They make great little routers.) : yeah, i've been lusting after a dual proc board since they were : revealed back in Q2 '04. perhaps the market just isn't there? other : products announced later have made it into production before these SMP : boards... VIA has a reputation for taking their time to bring products to market, after they've been announced. I'd love to be a fly on their walls to see just what the holdup is. : i'm wondering if the Balance systems will be updated with a C7 when : available. not a great laptop, but would work nicely as a crypto : accelerated endpoint: : : http://www.walmart.com/catalog/product.gsp?product_id=3504708 : http://www.walmart.com/catalog/product.gsp?product_id=3595030 Geez, I had no idea! Hopefully, as there's a C7 line dedicated to mobile computing, someone will pick these up. If not, it's back to the drawing board to make a home-brew laptop (assuming the chips -- and ideally even a DP configuration -- actually show up on the market). From separate726 at gmail.com Fri Mar 10 07:42:52 2006 From: separate726 at gmail.com (Deena Robison) Date: Fri, 10 Mar 2006 20:42:52 +0500 Subject: Wow check out this huge enlargement patch sale! Message-ID: <200603110142.k2B1goTG006414@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1122 bytes Desc: not available URL: From dgerow at afflictions.org Fri Mar 10 19:07:24 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 10 Mar 2006 22:07:24 -0500 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: <6.0.1.1.0.20060310163951.041d14b0@mail.comcast.net> References: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> <20060310070457.GL31158@afflictions.org> <6.0.1.1.0.20060310163951.041d14b0@mail.comcast.net> Message-ID: <20060311030724.GI10106@afflictions.org> Thus spake Steve Schear (s.schear at comcast.net) [10/03/06 19:57]: : >While I have no key insights into how Skype encryption is handled -- aside : >from the fact that most crypto-knowledgable communities view it skeptically : >-- I /do/ know they've stated they will fully comply with any wiretapping : >request, and declined to comment further on what exactly that meant. : : I believe it means they will comply with wiretapping requests of calls that : touch the public switched network. Anything to support that? They /do/ claim that there are no back doors within the code. And the quote I was thinking of is: "Skype 'cooperates fully with all lawful requests from relevant authorities.'" What we infer from that is meaningless: so long as they continue to make vague comments about their call security and what they'll comply with, and so long as their crypto remains closed, I'm not exactly filled with warm fuzzies over their product. However, no matter what your approach (the trusting or the paranoid), it's all speculation. So long as their crypto /does/ remain closed -- and they've given nobody any reason to believe it will be anything but -- we'll have a hard time telling just how good it actually is. Like I said, I'm waiting for Zfone and ZRTP. From s.schear at comcast.net Fri Mar 10 22:30:40 2006 From: s.schear at comcast.net (Steve Schear) Date: Fri, 10 Mar 2006 22:30:40 -0800 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: <20060311030724.GI10106@afflictions.org> References: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> <20060310070457.GL31158@afflictions.org> <6.0.1.1.0.20060310163951.041d14b0@mail.comcast.net> <20060311030724.GI10106@afflictions.org> Message-ID: <6.0.1.1.0.20060310222646.041d0758@mail.comcast.net> At 07:07 PM 3/10/2006, Damian Gerow wrote: >Thus spake Steve Schear (s.schear at comcast.net) [10/03/06 19:57]: >: >While I have no key insights into how Skype encryption is handled -- aside >: >from the fact that most crypto-knowledgable communities view it skeptically >: >-- I /do/ know they've stated they will fully comply with any wiretapping >: >request, and declined to comment further on what exactly that meant. >: >: I believe it means they will comply with wiretapping requests of calls that >: touch the public switched network. > >They /do/ claim that there are no back doors within the code. And the quote >I was thinking of is: >However, no matter what your approach (the trusting or the paranoid), it's >all speculation. So long as their crypto /does/ remain closed -- and >they've given nobody any reason to believe it will be anything but -- we'll >have a hard time telling just how good it actually is. > >Like I said, I'm waiting for Zfone and ZRTP. One way to provide some measure of protection is to proxy Skype, for example from with a VPN. At least they won't be able to ID your IP address. If both parties are inside the VPN all the better. Steve From coderman at gmail.com Fri Mar 10 22:46:58 2006 From: coderman at gmail.com (coderman) Date: Fri, 10 Mar 2006 22:46:58 -0800 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <20060311013623.GC10106@afflictions.org> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> <20060310064422.GI31158@afflictions.org> <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> <20060311013623.GC10106@afflictions.org> Message-ID: <4ef5fec60603102246l1c849a26ka5e5cd171379db7d@mail.gmail.com> On 3/10/06, Damian Gerow wrote: > ... > If you're looking at them, where does the 'Luke CoreFusion processor' fit > in? I remember them saying they'd be using Luke in the C7, but I'm hesitant > to believe the C7 is already viable. VIA's naming conventions are annoying; some names refer to the whole proc, some to just part of the core, and some to the whole CPU/north/south bridge collection. IIRC Luke is a smaller fab process (the eden-n) with the faster/improved north bridge support. it's still the C5P core (two entropy sources and AES accel.) > (Actually, something else I'd like to see: A C7 with >4 on-board NICs, or a > full-size ATX C7. They make great little routers.) www.routerboard.com has some PCI quad port NIC's with the same VIA rhine chips; unfortunately 2 NIC's is the most i've seen ship on the mini-itx. (routerboard also has a PCI to 4 x miniPCI adapter that is great for wireless gear) i've used the PCI riser/adapter to mount two PCI cards horizontally off the mini-itx for adding a quad port ethernet (4xtulip) and a quad mPCI filled with atheros CM9 radios. best little router you can ask for, IMHO. > Hopefully, as there's a C7 line dedicated to mobile computing, someone will > pick these up. If not, it's back to the drawing board to make a home-brew > laptop (assuming the chips -- and ideally even a DP configuration -- > actually show up on the market). this would be easy (easier at least) with a nano-itx form factor. i know they make boards with LVDS video built on, but they seem to be hard to get ahold of, mainly for OEM applications rather than direct retail. it will be interesting to see how this plays out... From coderman at gmail.com Fri Mar 10 23:05:37 2006 From: coderman at gmail.com (coderman) Date: Fri, 10 Mar 2006 23:05:37 -0800 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <20060311065631.GJ10106@afflictions.org> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> <20060310064422.GI31158@afflictions.org> <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> <20060311013623.GC10106@afflictions.org> <4ef5fec60603102246l1c849a26ka5e5cd171379db7d@mail.gmail.com> <20060311065631.GJ10106@afflictions.org> Message-ID: <4ef5fec60603102305x25270476ud41f8d7953e12d44@mail.gmail.com> On 3/10/06, Damian Gerow wrote: > ... > I've contemplated going the quad-NIC route, but that still doesn't alleviate > my two other requirements: RAID card and wireles adapter. yeah, for this you'd need the on board cardbus for wireless card, then use the two PCI slots for the RAID card and quad-NIC. as a plus, the boards with the cardbus slot usually have a compact flash port underneath if you want a diskless system. > What distinguishes the C5P from the C3? Aside from specs, I mean: how would > I be able to identify one? (It's almost as if VIA is trying to kill the > line off.) the C3 was a larger fab process and had no padlock engine (neither entropy or AES). it's difficult to differentiate between a mainboard using a C3 and a mainboard using the C5. this drives me nuts! you have to look for the keyword "Nehemiah" or verify part/model #'s. and then Nehemiah may refer to either the C5XL or C5P core (C5XL == single entropy source, C5P == two entropy sources and AES) From eugen at leitl.org Fri Mar 10 14:18:07 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 10 Mar 2006 23:18:07 +0100 Subject: [dave@farber.net: [IP] Bush declares war on freedom of the press] Message-ID: <20060310221807.GT25017@leitl.org> ----- Forwarded message from David Farber ----- From coderman at gmail.com Sat Mar 11 00:33:28 2006 From: coderman at gmail.com (coderman) Date: Sat, 11 Mar 2006 00:33:28 -0800 Subject: speaking of weak primes, weak exponents? Message-ID: <4ef5fec60603110033h3a572882sabe833f71a412a00@mail.gmail.com> Qi Cheng is not aware of any further work on "A New Class of Unsafe Primes" - http://eprint.iacr.org/2002/109 , which was mentioned here recently (thanks Peter). not a big deal or something to be concerned about? (the speed improvement shown makes me think this should be a check performed for all prime selection in any pubkey system, even if it is unlikely) also curious if anyone has insight on the following as potential pitfalls to avoid when implementing / generating RSA: --- http://eprint.iacr.org/2006/093 "RSA and a higher degree diophantine equation ... Let $N=pq$ be an RSA modulus where $p$, $q$ are large primes of the same bitsize. We study the class of the public exponents $e$ for which there exist an integer $m$ with $1\leq m\leq {\log{N}\over \log{32}}$ and small integers $u$, $X$, $Y$ and $Z$ satisfying $$(e+u)Y^m-\psi(N)X^m=Z,$$ where $\psi(N)=(p+1)(q-1)$. First we show that these exponents are of improper use in RSA cryptosystems." --- http://eprint.iacr.org/2006/092 "Cryptanalysis of RSA with constrained keys ... We show that choosing a public key exponent $e$ for which there exist positive integers $X$, $Y$ such that $\left\vert eY-XF(u)\right\vert$ and $Y$ are suitably small, then the system is insecure." --- one last related item, large qubit quantum computers: --- http://www.mail-archive.com/cryptography at metzdowd.com/msg05835.html bulk quantum computation Travis H. Here's a 1997 paper on "quantum computing in the large" that I had been asking about: http://www.media.mit.edu/physics/projects/spins/home.html "Neil Gershenfeld and Isaac Chuang have developed an entirely new approach to quantum computation that promises to solve many of these problems. Instead of carefully isolating a small number of qubits, we use a large thermal ensemble (such as a cup of coffee). Such a system has ~10^23 degrees of freedom; by applying RF pulses that excite nuclear magnetic resonances, we can create a tiny deviation from equilibrium that acts just like a much smaller number of pure qubits." From dgerow at afflictions.org Fri Mar 10 22:56:32 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Sat, 11 Mar 2006 01:56:32 -0500 Subject: POLL: crypto hardware & Fwd: [Xen-devel] Announce of our Xen project; Routing simulation with Einar (fwd) In-Reply-To: <4ef5fec60603102246l1c849a26ka5e5cd171379db7d@mail.gmail.com> References: <4ef5fec60603061031q61215f66k37a98d1ca4f3afa7@mail.gmail.com> <20060306184315.GZ25017@leitl.org> <4ef5fec60603061051g32cb4f93lbb5bc04b795942dd@mail.gmail.com> <20060310064422.GI31158@afflictions.org> <4ef5fec60603100916w2d92ff71q5a93cea54edc0154@mail.gmail.com> <20060311013623.GC10106@afflictions.org> <4ef5fec60603102246l1c849a26ka5e5cd171379db7d@mail.gmail.com> Message-ID: <20060311065631.GJ10106@afflictions.org> Thus spake coderman (coderman at gmail.com) [11/03/06 01:59]: : > (Actually, something else I'd like to see: A C7 with >4 on-board NICs, or a : > full-size ATX C7. They make great little routers.) : : www.routerboard.com has some PCI quad port NIC's with the same VIA : rhine chips; unfortunately 2 NIC's is the most i've seen ship on the : mini-itx. : (routerboard also has a PCI to 4 x miniPCI adapter that is great for : wireless gear) I've contemplated going the quad-NIC route, but that still doesn't alleviate my two other requirements: RAID card and wireles adapter. : i've used the PCI riser/adapter to mount two PCI cards horizontally : off the mini-itx for adding a quad port ethernet (4xtulip) and a quad : mPCI filled with atheros CM9 radios. best little router you can ask : for, IMHO. Agreed. Until you require three physically distinct PCI cards. Unless there's a triple-riser card out there I've not yet come across (likely there is). What distinguishes the C5P from the C3? Aside from specs, I mean: how would I be able to identify one? (It's almost as if VIA is trying to kill the line off.) : this would be easy (easier at least) with a nano-itx form factor. i : know they make boards with LVDS video built on, but they seem to be : hard to get ahold of, mainly for OEM applications rather than direct : retail. it will be interesting to see how this plays out... has always seemed to have stock of LVDS-based boards. That's what I was using in the original C3-based home-brew laptop. From webster.gilliamskt at gmail.com Fri Mar 10 10:08:24 2006 From: webster.gilliamskt at gmail.com (Lula Randolph) Date: Sat, 11 Mar 2006 02:08:24 +0800 Subject: Hey bro, you really should check this out Message-ID: <200603100156.k2A1uGoE003608@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 771 bytes Desc: not available URL: From coderman at gmail.com Sat Mar 11 02:13:04 2006 From: coderman at gmail.com (coderman) Date: Sat, 11 Mar 2006 02:13:04 -0800 Subject: journalistic insecurity and facilitating whistleblower privacy Message-ID: <4ef5fec60603110213q1d10ba77sba8d5a799b475958@mail.gmail.com> more fallout from the top sekrit "national security letters" (30,000 issued per year, wonder how high this has increased with the new focus on journalistic sources?) """ On Tuesday, an email arrived from Dan Eggen, Justice Department correspondent for The Washington Post. Dan wanted a copy of the letter and more information on the story. That's right I write a story about how the Bush administration is monitoring the email of journalists and a journalist fires off an email asking me to violate the USA Patriot Act and risk certain jail time by providing him with a copy of a letter that I'm not even supposed to admit I have. ... Then I checked my voice mail to find a call from Robert O'Harrow Jr., another Post reporter, wanting information on my sources. Hmmm. I write a story about how the Bush administration is monitoring phone calls of reporters and a reporter calls me on the phone to obtain information on my confidential sources. Anyone see a pattern here? Next, I get both a phone call and an email from David Armstrong of the National Security News Service saying he is working with 60 Minutes on a story about domestic spying by the National Security Agency. He wants info on my sources. ... When Mark Felt, the number two man in the FBI, served as Post reporter Bob Woodward's primary source on Watergate, he insisted that Woodward avoid contact by telephone and devised a scheme of planted messages in a newspaper left at Woodward's door and meetings in an underground garage in Arlington.... My sources know better than to use phone lines and email to contact me. We've worked out elaborate, and always changing, methods for sharing information. """ are the vast majority of journalists really this brain dead? here is what i'd like to know from a reporter to whom i was about to divulge sensitive information: - do i _really_ trust you? even if they turn the screws? - do you know what physical security is (and implement it)? [ oops, is anyone left standing? ] - do you use network security best practices when communicating privately online? [ os up to date with security patches, unnecessary services disabled, firewall, etc ] - can i communicate via a secure channel? [ examples: whispered conversations in a noisy parking garage ;) off the record with mutually verified keys http://www.cypherpunks.ca/otr/ other SSL mechanism with mutual authentication like http://openvpn.net/ pgp/gpg encrypted email (though this seems not so popular?) ] - do you protect your stored data appropriately? [ loop-aes encrypted volumes, FileVault, gpg encrypted files, etc ] - do you use good passwords/phrases for authentication? what other questions would you ask? --- http://www.capitolhillblue.com/blog/2006/03/we_dont_burn_our_sources.html We don't burn our sources March 9, 2006 05:25 AM / The Rant . By DOUG THOMPSON One of the questions frequently raised by critics of this web site is "how can you guys have sources the mainstream media doesn't have?" Good question. We often quote confidential sources in our stories. We have a choice of depending on such sources or not publishing the story. If I'm satisfied the sources are accurate I go with the story. It's a question of trust and, during my 23 years in Washington as both a journalist and a political operative, I built up a network of sources I trust and who trust me to protect their identity and not put them in harm's way. More than 40 years in journalism taught me to protect such sources at all cost. Many of those same sources don't trust the so-called "mainstream media" outlets because they've been burned by journalists who put the story ahead of protecting those who provide them with the information. Even worse, the mainstreamers can be downright sloppy when it comes to protecting those who have such information. On Monday, I outlined how the Bush Administration has launched an all-out war on the press, directing attorney general Alberto Gonzales to go after reporters with subpoenas, wiretaps, monitoring of emails and surveillance to try and stop leaks about the many questionable activities of the White House. I learned about the efforts because the FBI made the incredibly stupid mistake of sending one of their "National Security Letters" to a company I own demanding information on one of its clients - me. Then I confirmed the story with my administration sources and ran with it on Monday, knowing that even acknowledging receipt of a National Security Letter could lead to trouble. The letter was withdrawn after my attorney negotiated a deal. On Tuesday, an email arrived from Dan Eggen, Justice Department correspondent for The Washington Post. Dan wanted a copy of the letter and more information on the story. That's right I write a story about how the Bush administration is monitoring the email of journalists and a journalist fires off an email asking me to violate the USA Patriot Act and risk certain jail time by providing him with a copy of a letter that I'm not even supposed to admit I have. In fact, I don't have it. I never did. The FBI sent the letter to my web hosting company offices which are 300 miles away from my home and studio. At my instructions it went from the employee who received it straight to my attorney and he dealt directly with the feds. I never saw the letter, do not know what happened to it and am not privy to details of what it said. I don't want to know. That's why I'm still sitting here and not on my way to Gitmo. Then I checked my voice mail to find a call from Robert O'Harrow Jr., another Post reporter, wanting information on my sources. Hmmm. I write a story about how the Bush administration is monitoring phone calls of reporters and a reporter calls me on the phone to obtain information on my confidential sources. Anyone see a pattern here? Next, I get both a phone call and an email from David Armstrong of the National Security News Service saying he is working with 60 Minutes on a story about domestic spying by the National Security Agency. He wants info on my sources. Let's see. A reporter uses both the telephone and email to request the names of confidential sources on a story about how the National Security Agency monitors telephone and email use of, you guessed it, reporters. Sorry guys. I'm not about to burn my sources when you take so little precaution in seeking information from me. Besides, I wouldn't help 60 Minutes if they were the only news outlet left on the face of the planet. In 1981 I served on a panel discussion with Fred Graham, then legal correspondent for CBS News. During a break I told him about a paper I once worked for, The Alton Telegraph in Illinois, which had lost a landmark libel suit for something they never published. I thought it might make a good story about injustice. Instead, Graham turned the story over to Morley Safer and 60 Minutes and they put together a hatchet job on the newspaper and told the story from a trial lawyer's point of view. Instead of defending freedom of the press, Safer and his crew sensationalized the story for ratings. Some years later, we would learn again just how 60 Minutes and CBS News hangs people out to dry. Jeffrey Wigand, a fired corporate vice president for Brown & Williamson Tobacco Co., blew the whistle on the company's campaign to hide the true dangers of nicotine. But 60 Minutes and Mike Wallace caved to corporate pressure and shelved the story after revealing Wigand's identity. His reputation was ruined by the network's incompetence. Given such track records, why should any source trust the mainstreamers? The Washington Post sends an unsecure email openly asking me to violate federal law by turning over a classified document and I'm supposed to believe they will protect sources that I've cultivated and protected for more than two decades? When Mark Felt, the number two man in the FBI, served as Post reporter Bob Woodward's primary source on Watergate, he insisted that Woodward avoid contact by telephone and devised a scheme of planted messages in a newspaper left at Woodward's door and meetings in an underground garage in Arlington. Felt knew using the telephone or other standard communications means of the time would lead the secrecy-obsessed Nixon White House to his door. Felt's identity remained a secret for 31 years. My sources know better than to use phone lines and email to contact me. We've worked out elaborate, and always changing, methods for sharing information. I'm not about to risk their confidentiality with reporters who are less careful. I've been hauled in front of grand juries by overzealous prosecutors who wanted names of sources. They didn't get them. As a journalist, I was trained to develop my own network of sources, not call other reporters and ask them to give up theirs. Maybe I'm too old-fashioned for today's pop-culture journalism. Maybe it's out of style for reporters to do their own legwork and research instead of depending on Google and others to do it for them. Or maybe I'm just too old to change and too damn suspicious to get trapped by youngsters. My mama drowned the dumb ones. --- more on the national security letters here: http://www.aclu.org/safefree/patriot/17458res20040929.html and here: http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html From coderman at gmail.com Sat Mar 11 03:06:25 2006 From: coderman at gmail.com (coderman) Date: Sat, 11 Mar 2006 03:06:25 -0800 Subject: NO-QUESTIONS WIRETAPPING - "liberty theater" Message-ID: <4ef5fec60603110306m4ef763f1pe53f0b92273a147f@mail.gmail.com> let's call this particular form of freedom lip service: "liberty theater" it's been quite a show and only promises to get even more entertaining... :) ---cut--- http://www.oregonlive.com/commentary/oregonian/index.ssf?/base/editorial/114195753619950.xml&coll=7 NO-QUESTIONS WIRETAPPING Friday, March 10, 2006 David Sarasohn R emember that fundamental principle -- the one that got everybody so upset when they first heard about the National Security Agency's freelance wiretapping -- that says that if the U.S. government wants to listen to your phone calls, it needs to get a court's permission? George W. Bush used to talk about it when he was running for re-election. Some people call it the Fourth Amendment. Remember it? The U.S. Senate Select Committee on Intelligence has a message for you about that principle: Forget it. After months of huffing and puffing and declaring its determination to stand up for the Constitution against the White House, the committee -- or at least its eight-member GOP majority -- has decided resolutely to get out of the way. As a result, the majority is now supporting a proposal that would allow the Justice Department, for the first time ever, to listen in on phone calls without telling anybody -- courts or Congress. But only for 45 days. The 45-day limit is the committee Republicans' idea of a constitutional limit on executive power. Not that the eavesdropping would have to stop after 45 days -- although if it did, nobody outside the executive branch would ever know that the wiretapping had happened -- or that after 45 days a court would have to give its approval. The most the Intelligence Committee dares to suggest is that after listening to someone's phone calls for a month and a half, the government would have to tell a congressional subcommittee that it wants to keep doing it. This is not your father's Fourth Amendment. It's not even George Bush's father's Fourth Amendment. "Aside from the civil liberties dimension," William C. Banks, a law professor at Syracuse University, told The New York Times, "there's an invitation here to the president to go on indefinitely with warrantless surveillance." It's not like there's any principle involved. "The Constitution has always been a teeter-totter between collective security and individual privacy," says Sen. Ron Wyden, D-Ore., a minority member of the committee. "This new proposal moves the teeter-totter very significantly in one direction. "I think this is a significant skewing of the balance. We're on the brink of some approaches the committee will regret, and the country will regret." Remarkably, Republican committee members are preening themselves on resisting White House pressure. The committee did turn down the proposal of Sen. Mike DeWine to simply declare whatever the administration had done to be legal -- without delving very deeply into what the administration has done. The majority's reluctance to bother the White House by pursuing the facts needed to conduct oversight is likely to limit any efforts the committee might make in the future; as Wyden notes, "Congress can't possibly legislate in a bipartisan manner with the level of information we've got now." There are other interesting things for Congress to examine. The administration claims its judge-free wiretap power comes from the congressional authorization of force following Sept. 11, 2001. Thursday, the Washington Post quoted David S. Kris, associate deputy attorney general in charge of national security issues from 2000 to 2003, that "In sum, I do not believe the statutory law will bear the government's weight. . . . I do not think Congress can be said to have authorized the NSA surveillance." You might think that point would interest the congressional majority, although nobody wants to be so impolite as to bring it up. It hasn't been a heartening stretch for congressional GOP leaders concerned about constitutional rights. Senate Judiciary Committee chairman Arlen Specter just floor-managed the reauthorization of the Patriot Act while insisting that he had many concerns about it, and promising to produce separate legislation to deal with them -- although by renewing the bill, he's abandoned any leverage on the issue. Maybe he can bring it up again under the new Bill of Rights 45-day exception rule. Of course, if Specter later remembers his constitutional concern, it's not hard to imagine the Senate majority and White House response: Forget it. David Sarasohn, associate editor, can be reached at 503-221-8523 or davidsarasohn at news.oregonian.com. ---end-cut--- From dgerow at afflictions.org Sat Mar 11 13:56:06 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Sat, 11 Mar 2006 16:56:06 -0500 Subject: journalistic insecurity and facilitating whistleblower privacy In-Reply-To: <4ef5fec60603110213q1d10ba77sba8d5a799b475958@mail.gmail.com> References: <4ef5fec60603110213q1d10ba77sba8d5a799b475958@mail.gmail.com> Message-ID: <20060311215606.GD75666@afflictions.org> Thus spake coderman (coderman at gmail.com) [11/03/06 05:27]: : are the vast majority of journalists really this brain dead? here is : what i'd like to know from a reporter to whom i was about to divulge : sensitive information: : : - do i _really_ trust you? even if they turn the screws? : : - do you know what physical security is (and implement it)? : [ oops, is anyone left standing? ] : : - do you use network security best practices when communicating : privately online? : [ os up to date with security patches, unnecessary services : disabled, firewall, etc ] : : - can i communicate via a secure channel? : [ examples: whispered conversations in a noisy parking garage ;) : off the record with mutually verified keys http://www.cypherpunks.ca/otr/ : other SSL mechanism with mutual authentication like http://openvpn.net/ : pgp/gpg encrypted email (though this seems not so popular?) ] : : - do you protect your stored data appropriately? : [ loop-aes encrypted volumes, FileVault, gpg encrypted files, etc ] : : - do you use good passwords/phrases for authentication? : : what other questions would you ask? - How do you store your passwords? I'd hope you're not using the same password for everything; how do you remember all of them? - What is your past history with confidential sources? - Which paper, etc. do you work for? What is /their/ history with confidential sources? - Does your workplace protect stored data appropriately (think backups of data pulled out of mounted, thus unencrypted, encrypted volumes)? - Do you use a cellphone/beeper/etc.? How? When? With whom is the account associated? Can you leave it on and at your office/home when we meet? From mccafferty.amelia4epv at gmail.com Sat Mar 11 04:37:31 2006 From: mccafferty.amelia4epv at gmail.com (Greta Dubois) Date: Sat, 11 Mar 2006 20:37:31 +0800 Subject: Improved sexual desire Message-ID: <200603111226.k2BCQCou021682@proton.jfet.org> A recent survey showed that 68% of women are unsatisfied with their sexual partners. Of course most of these women would never tell their partner that they are unhappy. Not being able to fully satisfy a woman can result in depression and feelings of inadequacy. Thankfully, men of all ages can now safely and naturally enhance their body and penis anatomy and renew sexual vitality without resorting to dangerous surgery. The all natural proprietary blend of unique herbs found in Maxaman is designed to restore blood flow to your penis, unleash stored testosterone, and heighten sensation by activating the body's natural hormone production and supplying vital nutrients necessary for peak sexual performance. http://cekldibfhjm.iqratingss.com/?agbfhjmxwqowyceklzmmdi From emc at artifact.psychedelic.net Sun Mar 12 02:38:04 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sun, 12 Mar 2006 02:38:04 -0800 (PST) Subject: Justin Berry, Jimbo Wales, and Wikipedia Message-ID: <200603121038.k2CAc4Re031449@artifact.psychedelic.net> A few weeks ago, a NY Times reporter named Kurt Eichenwald wrote a series of articles on a 19 year old young man named Justin Berry, who made hundreds of thousands of dollars starting at age 13 performing sexually in front of his webcam, and subsequently ran a number of pay teen sites with sexual content. There used to be a fairly lengthy article about Mr. Berry on Wikipedia, but it was summarily deleted, along with its entire revision history, by Wikipedia's owner, Jimbo Wales, and it is represented that Mr. Berry called Mr. Wales and expressed displeasure at his portrayal. Since that time, the article has been reduced to a 2-sentence stub, and all attempts to add any additional information to it, no matter how well sourced, have resulted in the additions being reverted, usually accompanied by various incomprehensible mutterings by Wikipedia admins, who, when asked specific direct questions about what was wrong with the original article, or why specific information can't be added to the current one, become non-responsive and stonewalled. To the best of my knowlege, no one has successfully added any information to the article since Jimbo deleted it, and discussion amongst admins about the article is taking place out of band, and not on any of the Wikipedia pages where such discussion usually takes place. Now of course, Wikipedia is a private organization, which can do anything it wants on servers that it owns. Nonetheless, the actions which are taking place are in direct contravention of stated Wikipedia policy, and there seems to be a deliberate attempt to not be forthcoming with any information on the subject. Everyone who has pressed the issue has gotten banned for various contrived excuses like "uncivility" and "trollishness", and even comments about the situation on peoples private talk pages have been edited by admins. While Wikipedia is a private organization, they are attempting to create a reputation for themselves as an unbiased source of truthful information. Clearly they have a choice of being truthful and being respected, or of censoring, violating their own policies, and not being taken seriously. When things like this happen, our respect for them, and our view of them as an authoritative source of information, need to be adjusted accordingly. I found an interesting quote by Jimbo Wales about Wikipedia and the truth. "If a viewpoint is held by an extremely small (or vastly limited) minority, it doesn't belong in Wikipedia (except perhaps in some ancillary article) regardless of whether it's true or not; and regardless of whether you can prove it or not." Wikipedia, in the propaganda it writes about itself, represents itself as not censoring even offensive material, and arriving at article content entirely through consensus. The reality, at least in this case, seems to be a lot different than the officially stated policy. I invite Jimbo Wales or someone else who can speak for the Wikimedia Foundation, to respond to this post, and give us all a straight answer about exactly what is going on with this particular article. If nothing can be added to Justin Berry's article because Justin or his handlers would be displeased by it, do we apply the same standards to George Bush's article, or Scott Peterson's? One wonders why a teenage male sex performer merits such personal attention from Wikipedia's owner, allegedly a wealthy married heterosexual. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From dewayne at warpspeed.com Sun Mar 12 06:14:19 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Sun, 12 Mar 2006 06:14:19 -0800 Subject: [Dewayne-Net] Tracking Secret Operatives Not Too Tough Message-ID: [Note: This item comes from reader Randall. DLH] >From: Randall >Date: March 11, 2006 9:39:16 PM PST >To: Dave , Dewayne Hendricks >, Declan McCullagh , JMG > >Subject: Tracking Secret Operatives Not Too Tough > > > > >Sunday, March 12, 2006 at 12:37 AM EST >Internet blows CIA cover >It's easy to track America's covert operatives. All you need to >know is >how to navigate the Internet > >..By John Crewdson >Tribune senior correspondent > >March 11, 2006, 12:00 PM CST > >WASHINGTON -- She is 52 years old, married, grew up in the Kansas City >suburbs and now lives in Virginia, in a new three-bedroom house. > >Anyone who can qualify for a subscription to one of the online >services >that compile public information also can learn that she is a CIA >employee who, over the past decade, has been assigned to several >American embassies in Europe. > >The CIA asked the Tribune not to publish her name because she is a >covert operative, and the newspaper agreed. But unbeknown to the CIA, >her affiliation and those of hundreds of men and women like her have >somehow become a matter of public record, thanks to the Internet. > >When the Tribune searched a commercial online data service, the result >was a virtual directory of more than 2,600 CIA employees, 50 internal >agency telephone numbers and the locations of some two dozen secret >CIA >facilities around the United States. > >Only recently has the CIA recognized that in the Internet age its >traditional system of providing cover for clandestine employees >working >overseas is fraught with holes, a discovery that is said to have >"horrified" CIA Director Porter Goss. > >"Cover is a complex issue that is more complex in the Internet age," >said the CIA's chief spokeswoman, Jennifer Dyck. "There are things >that >worked previously that no longer work. Director Goss is committed to >modernizing the way the agency does cover in order to protect our >officers who are doing dangerous work." > >Dyck declined to detail the remedies "since we don't want the bad guys >to know what we're fixing." > >Several "front companies" set up to provide cover for CIA >operatives and >its small fleet of aircraft recently began disappearing from the >Internet, following the Tribune's disclosures that some of the planes >were used to transport suspected terrorists to countries where they >claimed to have been tortured. > >Although finding and repairing the vulnerabilities in the CIA's cover >system was not a priority under Goss' predecessor, George Tenet, one >senior U.S. official observed that "the Internet age didn't get >here in >2004," the year Goss took over at the CIA. > >CIA names not disclosed > >The Tribune is not disclosing the identities of any of the CIA >employees >uncovered in its database searches, the searching techniques used or >other details that might put agency employees or operatives at >risk. The >CIA apparently was unaware of the extent to which its employees >were in >the public domain until being provided with a partial list of names by >the Tribune.' > >At a minimum, the CIA's seeming inability to keep its own secrets >invites questions about whether the Bush administration is doing >enough >to shield its covert CIA operations from public scrutiny, even as the >Justice Department focuses resources on a two-year investigation into >whether someone in the administration broke the law by disclosing to >reporters the identity of clandestine CIA operative Valerie Plame. > >Not all of the 2,653 employees whose names were produced by the >Tribune >search are supposed to be working under cover. More than 160 are >intelligence analysts, an occupation that is not considered a covert >position, and senior CIA executives such as Tenet are included on the >list. > >Covert employees discovered > >But an undisclosed number of those on the list--the CIA would not say >how many--are covert employees, and some are known to hold jobs that >could make them terrorist targets. > >Other potential targets include at least some of the two dozen CIA >facilities uncovered by the Tribune search. Most are in northern >Virginia, within a few miles of the agency's headquarters. Several are >in Florida, Ohio, Pennsylvania, Utah and Washington state. There is >one >in Chicago. > >Some are heavily guarded. Others appear to be unguarded private >residences that bear no outward indication of any affiliation with the >CIA. > >A senior U.S. official, reacting to the computer searches that >produced >the names and addresses, said, "I don't know whether Al Qaeda could do >this, but the Chinese could." > >Down on "The Farm" > >For decades the CIA's training facility at Camp Peary, Va., near >historic Williamsburg, remained the deepest of secrets. Even after >former CIA personnel confirmed its existence in the 1980s the agency >never acknowledged the facility publicly, and CIA personnel >persisted in >referring to it in conversation only as "The Farm." > >But an online search for the term "Camp Peary" produced the names and >other details of 26 individuals who according to the data are employed >there. Searching aviation databases for flights landing or taking off >from Camp Peary's small airstrip revealed 17 aircraft whose ownership >and flight histories could also be traced. > >Although the Tribune's initial search for "Central Intelligence >Agency" >employees turned up only work-related addresses and phone numbers, >other >Internet-based services provide, usually for a fee but sometimes for >free, the home addresses and telephone numbers of U.S. residents, as >well as satellite photographs of the locations where they live and >work. > >Asked how so many personal details of CIA employees had found their >way >into the public domain, the senior U.S. intelligence official replied >that "I don't have a great explanation, quite frankly." > >The official noted, however, that the CIA's credo has always been that >"individuals are the first person responsible for their cover. If they >can't keep their cover, then it's hard for anyone else to keep it. If >someone filled out a credit report and put that down, that's just >stupid." > >One senior U.S. official used a barnyard epithet to describe the >agency's traditional system of providing many of its foreign >operatives >with easily decipherable covers that include little more than a post >office box for an address and a non-existent company as an employer. > >Coverts especially important > >And yet, experts say, covert operatives who pose as something other >than >diplomats are becoming increasingly important in the global war on >terror. > >"In certain areas you just can't collect the kind of information you >need in the 21st Century by working out of the embassy. They're >just not >going to meet the kind of people they need to meet," said Melvin >Goodman, who was a senior Soviet affairs analyst at the CIA for more >than 20 years before he retired. > >The problem, Goodman said, is that transforming a CIA officer who has >worked under "diplomatic cover" into a "non-official cover" >operator, or >NOC--as was attempted with Valerie Plame--creates vulnerabilities that >are not difficult to spot later on. > >The CIA's challenge, in Goodman's view, is, "How do you establish a >cover for them in a day and age when you can Google a name ... and >find >out all sorts of holes?" > >In Plame's case, online computer searches would have turned up her >tenure as a junior diplomat in the U.S. Embassy in Athens even >after she >began passing herself off as a privately employed "energy consultant." > >The solution, Goodman suggested, is to create NOCs at the very >outset of >their careers, "taking risks with younger people, worrying about the >reputation of people before they have one. Or create one." > >Shortage of `mentors' > >But that approach also has a downside, in that "you're getting into >the >problem of very junior, inexperienced people, which a lot of >veteran CIA >people feel now is part of the problem. Porter Goss has to double the >number of operational people in an environment where there are no >mentors. Who's going to train these people?" > >In addition to stepping up recruiting, Goss has ordered a "top-down" >review of the agency's "tradecraft" following the disclosure that >several supposedly covert operatives involved in the 2003 abduction >of a >radical Muslim preacher in Milan had registered at hotels under their >true names and committed other amateurish procedural violations that >made it relatively easy for the Italian police to identify them and >for >Italian prosecutors to charge them with kidnapping. > >----- > >Tribune researcher Brenda J. Kilianski contributed to this article >from >Chicago. >jcrewdson at tribune.com > > Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From emc at artifact.psychedelic.net Sun Mar 12 07:22:31 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sun, 12 Mar 2006 07:22:31 -0800 (PST) Subject: Justin Berry, Jimbo Wales, and Wikipedia In-Reply-To: Message-ID: <200603121522.k2CFMVFf011216@artifact.psychedelic.net> John Young writes: > We posted Eric's comments to Wikipedia, and four mintues later > they had been removed. > We posted a Wiki comment at the Berry entry about Wikipeida's > censorship of the item and a pointer to Cryptome's hosting of the > comments, and that was censored five minutes later. So an entry > about the censorship was added to Cryptome's entry on Wiki. Amazingly, when the censorship of the Berry article was discussed on "WikiProject Wikipedians against censorship", the entire Wikipedians Against Censorship project was nominated for deletion from Wikipedia by Nicholas Turnbull, one of the admins who has been banning people trying to edit the Berry article. http://en.wikipedia.org/wiki/Wikipedia:Miscellany_for_deletion/Wikipedia:WikiProject_Wikipedians_against_censorship -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From emc at artifact.psychedelic.net Sun Mar 12 08:38:55 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sun, 12 Mar 2006 08:38:55 -0800 (PST) Subject: CRM: RE: Justin Berry, Jimbo Wales, and Wikipedia In-Reply-To: <4414458D.4000202@rant-central.com> Message-ID: <200603121638.k2CGctPS012294@artifact.psychedelic.net> Roy Silvernail writes: > It's interesting that the history of Justin Berry's page shows all the > edits and reversions. John's edits are still available through the > history links. The current history starts after Jimbo wiped the article and its revision history. It's only a few days worth, and shows only recent edits. > Regardless of the underlying intent, this is just another edit war. In > this case, the Boss happens to be involved. I would be much more > concerned if the history page were altered to conceal the edits. Well of course it has. No versions of the censored article are available. > Didn't we predict edit wars (of a sort) back in the Depew days? I wouldn't call removal of everything added to the article an edit war. An edit war is when two sides argue over differing versions of content. This is the suppression of content. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From jya at cryptome.net Sun Mar 12 10:02:50 2006 From: jya at cryptome.net (John Young) Date: Sun, 12 Mar 2006 10:02:50 -0800 Subject: Justin Berry, Jimbo Wales, and Wikipedia Message-ID: We posted Eric's comments to Wikipedia, and four mintues later they had been removed. We posted a Wiki comment at the Berry entry about Wikipeida's censorship of the item and a pointer to Cryptome's hosting of the comments, and that was censored five minutes later. So an entry about the censorship was added to Cryptome's entry on Wiki. Screen shots of the process: http://cryptome.org/justin-berry.htm From roy at rant-central.com Sun Mar 12 08:00:13 2006 From: roy at rant-central.com (Roy M. Silvernail) Date: Sun, 12 Mar 2006 11:00:13 -0500 Subject: CRM: RE: Justin Berry, Jimbo Wales, and Wikipedia In-Reply-To: References: Message-ID: <4414458D.4000202@rant-central.com> John Young wrote: > We posted Eric's comments to Wikipedia, and four mintues later >they had been removed. > >We posted a Wiki comment at the Berry entry about Wikipeida's >censorship of the item and a pointer to Cryptome's hosting of the >comments, and that was censored five minutes later. So an entry >about the censorship was added to Cryptome's entry on Wiki. > > It's interesting that the history of Justin Berry's page shows all the edits and reversions. John's edits are still available through the history links. Also interesting is the latest history entry: 14:15, 12 March 2006 Theresa knott (Jimbo has asked for us to start again so let's start.) Regardless of the underlying intent, this is just another edit war. In this case, the Boss happens to be involved. I would be much more concerned if the history page were altered to conceal the edits. Didn't we predict edit wars (of a sort) back in the Depew days? -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT CRM114->procmail->/dev/null->bliss http://www.rant-central.com From jay at tamboli.cx Sun Mar 12 08:32:44 2006 From: jay at tamboli.cx (Jay Goodman Tamboli) Date: Sun, 12 Mar 2006 11:32:44 -0500 Subject: CRM: RE: Justin Berry, Jimbo Wales, and Wikipedia In-Reply-To: <4414458D.4000202@rant-central.com> References: <4414458D.4000202@rant-central.com> Message-ID: <8084DCC1-4E8A-4CC4-88DB-63948AEF0E6B@tamboli.cx> On 2006.03.12, at 11:00, Roy M. Silvernail wrote: > Regardless of the underlying intent, this is just another edit > war. In > this case, the Boss happens to be involved. I would be much more > concerned if the history page were altered to conceal the edits. My understanding was that Jimbo Wales had done just that. At http:// en.wikipedia.org/wiki/Talk:Justin_Berry#Total_rewrite.3F he wrote that he'd like to see a total re-write, and the time of that posting is also the time on the oldest version of the page that's available (http://en.wikipedia.org/w/index.php? title=Justin_Berry&oldid=42757036). My impression was that there was an older page that Jimbo Wales had simply wiped, erasing the history, and blocking the author (http://en.wikipedia.org/wiki/ Talk:Justin_Berry#Bone_to_Pick...). Consider also the unlikihood that Jimbo started this page. From the talk page, it looks like the original article can be found at http://rookiee.aisdigital.net/ justin_article_archive/Justin_Berry.htm. /jgt -- http://tamboli.cx/ From roy at rant-central.com Sun Mar 12 09:17:42 2006 From: roy at rant-central.com (Roy M. Silvernail) Date: Sun, 12 Mar 2006 12:17:42 -0500 Subject: CRM: RE: Justin Berry, Jimbo Wales, and Wikipedia In-Reply-To: <200603121638.k2CGctPS012294@artifact.psychedelic.net> References: <200603121638.k2CGctPS012294@artifact.psychedelic.net> Message-ID: <441457B6.3020302@rant-central.com> Eric Cordian wrote: >Roy Silvernail writes: > > >>Regardless of the underlying intent, this is just another edit war. In >>this case, the Boss happens to be involved. I would be much more >>concerned if the history page were altered to conceal the edits. >> >> > >Well of course it has. No versions of the censored article are available. > > Apologies. That's what I get for coming late to a discussion. >>Didn't we predict edit wars (of a sort) back in the Depew days? >> >> > >I wouldn't call removal of everything added to the article an edit war. >An edit war is when two sides argue over differing versions of content. >This is the suppression of content. > > It's the same thing, really. In this case, one side's preferred version is no version at all. That being said, I looked at the mirrored copy of the original article, and now I'm a bit confused as to the suppressors' agenda. The original appears balanced and factual. What's to be gained from hiding the details? -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT CRM114->procmail->/dev/null->bliss http://www.rant-central.com From gregory.rider at gmail.com Sun Mar 12 13:25:40 2006 From: gregory.rider at gmail.com (Greg Rider) Date: Sun, 12 Mar 2006 13:25:40 -0800 Subject: Justin Berry and related incidents Message-ID: <2d4ed5060603121325yad39ae8g92ad21128fc8f767@mail.gmail.com> This is happening more and more lately. Perhaps you might be interested in the Brian Peppers incident? It's very convoluted (intentionally made that way by members of Wikipedia who seek to supress this information), so allow me to oversimplify what happened: 1. A few kids wrote garbage articles about Brian Peppers, they were deleted. 2. Someone writes a well-referenced article about Brian Peppers, and it is re-deleted under the notion that it was somehow a "recreation of deleted content". 3. An administrator attempts to point this out, and the facts slowly become obfuscated. 4. A vote is held, twice, regarding the rewritten article, both times there being a majority (66%) vote supporting to keep the article. 5. Jimbo Wales DELETES the article, stating that, and I quote: "I didn't delete it on a whim. It was an inappropriate recreation of previously AfD's content, and should have been speedied right off the bat. The only thing out of process here was inappropriate recreation.--Jimbo Wales 03:11, 23 February 2006 (UTC)" There is a lot to sort out in this big mess, if you're interested I can provide you links. I also have access to deleted records, as all deleted edits are viewable by administrators of Wikipedia. If you need copies of anything which was deleted, please let me know, I'd be *MORE* than happy to help you. (So long as he has not had the developers delete the deleted entry, all deleted edits are more accurately decribed as "hidden".) I hope to hear from you soon. (P.S., see also: http://en.wikipedia.org/wiki/Jack_Thompson_%28attorney%29 ) From GWGYHUZTNOST at msn.com Sun Mar 12 10:48:12 2006 From: GWGYHUZTNOST at msn.com (Gertrude Deleon) Date: Sun, 12 Mar 2006 16:48:12 -0200 Subject: Lose Weight in 1 Week hnNqZ Message-ID: <68AR87FE.0A24.GWGYHUZTNOST@msn.com> Dream of nice shape body? Try Hoodia Maximum Strength and see the results for yourself. We are so confident that you will love the new you or will cheerfully refund your money. Try Us Today.. http://043.secureehoodia.com EDb From oleynikov_s at inbox.ru Sun Mar 12 10:15:01 2006 From: oleynikov_s at inbox.ru (Al Kidd) Date: Sun, 12 Mar 2006 17:15:01 -0100 Subject: Fuller & Harder Erections Message-ID: <200603121614.k2CGEvXf030347@proton.jfet.org> With viagra, optimal sexual function can be restored for nearly every man who desire it, in a matter of minutes. Viagra helps you: * To have firmer erection * Enjoy sex life better * Fulfil partner's sexual needs * Bolster self confidence * Renew and strengthen sex life * Restore intimacy * Solidify sexual bonds http://jkmbcdefhlag.webworldfree.com/?iagxwqowyjkmzgvbcdefhl committeeman From dgerow at afflictions.org Sun Mar 12 14:40:48 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Sun, 12 Mar 2006 17:40:48 -0500 Subject: On being a cypherpunk Message-ID: <20060312224048.GZ75666@afflictions.org> For various reasons, what little faith I had left in the government has been whittled down to nill over the past year or so. And recent events (likely none of which any of you have heard of) have brought my faith in police to approximately the same level. Does this mean, after two years of semi-lurking, I'm on my way to becoming a cypherpunk? (As ASCII is not known for its ability to convey intent: I'm being facetious.) From measl at mfn.org Sun Mar 12 16:50:26 2006 From: measl at mfn.org (J.A. Terranson) Date: Sun, 12 Mar 2006 18:50:26 -0600 (CST) Subject: On being a cypherpunk In-Reply-To: <20060312224048.GZ75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> Message-ID: <20060312184941.A79019@ubzr.zsa.bet> On Sun, 12 Mar 2006, Damian Gerow wrote: > For various reasons, what little faith I had left in the government has been > whittled down to nill over the past year or so. And recent events (likely > none of which any of you have heard of) have brought my faith in police to > approximately the same level. > > Does this mean, after two years of semi-lurking, I'm on my way to becoming a > cypherpunk? No. It means you are on your way to becoming the next Tim C. May. Cypherpunks write code. :-) > (As ASCII is not known for its ability to convey intent: I'm being facetious.) Ack. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From dave at farber.net Sun Mar 12 15:56:19 2006 From: dave at farber.net (David Farber) Date: Sun, 12 Mar 2006 18:56:19 -0500 Subject: [IP] Essay on Data Mining Message-ID: Begin forwarded message: From measl at mfn.org Sun Mar 12 17:28:49 2006 From: measl at mfn.org (J.A. Terranson) Date: Sun, 12 Mar 2006 19:28:49 -0600 (CST) Subject: [OT] To Afflictions.org only [PRIV] :-) In-Reply-To: <20060312184941.A79019@ubzr.zsa.bet> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> Message-ID: <20060312185649.T79019@ubzr.zsa.bet> On Sun, 12 Mar 2006, J.A. Terranson wrote: A reply to a posting by affliction.org. When my MTA tried to pass it to the original poster, it was beaten down by a blacklist (SORBS). Sorry dude, but you've apparently got, or had, bot! Address and Port: 64.7.134.90 Record Created: Sat Sep 10 08:29:56 2005 GMT Record Updated: Sun Jan 8 09:54:01 2006 GMT Additional Information: Likely Trojaned Machine, host running Korgo trojan Currently active and flagged to be published in DNS If you wish to request a delisting please do so through the Support System. Let's see what it looks like today: mx1# nmap 64.7.134.90 Starting nmap 3.78 ( http://www.insecure.org/nmap/ ) at 2006-03-12 18:57 CST Interesting ports on asylum.afflictions.org (64.7.134.90): (The 1652 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 143/tcp open imap 443/tcp open https 993/tcp open imaps 995/tcp open pop3s 5800/tcp open vnc-http 5900/tcp open vnc Nmap run completed -- 1 IP address (1 host up) scanned in 77.327 seconds mx1# Well, you've got 993 and 995 open, so 110 and 143 should probably go away. Then, you've got VNC open to the worold: ARE YOU NUTS? Your DNS is not recursing, and that's OK, although I question your need to run one. Basically, you look OK, except that the world still believes you Got Bot. You may wanna give SORBS a heads-up that you fixed it. Sorry about the public posting, but it's the only way to get it to you. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From eugen at leitl.org Sun Mar 12 13:48:11 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 12 Mar 2006 22:48:11 +0100 Subject: [dewayne@warpspeed.com: [Dewayne-Net] Tracking Secret Operatives Not Too Tough] Message-ID: <20060312214811.GO25017@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From ekvcvygbostc at hotmail.com Sun Mar 12 14:18:57 2006 From: ekvcvygbostc at hotmail.com (Jewell Otero) Date: Mon, 13 Mar 2006 04:18:57 +0600 Subject: Best Pharmacy G4Er Message-ID: <68IW87FE.0L24.ekvcvygbostc@hotmail.com> Huge selection of meds available at attractive prices. Highest quality assured. Try us out today.. http://au.geocities.com/penn8180merwyn83950/ t9AM From eugen at leitl.org Mon Mar 13 00:22:52 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Mar 2006 09:22:52 +0100 Subject: [dave@farber.net: [IP] Essay on Data Mining] Message-ID: <20060313082252.GI25017@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Mon Mar 13 05:36:20 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Mar 2006 14:36:20 +0100 Subject: [dave@farber.net: [IP] Justice Dept e-mail on wiretapping program released through FOIA] Message-ID: <20060313133620.GH25017@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Mon Mar 13 05:36:43 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Mar 2006 14:36:43 +0100 Subject: [dave@farber.net: [IP] NORAD orders Web deletion of transcript]] Message-ID: <20060313133643.GI25017@leitl.org> ----- Forwarded message from David Farber ----- From gbroiles at gmail.com Mon Mar 13 15:15:11 2006 From: gbroiles at gmail.com (Greg Broiles) Date: Mon, 13 Mar 2006 15:15:11 -0800 Subject: On being a cypherpunk In-Reply-To: <20060313225123.GT75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> Message-ID: <4918801a0603131515k53b2adb8h8b8e9232eed2ae7b@mail.gmail.com> On 3/13/06, Damian Gerow wrote: > I've known for years (it was on the website holding the subscription form) > that cypherpunks write code. But I've never seen discussion behind the > phrase, only of the phrase itself. See "A Cypherpunk's Manifesto" at . -- Greg Broiles, JD, LLM Tax, EA gbroiles at gmail.com (Lists only. Not for confidential communications.) Law Office of Gregory A. Broiles San Jose, CA From coderman at gmail.com Mon Mar 13 15:16:08 2006 From: coderman at gmail.com (coderman) Date: Mon, 13 Mar 2006 15:16:08 -0800 Subject: On being a cypherpunk In-Reply-To: <20060313225123.GT75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> Message-ID: <4ef5fec60603131516k7fbb7c6cqf73959cf2d81a2a1@mail.gmail.com> On 3/13/06, Damian Gerow wrote: > ... > I've known for years (it was on the website holding the subscription form) > that cypherpunks write code. But I've never seen discussion behind the > phrase, only of the phrase itself. > > I suppose in one sense, the statement, "Cypherpunks write code," answers the > question itself. But aside from the obvious, I'm curious to know what > individual reasons people have. > > If you (yes, you, the person reading this right now) write code, why do you > do it? i suppose an abridged description would be: i write code to facilitate personal privacy because i feel privacy is important and worthwhile for many reasons. i write code for those who want to take responsibility for their own privacy because governments and businesses will not give them the tools to do so. i write code to assist private communication because the ability to communicate freely is a fundamental and necessary aspect of any social context. i write code because it gives me a great deal of satisfaction to build something useful to myself and others. From coderman at gmail.com Mon Mar 13 15:18:33 2006 From: coderman at gmail.com (coderman) Date: Mon, 13 Mar 2006 15:18:33 -0800 Subject: Fwd: Tor wants to fund a few Ontario students In-Reply-To: <20060313223236.GZ15157@localhost.localdomain> References: <20060313223236.GZ15157@localhost.localdomain> Message-ID: <4ef5fec60603131518g7d4c9118lcd7a152fb4e50402@mail.gmail.com> Ontario cypherpunks students do what? :P ---------- Forwarded message ---------- From: Roger Dingledine Date: Mar 13, 2006 2:32 PM Subject: Tor wants to fund a few Ontario students To: or-announce at freehaven.net Hi folks, Thanks to Mike Gurski at Bell, the Tor project has some money to pay one or two students to help develop Tor. The strings are that they need to be students (of some sort) at a university in Ontario. If you know any outstanding students who can code well and have an interest in privacy/security, please pass this on to them. We want people who can work independently and write good code. We're ready to start whenever we find the right people. I'd like to find some Windows developers to help fill the gaps in our current skills, but if you know a brilliant developer I'm flexible. I've written up more details here: http://wiki.noreply.org/noreply/TheOnionRouter/OntarioStudent Thanks! --Roger -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFEFfME61qJaiiYi/URAhLtAJwKALCBWoZZyTy9632sne6DwIpOOQCeM1Xs GrN8kBZSLcDcT4RKrLR90z8= =jHPR -----END PGP SIGNATURE----- From coderman at gmail.com Mon Mar 13 16:43:26 2006 From: coderman at gmail.com (coderman) Date: Mon, 13 Mar 2006 16:43:26 -0800 Subject: Via unveils high performance mini-ITX line - C7 cores in production Message-ID: <4ef5fec60603131643o2689049am40a02cda4781e64e@mail.gmail.com> mmm, 4096 bit montgomery multiplier in core as MONTMUL instruction. SHA1 & SHA2-256 in core as XSHA instruction. in addition to the usual dual entropy sources and AES in core... see also http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/programming_guide.pdf ---cut--- http://linuxdevices.com/news/NS3116742043.html Via unveils high performance mini-ITX line Mar. 13, 2006 Via has announced a next-generation family of mini-ITX boards based on its new C7 processor family. "Epia EN" boards will offer a large performance boost over previous Epia boards, Via says. They target thin clients, car PCs, robotics, medical equipment, kiosks, and server appliances. (Click for larger view of Via Epia EN) Initial Epia EN boards will feature C7 processors clocked at 1.5GHz, or else an "Eden" version of the C7 clocked at 1.2GHz, for passively cooled applications. Advanced features include support for 533/400MHz DDR2 RAM, gigabit Ethernet, and an onboard SATA II RAID 0, 1, and O+1 controller. A prototype Epia EN board based on a C7 processor (Click to enlarge) The EN-series will eventually offer models clocked to 2GHz, with frontside-bus speeds up to 800MHz, Via says. First C7-equipped mini-ITX boards from Via The Epia EN boards will be the first mini-ITX boards to feature Via's next-generation x86-compatible processors, the C7 desktop, C7-M mobile, and C7-Eden embedded processors. All three are based on the same "C5J Esther" core, with different testing requirements and packaging. Touted features of the C5J Esther core include support for SSE2 and SSE3 instructions, said to improve 3D performance; a full-speed FPU (floating point unit), rather than the half-speed unit of earlier Via chips; 16 pipeline stages; and 128KB each of L1 and L2 cache. The core also integrates Via's cryptography hardware. It has a die size of 30 square millimeters, and is manufactured by IBM using 90-namometer SOI (silicon-on-insulator) technology. C7 die layout (Click to enlarge) The C7-series chips have a TDP (thermal design power, aka maximum power draw) of 12 Watts when clocked at 1.5GHz, Via says -- or about half that of a Celeron-M. Additionally, the chips dissipate 20 Watts when clocked at 2GHz, Via says, and offer better performance-per-Watt than Intel's venerable Pentium M, it claims. C7 vs. Pentium M in performance-per-Watt (Source: Via) Via announced the C7 in May of last year -- see that announcement for lots more details about the chip. CN700 Northbridge Along with new C7 and C7-M processors, the Epia EN-series boards will use Via's relatively new CN700 chipset, which just began sampling in December. The chipset includes a new "CN700" northbridge, along with a VT8237-series southbridge connected through a V-link host controller. The C7 processor, CN700 northbridge, and VT8237-R southbridge function diagram (Click to enlarge) Claimed performance leap Benchmarking against older mini-ITX boards based on C3 processors shows the C7-based Epia EN-series boards to offer 55 percent better results on MPEG encoding, 40 better results on business productivity performance, and about 10 percent better results on 3D graphics performance tests, Via reports. C3 v. C7 benchmark results (Source: Via) In addition to better performance, and performance-per-Watt, Via says the EN-series boards are more reliable, thanks to low heat dissipation. They are not as dependent as most boards on mechanical cooling systems, and don't generate enough heat to damage board components, Via says. Other claimed features include: * ATX power * DDRII 400/533 memory socket * UDMA 66/100/133 connectors * CN700 Northbridge * VT8237R+ Southbridge * PCI connector * LVDS/DVI modules available * 6-channel audio * Switchable (jumpers) S/PDIF / S-Video port * PS-2 connectors * USB 2.0 * Gigabit Ethernet Availability Via has not announced specific EN-series board availability, but says that boards will be available at a variety of price points soon. ---end-cut--- From dgerow at afflictions.org Mon Mar 13 14:17:29 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Mon, 13 Mar 2006 17:17:29 -0500 Subject: [OT] To Afflictions.org only [PRIV] :-) In-Reply-To: <20060312185649.T79019@ubzr.zsa.bet> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060312185649.T79019@ubzr.zsa.bet> Message-ID: <20060313221729.GR75666@afflictions.org> Thus spake J.A. Terranson (measl at mfn.org) [12/03/06 20:41]: : A reply to a posting by affliction.org. When my MTA tried to pass it to : the original poster, it was beaten down by a blacklist (SORBS). Sorry : dude, but you've apparently got, or had, bot! It's actually an artifact of running a TOR proxy. I've de-listed myself from SORBS four times, and since then, I've just given up. I don't even run the TOR proxy anymore, and I haven't cared to get myself delisted. Maybe I should do it one more time... : Additional Information: Likely Trojaned Machine, host running Korgo trojan That's actually blatantly false. I've done full virus scans of every host on the network, and Korgo isn't anywhere to be found. This was the case each time. : Well, you've got 993 and 995 open, so 110 and 143 should probably go away. Good point. I never use POP3 externally anyhow. : Then, you've got VNC open to the worold: ARE YOU NUTS? Nope. My roommate requested it. I told him it's a bad idea. We're still hashing it out. What I'm tending towards is a tunnel-only SSH setup for him, but haven't had the time to play with it. (And I think you missed a few other open ports, but that's fine by me.) : Your DNS is not recursing, and that's OK, although I question your need to : run one. Basically, you look OK, except that the world still believes you : Got Bot. You may wanna give SORBS a heads-up that you fixed it. Sorry : about the public posting, but it's the only way to get it to you. I should hope my DNS isn't recursing. And I need it as I run my own domain, and haven't found a good, reliable DNS provider that will let me do everything I want to do (SPF, TXT, and LOC RRs, etc.). I find it strange that you were able to get to me without issues previously. I don't particularly mind that you posted publicy: if I felt uncomfortable running my network the way I do, then I wouldn't run it that way. From dgerow at afflictions.org Mon Mar 13 14:22:36 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Mon, 13 Mar 2006 17:22:36 -0500 Subject: On being a cypherpunk In-Reply-To: <20060312184941.A79019@ubzr.zsa.bet> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> Message-ID: <20060313222236.GS75666@afflictions.org> Thus spake J.A. Terranson (measl at mfn.org) [12/03/06 20:03]: : > Does this mean, after two years of semi-lurking, I'm on my way to becoming a : > cypherpunk? : : No. It means you are on your way to becoming the next Tim C. May. Hmmmm... I don't know if that's a good thing or not... : Cypherpunks write code. Yes, but /why/? From rah at shipwright.com Mon Mar 13 14:41:03 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Mon, 13 Mar 2006 17:41:03 -0500 Subject: On being a cypherpunk In-Reply-To: <20060313222236.GS75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> Message-ID: At 5:22 PM -0500 3/13/06, Damian Gerow wrote: >Yes, but /why/? Tim would do it -- if he could :-) -- to watch it all fall down. If *I* could :-), it would be to make more stuff cheaper over time -- progress, in other words. We all have our reasons. Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dgerow at afflictions.org Mon Mar 13 14:51:23 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Mon, 13 Mar 2006 17:51:23 -0500 Subject: On being a cypherpunk In-Reply-To: References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> Message-ID: <20060313225123.GT75666@afflictions.org> Thus spake R. A. Hettinga (rah at shipwright.com) [13/03/06 17:55]: : We all have our reasons. I've known for years (it was on the website holding the subscription form) that cypherpunks write code. But I've never seen discussion behind the phrase, only of the phrase itself. I suppose in one sense, the statement, "Cypherpunks write code," answers the question itself. But aside from the obvious, I'm curious to know what individual reasons people have. If you (yes, you, the person reading this right now) write code, why do you do it? If you do /not/, but wish you did, why? From ashwood at msn.com Mon Mar 13 18:19:34 2006 From: ashwood at msn.com (Joseph Ashwood) Date: Mon, 13 Mar 2006 18:19:34 -0800 Subject: On being a cypherpunk References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> <4918801a0603131515k53b2adb8h8b8e9232eed2ae7b@mail.gmail.com> <20060314000948.GV75666@afflictions.org> Message-ID: My 2 cents. ----- Original Message ----- From: "Damian Gerow" Subject: Re: On being a cypherpunk > Now I know why Mr. Hughes 'writes code'. What about you? Or are you > insinuating that Mr. Hughes speaks on your behalf? I write code because someone has to redeem my birthday after 1945 ushered in the atomic age. I write code because I live by "Judge a man by his works, not by his worth" Joe From dgerow at afflictions.org Mon Mar 13 16:09:48 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Mon, 13 Mar 2006 19:09:48 -0500 Subject: On being a cypherpunk In-Reply-To: <4918801a0603131515k53b2adb8h8b8e9232eed2ae7b@mail.gmail.com> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> <4918801a0603131515k53b2adb8h8b8e9232eed2ae7b@mail.gmail.com> Message-ID: <20060314000948.GV75666@afflictions.org> Thus spake Greg Broiles (gbroiles at gmail.com) [13/03/06 18:31]: : > I've known for years (it was on the website holding the subscription form) : > that cypherpunks write code. But I've never seen discussion behind the : > phrase, only of the phrase itself. : : See "A Cypherpunk's Manifesto" at : . Now I know why Mr. Hughes 'writes code'. What about you? Or are you insinuating that Mr. Hughes speaks on your behalf? From measl at mfn.org Mon Mar 13 17:16:32 2006 From: measl at mfn.org (J.A. Terranson) Date: Mon, 13 Mar 2006 19:16:32 -0600 (CST) Subject: On being a cypherpunk In-Reply-To: <20060314000948.GV75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> <4918801a0603131515k53b2adb8h8b8e9232eed2ae7b@mail.gmail.com> <20060314000948.GV75666@afflictions.org> Message-ID: <20060313191151.U98643@ubzr.zsa.bet> On Mon, 13 Mar 2006, Damian Gerow wrote: > Thus spake Greg Broiles (gbroiles at gmail.com) [13/03/06 18:31]: > : > I've known for years (it was on the website holding the subscription form) > : > that cypherpunks write code. But I've never seen discussion behind the > : > phrase, only of the phrase itself. > : > : See "A Cypherpunk's Manifesto" at > : . > > Now I know why Mr. Hughes 'writes code'. What about you? Or are you > insinuating that Mr. Hughes speaks on your behalf? In this forum, it is unlikely that anyone speaks on anyone elses behalf :-/ In all seriousness, except for the commonality of the CP agenda, self-identified "Cypherpunks" could not be categorized by any common property. I Wrote Code, and now help others to Write Code as a deliberately radical act in furtherance of my personal political agenda. I believe that only in *action* can a human claim the right to exist free of fetters, and that the most efficient action I can take is the one that impacts the most people with the least effort: code. In the end, I think that the code will set you free. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From roy at rant-central.com Mon Mar 13 19:12:28 2006 From: roy at rant-central.com (Roy M. Silvernail) Date: Mon, 13 Mar 2006 22:12:28 -0500 Subject: On being a cypherpunk In-Reply-To: <20060313225123.GT75666@afflictions.org> References: <20060312224048.GZ75666@afflictions.org> <20060312184941.A79019@ubzr.zsa.bet> <20060313222236.GS75666@afflictions.org> <20060313225123.GT75666@afflictions.org> Message-ID: <4416349C.4000204@rant-central.com> Damian Gerow wrote: >If you (yes, you, the person reading this right now) write code, why do you >do it? > > To scratch an itch, and to get something done that isn't otherwise available. Granted, the last cypherpunkish thing I really worked on was attempting to standardize a PGP X-header, but hey... (and this was a bit before S-MIME, or even MIME attachments, became prevalent) -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT CRM114->procmail->/dev/null->bliss http://www.rant-central.com From cameron.holwayebzg at gmail.com Tue Mar 14 05:35:27 2006 From: cameron.holwayebzg at gmail.com (Jeremiah) Date: Tue, 14 Mar 2006 05:35:27 -0800 Subject: Expert stock suggestions and recommendations Message-ID: <200603132135.k2DLZPKH022232@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3924 bytes Desc: not available URL: From dgerow at afflictions.org Tue Mar 14 09:50:32 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Tue, 14 Mar 2006 12:50:32 -0500 Subject: [Clips] Is Skype a haven for criminals? In-Reply-To: <6.0.1.1.0.20060310222646.041d0758@mail.comcast.net> References: <6.0.1.1.0.20060309103622.059b7848@mail.comcast.net> <20060310070457.GL31158@afflictions.org> <6.0.1.1.0.20060310163951.041d14b0@mail.comcast.net> <20060311030724.GI10106@afflictions.org> <6.0.1.1.0.20060310222646.041d0758@mail.comcast.net> Message-ID: <20060314175032.GE89933@afflictions.org> Thus spake Steve Schear (s.schear at comcast.net) [11/03/06 01:47]: : One way to provide some measure of protection is to proxy Skype, for : example from with a VPN. At least they won't be able to ID your IP : address. If both parties are inside the VPN all the better. I would beg to differ, but that's not a conversation for cypherpunks. To address your original question, a link to a page containing a plethora of information about Skype was just posted to another mailing list I watch: Depending on the paper you read, the security seems sound. Specifically: Traditional warnings and caveats about studies sponsored by ${COMPANY} proving ${COMPANY}'s products are secure/fast/etc. should be heeded. From pearliezl9 at hotmail.com Tue Mar 14 06:11:22 2006 From: pearliezl9 at hotmail.com (Alexis) Date: Tue, 14 Mar 2006 22:11:22 +0800 Subject: Insider information that brings about tremendous profits Message-ID: <200603150611.k2F6BDQa021944@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3906 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 14 13:12:27 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Mar 2006 22:12:27 +0100 Subject: Please DO NOT refer to our High Gain Omni Directional as Pipe Bomb Message-ID: <20060314211227.GM25017@leitl.org> Tee-hee. Forwarded message: Subject: Immediate Action Required: Please DO NOT refer to our High Gain Omni Directional (ML-5299-HPA1-01 & ML-2499-HPA3-01/-02) as Pipe Bomb Importance: High Hi all: We had a recent reported incident where a partner carrying one of our omni directional antennas labeled Pipe Bomb was arrested at Orange County airport and led to the airport shutdown for some period of time. Homeland Security and TSA have been in touch with Anthony Bartolo regarding this incidence and we need to act promptly to prevent any future incidences. >From our end we have gone back checked with our supplier to ensure there isn't a Pipe Bomb reference in the product description, packaging or labeling and found that it is not the case. We have pulled products from our inventory and reviewed that we do not have refer to these products as pipe bombs anywhere. Our guess with this particular incidence is that the parts were re-labeled by the partner/end-user as a pipe bomb b referencing it as pipe bomb. When I do a Google search I find the following resellers using a description of Pipe Bomb with Symbol antenna products: 1) System ID- Part of Informatics. T. Ellis from System ID confirmed that they have cleaned up their website since the incidence. Google still shows the Pipe Bomb description and it may take a few days for them to update the description. 2) Direct Dial in Canada: Website needs to be cleaned up. David if you have contact within this firm.. can you personally reach out to make sure this happens quickly. I am sending this request to their generic customer service email id. 3) The Barcode Warehouse in UK: Ditto as 2 above. I would urge all Symbol associates to NOT refer to/label/mark these antennas as Pipe bomb in informal or formal communications. Thank you for your prompt attention to this matter. SYMBOL ACCESS POINT ANTENNA, 802.11A, 5GHZ, OMNI (PIPE BOMB), 5DBI ... SYMBOL ACCESS POINT ANTENNA, 802.11A, 5GHZ, OMNI (PIPE BOMB), 5DBI - ML-5299-HPA1-01. www.systemid.com/RF_-_WIRELESS/ SYMBOL_ACCESS_POINT_--107553.asp - 51k - Cached - Similar pages ML-2499-HPA3-01 - Canada : SYMBOL OMNI WIRELESS ANTENNA (PIPE BOMB ... Canada ML-2499-HPA3-01 SYMBOL OMNI WIRELESS ANTENNA (PIPE BOMB), 5 DBI, 2.4 GHZ. ... Omni antenna (Pipe Bomb), 5 dBi, 2.4 GHz ... www.directdial.com/ca/shop/item/ML-2499-HPA3-01.html - 27k - Cached - Similar pages Symbol AP-5131 Wireless Access Point - The Barcode Warehouse Symbol AP-5131 Wireless Access Point by Symbol Technologies from The ... (Pipe Bomb), 3.3dBi, 2.4 GHz Availability: Ordered upon request, o?=51.36 ex vat ... www.thebarcodewarehouse.co.uk/wireless/ symbol+technologies/ap-5131+wireless+access+point/997/0/5 - 77k - Cached - Similar pages Symbol WS2000 - The Barcode Warehouse Symbol WS2000 by Symbol Technologies from The Barcode Warehouse. ... High Performabce Omni Antenna (Pipe bomb), 2.4 GHz, 5dBi RBNC connector ... www.thebarcodewarehouse.co.uk/ wireless/symbol+technologies/ws2000/827/0/5 - 101k - Mar 6, 2006 - Cached - Similar pages ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From justin-cypherpunks at soze.net Tue Mar 14 15:44:08 2006 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 14 Mar 2006 23:44:08 +0000 Subject: Please DO NOT refer to our High Gain Omni Directional as Pipe Bomb In-Reply-To: <20060314211227.GM25017@leitl.org> References: <20060314211227.GM25017@leitl.org> Message-ID: <20060314234407.GA976@arion.hive> > Subject: Immediate Action Required: Please DO NOT refer to our High > Gain Omni Directional (ML-5299-HPA1-01 & ML-2499-HPA3-01/-02) as Pipe > Bomb > Importance: High > > Hi all: We had a recent reported incident where a partner carrying > one of our omni directional antennas labeled Pipe Bomb was arrested > at Orange County airport and led to the airport shutdown for some > period of time. Homeland Security and TSA have been in touch with > Anthony Bartolo regarding this incidence and we need to act promptly > to prevent any future incidences. possible replacement labels: "Harmless cylinder" "Idiot discriminator" "Unclassified baton" -- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants. From mpqjdx at sbc.com Tue Mar 14 18:24:55 2006 From: mpqjdx at sbc.com (Haynes) Date: Wed, 15 Mar 2006 00:24:55 -0200 Subject: health is wealth Message-ID: <20013315132416.A30727@pawprint.jitterbugging.co.uk> The Only online pharmacy verified by BBB and approved by Visa Seal of Confidence Quality meds at quality prices, and shipping so discrete that comes fast at your doorstep Please give us an opportunity fo check us http://Kelvin.roadrus.com not interested? you can out-out at our website From gregory.rider at gmail.com Wed Mar 15 02:09:02 2006 From: gregory.rider at gmail.com (Greg Rider) Date: Wed, 15 Mar 2006 02:09:02 -0800 Subject: Justin Berry and related incidents In-Reply-To: <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> References: <2d4ed5060603131603i6c186d91x16a06b6d9e58b6f6@mail.gmail.com> <2d4ed5060603131802p45f314bv1ff2c6202565d850@mail.gmail.com> <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> Message-ID: <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> The jya at cryptome address is saying mailbox full, so I've forwarded my reply to you here at jfet.org... Let me know if what you think of our site, see below (and pls do not distribute it yet) > ---------- Forwarded message ---------- > From: Greg Rider > Date: Mar 13, 2006 4:03 PM > Subject: Re: Justin Berry and related incidents > To: John Young > > > Hi John, > > After speaking with some friends who respect what you've done in the > past, I've decided to provide you with a direct link to a site we're > going to announce in the next 2 weeks called WIKITRUTH.INFO. Please > do not announce this site or spread out this URL as we're still > working on some things. > > I think you will find this to be of interest: > > http://www.wikitruth.info/index.php?title=Uncensored:Justin_Berry > http://www.wikitruth.info/index.php?title=Talk:Uncensored:Justin_Berry > http://www.wikitruth.info/index.php?title=Wikitruth:Justin_Berry > > Right now the hot topic is the article for Jack Thompson (attorney), > while Justin Berry is being pushed under the rug by Wikipedia > administrators, arguing that if facts of note do not dignify the > subject, they should not be included. (!) Truly frightening. > > > The reason I'm giving you a link to this project early on is I wanted > to invite you to join it. There is no commitment, I just ask that you > pick a unique and anonymous username. > > If you're interested in helping out here and there, just let me know > what username you'd like and I will create an account for you. > Otherwise, feel free to visit the new site any > time. From justin-cypherpunks at soze.net Tue Mar 14 19:49:45 2006 From: justin-cypherpunks at soze.net (Justin) Date: Wed, 15 Mar 2006 03:49:45 +0000 Subject: Please DO NOT refer to our High Gain Omni Directional as Pipe Bomb In-Reply-To: References: <20060314234407.GA976@arion.hive> Message-ID: <20060315034945.GA22668@arion.hive> On 2006-03-15T15:04:59+1300, Peter Gutmann wrote: > Justin writes: > > >possible replacement labels: > > > >"Harmless cylinder" > >"Idiot discriminator" > >"Unclassified baton" > > Since BATON is a Type I algorithm, it'd hardly be unclassified. The antenna is not a Type 1 algorithm. It's unclassified, and it's a baton. -- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants. From aeavebxfd at msn.com Tue Mar 14 22:54:37 2006 From: aeavebxfd at msn.com (Harris Bourgeois) Date: Wed, 15 Mar 2006 04:54:37 -0200 Subject: Top 10 Best Watches TrWp Message-ID: <68GO87FE.0G24.aeavebxfd@msn.com> World Top10 Branded Watches at 90% off the original price. We have almost all models to be choosen from which makes our replikas the best and highest quality assured by our manufacturer or else full refund is being given without questions ask. Check us out toooday.. http://043.oysterswitsugga.com dPD6 From bgyoa at diper.com Wed Mar 15 08:26:00 2006 From: bgyoa at diper.com (Shaun J. Pereira) Date: Wed, 15 Mar 2006 08:26:00 -0800 Subject: 1 billion may die from Asian Flu Message-ID: <554714.7928712024020.537420808074.KSDK.7362@a> backpack ,big itkin itislamic !wasteful it'scasbah seeintricacy notgilbertson acomic bepursuant maydote it cartridge somegorky onanyway anddecatur andellis notdenotative beticket andbile thene beleghorn somemiltonic !infamy andbearish somerook mayhunt someprotocol oncider thehernandez ,spurn inknown ornemesis ,distraught aecclesiastic seeinsurrection ! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1788 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image821.gif Type: image/gif Size: 8862 bytes Desc: not available URL: From gregory.rider at gmail.com Wed Mar 15 08:26:25 2006 From: gregory.rider at gmail.com (Greg Rider) Date: Wed, 15 Mar 2006 08:26:25 -0800 Subject: Justin Berry and related incidents In-Reply-To: <20060315143903.GB735@proton.jfet.org> References: <2d4ed5060603131603i6c186d91x16a06b6d9e58b6f6@mail.gmail.com> <2d4ed5060603131802p45f314bv1ff2c6202565d850@mail.gmail.com> <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> <20060315143903.GB735@proton.jfet.org> Message-ID: <2d4ed5060603150826x24c92cfeh8ec39f8cbfb25d09@mail.gmail.com> Excellent. :) On 3/15/06, Riad S. Wahby wrote: > Greg Rider wrote: > > The jya at cryptome address is saying mailbox full, so I've forwarded my > > reply to you here at jfet.org... Let me know if what you think of our > > site, see below (and pls do not distribute it yet) > > Point of order: cypherpunks is a relatively extensive public list... > I therefore suspect that the cat is already out of the bag. > > -- > Riad S. Wahby > rsw at jfet.org From eugen at leitl.org Wed Mar 15 00:25:32 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Mar 2006 09:25:32 +0100 Subject: /. [PGP Creator's Zfone Encrypts VoIP] Message-ID: <20060315082532.GC25017@leitl.org> Link: http://slashdot.org/article.pl?sid=06/03/14/1842248 Posted by: CmdrTaco, on 2006-03-15 01:12:00 Philip Zimmermann, creator of PGP wrote in to tell me about [1]Zfone, his new system for encrypting any SIP VoIP voice stream. His first release is Mac & Linux only. I tested it with him using Gizmo as our client and it was pretty trivial to use. While it should work on most any SIP compatible VoIP client, he hopes that clients like OpenWengo and Gizmo will incorporate Zfone directly into the UI. Zfone has no centralization, and has been submitted to the IETF. He hasn't yet determined a license, but he believes strongly in releasing source code for all encryption products. A windows client is forthcoming. References 1. http://www.philzimmermann.com/EN/zfone/index.html ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rsw at jfet.org Wed Mar 15 06:39:03 2006 From: rsw at jfet.org (Riad S. Wahby) Date: Wed, 15 Mar 2006 09:39:03 -0500 Subject: Justin Berry and related incidents In-Reply-To: <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> References: <2d4ed5060603131603i6c186d91x16a06b6d9e58b6f6@mail.gmail.com> <2d4ed5060603131802p45f314bv1ff2c6202565d850@mail.gmail.com> <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> Message-ID: <20060315143903.GB735@proton.jfet.org> Greg Rider wrote: > The jya at cryptome address is saying mailbox full, so I've forwarded my > reply to you here at jfet.org... Let me know if what you think of our > site, see below (and pls do not distribute it yet) Point of order: cypherpunks is a relatively extensive public list... I therefore suspect that the cat is already out of the bag. -- Riad S. Wahby rsw at jfet.org From bill.stewart at pobox.com Wed Mar 15 09:49:11 2006 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 15 Mar 2006 09:49:11 -0800 Subject: /. [PGP Creator's Zfone Encrypts VoIP] In-Reply-To: References: <20060315082532.GC25017@leitl.org> Message-ID: <6.2.1.2.0.20060315091933.034f54e8@pop.idiom.com> At 08:13 AM 3/15/2006, Tyler Durden wrote: >This is interesting. >Sorry...I'm a working stiff so I haven't kept up with the protocols. Does >SIP in any way force a centralized "switch" paradigm on the VoIP >implementation? My thinking is that it does not, it's more of an interface. >Which means that Zfone could be Peer-to-Peer, and I would bet Zimmerman >would have shot for that. >Anyone know? SIP is no longer quite "simple", but it's certainly simpler and more powerful than H.323. It looks a lot like an IM system. The basic model is client/server, with servers that can proxy requests to other servers, where the job of a server is to provide presence service so that clients can find each other, and actual media channels are client-to-client. (This does mean that you sometimes need to tunnel through NAT and firewalls.) Because servers can proxy requests to other servers, it's no longer a simple hierarchy model. And most SIP clients support direct client-to-client connections - as long as you figure out the destination user's address yourself if you don't have a server, and don't mind not having a server to tell you who's calling, reject junk callers, etc. A popular approach is to have an IP PBX that uses SIP functions to listen to IP phones or IP video, talk to other IP PBXs, and talk to telco SIP servers to reach old telco phones, (alternatively to support traditional telco lines using hardware on the PBX), and also to talk to other servers like conference bridges, voicemail, or voicemail-to-email gateways. The two main pre-SIP standards our there are H.323, which is a simpler client-server model that reuses large amounts of ugly ISDN protocols, and Cisco's SCCP (aka "Skinny") which is a simpler pre-H.323 protocol. There are a number of different SIP server types out there - Asterisk IP PBX is a free open-source application that runs on Linux. Most of the development is funded by Digium, a company that sells hardware like telco interface boards for PCs, including T1, single-line telco interfaces, and single-line phone interfaces, etc. - VOIP servers built into routers. Cisco mostly uses Skinny, but they'll do SIP "real soon". - Old PBX vendor PBXs with IP boards - mostly H.323, with SIP support emerging. - Centralized SIP servers that support sites with IP phones and no servers - This includes routers from Cisco, etc., as well as specialized servers from vendors like Sylantro and Acme Packets. In the pre-SIP world, you generally don't mix site-based servers like Asterisk and centralized servers, because you don't need both, except for things like Cisco SRST failure-mode support in routers, but since SIP supports proxies, you may have a local server that does your basic presence service and centralized servers for voicemail. - Some people are playing with Distributed Hash Tables instead of real servers. As far as encryption goes, SIP does most of its signalling with an HTTP-like protocol that you can run over TLS, and does media support with RTP (which can be the secure or non-secure versions.) Unfortunately, far too many SIP servers don't handle the crypto negotiations, not only do they not burn the horsepower to do signalling over TLS, they also don't help the clients exchange keys. From coderman at gmail.com Wed Mar 15 10:46:23 2006 From: coderman at gmail.com (coderman) Date: Wed, 15 Mar 2006 10:46:23 -0800 Subject: /. [PGP Creator's Zfone Encrypts VoIP] In-Reply-To: <6.2.1.2.0.20060315091933.034f54e8@pop.idiom.com> References: <20060315082532.GC25017@leitl.org> <6.2.1.2.0.20060315091933.034f54e8@pop.idiom.com> Message-ID: <4ef5fec60603151046xf42b742gc4cdb40cb9dc1622@mail.gmail.com> On 3/15/06, Bill Stewart wrote: > ... > The basic model is client/server, with servers that can proxy requests to > other servers, > where the job of a server is to provide presence service so that > clients can find each other, and actual media channels are client-to-client. > (This does mean that you sometimes need to tunnel through NAT and firewalls.) > Because servers can proxy requests to other servers, > it's no longer a simple hierarchy model. there is also TRIP: http://www.voip-info.org/wiki-TRIP an inter-domain routing protocol for VoIP (like BGP for voice). for various political reasons this has never seemed to go anywhere. i posted a patch for gcc 3.x a while back if anyone wants to build the vovida trip daemon on a modern system. From camera_lumina at hotmail.com Wed Mar 15 08:13:45 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 15 Mar 2006 11:13:45 -0500 Subject: /. [PGP Creator's Zfone Encrypts VoIP] In-Reply-To: <20060315082532.GC25017@leitl.org> Message-ID: This is interesting. Sorry...I'm a working stiff so I haven't kept up with the protocols. Does SIP in any way force a centralized "switch" paradigm on the VoIP implementation? My thinking is that it does not, it's more of an interface. Which means that Zfone could be Peer-to-Peer, and I would bet Zimmerman would have shot for that. Anyone know? -TD >From: Eugen Leitl >To: cypherpunks at jfet.org >Subject: /. [PGP Creator's Zfone Encrypts VoIP] >Date: Wed, 15 Mar 2006 09:25:32 +0100 > >Link: http://slashdot.org/article.pl?sid=06/03/14/1842248 >Posted by: CmdrTaco, on 2006-03-15 01:12:00 > > Philip Zimmermann, creator of PGP wrote in to tell me about [1]Zfone, > his new system for encrypting any SIP VoIP voice stream. His first > release is Mac & Linux only. I tested it with him using Gizmo as our > client and it was pretty trivial to use. While it should work on most > any SIP compatible VoIP client, he hopes that clients like OpenWengo > and Gizmo will incorporate Zfone directly into the UI. Zfone has no > centralization, and has been submitted to the IETF. He hasn't yet > determined a license, but he believes strongly in releasing source > code for all encryption products. A windows client is forthcoming. > >References > > 1. http://www.philzimmermann.com/EN/zfone/index.html > >----- End forwarded message ----- >-- >Eugen* Leitl leitl http://leitl.org >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.ativel.com >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From measl at mfn.org Wed Mar 15 09:30:55 2006 From: measl at mfn.org (J.A. Terranson) Date: Wed, 15 Mar 2006 11:30:55 -0600 (CST) Subject: Justin Berry and related incidents In-Reply-To: <20060315143903.GB735@proton.jfet.org> References: <2d4ed5060603131603i6c186d91x16a06b6d9e58b6f6@mail.gmail.com> <2d4ed5060603131802p45f314bv1ff2c6202565d850@mail.gmail.com> <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> <20060315143903.GB735@proton.jfet.org> Message-ID: <20060315113042.D7425@ubzr.zsa.bet> On Wed, 15 Mar 2006, Riad S. Wahby wrote: > Greg Rider wrote: > > The jya at cryptome address is saying mailbox full, so I've forwarded my > > reply to you here at jfet.org... Let me know if what you think of our > > site, see below (and pls do not distribute it yet) > > Point of order: cypherpunks is a relatively extensive public list... > I therefore suspect that the cat is already out of the bag. Meow... -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From rah at shipwright.com Wed Mar 15 10:52:29 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 15 Mar 2006 13:52:29 -0500 Subject: Justin Berry and related incidents In-Reply-To: <20060315113042.D7425@ubzr.zsa.bet> References: <2d4ed5060603131603i6c186d91x16a06b6d9e58b6f6@mail.gmail.com> <2d4ed5060603131802p45f314bv1ff2c6202565d850@mail.gmail.com> <2d4ed5060603141134w4877c137hc005a380eaee8aca@mail.gmail.com> <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> <20060315143903.GB735@proton.jfet.org> <20060315113042.D7425@ubzr.zsa.bet> Message-ID: At 11:30 AM -0600 3/15/06, J.A. Terranson wrote: >Meow... Telegraph. Telephone. Tell Het... Oh, forget it... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From luvenia.hurlburt9cq at gmail.com Wed Mar 15 13:14:40 2006 From: luvenia.hurlburt9cq at gmail.com (Sara Mayfield) Date: Wen, 15 Mar 2006 14:14:40 -0700 Subject: Hey buddy, whats up Message-ID: <200603150714.k2F7EbKp023413@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1121 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Tue Mar 14 18:04:59 2006 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 15 Mar 2006 15:04:59 +1300 Subject: Please DO NOT refer to our High Gain Omni Directional as Pipe Bomb In-Reply-To: <20060314234407.GA976@arion.hive> Message-ID: Justin writes: >possible replacement labels: > >"Harmless cylinder" >"Idiot discriminator" >"Unclassified baton" Since BATON is a Type I algorithm, it'd hardly be unclassified. Peter. From emc at artifact.psychedelic.net Wed Mar 15 17:56:22 2006 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Wed, 15 Mar 2006 17:56:22 -0800 (PST) Subject: Justin Berry and related incidents In-Reply-To: <2d4ed5060603150209o79234c5ata51c3e18bc5fe41f@mail.gmail.com> Message-ID: <200603160156.k2G1uMRr011060@artifact.psychedelic.net> Greg Rider writes: > > http://www.wikitruth.info/index.php?title=Uncensored:Justin_Berry > > http://www.wikitruth.info/index.php?title=Talk:Uncensored:Justin_Berry > > http://www.wikitruth.info/index.php?title=Wikitruth:Justin_Berry This looks like an interesting site. The Wikipedia admins have backed off a bit on their Justin Berry feeding frenzy, and allowed a new, albeit somewhat tamer article, to be written. I'm now banned under several accounts until the entropy death of the universe, although I did manage to disparage Jimbo for a while until I was locked out. Progress, I guess. :) -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From iufcypherpunks at jfet.org Thu Mar 16 00:59:58 2006 From: iufcypherpunks at jfet.org (Laurence Haley) Date: Thu, 16 Mar 2006 00:59:58 -0800 Subject: Presenting Loans at low rates Message-ID: you won't believe this Homeowner / cypherpunks at al-qaeda.net You have been pre-approved for a $466,706 Home Loan at a 3.73 Fixed Rate. This offer is being extended to you unconditionally and your credit is in no way a factor. To take Advantage of this Limited Time opportunity All we ask is that you visit our Website and complete The 1 minute post Approval Form http://NX4aox.teamrefiusa.com Ciao, Laurence Haley From olib at paynejones.com Wed Mar 15 12:44:18 2006 From: olib at paynejones.com (Christopher Garland) Date: Thu, 16 Mar 2006 01:44:18 +0500 Subject: There are over 20 ways to use the Gravitizer, check it out. Message-ID: a magnificent sight, and gives hope that the rest of Cron can be restored to its Young people do have the ability to adapt well. They are being painting or drawing. In fact, a sculptor friend of mine had free in a form that is so malleable that you can just pastebomb -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 934 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cannabis.gif Type: image/gif Size: 17151 bytes Desc: not available URL: From shipley.beaty at gmx.de Wed Mar 15 20:03:01 2006 From: shipley.beaty at gmx.de (Burl Sutton) Date: Thu, 16 Mar 2006 12:03:01 +0800 Subject: Want to live forever? Message-ID: <200603162003.k2GK3T7Q013005@proton.jfet.org> After the age of twenty-one, your body slowly stops releasing an important hormone known as HGH (Human Growth Hormone). The reduction of HGH, which regulates levels of other hormones in the body (including testosterone, estrogen, progesterone, and melatonin) is directly responsible for many of the most common signs of growing old, such as wrinkles, gray hair, decreased energy, and diminished sexual function. Human Growth Hormone will normally yield the following results: - Boost your immune system - Rejuvenate your body and mind - Feel & look younger - Reduce wrinkles, lose weight, decrease cellulite - Restore your sex drive and vigor - Revitalize your heart, liver, kidneys & lungs - Maintain muscle mass - Refresh memory, mood and mental energy - Sleep soundly and awake rested - Help eliminate stress, fatigue and depression http://bikghlmacdf.redneckfun.net/?ejacdfxwqowybikzhghghlm From eugen at leitl.org Thu Mar 16 04:40:01 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 16 Mar 2006 13:40:01 +0100 Subject: In-Reply-To: <20060309063952.GA5984@proton.jfet.org> References: <30C45300-843A-4DBE-847F-46694AC0749B@mac.com> <4ef5fec60603082022q6f7260eeq668d9c97737a7aba@mail.gmail.com> <20060308222922.O52713@ubzr.zsa.bet> <20060309063952.GA5984@proton.jfet.org> Message-ID: <20060316124001.GL25017@leitl.org> On Thu, Mar 09, 2006 at 01:39:52AM -0500, Riad S. Wahby wrote: > Maybe we can resuscitate this beast. I suppose a good start would be > de-lurking myself, but we shall see if that's really a possibility or > not. We almost certainly can. It's a lot of work, though. > As to the make-your-own-node howto, I haven't had the opportunity yet, > but I see the glimmer of free time at the end of the tunnel, so it > really is forthcoming, after a fashion. Rock on. I'll probably virtually completely disappear after end October, though. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: From rah at shipwright.com Thu Mar 16 11:31:40 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 16 Mar 2006 14:31:40 -0500 Subject: [Clips] Painkiller Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Thu, 16 Mar 2006 14:29:10 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Painkiller Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com Forbes Legal Painkiller Daniel Lyons 03.03.06, 12:00 PM ET BOSTON - Companies have turned into data pack rats, stashing millions of e-mail files and other documents. And why not? Saving stuff is easy, and cheap, thanks to ever-declining prices on disk and tape drives. Just one problem: Some companies now have so much stuff saved that it takes forever to sift through mountains of material to find anything. Complying with discovery requests in a lawsuit can cost more than $1 million as companies sometimes need to hire extra staff to cull through records. "It's a very broken business process. Companies just don't have tools to do this in the right way," says Andrew Cohen, associate general counsel and compliance practice lead at EMC, the king of data storage hardware and software. "Sometimes the cost of discovery can be higher than whatever settlement ends up getting paid in a lawsuit." Seeing an opportunity, EMC this week rolled out an all-in-one "e-Discovery Solution" that combines EMC storage hardware, document management software and consulting services. The idea is to put a document storage infrastructure in place so that companies can find documents in less time. "We come at this in a proactive way, at a very high level," says Cohen. "We're saying you can save money by managing your information in a proactive and smarter way up front, by thinking about what information belongs in the repository and also by having the right tools to manage that information." Cohen, 41, knows first-hand how painful these discovery requests can be. For the past seven years he has been an associate general counsel at EMC, handling employment lawsuits and compliance issues. "We went through a lot of pain, and spent a lot of money just for data processing costs on some pretty routine discoveries. That got my attention," Cohen says. A year ago, Cohen changed hats and became a product manager of sorts, assembling a solution that EMC could sell to big corporations to help them manage legal discovery in a more efficient way. He says customers are eager to hear about EMC's solution. One of the first to sign up was MasterCard, the Purchase, N.Y.-based credit card issuer. For Hopkinton, Mass.-based EMC, the push into services is all part of an ongoing transformation which began in 2001, when industry veteran JosephTucciJoseph Tucci took over as chief executive. In the 1990s, EMC had boomed simply by selling giant storage boxes to customers who had a seemingly unlimited appetite for disk space. But in recent years, things have changed. Though companies are still adding data at a fast clip, they're now looking for more than just big boxes. They also need help managing vast repositories of data, which can reside in different places and on different media--some on tape, some on various kinds of disk-based systems. Toward that end, over the past few years, EMC has quietly transformed itself into a seller of services and software to go with its hardware. Since 2003, the company has spent $4 billion acquiring more than a dozen software companies, including Documentum, Legato and VMware. EMC also has created a 9,000-employee services division whose consultants help customers develop strategies for managing giant repositories of data. EMC calls this "information life cycle management." Tucci's push into software and services has paid off. In 2005, those two areas accounted for slightly more than 50% of EMC's overall revenues. Last year, EMC earned $1.1 billion on sales of $9.7 billion, up from $871 million on sales of $8.2 billion in 2004. Looking ahead, this year analysts expect EMC to reap revenues of just over $11 billion. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From pgut001 at cs.auckland.ac.nz Wed Mar 15 17:41:44 2006 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Thu, 16 Mar 2006 14:41:44 +1300 Subject: speaking of weak primes, weak exponents? In-Reply-To: <4ef5fec60603110033h3a572882sabe833f71a412a00@mail.gmail.com> Message-ID: coderman writes: >not a big deal or something to be concerned about? (the speed improvement >shown makes me think this should be a check performed for all prime selection >in any pubkey system, even if it is unlikely) I've also posted this to sci.crypt to see if anyone there had any comments, both Tom St.Denis (a regular contributor and author of libtomcrypt) and David Wagner (needs no introduction :-) comment that the chance of a random 512-bit prime having this form is about 1/2^250, so it's not worth checking for. See the sci.crypt thread for more info. Peter. From programs at necsi.org Thu Mar 16 15:06:45 2006 From: programs at necsi.org (NECSI Programs) Date: Thu, 16 Mar 2006 18:06:45 -0500 Subject: No subject Message-ID: Subject: Special program on _Homeland and International Security_ at ICCS Special program on _Homeland and International Security_ at the International Conference on Complex Systems. Events over the past few years have altered perspectives about priorities of national and international challenges. The scientific community, and particularly the Complex Systems community, should respond by providing new insights tools and approaches informing policy, preparation and action. In particular, international terrorism, pandemics, and natural disasters are leading to a broad need for strategies to address national and international security. The science of complex systems, including network analysis, agent simulations, and new approaches to systems engineering, provide a basis for better identification and prioritization of challenges, developing strategies for addressing them, and executing the strategies that are developed. The huge investments that are currently underway and planned in these areas should be guided by complex systems ideas. We are planning multiple sessions on the topic of Homeland and International Security at the International Conference on Complex Systems. Abstracts can be submitted through the conference webpage at http://necsi.org/conferences/iccs06 Key topics include, but are not restricted to: --Modeling and simulation of attacks, pandemics and disasters --Critical infrastructure protection --Network analysis of terrorism --Social processes of radical movements supporting terrorism --Analysis of effective and ineffective crisis response --Network analysis of transnational emergency response Agencies and organizations that are interested in presenting funding opportunities or collaborations are welcome. ----------------------------------------------------------------- Yaneer Bar-Yam Professor and President New England Complex Systems Institute http://necsi.org ----------------------------------------------------------------- ----------------- complex-announcements at necsi.org If you prefer not to receive messages about this and future programs please let us know by sending an email to complex-announcements-off at necsi.org. If this does not work send an e-mail to: complex at necsi.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eoaqsasiwitqa at avaya.com Thu Mar 16 19:12:45 2006 From: eoaqsasiwitqa at avaya.com (Hayes) Date: Thu, 16 Mar 2006 20:12:45 -0700 Subject: Hear to what our Med Customer says Message-ID: <5220277.103133zikkpgdzcgjctb@avaya.com> The Only online pharmacy verified by BBB and approved by Visa Seal of Confidence Quality meds at quality prices, and shipping so discrete that comes fast at your doorstep Please give us an opportunity fo check us http://Aurora.ascamp.com not interested? you can out-out at our website From coderman at gmail.com Thu Mar 16 21:34:04 2006 From: coderman at gmail.com (coderman) Date: Thu, 16 Mar 2006 21:34:04 -0800 Subject: for the bored: test an iso (esp those with via padlock hw) Message-ID: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> if you'd like to help me test some crypto pieces the following ISO includes a test mode which gathers stats and hardware info. feel free to trim whatever from this report and send me the remainder. additional modes support a network-less key management mode and a network enabled instance and cd/dvd writing clone mode. i'm curious about the following mainly: - does it boot? - is network hardware (no wireless) detected in 'net' target? - does entropy mgmt on VIA hardware work? (c5test/c5keys/c5net) - does the clonecd/clonedvd work with your hardware? (clone) - are the key mgmt tools provided sufficient/working? (gpg, openssl, ssh) feedback appreciated. please note the test mode may take a loooong time (30 mins not uncommon). also note you may be left with a single seeder on a slow DSL line, which might take a while as well. src for mtrngd and modified hw_random in src/ on the iso. these bits need some work... thanks http://home.peertech.org:65534/test.iso.torrent gpg --print-md sha256 test.iso test.iso: C7096E4F 76F6AE52 F3E61058 0C269EC3 9C2A1478 B11DDDC5 0664F9F 864DDB44 you can run this without any disks for the security conscious. the full project is intended for release at defcon this year. hope to see you there. (not as a presentation, we just like to geek out. and i'll try to be sober this year but no promises!) From URVEXN at yahoo.com Thu Mar 16 08:06:45 2006 From: URVEXN at yahoo.com (Zelma Lundy) Date: Thu, 16 Mar 2006 22:06:45 +0600 Subject: All Mens Need This ZUH2u Message-ID: <101.12e558d5.2a9ONI44@sol.com> Here's latest "Longz" formula has been proven to add inches to the sizes while multiplying orgasms like never had before. Our products is light years ahead of our competitors which has millions of happy users. Check us out..You won't regret. http://inthemeshwith.com RVqPyc From coderman at gmail.com Fri Mar 17 00:43:25 2006 From: coderman at gmail.com (coderman) Date: Fri, 17 Mar 2006 00:43:25 -0800 Subject: [programs@necsi.org: Special program on _Homeland and International Security_ at ICCS] In-Reply-To: <20060317081016.GA25017@leitl.org> References: <20060317081016.GA25017@leitl.org> Message-ID: <4ef5fec60603170043l5401a1b8tac65ed3af0c258e3@mail.gmail.com> On 3/17/06, Eugen Leitl wrote: > ----- Forwarded message from NECSI Programs ----- > ... > Special program on _Homeland and International Security_ > at the International Conference on Complex Systems. > ... > The scientific community, and particularly the Complex > Systems community, should respond by providing new insights > tools and approaches informing policy, preparation and action. > > ... > --Critical infrastructure protection > ... > --Analysis of effective and ineffective crisis response > --Network analysis of transnational emergency response heh, i'd love to see sante fe & necsi soundly trashing tsa no fly lists and ssss labeling, nsa's tia reborn, and every other program the vast majority of "security" bureaucracy/funding is porked in. rapid repair is key, and att's ndr program a model with some success. perhaps cognitive wireless radios (software defined? fuck the fcc!) will provide a good last mile in the near future... as for other industries / organizations - some systems are just broken against a skilled asymmetric attacker. time to move on... From coderman at gmail.com Fri Mar 17 02:11:38 2006 From: coderman at gmail.com (coderman) Date: Fri, 17 Mar 2006 02:11:38 -0800 Subject: for the bored: test an iso (esp those with via padlock hw) In-Reply-To: <20060317085555.GD83256@afflictions.org> References: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> <20060317085555.GD83256@afflictions.org> Message-ID: <4ef5fec60603170211w3433bc3dn351c5f5c59e8ebb8@mail.gmail.com> On 3/17/06, Damian Gerow wrote: > ... > I'm curious: what's the intent of this project? identity management and decentralized and/or wireless networks. we'll see how much gets finished by summer... > Though I'm on DSL as well, I'll leave my seed up for a loooong time to help > out with this. thanks; there shouldn't be much traffic and anything is helpful. From dgerow at afflictions.org Fri Mar 17 00:55:55 2006 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 17 Mar 2006 03:55:55 -0500 Subject: for the bored: test an iso (esp those with via padlock hw) In-Reply-To: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> References: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> Message-ID: <20060317085555.GD83256@afflictions.org> Thus spake coderman (coderman at gmail.com) [17/03/06 00:48]: : if you'd like to help me test some crypto pieces the following ISO : includes a test mode which gathers stats and hardware info. feel free : to trim whatever from this report and send me the remainder. : additional modes support a network-less key management mode and a : network enabled instance and cd/dvd writing clone mode. I'm curious: what's the intent of this project? I should be able to give it a test in about a week or so (I'm away from my normal habitat at the moment). : feedback appreciated. please note the test mode may take a loooong : time (30 mins not uncommon). also note you may be left with a single : seeder on a slow DSL line, which might take a while as well. Though I'm on DSL as well, I'll leave my seed up for a loooong time to help out with this. From rah at shipwright.com Fri Mar 17 05:12:33 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 17 Mar 2006 08:12:33 -0500 Subject: [Clips] 'A' Is for Anarchy Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Fri, 17 Mar 2006 06:09:52 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] 'A' Is for Anarchy Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com OpinionJournal WSJ Online TASTE COMMENTARY 'A' Is for Anarchy Anarchism has gone from intellectually complicated and violent to just plain silly. BY TODD SEAVEY Friday, March 17, 2006 12:01 a.m. EST It might look like just another violent sci-fi film from the ads, but "V for Vendetta," opening in theaters across the country today, is the first superhero movie that's explicitly anarchist. Larry and Andy Wachowski, the producers, also brought us "The Matrix"--which ended, as you'll recall, with Neo's memorable anarchic warning to humanity's captors that he was going to "show them . . . a world without rules and controls, without borders or boundaries" and spark a revolution. The Wachowskis are now apparently trying something even more radical in adapting this comic-book story. The "V" film features some delightfully topsy-turvy casting. The man who played the enslaved Winston Smith in "1984" (John Hurt) now plays the fascistic leader of a future London. The man who played authoritarian Agent Smith in "The Matrix" (Hugo Weaving) now portrays a deranged freedom-fighter/terrorist wearing a Guy Fawkes mask (Fawkes being the real-life terrorist who tried to blow up the British Parliament 400 years ago). And the actress who was an elected queen in recent "Star Wars" films (Natalie Portman) now plays an oppressed journalist. But the greatest turnabout, if it actually occurs, will be audiences cheering for the hero of the film, who is a terrorist. Where did the ideas behind this movie come from, and why would we have any sympathy for them? London audiences may be particularly wary, recalling not only last year's jihadist bombings there but also, from the history books, anarchist bomb attacks on the London Underground in 1883 and 1896. The attacks were part of a campaign across Europe near the turn of the century, the inspiration for anarchist villains in novels by G.K. Chesteron, Joseph Conrad and others. America's own collective cultural memory of anarchism generally begins with the killing of eight Chicago police officers by anarchists in the 1886 Haymarket Riot, the assassination of President McKinley by an anarchist in 1901 and the murders committed by immigrant Italian anarchists Sacco and Vanzetti in 1920 (they were indeed guilty, as their own lawyer admitted to a sympathetic Upton Sinclair, who kept the knowledge hidden for years). Anarchism, the idea that society would be better off without the constraints of government, has a long and often sordid history. What is arguably the first book urging the complete abolition of government, "A Vindication of Natural Society," was written 250 years ago by the man usually credited with founding conservatism, Edmund Burke. The British philosopher and politician, who served in the very Parliament building that Fawkes tried to destroy, argued that the same sort of anti-authoritarian reasoning that was being used in the 18th century to dispel religious belief could be used to undermine earthly political leaders. Scholars long accepted Burke's assurances later in life--when he had become a conservative member of the (generally liberal) Whig Party--that "Vindication" was merely satire. But 20th-century "anarcho-capitalist" economist Murray Rothbard argued that Burke's views had simply evolved over time and that Burke was embarrassed by his youthful ideological excesses. Indeed, anarchism has often been an attractive notion for young people. Paul Avrich, a historian of anarchism who died a few weeks ago in New York, suggested that James Joyce, Bernard Shaw and Eugene O'Neill were all anarchists early on in their intellectual development. Regardless of whether Burke's book was a satire, it was an inspiration to the man who first developed a full anarchist philosophy, William Godwin. He combined conservative religious sensibilities with Whig-inspired political arguments and communist-anarchist solutions to conclude that God-given goodness and the rational nature of human beings meant that the best outcomes would occur in the absence of force, thereby alleviating the need for both government and property. The utopian oddness of this view, whatever the sophistication of its argument, is a hallmark of anarchist reasoning. In the 19th century, anarchist radicals who, from our perspective, seem to have diametrically opposed views often thought of themselves as a united front, aligned against the political establishment. Many anarchists believed, then as now, that government and the free market should both wither away and allied themselves with Marxists. But there were also ardently capitalist anarchists, such as Lysander Spooner, who started his own profit-making postal service to compete with the U.S. government's lazy monopoly. Marxists found more in common with French anarchist Pierre-Joseph Proudhon, who famously declared that "property is theft!" Russian anarchists and communists found figures they could both admire in Michael Bakunin and Peter Kropotkin, who praised "mutual aid" as an alternative to top-down government. (One sees hints of Kropotkin's thought in things like the medical center quickly set up in New Orleans by the anarchist group Common Ground while the government floundered in the wake of Katrina.) Russia's most famous anarchist, though, was Leo Tolstoy, who said: "There are no crimes so revolting that they would not readily be committed by men who form part of a government." But Tolstoy, in stark contrast to the likes of the Haymarket murderers, appealed in the name of Christianity for an end to violence by soldiers and anarchists alike. (His countryman Dostoevsky was unconvinced and depicted anarchists as both dangerous and self-destructive in "The Devils.") For most of the 20th century, it must be acknowledged, anarchism functioned as little more than an adjunct to other, more popular, political movements: labor in the case of "anarcho-syndicalists" and left-anarchists such as Emma Goldman; capitalism in the case of anarchist libertarians like Rothbard; and hippie culture in the case of prankster chaos-worshippers like authors Robert Anton Wilson and Hakim Bey. As anarchism has aged and largely eschewed violence (fantasies like "V for Vendetta" notwithstanding), its members seem to have gone one of two routes, either becoming fringe figures who produce manifestoes and performance art of no great political impact or, ironically, choosing to replace the chaotic violence of old with allegiance to the more predictable, systematic coercion of laws and government. The ideal of the ending of all political control has gradually, perhaps inevitably, been pushed aside by the more familiar one of shaping political control to suit one's own agenda. In fact, modern so-called anarchists are usually working to increase government power. They form an important faction of the antiglobalization movement, agitating for stricter regulations on international trade. To judge by the sometimes violent protests at World Trade Organization conferences, the latest anarchists are usually grungy kids with strange hair and piercings; it is hard to say for certain, but they have probably spent more time listening to Rage Against the Machine and the Clash than reading Godwin or Proudhon. Perhaps the greatest evidence that there is little intellectual heft left in the anarchist movement is the occasional protests in Albany, N.Y., where self-proclaimed anarchists turn up to protest budget cuts at state-run schools. It's a satire Burke never could have dreamed of. Mr. Seavey edits HealthFactsAndFears.com (now part of the OpinionJournal Federation of sites). -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Fri Mar 17 00:10:16 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 17 Mar 2006 09:10:16 +0100 Subject: [programs@necsi.org: Special program on _Homeland and International Security_ at ICCS] Message-ID: <20060317081016.GA25017@leitl.org> ----- Forwarded message from NECSI Programs ----- From b.m.m.d.weger at TUE.nl Fri Mar 17 09:03:32 2006 From: b.m.m.d.weger at TUE.nl (Weger, B.M.M. de) Date: Fri, 17 Mar 2006 18:03:32 +0100 Subject: MD5 collisions in one minute Message-ID: Hi all, You might be interested in knowing that my MSc student Marc Stevens has found a considerable speedup of MD5 collision generation. His improvements of Wang's method enables one to make MD5 collisions typically in one minute on a PC; sometimes it takes a few minutes, and sometimes only a few seconds. His paper (shortly to appear on the Cryptology ePrint Archive) can be found on http://www.win.tue.nl/hashclash/, where we've also made his software available (source code and a Win32 executable). Grtz, Benne de Weger --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Fri Mar 17 10:55:20 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 17 Mar 2006 19:55:20 +0100 Subject: [b.m.m.d.weger@TUE.nl: MD5 collisions in one minute] Message-ID: <20060317185520.GR25017@leitl.org> ----- Forwarded message from "Weger, B.M.M. de" ----- From eugen at leitl.org Fri Mar 17 10:57:39 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 17 Mar 2006 19:57:39 +0100 Subject: Justice Dept. Report Cites F.B.I. Violations Message-ID: <20060317185739.GS25017@leitl.org> http://www.michaelmoore.com/words/latestnews/index.php?id=6144 March 9th, 2006 11:55 am Justice Dept. Report Cites F.B.I. Violations By Eric Lichtblau / New York Times WASHINGTON, March 8 b The Federal Bureau of Investigation found apparent violations of its own wiretapping and other intelligence-gathering procedures more than 100 times in the last two years, and problems appear to have grown more frequent in some crucial respects, a Justice Department report released Wednesday said. While some of these instances were considered technical glitches, the report, from the department's inspector general, characterized others as "significant," including wiretaps that were much broader in scope than approved by a court and others that were allowed to continue for weeks or sometimes months longer than was authorized. In one instance, the F.B.I. received the full content of 181 telephone calls as part of an intelligence investigation, instead of merely the billing and toll records as authorized, the report found. In a handful of cases, it said, the bureau conducted physical searches that had not been properly authorized. The inspector general's findings come at a time of fierce Congressional debate over the program of wiretapping without warrants that the National Security Agency has conducted. That program, approved by President Bush, is separate from the F.B.I. wiretaps reviewed in the report, and the inspector general's office concluded that it did not have the jurisdiction to review the legality or operations of the N.S.A. effort. But, the report disclosed, the Justice Department has opened reviews into two other controversial counterterrorism tactics that the department has widely employed since the Sept. 11 attacks. In one, the inspector general has begun looking into the F.B.I.'s use of administrative subpoenas, known as national security letters, to demand records and documents without warrants in terror investigations. Some critics maintain that the bureau has abused its subpoena powers to demand records in thousands of cases. In the other, the Office of Professional Responsibility, a Justice Department unit that reviews ethics charges against department lawyers, has opened inquiries related to the detention of 21 people held as material witnesses in terror investigations. As with the F.B.I.'s use of administrative subpoenas, civil rights advocates assert that the Justice Department has abused the material witness statute by holding suspects whom it may not have enough evidence to charge. The new ethics inquiries are reviewing accusations that department officials did not take some material witnesses to court within the required time, failed to tell them the basis for the arrest or held them without any attempt to obtain their testimony as supposed witnesses in terror investigations, the inspector general said Wednesday. Representative John Conyers Jr. of Michigan, ranking Democrat on the House Judiciary Committee, characterized the report as "yet another vindication for those of us who have raised concerns about the administration's policies in the war on terror." Mr. Conyers said that "despite the Bush administration's attempt to demonize critics of its antiterrorism policies as advancing phantom or trivial concerns, the report demonstrates that the independent Office of Inspector General has found that many of these policies indeed warrant full investigations." For its part, the F.B.I. said in a statement that it had been quick to correct errors in intelligence-gathering procedures when they were discovered and that "there have been no examples by the F.B.I. of willful disregard for the law or of court orders." The inspector general's review grew out of documents, dealing with intelligence violations, that were released last year under a Freedom of Information Act request by the Electronic Privacy Information Center, a private group in Washington. The inspector general then obtained more documents on violations and included an 11-page analysis of the problem as part of a broader report Wednesday on counterterrorism measures. The inspector general reviewed 108 instances in which the F.B.I. reported violations to an oversight board in the 2004 and 2005 fiscal years. "We're always looking to bring the number of violations down," John Miller, chief spokesman for the bureau, said in an interview, "but given the scope and complexity of national security investigations, that's a relatively small number." The inspector general's review found that reported violations under the Foreign Intelligence Surveillance Act, which governs some federal wiretaps, accounted for a growing share of the total, having risen to 69 percent last year from 48 percent in 2004. The duration of the violations also grew in some crucial areas, the review found. Two of those areas were the "overcollection" of intelligence b going beyond the scope approved by the court in authorizing a wiretap b and "overruns," in which a wiretap or other intelligence-gathering method was allowed to continue beyond the approved time period without an extension. The review found that the average amount of time that overcollections and overruns were allowed before they were discovered and corrected rose to 32 days last year from 22 in 2004. In most cases, the F.B.I. was found to be at fault, while about a quarter of the time a "third party," usually a telecommunications company, was to blame, the data showed. In taking issue with some of the findings, F.B.I. officials said the data were skewed by a number of exceptionally long violations; one wiretap lasted 373 days. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From vwviw at hotmail.com Fri Mar 17 12:31:06 2006 From: vwviw at hotmail.com (Lorrie Covington) Date: Fri, 17 Mar 2006 22:31:06 +0200 Subject: Obtained DIplomas in 2 Weeks NqM Message-ID: <131.46e558d5.2a9UXE44@sol.com> Obtain a prosperous future, money-earning power and the prestige that comes with having the career position you've always dreamed of. Diplomas from prestigious non-accredited universities based on your present knowledge and life experience. No required tests, classes, books or examinations. Bachelors', Masters', MBA's, Doctorate & Ph.D. degrees available in your field. Confidentiality Assured.. Call Now To Receive Your Diploma Within 2 Weeks 1-484-693-8861 ka From observer at westnet.com Sat Mar 18 03:03:31 2006 From: observer at westnet.com (John F. McMullen) Date: March 18, 2006 3:03:31 AM PST Subject: Harlan Levy: Caught Up in DNA's Growing Web Message-ID: >From the New York Times -- Op-Ed Contributor Caught Up in DNA's Growing Web by Harlan Levy THE announcement this week that DNA from a paroled violent felon working as a bouncer matches that found on plastic ties used to bind a murdered graduate student highlights DNA's power to implicate people already in state databases. Fifteen years ago, as a Manhattan homicide prosecutor, I was an aggressive proponent of taking DNA from convicted murderers, rapists and other violent felons so we could catch them when they committed crimes again. I even quit my day job to write a book likening the identification of criminals through DNA to the voice of God speaking on earth. I still firmly believe in the power of DNA to catch the guilty and exonerate the innocent. This week's developments seem likely to vindicate that faith again. But for all this technology's promise, proposals by some to extend DNA databanks far beyond convicted felons, and even to the general population, go too far. In the early 1990's, state legislatures did what many early proponents of DNA urged: they passed laws to take DNA from those convicted of murder, rape and other violent felonies. Then they enacted laws to take DNA from most convicted felons. Misdemeanor sex crimes were next, a logical, intelligent measure. But the proposed next steps in DNA collection were more problematic. In 1998, New York City's police commissioner, Howard Safir, proposed that DNA be taken from all arrestees. And Gov. George Pataki has sought to take DNA from people convicted of any misdemeanor, without proof that such offenders are more likely than the general population to commit violent felonies or sex crimes (the kinds of offenses where DNA evidence is most useful). And the buzz today among prosecutors, judges and defense lawyers is that proposals to take DNA from the entire population are next. What, if anything, is wrong with this picture? DNA databanks do help apprehend dangerous criminals (and thereby prevent crime). But most people aren't violent criminals and never will be, so putting their DNA on file exposes them to risks that they otherwise wouldn't face. First, the people who collect and analyze DNA can make mistakes (witness the Houston Police Department Laboratory, whose slapdash DNA procedures led to at least one wrongful conviction). Second, people can be framed by the police, a rival or an angry spouse. Third, DNA is all about context; there may be innocent reasons for a person's DNA to be at a crime scene, but the police are not always so understanding. Indeed, with a universal national DNA databank, innocent people may be embroiled in criminal investigations when their DNA (a single hair or spot of saliva on a drinking glass) appears in a public or private place where they had every right to be. Even if we get past those objections (do you trust the government with your DNA on file?), the practical barriers to universal collection loom larger still. In a nation with no institutionalized national identification cards, photo files or fingerprinting, just imagine requiring all citizens and residents to report to the local registry for DNA collection. So the advocates of universal testing will urge the collection of DNA at birth. Aside from the atmospherics of registering newborns (don't you know that children are our future ... criminals), rapid technological advances suggest that we will not be using the same methods to analyze and store DNA results 20 years from now, when those grown babies begin committing crimes. [snip] Weblog at: ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dewayne at warpspeed.com Sat Mar 18 05:34:20 2006 From: dewayne at warpspeed.com (Dewayne Hendricks) Date: Sat, 18 Mar 2006 05:34:20 -0800 Subject: [Dewayne-Net] Harlan Levy: Caught Up in DNA's Growing Web Message-ID: [Note: This item comes from reader John McMullen. DLH] From zfxdh at abisolutions.com Sat Mar 18 06:41:19 2006 From: zfxdh at abisolutions.com (Rosella B. Richards) Date: Sat, 18 Mar 2006 06:41:19 -0800 Subject: FWD: Chenney shot a lawyer Message-ID: <355387.1847034561632.097112799310.REAE.6955@troop> consumptive tryfireman mayinfatuate inshattuck butcobble bequart andshinbone ortroupe theimitable bebonnet inhabib andcontraceptive it'sconfuse mayolden barbour tryangeles seearrowhead ,scrawl !adhesive theclad trymacromolecule it'smother itbacklog !bronchiolar aalistair thesawyer mayother butdunk seedivide avery orcoddle somestiff trythicken andcurd orclink bemoose it -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1801 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image432.gif Type: image/gif Size: 21482 bytes Desc: not available URL: From leechjdf at hotmail.com Fri Mar 17 19:27:43 2006 From: leechjdf at hotmail.com (Lauren) Date: Sat, 18 Mar 2006 08:27:43 +0500 Subject: [9] Successful stock recommendation for winning players Message-ID: <200603181327.k2IDRfQd013754@proton.jfet.org> Manage your stocks using expert recommendation ......PREMIER INFORMATION (Other OTC:PIFR.PK).... Climbs 100% plus since its IPO, just signing an agreement with TOP 10 in-surancee company in US (AccuQuote). The company is pleased and proud to be working with a wide range of clients that includes in-surancee industry leaders Transamerica In-surancee and John Hancock In-surancee, as well as leading online in-surancee br0ker AccuQuote. We Do Not See this slowing down. Must boom on Monday, pay attention on it! Check up here: more info: http://finance.yahoo.com/q/h?s=PIFR.PK&t=2006-03-18T05:31:54 Must CHECK IT, before Monday. Top-performing stocks recommended by investment experts From squires at zargon.hobbesnet.org Sat Mar 18 11:59:13 2006 From: squires at zargon.hobbesnet.org (Scott Squires) Date: Sat, 18 Mar 2006 13:59:13 -0600 Subject: Update: Torbutton 1.0.1 Message-ID: Announcing Torbutton 1.0.1 http://zargon.hobbesnet.org/~squires/torbutton/torbutton-1.0.1.xpi * bugfix: toolbar button tooltips now display the correct status * bugfix: set socks5 proxy to tor port (9050) instead of privoxy (8118) * bugfix: allow user to change proxy exclusion list ("no proxy for") * new: added compatibility with firefox 1.0 and 0.9 * new: use socks_remote_dns on firefox versions that have it * new: added update functionality through the extensions manager * new: added preference: display statusbar panel (yes/no) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Sat Mar 18 07:14:47 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Mar 2006 16:14:47 +0100 Subject: [dewayne@warpspeed.com: [Dewayne-Net] Harlan Levy: Caught Up in DNA's Growing Web] Message-ID: <20060318151446.GM25017@leitl.org> ----- Forwarded message from Dewayne Hendricks ----- From jayda.freehf81 at gmail.com Sat Mar 18 03:44:54 2006 From: jayda.freehf81 at gmail.com (Brandi Cochran) Date: Sat, 18 Mar 2006 17:44:54 +0600 Subject: Greater control over ejaculation Message-ID: <200603182344.k2INiqAD028371@proton.jfet.org> A recent survey showed that 68% of women are unsatisfied with their sexual partners. Of course most of these women would never tell their partner that they are unhappy. Not being able to fully satisfy a woman can result in depression and feelings of inadequacy. Thankfully, men of all ages can now safely and naturally enhance their body and penis anatomy and renew sexual vitality without resorting to dangerous surgery. The all natural proprietary blend of unique herbs found in Maxaman is designed to restore blood flow to your penis, unleash stored testosterone, and heighten sensation by activating the body's natural hormone production and supplying vital nutrients necessary for peak sexual performance. http://efhlcdgijm.johnsource.com/?abkcdgijmxwqowyefzmmhl From eugen at leitl.org Sat Mar 18 12:02:19 2006 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Mar 2006 21:02:19 +0100 Subject: [squires@zargon.hobbesnet.org: Update: Torbutton 1.0.1] Message-ID: <20060318200219.GS25017@leitl.org> Very useful extension. ----- Forwarded message from Scott Squires ----- From steve49152 at yahoo.ca Sun Mar 19 09:56:37 2006 From: steve49152 at yahoo.ca (Steve Thompson) Date: Sun, 19 Mar 2006 12:56:37 -0500 (EST) Subject: [dave@farber.net: [IP] Justice Dept e-mail on wiretapping program released through FOIA] In-Reply-To: <20060313133620.GH25017@leitl.org> Message-ID: <20060319175637.25489.qmail@web33502.mail.mud.yahoo.com> --- Eugen Leitl wrote: > ----- Forwarded message from David Farber ----- > From: David Farber > Date: Fri, 10 Mar 2006 06:02:18 -0500 [moving along a bit...] > -------- Original Message -------- > Subject: Justice Dept e-mail on wiretapping program released through > FOIA > Date: Thu, 09 Mar 2006 12:22:27 -0800 > From: Jim Warren > To: Dave Farber > > From: The National Security Archive [mailto:NSARCHIVE at hermes.gwu.edu] On > Behalf Of National Security Archive > Sent: Thursday, March 09, 2006 1:12 PM > > National Security Archive Update, March 9, 2006 > > Justice Department e-mail on wiretapping program released through FOIA [Just a bit further...] > Former official describes legal defenses as "weak" and "slightly > after-the-fact," Guesses they reflected "VP's philosophy... best > defense is a good offense." > > For more information: > Thomas Blanton or Kristin Adair - 202/994-7000 > > http://www.nsarchive.org Sigh. > Washington, D.C., 9 March 2006 - The Justice Department official who > oversaw national security matters from 2000 to 2003 e-mailed his former > colleagues after revelation of the controversial warrantless wiretapping > program in December 2005 that the Department's justifications for the > program were "weak" and had a "slightly after-the-fact quality" to them, > and surmised that this reflected "the VP's philosophy that the best > defense is a good offense," according to documents released through a > Freedom of Information Act lawsuit brought by the Electronic Privacy > Information Center and joined by the ACLU and the National Security > Archive. > > David Kris, the former associate deputy attorney general who now serves > as chief ethics and compliance officer at Time Warner, e-mailed Justice > Department official Courtney Elwood on 20 December 2005 his own analysis > of the controversy, writing that "claims that FISA [the wiretapping > statute] simply requires too much paperwork or the bothersome marshaling > of arguments seem relatively weak justifications for resorting to > Article II power in violation of the statute." The subject line of the > e-mail was "If you can't show me yours." > > On 22 December, after reading the Department's talking points as > forwarded by Elwood, Kris commented that the Department's approach > "maybe... reflects the VP's [Vice President Cheney] philosophy that the > best defense is a good offense (I don't expect you to comment on that > :-))." > > On 19 January 2006, Kris wrote Elwood that the Department's white paper > was "professional and thorough and well written" but that "I kind of > doubt it's going to bring me around on the statutory arguments." > > The Kris e-mails were the only substantive new documents released by the > Justice Department yesterday in response to the March 8 deadline ordered > by U.S. District Court Judge Henry Kennedy in the FOIA lawsuit brought > by EPIC together with the ACLU and the Archive, seeking the internal > legal justifications used by the government to carry out the wiretapping > program. In three separate letters to the plaintiffs, Justice claimed > it had fully searched the records of the Office of the Attorney General > and had made a "full grant" of the FOIA requests, yet most of the > released material consisted of the previously released white paper and > transcripts of public appearances by the Attorney General. Justice > produced not a single record relating to any of the 30-odd > reauthorizations of the wiretapping program that President Bush has > publicly stated took place in 2002, 2003, 2004 and 2005. Urk! Wiretapping? Nah, couldn't be.... > Justice's Office of Legal Counsel admitted in its response that in the > two-and-a-half months since the FOIA requests were filed, OLC had only > completed its search of its unclassified files. "The unclassified files > are exactly the place where the wiretapping memos are least likely to > exist," commented Thomas Blanton, director of the National Security > Archive. "This is a case of looking for your car keys under the street > lamp even if that's a block away from where you lost them." > > http://www.nsarchive.org Well, Duh! What kind of idiot stores memos (dangerous at the best of times!) concerning wiretapping, and presumably its reasons and possibly incidental commentary, in unclassified record stores? What kind of fucking idiot does that in the Hallowed Halls of Clandestenia, and more importantly: what kind of sclerotic retard goes looking for such records with a bleeping FOIA request?! That's what I want to know. Regards, Steve __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From rah at shipwright.com Sun Mar 19 13:10:45 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 19 Mar 2006 16:10:45 -0500 Subject: [Clips] Wave of federal workers to retire Message-ID: In addition to the usual May-esque "leaches won't stop sucking the tit" content, there's extra-added crunchy TLA goodness... Cheers, RAH ------- --- begin forwarded text Delivered-To: clips at philodox.com Date: Sun, 19 Mar 2006 16:02:35 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Wave of federal workers to retire Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com >From the Baltimore Sun Wave of federal workers to retire Some agencies streamline hiring as longtime staff prepare to leave By Melissa Harris Sun reporter March 19, 2006 The wave of federal workers originally hired to spy on the Soviet Union, launch the Great Society and regulate everyone from polluters to drugmakers in the 1960s and 1970s is beginning to age out of the work force, an exodus that some officials say could drain expertise and diminish the quality of service. The numbers point to what some call a "retirement tsunami": 60 percent of federal workers are older than 45, and many could retire now if they wanted to, compared with 31 percent in the private sector, according to one think tank. Experts say that the next five years could see a mass exit of experienced - and loyal - employees at a time when some younger workers see public service as a steppingstone to lucrative private-sector jobs. "The loss of so many individuals with a deep, ingrained institutional knowledge of their agency has the potential to cause a lapse or pause of service delivery," Linda Springer, director of the Office of Personnel Management, said at a luncheon at the National Press Club in Washington. Max Stier, president of the Partnership for Public Service, a nonprofit human resources think tank, said he sees signs of that in such things as the slow federal response to Hurricane Katrina and the lagging translation of foreign intelligence at the FBI. "It's a problem of rust, rather than engine failure," said Stier, whose group, which helps the federal government improve its hiring practices, provided numbers on the coming federal retirement wave. "It creeps up slowly but nonetheless can have devastating consequences. ... The work will not get done at the same level unless older workers stay longer or they are replaced with equal or superior folks." Don Freeburn is one of those whose skills and experience hang in the balance. Hired by NASA in 1965, he worked on the Apollo program and is a general engineer with the Department of Energy. He could have retired eight years ago, but college bills kept him in the work force. "First of all, the job is great," said Freeburn, 63, of Clarksburg. "Second, this is a high cost-of-living area, and, basically, I had two kids in college, a wife who went back to college, and those debts over the last 10 years. Next year, I'll take another look at the finances." His situation mirrors that of many older workers who rode into public service on the idealism of the 1960s. Heeding the call Early in that decade, people in their 20s heeded President John F. Kennedy's call to do something for their country, and the federal government hired them in record numbers. Excluding the Postal Service, it added more than 428,000 employees during the 1960s, a growth of about 23 percent. The Social Security Administration, with headquarters in Woodlawn, was a prime illustration. By the mid-1970s, young employees had swelled its work force to almost 82,500 workers nationally, nearly seven times its size in 1950. Many of them were hired en masse to handle an expansion of disability benefits. The tide turned in the 1980s and 1990s. During the Reagan era, executive branch employment outside of the Defense Department and the Postal Service shrank 11 percent, to 1.16 million, according to Office of Personnel Management data, as employees rode out on anti-big-government rhetoric. Budgets were stripped. Agencies laid off workers under official "reductions in force." Then President Bill Clinton shrank the military. Privatization further scaled back the ranks, as did early-retirement packages aimed at meeting year-to-year cuts. Some recruiters no longer had a reason to give speeches at colleges or attend a large number of job fairs because they were hiring few people. Little attention was given to whether enough talent remained to replace retiring senior managers. As a result, both of the Baltimore area's largest agencies - Social Security and the National Security Agency - have been playing catch-up. "We hired no more than a handful of people, 200 to 250 per year, through the '90s," said John Taflan, director of human resources at the NSA, which eavesdrops on calls and e-mail globally. "We had to ramp up to rebuild a recruiting network. ... It took us about three years to get it going again." Given the new demands after the Sept. 11, 2001, terrorist attacks, the agency plans to hire 1,500 people worldwide yearly from 2003 to 2011, and Taflan said the nature of that work dictates that about 60 percent of those hired are recent college graduates. But training those workers - 97 percent of whom stay until retirement - is slow. "It takes three to five years and, for more difficult languages, seven years, to train someone to see behind the actual spoken word and draw conclusions from it," Taflan said. "It's hard to hire someone midway through their career because of the long training time. They're over halfway through their career and just learning how to do the work." Social Security hired almost 16,000 workers from fiscal 2002 to fiscal 2005 to gear up for coming retirements. The agency is in fairly good shape in terms of staffing, officials say. "SSA hasn't been losing permanent positions in great numbers," said Terry Stradtman, a regional director who oversees 450 workers in several Mid-Atlantic states, including Maryland. "Some other agencies have been forced to downsize more drastically." Hurdles to hiring In filling crucial vacancies in a tight labor market, government agencies face a number of challenges. Workers with more than 30 years of service can retire as early as age 55 and not lose benefits. Federal workers have pensions, a well-managed 401(k)-style plan and access to health care for life, but their pay generally is lower than in the private sector. Statistics show that government agencies end up hiring a far smaller percentage of their interns than do their private-sector counterparts. And the government hiring process can be the definition of red tape, with job postings written in impenetrable jargon and applicants asked to answer detailed questionnaires as well as submit college transcripts. Previously, the Woodlawn-based Centers for Medicare & Medicaid Services took 90 days on average to hire someone, and its personnel department had to go through 64 steps to do so. Many applicants never heard back from the agency. Federal executives had to be persuaded that recruitment, hiring and retention were top priorities, said Dan Blair, deputy director of the Office of Personnel Management. "We had to convince people at the top level that this is not a human resources thing that can be relegated to the back room," Blair said. The Medicare agency has made over its hiring process, drastically reducing the number of steps and smoothing out the language in its job postings. Social Security has won awards in planning for the retirement wave and for its rapid hiring speed of 26 days from application deadline to a job offer during fiscal year 2005. The National Security Agency and other intelligence agencies have started sharing job applications. The NSA also runs a program that gives college students free tuition, room and board in exchange for a commitment to work for the government after graduation. On the whole, the federal government is trying to move faster and to sweeten the pot with sign-on bonuses, work-from-home opportunities and tuition reimbursement. "We feel we have as fine of a recruitment marketing program as anyone else in terms of our posters, brochures and CD-ROMs," said Fred Glueckstein, who directs Social Security's recruitment planning efforts. "We have materials in almost 100 languages. We've put a lot of thought in how to do this right." Retention Agencies are also beginning to look at ways to retain graying workers past their retirement age, something that might dovetail with the desires of baby boomers. A Merrill Lynch survey last year found that 76 percent of people born after World War II and before 1964 plan to work during retirement. Ideally, the respondents said, they would like to move between periods of work and leisure. Almost all of them - 94 percent - said they don't plan to work full time. Federal rules don't always support flexibility. But Springer said the retirement wave means that federal agencies no longer have the "luxury" of turning away workers with decades of institutional knowledge just because they don't want to work 9-to-5 every day. The aging of the federal work force has effects beyond the on-the-job hours. In the 1970s, Social Security headquarters had more than 100 softball teams for its energetic young workers. Six teams remain. "I occasionally have to serve the players icepacks with their beers," joked Carol Wiland, a bartender at Monaghan's Pub in Gwynn Oak, which has served as the teams' de facto clubhouse for decades. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From arma at mit.edu Sun Mar 19 22:16:10 2006 From: arma at mit.edu (Roger Dingledine) Date: Mon, 20 Mar 2006 01:16:10 -0500 Subject: Tor 0.1.1.16-rc is out Message-ID: This is the second release candidate for the 0.1.1.x series. It fixes a variety of odds and ends, including getting started on making it easier to add new authoritative dirservers. http://tor.eff.org/download.html Changes in version 0.1.1.16-rc - 2006-03-18 o Bugfixes on 0.1.1.15-rc: - Fix assert when the controller asks to attachstream a connect-wait or resolve-wait stream. - Now do address rewriting when the controller asks us to attach to a particular circuit too. This will let Blossom specify "moria2.exit" without having to learn what moria2's IP address is. - Make the "tor --verify-config" command-line work again, so people can automatically check if their torrc will parse. - Authoritative dirservers no longer require an open connection from a server to consider him "reachable". We need this change because when we add new auth dirservers, old servers won't know not to hang up on them. - Let Tor build on Sun CC again. - Fix an off-by-one buffer size in dirserv.c that magically never hit our three authorities but broke sjmurdoch's own tor network. - If we as a directory mirror don't know of any v1 directory authorities, then don't try to cache any v1 directories. - Stop warning about unknown servers in our family when they are given as hex digests. - Stop complaining as quickly to the server operator that he hasn't registered his nickname/key binding. - Various cleanups so we can add new V2 Auth Dirservers. - Change "AllowUnverifiedNodes" to "AllowInvalidNodes", to reflect the updated flags in our v2 dir protocol. - Resume allowing non-printable characters for exit streams (both for connecting and for resolving). Now we tolerate applications that don't follow the RFCs. But continue to block malformed names at the socks side. o Bugfixes on 0.1.0.x: - Fix assert bug in close_logs(): when we close and delete logs, remove them all from the global "logfiles" list. - Fix minor integer overflow in calculating when we expect to use up our bandwidth allocation before hibernating. - Fix a couple of bugs in OpenSSL detection. Also, deal better when there are multiple SSLs installed with different versions. - When we try to be a server and Address is not explicitly set and our hostname resolves to a private IP address, try to use an interface address if it has a public address. Now Windows machines that think of themselves as localhost can work by default. o New features: - Let the controller ask for GETINFO dir/server/foo so it can ask directly rather than connecting to the dir port. - Let the controller tell us about certain router descriptors that it doesn't want Tor to use in circuits. Implement SETROUTERPURPOSE and modify +POSTDESCRIPTOR to do this. - New config option SafeSocks to reject all application connections using unsafe socks protocols. Defaults to off. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Sun Mar 19 23:56:05 2006 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 20 Mar 2006 08:56:05 +0100 Subject: [arma@mit.edu: Tor 0.1.1.16-rc is out] Message-ID: <20060320075605.GF25017@leitl.org> ----- Forwarded message from Roger Dingledine ----- From promotexxx at yhgzz.com Sun Mar 19 23:47:08 2006 From: promotexxx at yhgzz.com (Allie) Date: Mon, 20 Mar 2006 10:47:08 +0300 Subject: For Your Business References: Message-ID: <372gsf21wzv887xy117mf$bzd7zep67k345$cya63rrz753@HS30> Promotion. Tools for you: - Provide emaiI Iist according to your order: We will customize your customer email Iist for you. - Send over emaiIs according to your need: We will customize your Iist and mailing your exclusive message for you. * We may supply maiIing solutions (S.erver). Contact us by Supporea at 3126.com Mr Pack Business Support Supporea at 3126.com This email is for cypherpunks at al-qaeda.net. Not email me: Just1@@AIM.com From coderman at gmail.com Mon Mar 20 15:16:44 2006 From: coderman at gmail.com (coderman) Date: Mon, 20 Mar 2006 15:16:44 -0800 Subject: The topology of covert conflict Message-ID: <4ef5fec60603201516k3b9475bdn4902160b408f3b1b@mail.gmail.com> an interesting paper... http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-637.pdf "Abstract. Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing network; medics attempting to halt the spread of an infectious disease by selective vaccination; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barabasi famously analysed the static case, and showed that vertex-order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework based on evolutionary game theory to explore the interaction of attack and defence strategies. We show, first, that naive defences don't work against vertex-order attack; second, that defences based on simple redundancy don't work much better, but that defences based on cliques work well; third, that attacks based on centrality work better against clique defences than vertex-order attacks do; and fourth, that defences based on complex strategies such as delegation plus clique resist centrality attacks better than simple clique defences. Our models thus build a bridge between network analysis and evolutionary game theory, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them. Finally, we draw some conclusions and present possible directions for future research..." From coderman at gmail.com Mon Mar 20 17:18:54 2006 From: coderman at gmail.com (coderman) Date: Mon, 20 Mar 2006 17:18:54 -0800 Subject: [Clips] Port knocking: A security idea whose time has come (or not?) Message-ID: <4ef5fec60603201718g53bddaa1i4ff64e93726068@mail.gmail.com> my comments below, On 3/20/06, R. A. Hettinga wrote: > > ... > Many, many innovations come from the Linux and Unix world. Few are more > intriguing to me than port knocking. As a global security plug-in to > protect services, it has a lot going for it and few downsides. However, for > one reason or another, it suffers from lack of use and understanding. A lot > of administrators may have heard of it, but few know how to implement it. > Even fewer have used it. > > Port knocking works on the concept that users wishing to attach to a > network service must initiate a predetermined sequence of port connections > or send a unique string of bytes before the remote client can connect to > the eventual service. In its most basic form, the remote user's client > software must first connect to one or more ports before connecting to the > final destination port. limit even attempted utilization of services to authenticated users - that's a good idea. port knocking is a poor implementation though. you can do strong single packet authentication without the additive latency of port knocking, and it is a cleaner design. (see www.blackhat.com/presentations/bh-usa-05/bh-us-05-madhat.pdf for example) i've talked about IPsec stacks keyed out of band which give you a robust "authenticated peers only" configuration without esoteric port knocking / SPA methods. unfortunately right now the options available are static pre shared key (setkey) which is insecure without some scripting/munging around single use keys. (this should change soon, for some lax definition of 'soon') it'd be nice to expand the keying options for those who wish to avoid exposing any services above the IP stack without proper authentication. (that means no IKE ports either). i'm a huge fan of OpenVPN and IPsec private networking, though IPsec is better suited for this "no services for the unauthenticated" mode of operation. > The biggest advantage of all is that port knocking is platform-, service-, > and application-independent: Any OS with the correct client and server > software can take advantage of its protection. Although port knocking is > mainly a Linux/Unix implementation, there are Windows tools that can do the > same thing. And similar to IPSec and other protective mechanisms, none of > the involved services or applications has to be port-knocking-aware. this is the only thing port knocking it has going for it; SPA or VPN's are a much stronger solution. > Critics often point to the fact that eavesdropping hackers might be able to > capture and replay the successful port-knocking sequence or series of > bytes. Although this might be true with the basic implementations, attacks > such as these would be squashed by using more sophisticated authentication > methods or minimized by using secondary hard-coded allowed IP addresses > such as TCP wrappers. this is a particularly significant concern over wireless networks, and when you add sophisticated authentication you might as well jump ship to SPA or VPN instead (since you're going to be spending additional effort managing credentials anyway - do it right and be done with it!) From eqkmtl at spec.net Mon Mar 20 13:05:39 2006 From: eqkmtl at spec.net (Branden Orr) Date: Tue, 21 Mar 2006 01:05:39 +0400 Subject: It offers the most novel and sensual experiance possible! Message-ID: and procedures. The solution to Canada's present problems and Start here. In the beginning there was clay. Ya, there was clay social interactions people have nowadays. You go to places you control. We found Wax Trax, a famous alternative record outlet, without much -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 929 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: kieffer.gif Type: image/gif Size: 17151 bytes Desc: not available URL: From yhvjo at carma.be Tue Mar 21 09:53:37 2006 From: yhvjo at carma.be (Maggie L. Kern) Date: Tue, 21 Mar 2006 09:53:37 -0800 Subject: Feel bad... Message-ID: <267923.9123523404771.745679028931.JCUU.0777@criminal> criteria buteminent buthawk ,denature ,sheffield orphysiology orentrant notdeputy mayminstrel trywilliams itchalmers the conscience andaugust butrumpus it'spollutant butwiener ,which andloudspeaker !doyle begabbro notparley itgroan mayhendrick mayglissade seecollier seediscriminatory ,goad notalcoholism itdaydream beaforesaid someimplicate someswimsuit thelizard mayjumbo incaptious try -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1791 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image242.gif Type: image/gif Size: 19358 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 21 02:22:43 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 21 Mar 2006 11:22:43 +0100 Subject: skype was made by clever people Message-ID: <20060321102243.GB25017@leitl.org> http://www.secdev.org/conf/skype_BHEU06.handout.pdf -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From coderman at gmail.com Tue Mar 21 11:39:35 2006 From: coderman at gmail.com (coderman) Date: Tue, 21 Mar 2006 11:39:35 -0800 Subject: skype was made by clever people In-Reply-To: <20060321102243.GB25017@leitl.org> References: <20060321102243.GB25017@leitl.org> Message-ID: <4ef5fec60603211139t27ce024ah231fa38dee60ec4d@mail.gmail.com> On 3/21/06, Eugen Leitl wrote: > http://www.secdev.org/conf/skype_BHEU06.handout.pdf it's interesting to note that this clearly allows for a MITM as required by legal authorities (Skype mentioned fully cooperating with authorities as required - how often do they do this?). the client authentication uses public keys signed by the Skype Authority; presumably any key they sign as being "User Alice", even if belonging to "User Eve", will be accepted by the client. with no visibility in client certs at the UI level i don't see how this can be avoided. note that this is really just useful for inter-skype calls as CALEA/traditional taps can take place once a skype call hits POTS. one of the slides mentions: "You are the certification authority - You can intercept and decrypt session keys". if this means that client private keys are also handed to the skype authority then eavesdropping is trivial (and no longer requires active MITM). however, this tidbit is listed under "Skype Voice Interception - Feasibility of a man in the middle attack" so i'm not sure if they are talking about a passive eavesdrop or an active MITM with regards to the cert authority intervention. other interesting bits: they use a 2^32 strength key for RC4 obfuscation of data payloads. all this encryption is purely done to obfuscate protocol. (the binary obfuscation is impressive as well; i fucking hate that shit though :) blocking skype with one rule: iptables -I FORWARD -p udp -m length --length 39 -m u32 --u32 '27&0x8f=7' --u32 '31=0x527c4833' -j DROP approximately 20,000 super nodes exist. heap exploits for biggest botnet ever? :P~ From coderman at gmail.com Tue Mar 21 13:51:02 2006 From: coderman at gmail.com (coderman) Date: Tue, 21 Mar 2006 13:51:02 -0800 Subject: Beware the clean-cut WASP cleaning crew member working in solitary late at night... Message-ID: <4ef5fec60603211351o17678761l3059b65c71b4d194@mail.gmail.com> *grin* [from my neck of the woods, so probably more interesting to me than most. it'd also be interesting to hear other stories of suspected clandestine surveillance. this guy is friends with Brandon Mayfield, another PDX attorney who had represented middle eastern clients, who was jailed on bogus finger print matches to the spain bombings - even when spanish authorities insisted he had nothing to do with it: www.komotv.com/news/printstory.asp?id=31353 ] also interesting that ADT appears to comply fully with such black bag jobs; another reason to roll your own :) ---cut--- http://www.oregonlive.com/news/oregonian/index.ssf?/base/news/1142913320152530.xml&coll=7 Lawyer thinks office was searched in secret Surveillance - A Portland attorney, who represents a Saudi, cites suspicious circumstances Tuesday, March 21, 2006 BRYAN DENSON A Portland lawyer suspects that federal authorities executed warrantless searches of his Lloyd Center office to collect information about a client who is the subject of an international terrorism investigation. Tom Nelson, who represents Saudi national Soliman al-Buthi, previously filed a complaint that alleged warrantless interception of phone and e-mail communications between al-Buthi and his other lawyers. "We allege in our complaint not only that they intercepted communications without a warrant, but they used the interceptions to the disadvantage of the client," Nelson said. Nelson thinks government agents, with no judicial supervision, entered his office on a number of occasions last year. He first raised the suspicion in September in a letter to Karin Immergut, the U.S. attorney for Oregon, who wrote back saying she was aware of no such warrantless searches. Nelson recounted his fears about warrantless searches by the National Security Agency in a story this week in U.S. News & World Report. Two years ago, the federal government charged al-Buthi, who headed an Ashland nonprofit called al-Haramain Islamic Foundation, with taking charitable donations totaling $130,000 in traveler's checks out of the United States. Federal authorities have accused the al-Haramain parent organization, based in Saudi Arabia, of ties to Osama bin Laden. Nelson thinks that while he was representing al-Buthi on the criminal charge and attempting to rid his client of a suspected "global terrorist" designation that someone posing as a janitor repeatedly tried to, and apparently did, enter his Lloyd Center office after hours. Attorney Jonathan Norling, who shares office space with Nelson, said he was sleeping on a couch at their practice early one morning last May when a man dressed as a custodian tried to enter Nelson's office. Norling startled the man twice one night in July when he caught the man trying to enter the locked office. Norling also suspects federal authorities were trying to collect information from Nelson's desk and computer. Whoever it was, he said, had a badge for the building that appeared valid. "This person clearly wasn't a cleaning crew," Norling said. "I know the cleaning crew. They come in at different times. They have a cart, and this guy didn't have a cart. . . . I've worked here seven years, and I've worked a lot of late nights, and I never experienced anything like that until Tom was working (on this case)." Nelson was suspicious of the government, having briefly represented Brandon Mayfield, the lawyer wrongly accused of the 2004 terrorist attack in Spain. Mayfield was the subject of intense federal surveillance. Nelson's suspicions deepened when he found that his computer had inexplicably been rebooted and that papers in his cluttered office had been moved around. "I'm not the world's best housekeeper," he said, "but I know where things are." After a few suspicious experiences, Nelson took his al-Buthi files to his home in Zigzag. There he experienced what he described as unexplained lapses in his burglar alarm, failures that the company that monitors the alarm couldn't adequately explain. On Sept. 23, he fired off the first of two letters to Immergut, the U.S. attorney for Oregon, complaining of "strong indications that my office and my home have been the target of clandestine searches" related to the al-Buthi case. Immergut responded Jan. 19 that she stood by her earlier statements: She was aware of no such searches under her watch. Immergut wrote that she assumed he was referring to news reports about clandestine intercepts by the NSA. Immergut pointed out in her response that the NSA and Department of Justice were separate agencies. In an interview Monday, she added, "The (NSA) is not required to come to the U.S. attorney for the district of Oregon for authorization to conduct any kind of searches." All of which keeps Nelson scratching his head. "I have no proof the government's doing these things," he said. "I just have a very healthy suspicion they are." ---end-cut--- From pgporqvpukm at hotmail.com Tue Mar 21 08:36:10 2006 From: pgporqvpukm at hotmail.com (Lakisha Locke) Date: Tue, 21 Mar 2006 17:36:10 +0100 Subject: People Laugh at You? ewEA Message-ID: The Only Clinically Tested Penis N-largement Pills that works.. - add 1-4 inches to your peniis - 20% thicker - 5x more enjoyable orgasm - or your monneyy back without question ask! Join miilliions of delighted users which has been benefited with "Longz". http://inthemeshwith.com CAiD7N From parsons at ainsight.com Wed Mar 22 06:45:32 2006 From: parsons at ainsight.com (Patrick Cates) Date: Wed, 22 Mar 2006 08:45:32 -0600 Subject: Your account #100926887 Message-ID: <0.6.8.2.6.61585754581089.340a8704@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1183 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: badge.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From butler at kocheye.com Wed Mar 22 07:31:28 2006 From: butler at kocheye.com (Johnathon Hodges) Date: Wed, 22 Mar 2006 09:31:28 -0600 Subject: Your account #172272661 Message-ID: <664q453v.7318197@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1165 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: confucian.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From katz at chauncey.com Wed Mar 22 09:29:41 2006 From: katz at chauncey.com (Isabella Walls) Date: Wed, 22 Mar 2006 11:29:41 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <80969585501517.XPSa9nFYij@quadruple> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1206 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: tedium.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From camera_lumina at hotmail.com Wed Mar 22 09:13:43 2006 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 22 Mar 2006 12:13:43 -0500 Subject: Beware the clean-cut WASP cleaning crew member working in solitary late at n In-Reply-To: <4ef5fec60603211351o17678761l3059b65c71b4d194@mail.gmail.com> Message-ID: Well, FUCK THAT...it's boobytrap time. I remember that in Florida some years back the Grand Jury refused to indict a Bodega owner who had installed an electrified section of fence right below the ceiling gap where crooks always came in to rip him off. Shortly after the installation he came in one morning to a burnt smell and --sho' nuff--there's a guy's corpse up there still frying. These lawyers should consider it a "value add" and charge their deep pocketed clients a premium. -TD >From: coderman >To: cypherpunks at jfet.org >Subject: Beware the clean-cut WASP cleaning crew member working in >solitary late at night... >Date: Tue, 21 Mar 2006 13:51:02 -0800 > >*grin* > >[from my neck of the woods, so probably more interesting to me than >most. it'd also be interesting to hear other stories of suspected >clandestine surveillance. this guy is friends with Brandon Mayfield, >another PDX attorney who had represented middle eastern clients, who >was jailed on bogus finger print matches to the spain bombings - even >when spanish authorities insisted he had nothing to do with it: >www.komotv.com/news/printstory.asp?id=31353 ] > >also interesting that ADT appears to comply fully with such black bag >jobs; another reason to roll your own :) > >---cut--- >http://www.oregonlive.com/news/oregonian/index.ssf?/base/news/1142913320152530.xml&coll=7 > >Lawyer thinks office was searched in secret >Surveillance - A Portland attorney, who represents a Saudi, cites >suspicious circumstances >Tuesday, March 21, 2006 >BRYAN DENSON > >A Portland lawyer suspects that federal authorities executed >warrantless searches of his Lloyd Center office to collect information >about a client who is the subject of an international terrorism >investigation. > >Tom Nelson, who represents Saudi national Soliman al-Buthi, previously >filed a complaint that alleged warrantless interception of phone and >e-mail communications between al-Buthi and his other lawyers. > >"We allege in our complaint not only that they intercepted >communications without a warrant, but they used the interceptions to >the disadvantage of the client," Nelson said. > >Nelson thinks government agents, with no judicial supervision, entered >his office on a number of occasions last year. He first raised the >suspicion in September in a letter to Karin Immergut, the U.S. >attorney for Oregon, who wrote back saying she was aware of no such >warrantless searches. Nelson recounted his fears about warrantless >searches by the National Security Agency in a story this week in U.S. >News & World Report. > >Two years ago, the federal government charged al-Buthi, who headed an >Ashland nonprofit called al-Haramain Islamic Foundation, with taking >charitable donations totaling $130,000 in traveler's checks out of the >United States. Federal authorities have accused the al-Haramain parent >organization, based in Saudi Arabia, of ties to Osama bin Laden. > >Nelson thinks that while he was representing al-Buthi on the criminal >charge and attempting to rid his client of a suspected "global >terrorist" designation that someone posing as a janitor repeatedly >tried to, and apparently did, enter his Lloyd Center office after >hours. > >Attorney Jonathan Norling, who shares office space with Nelson, said >he was sleeping on a couch at their practice early one morning last >May when a man dressed as a custodian tried to enter Nelson's office. >Norling startled the man twice one night in July when he caught the >man trying to enter the locked office. > >Norling also suspects federal authorities were trying to collect >information from Nelson's desk and computer. Whoever it was, he said, >had a badge for the building that appeared valid. > >"This person clearly wasn't a cleaning crew," Norling said. "I know >the cleaning crew. They come in at different times. They have a cart, >and this guy didn't have a cart. . . . I've worked here seven years, >and I've worked a lot of late nights, and I never experienced anything >like that until Tom was working (on this case)." > >Nelson was suspicious of the government, having briefly represented >Brandon Mayfield, the lawyer wrongly accused of the 2004 terrorist >attack in Spain. Mayfield was the subject of intense federal >surveillance. > >Nelson's suspicions deepened when he found that his computer had >inexplicably been rebooted and that papers in his cluttered office had >been moved around. "I'm not the world's best housekeeper," he said, >"but I know where things are." > >After a few suspicious experiences, Nelson took his al-Buthi files to >his home in Zigzag. There he experienced what he described as >unexplained lapses in his burglar alarm, failures that the company >that monitors the alarm couldn't adequately explain. > >On Sept. 23, he fired off the first of two letters to Immergut, the >U.S. attorney for Oregon, complaining of "strong indications that my >office and my home have been the target of clandestine searches" >related to the al-Buthi case. Immergut responded Jan. 19 that she >stood by her earlier statements: She was aware of no such searches >under her watch. Immergut wrote that she assumed he was referring to >news reports about clandestine intercepts by the NSA. > >Immergut pointed out in her response that the NSA and Department of >Justice were separate agencies. In an interview Monday, she added, >"The (NSA) is not required to come to the U.S. attorney for the >district of Oregon for authorization to conduct any kind of searches." > >All of which keeps Nelson scratching his head. > >"I have no proof the government's doing these things," he said. "I >just have a very healthy suspicion they are." > >---end-cut--- From barnett at kblegal.com Wed Mar 22 12:05:17 2006 From: barnett at kblegal.com (Claude Little) Date: Wed, 22 Mar 2006 14:05:17 -0600 Subject: Urgent Notification #165657375031769956 Message-ID: <2.3.1.5.2.56884862140470.571a5246@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1192 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: complainant.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From gates at americanhealthgroup.com Wed Mar 22 14:37:18 2006 From: gates at americanhealthgroup.com (Emilio Taylor) Date: Wed, 22 Mar 2006 16:37:18 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <6.1.6.3.8.64282893043946.206a6562@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1187 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: lasso.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From ronald.roush_200 at jlv.com Wed Mar 22 14:41:31 2006 From: ronald.roush_200 at jlv.com (Jo Glover) Date: Wed, 22 Mar 2006 16:41:31 -0600 Subject: Low mortagge ratee approvall Message-ID: <3.1.9.8.1.78042377943026.191a7665@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1151 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: guitar.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From rah at shipwright.com Wed Mar 22 18:33:54 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 22 Mar 2006 21:33:54 -0500 Subject: PayPal Goes Mobile Message-ID: --- begin forwarded text Date: Wed, 22 Mar 2006 21:33:16 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: PayPal Goes Mobile MobileCrunch March 22, 2006 PayPal Goes Mobile! Posted by Oliver | Discussion: 1 comment Hot on the heels of yesterday's post, comes this amazing news from PayPal that PayPal is launching a mobile product! According the the Internet Payment Giant's website, it is now possible to send and recieve money via mobile phones as well as make purchases directly from a mobile phone. According to their published materials: Send money to friends and family Send money securely, anytime, from wherever you are. You don't need cash or a check - just your phone. After you activate your phone, you can send money one of two ways: * Text to 729725 (PAYPAL) with the amount and recipient's phone number. Example: send 5 to 4150001234 Or * Call 1-800-4PAYPAL (1-800-472-9725) and follow the instructions. Since a picture is worth more than a thousand words, here's a screen cap from their website. I'll be revisiting this later today with more details. Tags: m-commerce, mobile-money, PayPal, PayPal-Mobile, OliverStarr, mobile-commerce Categories: Uncategorized | Bookmark this post with del.icio.us Google's New F-Finance Beta Pretty on Mobile but Lacking Substance Posted by Oliver | Discussion: 1 comment Another day, another Google Beta. Pretty soon they'll have to start giving them numeric designations instead of names. Today's suspect is Google Finance which was apparently released yesterday in beta (of course) with little fanfare. If you enter the URL into a mobile phone it automatically mobilizes the content so that it is easier to read (which is a plus here, but a disaster on many other websites that have already been optimized by the site's original authors- and a topic about which I will post on shortly). The content is a little light however, as I will demonstrate in the below images where I searched for Foldera (FDRA.ob) on both Google Finance and via YubNub. The results speak for themselves. Categories: Google Mobile, Announcements, Analysis | Bookmark this post with del.icio.us -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From pjegsu50rayw at best1.net Thu Mar 23 06:32:55 2006 From: pjegsu50rayw at best1.net (Martine Dorene) Date: Thu, 23 Mar 2006 08:32:55 -0600 Subject: CHEAP WAY TO BIGGER UR SHORT & THIN D11CK ran Message-ID: <856u672f.4823025@snowcrest.net> Is your Diick short? The Only Safe & Natural Way To Bigger ur Size Guaranteed Thicker & up to 3" longer after 1 month http://gaa.weAREFollOWedBY.cOM (Click Here to buy today and get bigger after 30 days) ran but friends tying purpose easy. king discuss easy got address? pretty clear address, explain longer met steps central likely? sudden evil forty mistress purpose journey, -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1196 bytes Desc: not available URL: From perry at piermont.com Thu Mar 23 06:30:30 2006 From: perry at piermont.com (Perry E. Metzger) Date: Thu, 23 Mar 2006 09:30:30 -0500 Subject: Greek officials were tapped using law enforcement back door Message-ID: A while ago, you may recall that members of the Greek government were wiretapped, and at the time, I speculated that the bad guys may have abused the built in CALEA software in the switch to do it. Well, it now appears that that was precisely what happened. Unfortunately, the article below is short on detail -- anyone have access to primary sources? (I know there are at least a couple of Greek cryptographers on this list...) http://www.deccanherald.com/deccanherald/mar162006/update71652006316.asp Perry --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From justin-cypherpunks at soze.net Thu Mar 23 08:23:16 2006 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 23 Mar 2006 16:23:16 +0000 Subject: Paypal? Confirm Message ! (Re: PayPal Goes Mobile) In-Reply-To: References: Message-ID: <20060323162316.GA18134@arion.hive> it hs come 2 r attn tht yr acct nfo needs 2 b upd8d... https://www.paypal.com From coderman at gmail.com Thu Mar 23 22:45:19 2006 From: coderman at gmail.com (coderman) Date: Thu, 23 Mar 2006 22:45:19 -0800 Subject: entropy status / benchmarks [was test an iso] Message-ID: <4ef5fec60603232245w2c2736ffw9a91c3cae9c0b64d@mail.gmail.com> On 3/16/06, coderman wrote: > ... > - does entropy mgmt on VIA hardware work? (c5test/c5keys/c5net) for those with VIA/Intel/AMD hw entropy device support and a running mtrngd you can get current status via '/etc/rc.d/rcS.mtrngd status'. logs are in /var/log/mtrngd/. i'd be interesting in knowing run times for large amounts of entropy gathered and mixed to /dev/random (gigabytes if it remains stable for that long). particularly for the Intel and AMD hw devices which i do not currently have at my disposal for testing. status output is similar to the following; sizes are in Bytes, times/stats are in microseconds (not milli): [Fri Mar 24 08:46:14-459926] Current MTRNGD Status: bad fips blocks ......: 13080 monobit failures ___: 3359 poker run failures _: 542707 bit run failures __: 1104377 long run failures __: 9687 cont run failures __: 35 good fips blocks .....: 41614750 hwrng read bytes .....: 104069575000 entropy add bytes ....: 104036872320 random writeable cnt .: 541858710 hw entropy read stats ....: min: 2479 avg: 3359 max: 22788 total: 139833561751 rng fips check stats .....: min: 904 avg: 919 max: 6464 total: 38267989605 random recv starve stats .: min: 3416 avg: 4305 max: 24018 total: 179159453561 you can stress /dev/random via 'bench-rng /dev/random 1024 1000000' or simply 'cat /dev/random > /dev/null'. uptime would be helpful. note that i accidentally left "forgiving fips check" set in the rcS.mtrngd script; this can be turned off for a better real world test. the forgiving option does not fail blocks with poker or bit runs. monobit, long, and continuous runs are always critical and the block is discarded. the FIPS check block size is 1500 bytes. see http://csrc.nist.gov/fips/fips1401.htm for more info. by default entropy density is at 80% so take that into consideration when calculating available /dev/random throughput. ex: entropy add bytes ....: 104036872320 x 0.80 == 83,229,497,856 Bytes of actual entropy added to /dev/random pool. From coderman at gmail.com Fri Mar 24 07:06:34 2006 From: coderman at gmail.com (coderman) Date: Fri, 24 Mar 2006 07:06:34 -0800 Subject: for the bored: test an iso (esp those with via padlock hw) In-Reply-To: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> References: <4ef5fec60603162134j30fd5235h673a09e32d6e5da2@mail.gmail.com> Message-ID: <4ef5fec60603240706y494bdf3el4fe16188b84c968d@mail.gmail.com> On 3/16/06, coderman wrote: > ... > http://home.peertech.org:65534/test.iso.torrent > > gpg --print-md sha256 test.iso > test.iso: C7096E4F 76F6AE52 F3E61058 0C269EC3 9C2A1478 B11DDDC5 0664F9F 864DDB44 apologies; the correct fingerprint (minus cut and paste error) should read: test.iso: C7096E4F 76F6AE52 F3E61058 0C269EC3 9C2A1478 B11DDDC5 10664F9F 864DDB44 or, without spaces: gpg --print-md sha256 test.iso 2>/dev/null | sed 's/[^0-9A-F]//g' C7096E4F76F6AE52F3E610580C269EC39C2A1478B11DDDC510664F9F 864DDB44 test.iso: 44947456 bytes (43M) 2006-03-16 also, for weakly private communication i can be reached using Off The Record ( http://www.cypherpunks.ca/otr/ ) on AOHell Instant Masochist (AIM) with credentials: username: coderman42 fingerprint: A59CDCB3 46468A16 27D21678 270AF0B5 0B0477CF i consider email public / non-private unless we are exchanging it over a private [virtual] network. (but you should have known that already given my use of a @gmail address...) From sigal_barnea at bgminteractive.com Fri Mar 24 11:24:42 2006 From: sigal_barnea at bgminteractive.com (Nolan Oneal) Date: Fri, 24 Mar 2006 13:24:42 -0600 Subject: Pre-approved Application #UEASJ08718 Message-ID: <20831738291803.EDOzUaw1im@farewell> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1199 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: at.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From eugen at leitl.org Fri Mar 24 04:26:18 2006 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Mar 2006 13:26:18 +0100 Subject: [perry@piermont.com: Greek officials were tapped using law enforcement back door] Message-ID: <20060324122618.GO25017@leitl.org> ----- Forwarded message from "Perry E. Metzger" ----- From cbonnet74 at hartfordlife.com Fri Mar 24 12:03:48 2006 From: cbonnet74 at hartfordlife.com (Etta Murillo) Date: Fri, 24 Mar 2006 14:03:48 -0600 Subject: Pre-approved Application #jkwpL006852150 Message-ID: <6.0.9.1.2.39760501882621.585a7147@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1196 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bureaucratic.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From taylors at homestore.com Fri Mar 24 13:53:37 2006 From: taylors at homestore.com (Cornelia Lockwood) Date: Fri, 24 Mar 2006 15:53:37 -0600 Subject: Ratess will skyrocket soon Message-ID: <35710714560208.n4xNhKOTEe@agglomerate> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1184 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: pay.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From merritt at aquahabitat.com Fri Mar 24 20:02:22 2006 From: merritt at aquahabitat.com (Dean Kaufman) Date: Fri, 24 Mar 2006 22:02:22 -0600 Subject: Pre-approved Application #072957388 Fri, 24 Mar 2006 22:02:22 -0600 Message-ID: <974q438c.3901813@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1227 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cannabis.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From Erna_Hogan at kantone.net Fri Mar 24 19:08:50 2006 From: Erna_Hogan at kantone.net (Ora Gorman) Date: Fri, 24 Mar 2006 23:08:50 -0400 Subject: FREE HoddiaLife! Message-ID: own hard fate. Just as they were beginning to eat, someone dragged from my reverie of watching the passive screen to the Yet instead of being used to foster love, self realization and -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 845 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: somehow.gif Type: image/gif Size: 9155 bytes Desc: not available URL: From seoul at borg.mindspring.com Sat Mar 25 02:21:55 2006 From: seoul at borg.mindspring.com (Amy Thayer) Date: Sat, 25 Mar 2006 04:21:55 -0600 Subject: Last chance for lower rates Message-ID: <516o478j.1274444@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1178 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: appeal.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From gugler at hallgroup.net Sat Mar 25 02:54:21 2006 From: gugler at hallgroup.net (Winston Gleason) Date: Sat, 25 Mar 2006 04:54:21 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <9.1.5.9.1.63928821275262.149a0984@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1181 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: merciful.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From kmcbrksppsub at yahoo.com Sat Mar 25 04:49:18 2006 From: kmcbrksppsub at yahoo.com (Joni Wyatt) Date: Sat, 25 Mar 2006 06:49:18 -0600 Subject: Only 2 Weeks Required tHjl3R Message-ID: Good News! Interested to obtain Bachelors', Masters', MBA's, Doctorate & Ph.D. degrees available in your field in 2 weeks time? It's available now... Call Us and get yours today 1-484-693-8861 Our Education office has someone available 24 hours a day, 7 Days a week Why waiting? 1-484-693-8861 vi From colten.rowleyql39 at gmail.com Sat Mar 25 13:10:23 2006 From: colten.rowleyql39 at gmail.com (Reyna Miller) Date: Sat, 25 Mar 2006 13:10:23 -0800 Subject: Hey sweetie, hope you're well Message-ID: <200603250510.k2P5AJEw019836@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 706 bytes Desc: not available URL: From ingoldsby.cordula8hy at gmail.com Sat Mar 25 22:35:27 2006 From: ingoldsby.cordula8hy at gmail.com (Tamika Foote) Date: Sun, 26 Mar 2006 04:35:27 -0200 Subject: Hey baby, found this site and wanted you to check it out first Message-ID: <200603260235.k2Q2ZNZm017735@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1116 bytes Desc: not available URL: From coderman at gmail.com Sun Mar 26 08:37:33 2006 From: coderman at gmail.com (coderman) Date: Sun, 26 Mar 2006 08:37:33 -0800 Subject: RFA: hardware, wireless, defcon (request for assistance with project release/distribution/runtime at defcon 14) Message-ID: <4ef5fec60603260837y743c6b2ar4570a26c5cc9406e@mail.gmail.com> :: public request for help with janus wireless / open source project at defcon 14 :: if you will be at defcon 14 this august and have one or more of the following and would be willing to help with an open source project launch / test during the con please get in touch with me using Off-The-Record or coordinate a meat space rendezvous via email - coderman at gmail. coderman42 on AIM :: OTR print A59CDCB3 46468A16 27D21678 270AF0B5 0B0477CF my appreciation to anyone and everyone for their help; we will need it (we are a very small group based in portland with limited resources and time). i will try to express my appreciation and reward your generosity in some fashion. please forward this to anyone with crypto clue who might be interested and likely to participate. desired and/or required: - VIA Nehemiah hardware and >128M of memory. C5XL, C5P or C5J / C7 required. - slimline IDE or USB CDROM/DVDROM drives. - any x586/Pentium system with > 128M of ram and 8G or more free on unformatted disk partition. - portable USB storage devices that can be formatted to XFS/iso image. - any system capable of burning single or dual layer DVD-R discs. - any wireless equipment that can support WPA/WPA2 EAP TLS w RADIUS (enterprise mode) - any prism2, hermes, atheros, cisco, intel or other linux supported wireless hardware in pcmcia/cardbus or mini-PCI/PCI formfactor. 200mW+ especially useful. - 802.11 or other HAM/FHSS/DSSS/OFDM amplifiers in the 900Mhz, 2.4Ghz, and 5.8Ghz bands (or other reasonable bands - HAM with auth/no-privacy packet radio signalling?) - antennas / cables / filters / mounting systems / for any of the above bands. - audio/video recording and/or mastering equipment and knowledge. - home/work/edu internet bandwidth that can support and would be available for the conference (or a subset) running a tor proxy and/or bittorrent seeder. traffic shaping and read-only boot/runtime is supported if you use the live ISO cd for hosting a tor[rent] node. please consider the potential security risks of running a tor node reachable from a private defcon wireless network before agreeing to this. middle/relay only nodes would still be helpful. - well CPU and memory endowed systems that you would make available to a private IPsec/OpenVPN network for distributed build and test services. all hardware you want to keep is encouraged to stay in your possession and a few hours or more would be helpful when contributing time/skills at the conference. you will need to meet me in person before or the day of the conference. the earlier the better. thanks again, i look forwarded to meeting any of you in person and discussing this project and code. martin - janus wireless coderman at gmail.com|peertech.org|charter.net|mindspring.com 'bastardized Leonard Cohen; the only quote you'll ever see me tarnish so,' ---cut--- "It is not to tell you anything But to live forever That I write this. ... This is the only code I can write. I am the only one who has built it. I didn't kill myself When things went wrong I didn't shirk difficult integrity, when the easy seduced me. I learned to write I learned to code What might be named On nights like this By one like me. " ---end-cut--- -- out of date and high level description of what this project is all about: 0. Overview Warning: this software is in early experimental stages and should be used accordingly. The Janus Wireless distribution provides a secure environment for private group networking. Please read the rest of this document for a description of digital identity and group networking features implemented in this release. 1. Identity Management The cornerstone of any secure system is the concept of digital identity used to establish authenticated sessions and manage resources. The Janus Wireless software defines your identity with a combination of passphrase and a USB memory stick. Both of these methods must be used together to authenticate you and should be protected like you would protect keys to other valuable personal items like a residence or vehicle. It is very important that you understand the security of your communications and data is dependant on the security of your passphrase and USB memory stick. Store these safely and never use them on a computer where your passphrase may be captured (key logger or shoulder surfer) or the USB memory copied. Physically hardened tamper resistant and/or evident hardware tokens may be used where needed for stronger authentication security. 2. Boot Options There are four different options to choose from when booting into a secure operating system instance. Each has a distinct purpose and you must reboot your system when changing from one domain to another. This may seem a bit cumbersome at first but this step is required to ensure the security of the operating system by initializing the computer with a known configuration from the BIOS bootstrap upward. keys : The first option presented is the secure key management mode which handles creation, modification, and distribution of digital identities and the cryptographic keys associated with them. All interaction with this domain occurs via the USB memory stick and other storage devices to implement a logical "air gap" boundary between this secure domain and others. No network services or capabilities are provided. live : Live mode provides a client environment that can run directly off of the disc used to boot the computer. Network support is provided for establishing virtual private network connections. install : A permanent installation on encrypted hard disk can be deployed with this mode. Please note that full disk encryption across all partitions is required. hdd : Encrypted operating systems stored on disk can be launched with this option. Note that the USB key used to install the encrypted OS is required to boot. If you lose this key or it becomes corrupted all data will on disk will be lost. 3. Getting Started Reboot into the 'keys' mode with a USB memory stick inserted to begin creating user and resource identities. Any live or hdd configuration options can be defined at this point as well. 4. Additional Information Invoke the 'about' command and select the desired topic for additional information on using this software and other common questions. Press the keys or invoke the 'reboot' command to restart the system and enter a different bootstrap target. f9e6efb5-0374f333-978717d5-9194321e-67215b35-1c1b3106-1496b640-690342ed gpg --print-md sha512 janus-wireless-pub.txt /etc/janus/keymgr/public/janus-wireless-pub.txt: E93E70B4 B457EB34 298C7A00 32CB5FE3 832DBC69 F894E747 F1C86D5F 454B9595 C2CC5C80 4CFBB105 8639C0A3 A442424F 0CF932F6 AFA8CCD0 25E6FA02 9CEC860C From coderman at gmail.com Sun Mar 26 09:46:17 2006 From: coderman at gmail.com (coderman) Date: Sun, 26 Mar 2006 09:46:17 -0800 Subject: guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) Message-ID: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> comments? Creating a secure password: o Include punctuation marks and numbers. o Mix capital, lowercase and space characters. o Create a unique acronym. o Short passwords should be 8 chars at least. Weaknesses to avoid: o Don't use a password that is listed as an example or public. o Don't use a password you have been using for years. o Don't use a password someone else has seen you type. o Don't use a password that contains personal information. o Don't use words or acronyms that can be found in a dictionary. o Don't use keyboard patterns (qwerty) or sequential numbers. o Don't use repeating characters (aa11). Keep your password secure: o Never tell your password to anyone or use it where they can observe it. o Never send your password by email or speak it where others may hear. o Occasionally verify your current password and change it to a new one. o Avoid writing your password down. (Keep it with you in a purse or wallet if you have to write down the password until you remember it.) --- High assurance passwords / exotic threat model interactive auth: use challenge response for single use Key Encryption Keys containing a minimum of 128 bits of entropy in a full SHA-512 derived key. exotic threat model implies full process for physical, emission, cryptographic and user interface security. (i.e. expert level security infrastructure and flawless identity management). ideally this would be coupled with a personal vascular scan biometric device (user centric with vascular auth challenge to open/sign hardened internal secrets) the odds of such a device being designed, produced and verified in an open and full disclosure manner is not high. :P From coderman at gmail.com Sun Mar 26 10:50:17 2006 From: coderman at gmail.com (coderman) Date: Sun, 26 Mar 2006 10:50:17 -0800 Subject: [Full-disclosure] guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) In-Reply-To: <4426D76B.2020505@maginetworks.com> References: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> <4426D76B.2020505@maginetworks.com> Message-ID: <4ef5fec60603261050l4a4536b9o2d955de280adb728@mail.gmail.com> On 3/26/06, J. Theriault wrote: > ... > Why not just encourage your users to use a "passphrase" instead of a > "password", such as using a (with proper grammar) book/movie quote or > phrase? excessive typing == unnecessary leaked information and longer auth process (acoustic, profiling, easier pattern discovery, etc.) i don't have a problem supporting a passphrase mode (>16 chars? >32?) but i'd rather not make it the default. (and the default is and must be the most secure and usable path for this to be trustworthy and widely usable) From rah at shipwright.com Sun Mar 26 10:05:51 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 26 Mar 2006 13:05:51 -0500 Subject: [Clips] Terrorist 007, Exposed Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Sun, 26 Mar 2006 13:04:44 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Terrorist 007, Exposed Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Washington Post Terrorist 007, Exposed By Rita Katz and Michael Kern Sunday, March 26, 2006; B01 For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. The savvy, English-speaking, presumably young webmaster taunted his pursuers, calling himself Irhabi -- Terrorist -- 007. He hacked into American university computers, propagandized for the Iraq insurgents led by Abu Musab al-Zarqawi and taught other online jihadists how to wield their computers for the cause. Suddenly last fall, Irhabi 007 disappeared from the message boards. The postings ended after Scotland Yard arrested a 22-year-old West Londoner, Younis Tsouli, suspected of participating in an alleged bomb plot. In November, British authorities brought a range of charges against him related to that plot. Only later, according to our sources familiar with the British probe, was Tsouli's other suspected identity revealed. British investigators eventually confirmed to us that they believe he is Irhabi 007. The unwitting end of the hunt comes at a time when al-Qaeda sympathizers like Irhabi 007 are making explosive new use of the Internet. Countless Web sites and password-protected forums -- most of which have sprung up in the last several years -- now cater to would-be jihadists like Irhabi 007. The terrorists who congregate in those cybercommunities are rapidly becoming skilled in hacking, programming, executing online attacks and mastering digital and media design -- and Irhabi was a master of all those arts. But the manner of his arrest demonstrates how challenging it is to combat such online activities and to prevent others from following Irhabi's example: After pursuing an investigation into a European terrorism suspect, British investigators raided Tsouli's house, where they found stolen credit card information, according to an American source familiar with the probe. Looking further, they found that the cards were used to pay American Internet providers on whose servers he had posted jihadi propaganda. Only then did investigators come to believe that they had netted the infamous hacker. And that element of luck is a problem. The Internet has presented investigators with an extraordinary challenge. But our future security is going to depend increasingly on identifying and catching the shadowy figures who exist primarily in the elusive online world. The short career of Irhabi 007 offers a case study in the evolving nature of the threat that we at the SITE Institute track every day by monitoring and then joining the password-protected forums and communicating with the online jihadi community. Celebrated for his computer expertise, Irhabi 007 had propelled the jihadists into a 21st-century offensive through his ability to covertly and securely disseminate manuals of weaponry, videos of insurgent feats such as beheadings and other inflammatory material. It is by analyzing the trail of information left by such postings that we are able to distinguish the patterns of communication used by individual terrorists. Irhabi's success stemmed from a combination of skill and timing. In early 2004, he joined the password-protected message forum known as Muntada al-Ansar al-Islami (Islam Supporters Forum) and, soon after, al-Ekhlas (Sincerity) -- two of the password-protected forums with thousands of members that al-Qaeda had been using for military instructions, propaganda and recruitment. (These two forums have since been taken down.) This was around the time that Zarqawi began using the Internet as his primary means of disseminating propaganda for his insurgency in Iraq. Zarqawi needed computer-savvy associates, and Irhabi proved to be a standout among the volunteers, many of whom were based in Europe. Irhabi's central role became apparent to outsiders in April of that year, when Zarqawi's group, later renamed al-Qaeda in Iraq, began releasing its communiquis through its official spokesman, Abu Maysara al-Iraqi, on the Ansar forum. In his first posting, al-Iraqi wrote in Arabic about "the good news" that "a group of proud and brave men" intended to "strike the economic interests of the countries of blasphemy and atheism, that came to raise the banner of the Cross in the country of the Muslims." At the time, some doubted that posting's authenticity, but Irhabi, who was the first to post a response, offered words of support. Before long, al-Iraqi answered in like fashion, establishing their relationship -- and Irhabi's central role. Over the following year and a half, Irhabi established himself as the top jihadi expert on all things Internet-related. He became a very active member of many jihadi forums in Arabic and English. He worked on both defeating and enhancing online security, linking to multimedia and providing online seminars on the use of the Internet. He seemed to be online night and day, ready to answer questions about how to post a video, for example -- and often willing to take over and do the posting himself. Irhabi focused on hacking into Web sites as well as educating Internet surfers in the secrets to anonymous browsing. In one instance, Irhabi posted a 20-page message titled "Seminar on Hacking Websites," to the Ekhlas forum. It provided detailed information on the art of hacking, listing dozens of vulnerable Web sites to which one could upload shared media. Irhabi used this strategy himself, uploading data to a Web site run by the state of Arkansas, and then to another run by George Washington University. This stunt led many experts to believe -- erroneously -- that Irhabi was based in the United States. Irhabi used countless other Web sites as free hosts for material that the jihadists needed to upload and share. In addition to these sites, Irhabi provided techniques for discovering server vulnerabilities, in the event that his suggested sites became secure. In this way, jihadists could use third-party hosts to disseminate propaganda so that they did not have to risk using their own web space and, more importantly, their own money. As he provided seemingly limitless space captured from vulnerable servers throughout the Internet, Irhabi was celebrated by his online followers. A mark of that appreciation was the following memorandum of praise offered by a member of Ansar in August 2004: "To Our Brother Irhabi 007. Our brother Irhabi 007, you have shown very good efforts in serving this message board, as I can see, and in serving jihad for the sake of God. By God, we do not like to hear what hurts you, so we ask God to keep you in his care. You are one of the top people who care about serving your brothers. May God add all of that on the side of your good work, and may you go careful and successful. We say carry on with God's blessing. Carry on, may God protect you. Carry on serving jihad and its supporters. And I ask the mighty, gracious and merciful God to keep for us everyone who wants to support his faith. Amen." Irhabi's hacking ability was useful not only in the exchange of media, but also in the distribution of large-scale al-Qaeda productions. In one instance, a film produced by Zarqawi's al-Qaeda, titled "All Is for Allah's Religion," was distributed from a page at www.alaflam.net/wdkl . The links, uploaded in June 2005, provided numerous outlets where visitors could find the video. In the event that one of the sites was disabled, many other sources were available as backups. Several were based on domains such as www.irhabi007.ca or www.irhabi007.tv , indicating a strong involvement by Irhabi himself. The film, a major release by al-Qaeda in Iraq, showed many of the insurgents' recent exploits compiled with footage of Osama bin Laden, commentary on the Abu Ghraib prison, and political statements about the rule of then-Iraqi Interim Prime Minister Ayad Allawi. Tsouli has been charged with eight offenses including conspiracy to murder, conspiracy to cause an explosion, conspiracy to cause a public nuisance, conspiracy to obtain money by deception and offences relating to the possession of articles for terrorist purposes and fundraising. So far there are no charges directly related to his alleged activities as Irhabi on the Internet, but given the charges already mounted against him, it will probably be a long time before the 22-year-old is able to go online again. But Irhabi's absence from the Internet may not be as noticeable as many hope. Indeed, the hacker had anticipated his own disappearance. In the months beforehand, Irhabi released his will on the Internet. In it, he provided links to help visitors with their own Internet security and hacking skills in the event of his absence -- a rubric for jihadists seeking the means to continue to serve their nefarious ends. Irhabi may have been caught, but his online legacy may be the creation of many thousands of 007s. Rita Katz is the author of "Terrorist Hunter" (HarperCollins) and the director of the SITE Institute, which is dedicated to the "search for international terrorist entities." Michael Kern is a senior analyst with the institute. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ElbertPollard at telstra.com Sun Mar 26 11:26:57 2006 From: ElbertPollard at telstra.com (Dewitt Sierra) Date: Mon, 27 Mar 2006 00:26:57 +0500 Subject: Fwd: This thing is awesome! Message-ID: in, wanting to resist, wanting to understand what it s all about Near the entrance to the cavern you can also find the City Jail. Don't enter element of many games, from Chess through to Scruples. Of all the possibilities that are unimaginative to human thinking. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 918 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: aboard.gif Type: image/gif Size: 17151 bytes Desc: not available URL: From burkett at intresys.com Mon Mar 27 04:07:18 2006 From: burkett at intresys.com (Francisco Mcgowan) Date: Mon, 27 Mar 2006 06:07:18 -0600 Subject: Ratess approved Message-ID: <0.5.8.4.8.90448554690855.324a5872@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1180 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: thermal.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From sutherland at israelbiblemuseum.com Mon Mar 27 04:48:37 2006 From: sutherland at israelbiblemuseum.com (Marjorie Stern) Date: Mon, 27 Mar 2006 06:48:37 -0600 Subject: Low mortagge ratee approvall Message-ID: <09472250535758.H6bgGE07iW@breezy> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1244 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: adversary.gif Type: image/gif Size: 6170 bytes Desc: not available URL: From rah at shipwright.com Mon Mar 27 03:58:12 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Mon, 27 Mar 2006 06:58:12 -0500 Subject: [Clips] The Freemen standoff Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Mon, 27 Mar 2006 06:57:38 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] The Freemen standoff Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com The Billings Gazette Published on Sunday, March 26, 2006. Last modified on 3/26/2006 at 12:29 am The Freemen standoff By LORNA THACKERAY Of The Gazette Staff JORDAN -- The quickest way to get booted out of a bar here is to start talking about the Freemen standoff that turned this remote farming-ranching community upside down 10 years ago this spring, says Garfield County Sheriff Kelly Pierson. Nobody in Jordan will commemorate this dubious anniversary with enthusiasm. Few welcomed the well-armed and disgruntled anti-government extremists in 1996. Fewer still want to be reminded of the tense 81-day standoff that clogged county roads with an army of FBI agents and battalions of reporters and divided the loyalties of families and neighbors. "The mind-set here is you just don't talk about it. It was so disturbing for so many people," the sheriff said. The Freemen have moved on, many to far-flung federal prisons. The general population has returned to the hard business of making a living in an agricultural economy dependent on the vagaries of weather and market prices. It's sheep-slaughtering predators and fuel prices that people want to talk about now. Pierson, a lifelong resident of the sprawling rural county in Eastern Montana, had just accepted a job as deputy sheriff when on March 25, 1996, the FBI began the siege of a Brusett-area ranch northwest of Jordan that the Freemen had named Justus Township. A mixture of locals and outsiders with a shared belief that no government higher than the county level is legitimate holed up on a 940-acre property that Freeman Ralph Clark had lost in foreclosure to the Farmers Home Administration. For a couple of years, the Freemen had been vexing local officials, briefly taking over the Garfield County Courthouse in January 1994 in an attempt to establish the "Supreme Court of Garfield County-comitatus." Freemen ringleader LeRoy Schweitzer, who considers himself a political prisoner at the high-security federal penitentiary in Marion, Ill., still signs his unintelligible harangues to local officials as chief justice of Justus Township. The Freemen angered the local population of Garfield County by offering bounties of $1 million for anyone, including U.S. District Judge Jack Shanstrom of Billings, thought to be involved in the foreclosure of Ralph Clark's property. Wanted posters promised a reward for Shanstrom and county officials "dead or alive." "They wanted to hang the sheriff and the county attorney," rancher Jack Murnion said recently. "That's a Phipps and a Murnion, and they're related to two-thirds of the county." Jack Murnion, a candidate this year for county commissioner, is the older brother of Garfield County Attorney Nick Murnion. Jack Murnion runs sheep and cattle in the Brusett area a few miles from the Clark property. Garfield County's sheriff at the time of the siege was Charlie Phipps. No doubt the Freemen intended to pay the bounties with checks they printed themselves as part of an improbable billion-dollar bank fraud scheme. At the Freemen's 1998 trial on 40 federal offenses, Assistant U.S. Attorney Jim Seykora told the jury that the Freemen "printed these checks by the truckload." They wrote checks totaling $18 billion. Most were rejected, but about $1.8 million worth was cashed, of which the defendants in Montana were held responsible for about $500,000. Even the IRS accepted one of the checks and issued a refund to the "taxpayer." Although most defendants refused to cooperate with their attorneys at trial, the attorneys argued that the Freemen acted in good faith because they truly believed what they were doing was legal. Jurors didn't buy it. As part of their complex financial scheme, the Freemen tried to put millions of dollars worth of liens on property owned by anyone who opposed them. They presented workshops showing others how to use their methods. Seykora noted, however, that they wouldn't accept their own financial instruments as payment for tuition. The Freemen, many wanted on criminal charges, initially established headquarters at Rodney Skurdal's place in the Bull Mountains outside Roundup. Much to the dismay of residents of Garfield County, Schweitzer, Skurdal and their adherents decided Sept. 28, 1995, to move their operation 120 miles northeast to Ralph Clark's place at Brusett. Local law enforcement complained bitterly that federal officials had allowed the six-vehicle convoy of fugitives to make their journey to Garfield County unmolested. There they remained, holding classes, printing fake checks and writing volumes of documents only they could interpret. What propelled this cadre of rural extremists into world headlines began March 25, 1996, when undercover FBI agents lured Schweitzer, Daniel E. Peterson Jr. and Lavon T. Hanson from the compound and arrested them. More than 100 agents then surrounded the enclave, where about 20 Freemen remained. The siege seemed endless, with more than 40 third-party negotiators sent in to try to arrange a peaceful surrender during the nearly 212 months the Freemen held out. Finally, after Freeman Edwin Clark was allowed to consult with Schweitzer at the Yellowstone County jail, Freemen in the Brusett compound agreed to give themselves up. Fourteen people surrendered peacefully on June 13, 1996. Two women, the wives of Ralph and Emmett Clark, were not charged with any crimes and left the compound on their own. The Freemen, as a going concern, were finished. There are still a few people around Garfield County who sympathize with Freemen ideology -- no more than 10, according to the sheriff -- but they don't threaten to hang local officials and federal judges, and they don't harass the county clerk with volumes of incomprehensible filings that cite such things as the Book of Deuteronomy and the Magna Carta. "It's something you really want to keep an eye on, but it's not a huge issue," Pierson said. "The mind-set is still the same, but we drove it underground." Freemen ideas still pop up across the nation from Jordan to Florida, he said. Believers keep in touch over the Internet. "But it's different than it was," the sheriff said. Hollywood, with its own well-established reputation as a haven for lunacy, couldn't have dreamed up a Wild West as strange as Montana seemed in 1996. The detested 55 mph speed limit had been abolished and replaced with a "basic rule" law that set no daytime speed limit. While the national media and late-night comedians marveled and every lead-footed driver with a hot car contemplated a Montana vacation, stranger things were brewing both on the prairies and in the mountains. As the Freemen made their stand east of the Divide, FBI agents closed in on "Unabomber" Ted Kaczynski at his isolated cabin near Lincoln in Western Montana. Montanans could distance themselves from the Unabomber, who mailed 16 bombs that killed three people and injured 23 others. He was more or less an import in their midst, a Harvard-educated mathematician gone mad and who had even spent time teaching at that bastion of free speech and hippies, the University of California at Berkeley. The Freemen couldn't be dismissed as outsiders. Many of them were homegrown. They were relatives, neighbors and friends, salt-of-the-earth farmers and ranchers who one day started declaring themselves sovereign and not answerable to any laws but their own. Generally, people who live in the area believe that a hard core of outsiders convinced a few locals -- many of them in desperate financial straits -- that the Freemen ideas would solve all their problems. Rod Coulter, also a candidate this year for Garfield County commissioner, said he still puzzles over how "people I thought the world of before they got involved in that deal" could have succumbed to Freemen ideas. "I don't know how they got so brainwashed," he said. "That was a bad deal all the way around. I don't think there were any real winners." The locals who got involved had one thing in common, said Jack Murnion. "They borrowed a lot of money from the Farmers Home Administration, and they forgot they borrowed it," he said. He was referring to a federal agriculture lending agency whose functions have now been absorbed by the Farm Services Agency. The financial crisis in agriculture in the 1980s resulted in high numbers of defaults on federally backed loans. Mark Parker, of Billings, one of the attorneys appointed to defend the Freemen, said many people recruited by the Freemen had been grasping at anything to hold on in face of financial ruin. "We had just had the perfect storm of things going wrong in people's lives," he said. "They just kept going down in a downward spiral, and they couldn't get out without a little help from the Department of Justice." The core group of Freemen was "a bit pathological," Parker said. "Eighty percent of the others wouldn't have had any involvement with the law, ever, without being drawn in by the core group." Parker's client, Agnes Stanton, of Brusett, was convicted on two counts of bank fraud. Parker helped her find a job, which she held for many years. Parker doesn't believe the Freemen's standoff had much lasting significance. "I don't think it was very important in the scheme of things that happen in history," he said. "These sociological eruptions happen a lot. I don't think you can draw many conclusions from that." Seykora contends that there was a lasting effect. "It made people pay attention to things people originally thought were frivolous," he said. Before it was over, Seykora worked on cases based on the Freemen's financial scheme in Michigan, Oklahoma, Washington, Texas and North Carolina. One positive outcome was that the Department of Justice put together a solid program for defusing these situations before anyone got hurt, Parker said. There had been other confrontations that hadn't ended so well. A whirl of violent anti-government backlash began in August 1992, when Alcohol, Tobacco and Firearms agents clashed with Randy Weaver at Ruby Ridge in the Idaho panhandle. Agents, hoping to arrest Weaver on firearms charges, had been watching his place for 16 months. A confrontation left an agent and Weaver's wife and 14-year-old son dead. Weaver filed a lawsuit and won a $3.1 million settlement from the government. Weaver was among those who visited the Freemen compound to try to negotiate a peaceful surrender. In 1993, David Koresh, a religious fanatic who claimed to be Jesus, gathered the faithful at a compound in Waco, Texas. A 51-day standoff with ATF agents ended April 19 in a bloodbath and fire that left 80 inside the compound and four agents dead. That, in turn, inspired Timothy McVeigh to bomb the Alfred P. Murrah Federal Building in Oklahoma City exactly two years later on April 19, 1995. His revenge for Waco took 168 lives, including those of 19 children in a day care. The anti-government movement was sizzling across the country and especially in the West, where suspicion of government authority is woven into the social fabric. Further infuriating the radical conservative movement was the election and pending re-election of President Clinton, whom many in rural America considered on a par with Satan himself. Rural Montana has a broad streak of political individualism converging with a generally conservative nature and a strong distrust of government, said Jim Lopach, a professor of constitutional law at the University of Montana. "I wasn't surprised by the developments in Eastern Montana," he said. "What I was surprised at was the extreme nature of it." Lopach, who grew up in Great Falls, picked up the flavor of Eastern Montana political culture in 1973 when he worked with the first local government study commissions. Under Montana's 1972 Constitution, elected review commissions were mandated to study their existing government every 10 years and decide whether changes should be offered to the voters. What citizens told these first study commissions was that they wanted to minimize their governments, Lopach said. "They didn't see government as important in their lives," he said. "There was a pronounced fear of interlocal or inter-governmental cooperation. There was always a fear that it would lead to too much government and a loss of control." Lopach said the real legacy of the standoff could be that it gave people a reason to consider how far and how deep devotion to political individualism should go. "It might be a moderating thing," he said. "It might be that they saw the dangers of extremism." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From alex.white at currie.edin.sch.uk Mon Mar 27 05:08:26 2006 From: alex.white at currie.edin.sch.uk (Eileen Pugh) Date: Mon, 27 Mar 2006 07:08:26 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <9.0.0.9.4.76359168179518.816a1843@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1155 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bridget.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From akadakia at austin.ibm.com Mon Mar 27 06:05:38 2006 From: akadakia at austin.ibm.com (Kenton Anderson) Date: Mon, 27 Mar 2006 08:05:38 -0600 Subject: Re-finance at the lowestt ratess Message-ID: <1.8.8.7.8.70326137667019.806a9778@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1191 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: carroll.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From coderman at gmail.com Mon Mar 27 09:10:16 2006 From: coderman at gmail.com (coderman) Date: Mon, 27 Mar 2006 09:10:16 -0800 Subject: [p2p-hackers] guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) In-Reply-To: References: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> Message-ID: <4ef5fec60603270910l1d908f72n36581d8493bac356@mail.gmail.com> On 3/27/06, Alen Peacock wrote: > ... > The overarching theme of the book is that theoretically secure systems > with usability problems end up being neither secure (because users > subvert them) nor usable. very true. > Some findings from Chap 7 include the fact > that a significant number of users did not comply with instructions > for password generation it is my personal hunch that if users had just one password they needed to remember they could remember a good one. the janus stuff we are working on uses loop-aes volumes specifically so you can store passwords in a browser, store capability URL's, keep accounts and logins in a text file, etc. [i'd love to know of any studies to this end though. i have tried experiments to see just how much entropy i can commit to memory and it is more than enough for a good interactive authentication. i think this is within the ability of most, if they had a desire to do so and understood the benefit.] so the goal is to provide a usable system with a single password, and make it user centric, so that all the other credentials and secrets associated with other digital identies can benefit from this bootstrap (and presumably share this more secure bootstrap). From guzman at airann.com Mon Mar 27 07:46:43 2006 From: guzman at airann.com (May Wiseman) Date: Mon, 27 Mar 2006 09:46:43 -0600 Subject: Lowest rate approved Message-ID: <1.1.6.0.0.68530598170502.696a5610@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1181 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: appleton.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From soft445 at gmail.com Mon Mar 27 09:50:10 2006 From: soft445 at gmail.com (Donald Harrison) Date: Mon, 27 Mar 2006 09:50:10 -0800 Subject: Stronger climaxes and orgasms Message-ID: <200603270152.k2R1qhMo018769@proton.jfet.org> A recent survey showed that 68% of women are unsatisfied with their sexual partners. Of course most of these women would never tell their partner that they are unhappy. Not being able to fully satisfy a woman can result in depression and feelings of inadequacy. Thankfully, men of all ages can now safely and naturally enhance their body and penis anatomy and renew sexual vitality without resorting to dangerous surgery. The all natural proprietary blend of unique herbs found in Maxaman is designed to restore blood flow to your penis, unleash stored testosterone, and heighten sensation by activating the body's natural hormone production and supplying vital nutrients necessary for peak sexual performance. http://bgcdelmfj.allegcons.info/?ahikfjxwqowybgzmmcdelm From taka6213 at abeam.ocn.ne.jp Mon Mar 27 08:13:44 2006 From: taka6213 at abeam.ocn.ne.jp (Derek Castillo) Date: Mon, 27 Mar 2006 10:13:44 -0600 Subject: Re-finance before rates skyrocket Message-ID: <2.5.8.5.9.88859284761209.836a8044@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1189 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: maximal.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From erwin at keychainsandmagnets.com Mon Mar 27 09:35:43 2006 From: erwin at keychainsandmagnets.com (Emmett Duarte) Date: Mon, 27 Mar 2006 11:35:43 -0600 Subject: Last chance for lower rates Message-ID: <074q915v.5656327@msn.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1157 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: lightweight.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From coderman at gmail.com Mon Mar 27 14:04:55 2006 From: coderman at gmail.com (coderman) Date: Mon, 27 Mar 2006 14:04:55 -0800 Subject: [p2p-hackers] guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) In-Reply-To: References: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> <4ef5fec60603270910l1d908f72n36581d8493bac356@mail.gmail.com> Message-ID: <4ef5fec60603271404g18a7ab75h681cfac70b00acc2@mail.gmail.com> On 3/27/06, Michael J Freedman wrote: > ... > This approach is certainly commonly done by people for useability. > However, the problem is that the best security you get is that of security > provided by the weakest site (i.e., the weakest link the chain analogy). true; which is why i'd like to see them use a single good password to mount an encrypted volume and secure OS where the rest of the (different*) passwords and PIN's and whatever else are kept. > As a solution developed precisely for this problem, you should check out > the pwdhash extension for browsers: > > http://crypto.stanford.edu/PwdHash/ this is a handy utility! i'd still be concerned about dictionary attacks on poor passwords (that is, discovering '.848fe29s44j' is the hash for pwned.com and 'secret'.) secure digests make this more expensive but not by much. * are you aware of any utility for the browser that generates random passwords? i'd like something like this as well, with the idea that the first time you visit the site (or need to change a password) a random password is generated, placed in the input text field, and then the browser password manager remembers it after that point. (and the password db is stored on an encrypted file system to prevent theft). someone will ask about users who aren't on their machine and need to access a site. i don't like to support this ability because you should never be using an untrusted computer to access a secure site. if the computer is trusted you should also be able to boot from CD and insert your USB storage key (which lets you use your browser password manager). (actually, looking at the source for PwdHash it appears easy enough to modify for random password generation) thanks for the tip, From mfreed at cs.nyu.edu Mon Mar 27 12:19:32 2006 From: mfreed at cs.nyu.edu (Michael J Freedman) Date: Mon, 27 Mar 2006 15:19:32 -0500 (EST) Subject: [p2p-hackers] guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) In-Reply-To: <4ef5fec60603270910l1d908f72n36581d8493bac356@mail.gmail.com> References: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> <4ef5fec60603270910l1d908f72n36581d8493bac356@mail.gmail.com> Message-ID: > it is my personal hunch that if users had just one password they > needed to remember they could remember a good one. the janus stuff we This approach is certainly commonly done by people for useability. However, the problem is that the best security you get is that of security provided by the weakest site (i.e., the weakest link the chain analogy). As an example, let's say that you use the same password to login to an online banking site (which really cares about security) and some random-dating site (which stores all unencrypted passwords in a big plaintext file on a rootable machine). An adversary trying to break-in to your bank account doesn't need to subvert the security of the bank site: He just needs to break into the dating site. No matter how many bits of entropy your password has, you lose. As a solution developed precisely for this problem, you should check out the pwdhash extension for browsers: http://crypto.stanford.edu/PwdHash/ Enjoy, --mike ----- www.michaelfreedman.org www.coralcdn.org From dbarrett at quinthar.com Mon Mar 27 20:36:15 2006 From: dbarrett at quinthar.com (David Barrett) Date: Mon, 27 Mar 2006 20:36:15 -0800 Subject: [p2p-hackers] guidelines for good password policy and maintenance/ user centric identity with single passwords (or a smallnumber at most over time) In-Reply-To: <4ef5fec60603271404g18a7ab75h681cfac70b00acc2@mail.gmail.com> Message-ID: <200603280436.k2S4aLvb028205@proton.jfet.org> > -----Original Message----- > From: coderman > Sent: Monday, March 27, 2006 2:05 PM > > On 3/27/06, Michael J Freedman wrote: > > ... > > This approach is certainly commonly done by people for useability. > > However, the problem is that the best security you get is that of > security > > provided by the weakest site (i.e., the weakest link the chain analogy). > > true; which is why i'd like to see them use a single good password to > mount an encrypted volume and secure OS where the rest of the > (different*) passwords and PIN's and whatever else are kept. What are your thoughts on using PKI? For example, create private keys (with no passwords) and put them in an encrypted volume. Then use one strong password to unlock your encrypted volume (and thus, unlock your private keys), and then SSH to everywhere else securely. Thus a user need only remember one password to get access to all servers. (And you can individually grant or revoke access to servers by adding/removing the corresponding public key.) Win32 has 'TrueCrypt', which has a nice feature of auto-unmounting the encrypted volume on suspend/hibernate. Thus even if your laptop gets stolen while hibernated, the private keys aren't compromised. And if you're laptop is configured to suspend on the screen closing, they'd need to steal your laptop from you, while it's running, and begin hacking on it before closing the screen. (And in the time someone can mount an offline attack, you can remove the user's corresponding public keys from the servers.) -david From fdorr at agtraders.com Tue Mar 28 00:09:08 2006 From: fdorr at agtraders.com (Lon D. Williamson) Date: Tue, 28 Mar 2006 00:09:08 -0800 Subject: why... Message-ID: <436166.7418194661771.661567699649.JPNT.3659@barstow> thickish itwinfield notsedulous acassette butadverbial someconsumption somealive andfickle notlanguid ,transform ,pickford someangles butastraddle butypsilanti scraggly thederail trybodybuilder onweb thethrottle maynurture seecoccidiosis butbawl itabstractor maycotta indeprecatory seeclam mayrudy somebarkeep onset ineileen therudyard ajove itcounterflow someacorn inbiddable seeairborne try -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1807 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image076.gif Type: image/gif Size: 14945 bytes Desc: not available URL: From coderman at gmail.com Tue Mar 28 01:06:43 2006 From: coderman at gmail.com (coderman) Date: Tue, 28 Mar 2006 01:06:43 -0800 Subject: [p2p-hackers] guidelines for good password policy and maintenance/ user centric identity with single passwords (or a smallnumber at most over time) In-Reply-To: <20060328043621.981C53FC44@capsicum.zgp.org> References: <4ef5fec60603271404g18a7ab75h681cfac70b00acc2@mail.gmail.com> <20060328043621.981C53FC44@capsicum.zgp.org> Message-ID: <4ef5fec60603280106na9f2184pc6e4256b66e9e443@mail.gmail.com> On 3/27/06, David Barrett wrote: > ... > What are your thoughts on using PKI? fine as long as trust and identity are properly implemented. physically hardened tokens are very good (ex: the rsa challenge / pin based token authenticator via radius) SPEKE and variants are also highly recommended in my book if you can use them in a secure context (that is, no rootkits and equivalents to capture passwords/phrases - a situation where single use passwords / bingo auth are helpful if secure hardware tokens are not feasible) > For example, create private keys (with no passwords) and put them in an > encrypted volume. Then use one strong password to unlock your encrypted > volume (and thus, unlock your private keys), and then SSH to everywhere else > securely. this works very well, and if you have hardware accelerated encryption it can be transparent. you can also pre distribute keys (public and secret) to the encrypted volumes you mount and run within (via a secure bootstrap of course...) [ see http://www.via.com.tw/en/initiatives/padlock/hardware.jsp ] i think this is a rich field of discovery when considering the user interface and authentication / session aspects of a secure system. best regards, From coderman at gmail.com Tue Mar 28 01:49:17 2006 From: coderman at gmail.com (coderman) Date: Tue, 28 Mar 2006 01:49:17 -0800 Subject: [p2p-hackers] lockstep synchronization protocol problem In-Reply-To: <343538103.05175@ustc.edu.cn> References: <343538103.05175@ustc.edu.cn> Message-ID: <4ef5fec60603280149s1ca73327j639244acb4d11032@mail.gmail.com> On 3/28/06, UE=x wrote: > I'm doing research about synchronization problem in P2P system,and the basic > synchronization protocol is the lockstep protocol,and it use rounds to synchronize > all the peer's movements,the problem is lockstep only synchronize peer's > movements?what about the event created by all the peers?can it use rounds to > synchronize them?and how to ? look at using a quorum based key distribution and agreement protocol (where quorum == a specific subset of group key management) with regular attestation / rekeying via trusted and strongly authenticated mechanisms. session timeout (for failure / lack of consensus / malicious attack) should be detected within an appropriate time frame for the user to respond securely. (i tend to think 60 seconds is an acceptable window) doing this in a user friendly manner is very difficult and probably the reason prior work in this domain is scarce. From coderman at gmail.com Tue Mar 28 02:15:00 2006 From: coderman at gmail.com (coderman) Date: Tue, 28 Mar 2006 02:15:00 -0800 Subject: janus wireless faq / "secure"* public communication Message-ID: <4ef5fec60603280215h3dee50aakde8d38ab6486c3fb@mail.gmail.com> - why don't you have a public website with forums and other services? :: public networks allow unauthenticated communication and may expose vulnerabilities. we are building a secure* private group networking system. a strong least privilege system only communicates over public networks in an ephemeral and read only manner via self certifying identifiers. (that is, we like to eat our own dogfood) - then what is that site i saw that talked about a janus wireless member? :: individuals within the group may host their own public services. we expect them to confirm that any operating system instance connected to public networks in this manner should be considered less than secure even if they are well protected. - how can i help you? :: get in touch with one of our members. you might try email, off-the-record, out-of-band, or other methods. - do i have to buy VIA padlock hardware to use your software? :: no, but this is the default and the accelerated encryption makes a secure runtime nearly transparent to you as a user. (in other words, we believe it is worth the cost to do so if you can) - can i meet one of your members in person for a strong key exchange and authentication? :: sure, see item #3. --- * secure means strong least privilege vetted by someone you trust. this degree of virtuous interaction is very difficult, complicated and currently believed to be the most secure way to design and maintain a secure system. this is elaborated on in detail in our technical documentation archive. From coderman at gmail.com Tue Mar 28 02:24:58 2006 From: coderman at gmail.com (coderman) Date: Tue, 28 Mar 2006 02:24:58 -0800 Subject: Fwd: [p2p-hackers] lockstep synchronization protocol problem In-Reply-To: <343540055.27718@ustc.edu.cn> References: <343540055.27718@ustc.edu.cn> Message-ID: <4ef5fec60603280224q5de3742cw7becaf88f3d881e8@mail.gmail.com> ---------- Forwarded message ---------- From: UE=x Date: Mar 28, 2006 2:00 AM Subject: Re: [p2p-hackers] lockstep synchronization protocol problem To: coderman at gmail.com can you introduce some papers to read about what you have said?I can't get your meaning,but thank you.how is it related to the synchronization problem? i am about to go offline for the night; here are a few off the top of my head that are relevant. i can post more later this week and others on this list will likely have input. group key distribution: Efficient Self-Healing Group Key Distribution with Revocation Capability (2003) http://citeseer.ist.psu.edu/623802.html group reputation / trust metrics: www.levien.com/thesis/compact.pdf quorums and usability are more complicated and i don't have any links off hand. best regards, P.S. please reply with any additional research / results if you encounter them... TZDz5D at 4PEVPTx>-La5=: >From: coderman >Reply-To: >To: "UE=x" , "Peer-to-peer development." >Subject: Re: [p2p-hackers] lockstep synchronization protocol problem >Date:Tue, 28 Mar 2006 01:49:17 -0800 > >On 3/28/06, UE=x wrote: >> I'm doing research about synchronization problem in P2P system,and the basic >> synchronization protocol is the lockstep protocol,and it use rounds to synchronize >> all the peer's movements,the problem is lockstep only synchronize peer's >> movements?what about the event created by all the peers?can it use rounds to >> synchronize them?and how to ? > >look at using a quorum based key distribution and agreement protocol >(where quorum == a specific subset of group key management) with >regular attestation / rekeying via trusted and strongly authenticated >mechanisms. session timeout (for failure / lack of consensus / >malicious attack) should be detected within an appropriate time frame >for the user to respond securely. (i tend to think 60 seconds is an >acceptable window) > >doing this in a user friendly manner is very difficult and probably >the reason prior work in this domain is scarce. From coderman at gmail.com Tue Mar 28 02:39:43 2006 From: coderman at gmail.com (coderman) Date: Tue, 28 Mar 2006 02:39:43 -0800 Subject: off the record howto / best practices Message-ID: <4ef5fec60603280239o38594f0flf2a1fc2137a6e5d1@mail.gmail.com> verify fingerprint: "Buddy List" -> Tools Menu Options -> Preferences Menu Option -> Plugins Menu Option -> Select Username from Known Fingerprints -> Press "Verify fingerprint" action -> VIEW FINGERPRINT AND APPROVE/REJECT IF EXPECTED --- Fingerprint for you, coderman42 (AIM/ICQ): A59CDCB3 46468A16 27D21678 270AF0B5 0B0477CF Purported fingerprint for anonymous: 0B0477CF 270AF0B5 27D21678 46468A16 A59CDCB3 --- -> Select "i have" verified action only if expected is true using verified otr credentials: -> Select "OTR: Not Private" image button at lower right corner if secure channel is down -> Verify "OTR: Private" image button at lower right corner before chat example of a failed key agreement: the "OTR: Unverified" image was never shown at the lower right corner of the window indicating an initial OTR exchange had taken place. ---cut--- (02:12:01) anonymous: hi code (02:12:05) Attempting to start a private conversation with anonymous... (02:12:11) coderman42: hello (02:12:14) coderman42: do you have OTR? (02:12:38) anonymous: hold on (02:12:51) coderman42: k (02:13:39) anonymous: *** Encrypted with the Gaim-Encryption plugin 02:17 (02:18:16) coderman42: sorry, no worky for you. (02:18:19) coderman42: try again (02:18:29) coderman42: what client / OS are you using? (02:18:38) coderman42: i recommend a unix like system with gaim (02:19:46) anonymous: i am on gaim and i was useing gaim encrypt (02:21:47) Attempting to start a private conversation with anonymous... (02:22:00) coderman42: maybe you were; it is not working currently. 02:22 (02:22:33) anonymous logged out. (02:23:04) anonymous logged in. (02:23:10) coderman42: wb (02:23:12) Attempting to start a private conversation with anonymous... (02:23:23) coderman42: (02:23:12) Attempting to start a private conversation with anonymous... (02:23:27) coderman42: waiting ... (02:23:44) coderman42: brb (02:26:58) anonymous: *** Encrypted with the Gaim-Encryption plugin 02:27 (02:28:45) anonymous logged out. ---end-cut-- remember to protect your keys. From measl at mfn.org Tue Mar 28 05:39:11 2006 From: measl at mfn.org (J.A. Terranson) Date: Tue, 28 Mar 2006 07:39:11 -0600 (CST) Subject: German CA TrustCenter insolvent (fwd) Message-ID: <20060328073857.A85776@ubzr.zsa.bet> ---------- Forwarded message ---------- Date: Mon, 26 Sep 2005 08:35:12 +0200 From: Stephan Neuhaus To: cryptography at metzdowd.com Subject: German CA TrustCenter insolvent Original article at http://www.heise.de/security/news/meldung/64224 It seems that the German TC TrustCenter GmbH (formerly TC TrustCenter AG) is now insolvent. TrustCenter was accredited to issue "qualified signatures", which is what you need in Germany if you want your digital signature to be as binding as your handwritten one. It is as yet unclear why TrustCenter ran out of money, but the fact that German banks sold their TrustCenter stocks to BeTrusted (now part of Cybertrust) in 2004 shows that the banks had lost their confidence in PKI. An interesting question is of course what happens with TrustCenter's private keys. Are they being auctioned off to the highest bidder? Fun, Stephan From measl at mfn.org Tue Mar 28 06:07:59 2006 From: measl at mfn.org (J.A. Terranson) Date: Tue, 28 Mar 2006 08:07:59 -0600 (CST) Subject: Huh? [Was: Re: German CA TrustCenter insolvent (fwd)] In-Reply-To: <20060328073857.A85776@ubzr.zsa.bet> References: <20060328073857.A85776@ubzr.zsa.bet> Message-ID: <20060328080708.A85776@ubzr.zsa.bet> Sorry about that! I wasnt even aware I had forwarded it till I saw it come in... -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF 'The right of self defence is the first law of nature: in most governments it has been the study of rulers to confine this right within the narrowest limits possible. Wherever standing armies are kept up, and the right of the people to keep and bear arms is, under any colour or pretext whatsoever, prohibited, liberty, if not already annihilated, is on the brink of destruction.' St. George Tucker From rah at shipwright.com Tue Mar 28 08:21:53 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 28 Mar 2006 11:21:53 -0500 Subject: Huh? [Was: Re: German CA TrustCenter insolvent (fwd)] In-Reply-To: <20060328080708.A85776@ubzr.zsa.bet> References: <20060328073857.A85776@ubzr.zsa.bet> <20060328080708.A85776@ubzr.zsa.bet> Message-ID: At 8:07 AM -0600 3/28/06, J.A. Terranson wrote: >I wasnt even aware I had forwarded it till I saw it >come in... Yeaahhhh... That's what they all say... ;-) Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From acquisti at andrew.cmu.edu Tue Mar 28 11:56:26 2006 From: acquisti at andrew.cmu.edu (Alessandro Acquisti) Date: March 28, 2006 11:56:26 AM EST Subject: PET Award Message-ID: Dave - If you feel this Call for Nominations may be of interest to your list, can you please distribute? Thanks, -alessandro ************* CALL FOR NOMINATIONS - 2006 PET AWARD [Please forward and distribute] You are invited to submit nominations to the 2006 PET Award. The PET Award is presented annually to researchers who have made an outstanding contribution to the theory, design, implementation, or deployment of privacy enhancing technology. It is awarded at the annual Privacy Enhancing Technologies Workshop (PET). The PET Award carries a prize of 3000 Euros thanks to the generous support of Microsoft. Any paper by any author written in the area of privacy enhancing technologies is eligible for nomination. However, the paper must have appeared in a refereed journal, conference, or workshop with published proceedings in the period that goes from the end of the penultimate PET Workshop (the PET workshop prior to the last PET workshop that has already occurred: i.e. June 2004) until April 15th, 2006. The complete Award rules including eligibility requirements can be found at http://petworkshop.org/award/. Anyone can nominate a paper by sending an email message containing the following to award-chairs06 at petworkshop.org: - Paper title - Author(s) - Author(s) contact information - Publication venue - A nomination statement of no more than 250 words. All nominations must be submitted by April 15th, 2006. A seven-member Award committee will select one or two winners among the nominations received. Winners must be present at the PET workshop in order to receive the Award. This requirement can be waived only at the discretion of the PET Advisory board. 2006 Award Committee: - Alessandro Acquisti (chair), Carnegie Mellon University, USA - Roger Dingledine (co-chair), The Free Haven Project, USA - Ram Chellappa, Emory University, USA - Lorrie Cranor, Carnegie Mellon University, USA - Rosario Gennaro, IBM Research, USA - Ian Goldberg, Zero Knowledge Systems, Canada - Markus Jakobsson, Indiana University at Bloomington, USA More information about the PET award (including past winners) is available at http://petworkshop.org/award/. More information about the 2006 PET workshop is available at http://petworkshop.org/2006/. ----------------------- Alessandro Acquisti Heinz School, Carnegie Mellon University (P) 412 268 9853 (F) 412 268 5339 http://www.heinz.cmu.edu/~acquisti ----------------------- ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From xcrittall at gmx.net Tue Mar 28 05:33:31 2006 From: xcrittall at gmx.net (Elwood Oakley) Date: Tue, 28 Mar 2006 12:33:31 -0100 Subject: increase in sexual desire Message-ID: <200603281032.k2SAWgLj005211@proton.jfet.org> Carefully chosen herbal ingredients are the key to peniis enlargement success. Not only the precise blend of ingredients but also many other factors have effect on the overall potency and strength of peniis enlargement formula. Some of these factors include growing conditions, geographical location where herbs are grown, harvest time, the way herbs are stored before processing, the way herbs are processed. http://cfabejldhk.alfaastralvictoria.info/?gimdhkxwqowycfzppabejl 8tn From dave at farber.net Tue Mar 28 10:28:14 2006 From: dave at farber.net (David Farber) Date: Tue, 28 Mar 2006 13:28:14 -0500 Subject: [IP] PET Award Message-ID: Begin forwarded message: From kulyabko_s at list.ru Tue Mar 28 09:32:35 2006 From: kulyabko_s at list.ru (Sharlene Johnson) Date: Tue, 28 Mar 2006 14:32:35 -0300 Subject: increase in sexual desire Message-ID: <200603281032.k2SAWY3t005201@proton.jfet.org> Carefully chosen herbal ingredients are the key to peniis enlargement success. Not only the precise blend of ingredients but also many other factors have effect on the overall potency and strength of peniis enlargement formula. Some of these factors include growing conditions, geographical location where herbs are grown, harvest time, the way herbs are stored before processing, the way herbs are processed. http://gicekmbfjl.applearmyd.info/?adhbfjlxwqowygizppcekm bp From justin-cypherpunks at soze.net Tue Mar 28 09:07:10 2006 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 28 Mar 2006 17:07:10 +0000 Subject: [p2p-hackers] guidelines for good password policy and maintenance / user centric identity with single passwords (or a small number at most over time) In-Reply-To: <4ef5fec60603271404g18a7ab75h681cfac70b00acc2@mail.gmail.com> References: <4ef5fec60603260946j7adfa545gd4f70d6c2e4ec3a9@mail.gmail.com> <4ef5fec60603270910l1d908f72n36581d8493bac356@mail.gmail.com> <4ef5fec60603271404g18a7ab75h681cfac70b00acc2@mail.gmail.com> Message-ID: <20060328170710.GA5382@arion.hive> On 2006-03-27T14:04:55-0800, coderman wrote: > On 3/27/06, Michael J Freedman wrote: > > As a solution developed precisely for this problem, you should check out > > the pwdhash extension for browsers: > > > > http://crypto.stanford.edu/PwdHash/ > > i'd still be concerned about dictionary attacks on poor passwords > (that is, discovering '.848fe29s44j' is the hash for pwned.com and > 'secret'.) secure digests make this more expensive but not by much. > > * are you aware of any utility for the browser that generates random > passwords? Two that are in app-admin/ under gentoo are pwgen and ranpwd. pwgen is neat. It prints out a bunch of passwords and you pick one, so that shoulder surfing doesn't work (unless it's with a camera). It also has an option to generate a password given a seed value (which could be your basic password you might use for PwdHash) and an input file, using sha-1. I recall a similar program that printed out skey-style many-word passwords. I wish I could remember what it was called. I like those kinds of passwords. I don't understand why some people are fixated on 8-character passwords, and why they insist on using every character on the keyboard. Compare [:alnum:]{8} -- 47.6 bits of entropy with :alnum: plus punctuation -- 52.5 bits. What kind of threat model might there be where the former is unacceptable while the latter is sufficient? Both provide more than enough security against a casual snoop, particularly when authentication methods go through processes that implement wrong-password delays and/or eventual lock-outs, and when the risk of another attack that provides access to the password file for an offline brute-force attack is minimal. Neither 47 nor 52 bits is nearly enough security to resist serious attacks by serious people with lots of hardware, TLAs, etc. -- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants. From rah at shipwright.com Tue Mar 28 14:23:54 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 28 Mar 2006 17:23:54 -0500 Subject: [Clips] Why is Hugo Chavez Involved With U.S. Voting Machines? Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Tue, 28 Mar 2006 16:32:09 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Why is Hugo Chavez Involved With U.S. Voting Machines? Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com Again, boys and girls, spoken slowly: With electronic voting, you can either have secret ballots, or not sell your vote, but not both. With equity, it doesn't matter. The whole *point* is to sell your ballot. Thus, once again, financial cryptography is the only cryptography that matters. :-). And political cryptography, like politics itself, is proven, once again, to be about nothing more than fraud and extortion. Cheers, RAH ------- RealClearPolitics March 28, 2006 Why is Hugo Chavez Involved With U.S. Voting Machines? By Richard Brand The greater threat to our nation's security comes not from Dubai and its pro-Western government, but from Venezuela, where software engineers with links to the leftist, anti-American regime of Hugo Chavez are programming electronic voting machines that will soon power U.S. elections. Congress spent two weeks overreacting to news that Dubai Ports World would operate several American ports, including Miami's, but a better target for their hysteria would be the acquisition by Smartmatic International of California-based Sequoia Voting Systems, whose machines serve millions of U.S. voters. That Smartmatic -- which has been accused by Venezuela's opposition of helping Chavez rig elections in his favor -- now controls a major U.S. e-voting firm should give pause to anybody who thinks that replacing our antiquated butterfly ballots and hanging chads will restore Americans' faith in our electoral process. Consider the lack of confidence Venezuelans have in their voting system. Anti-Chavez groups have such little faith in Smartmatic's machines that they refuse to run candidates in elections anymore as reports surface of fraud and irregularities from Chavez 2004 victory in a recall referendum. Yet somehow Smartmatic International and its Venezuelan owners were able to purchase Sequoia last year without the deal receiving any scrutiny from federal regulators -- including the Treasury Department's Committee on Foreign Investments in the United States (CFIUS), which is tasked with determining whether foreign takeovers pose security risks. CFIUS generally investigates such transactions only when the parties voluntarily submit themselves to review -- which Smartmatic did not do. But it retains the authority to initiate an investigation when it suspects a takeover compromises national security. Smartmatic has a brief but controversial history. The company was started in Caracas during the late 1990s by engineers Antonio Mugica and Alfredo Anzola. They worked out of downtown Caracas providing small-scale technology services to Latin American banks. Despite having no election experience, the tiny company rocketed from obscurity in 2004 after it was awarded a $100 million contract by the Chavez-dominated National Electoral Council to replace Venezuela's electronic voting machines for the recall vote. When the council announced the deal, it disingenuously described Smartmatic as a Florida company, though Smartmatic's main operations were in Caracas and the firm had incorporated only a small office in Boca Raton. It then emerged that Smartmatic's ''partner'' in the deal, Bizta Corp., also directed by Anzola and Mugica, was partly owned by the Venezuelan government through a series of intermediary shell corporations. Venezuela initially denied its investment but eventually sold its stake. When the vote finally came, exit polls by New York's Penn, Schoen & Berland Associates showed Chavez had been defeated 59 to 41 percent; however, when official tallies were announced, the numbers flipped to 58-42 in favor of Chavez. Venezuela's electoral council briefly posted machine-by-machine tallies on the Internet but removed them as mathematicians from MIT, Harvard and other universities began questioning suspicious patterns in the results. Flush with cash from its Venezuelan adventures, Smartmatic International incorporated in Delaware last year and purchased Sequoia, announcing the deal as a merger between two U.S. companies. Smartmatic says the recall vote was clean and that it is independent of the Chavez government. Responding to my inquiries, Smartmatic-Sequoias sent a written statement: ``Sequoia's products consist only of voting devices and systems, all of which must be federally and state tested and certified prior to use in an election. As Sequoia's products do not have military, defense or national security applications, they do not fall within the parameters of the matters governed by CFIUS.'' In fact, Smartmatic International is owned by a Netherlands corporation, which is in turn owned by a Curacao corporation, which is in turn held by a number of Curacao trusts controlled by proxy holders who represent unnamed investors, almost certainly among them Venezuelans Mugica and Anzola and possibly others. Why Smartmatic has chosen yet again to abuse the corporate form apparently to conceal the nationality and identity of its true owners is a question that should worry anyone who votes using one of its machines. Congress panicked upon hearing that our ports would be run by an American ally, Dubai, but never asked whether America's actual enemies in Venezuela have been able to acquire influence in our electoral process. Richard Brand is a second-year law student at New York University and a former staff writer for The Miami Herald. This article first ran in The Miami Herald. It is reprinted with the author's permission. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From arma at mit.edu Tue Mar 28 17:11:36 2006 From: arma at mit.edu (Roger Dingledine) Date: Tue, 28 Mar 2006 20:11:36 -0500 Subject: Tor 0.1.1.17-rc is out Message-ID: This is the third release candidate for the 0.1.1.x series. It fixes several major bugs for clients and servers. It also adds a fourth authoritative directory server (finally). http://tor.eff.org/download.html Changes in version 0.1.1.17-rc - 2006-03-28 o Major fixes: - Clients and servers since 0.1.1.10-alpha have been expiring connections whenever they are idle for 5 minutes and they *do* have circuits on them. Oops. With this new version, clients will discard their previous entry guard choices and avoid choosing entry guards running these flawed versions. - Fix memory leak when uncompressing concatenated zlib streams. This was causing substantial leaks over time on Tor servers. - The v1 directory was including servers as much as 48 hours old, because that's how the new routerlist->routers works. Now only include them if they're 20 hours old or less. o Minor fixes: - Resume building on irix64, netbsd 2.0, etc. - On non-gcc compilers (e.g. solaris), use "-g -O" instead of "-Wall -g -O2". - Stop writing the "router.desc" file, ever. Nothing uses it anymore, and it is confusing some users. - Mirrors stop caching the v1 directory so often. - Make the max number of old descriptors that a cache will hold rise with the number of directory authorities, so we can scale. - Change our win32 uname() hack to be more forgiving about what win32 versions it thinks it's found. o New features: - Add lefkada.eecs.harvard.edu as a fourth authoritative directory server. - When the controller's *setconf commands fail, collect an error message in a string and hand it back to the controller. - Make the v2 dir's "Fast" flag based on relative capacity, just like "Stable" is based on median uptime. Name everything in the top 7/8 Fast, and only the top 1/2 gets to be a Guard. - Log server fingerprint on startup, so new server operators don't have to go hunting around their filesystem for it. - Return a robots.txt on our dirport to discourage google indexing. - Let the controller ask for GETINFO dir/status/foo so it can ask directly rather than connecting to the dir port. Only works when dirport is set for now. o New config options rather than constants in the code: - SocksTimeout: How long do we let a socks connection wait unattached before we fail it? - CircuitBuildTimeout: Cull non-open circuits that were born at least this many seconds ago. - CircuitIdleTimeout: Cull open clean circuits that were born at least this many seconds ago. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Tue Mar 28 10:43:48 2006 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Mar 2006 20:43:48 +0200 Subject: [dave@farber.net: [IP] PET Award] Message-ID: <20060328184348.GN25017@leitl.org> ----- Forwarded message from David Farber ----- From chief608 at gmail.com Tue Mar 28 07:58:21 2006 From: chief608 at gmail.com (Mai Parr) Date: Tue, 28 Mar 2006 20:58:21 +0500 Subject: increase in sexual desire Message-ID: <200603290158.k2T1wJh9028778@proton.jfet.org> Carefully chosen herbal ingredients are the key to peniis enlargement success. Not only the precise blend of ingredients but also many other factors have effect on the overall potency and strength of peniis enlargement formula. Some of these factors include growing conditions, geographical location where herbs are grown, harvest time, the way herbs are stored before processing, the way herbs are processed. http://cfijkbedglm.promedtravel.com/?ahdglmxwqowycfijkzppbe h6 From begum at alfa.com Tue Mar 28 19:29:20 2006 From: begum at alfa.com (Pasquale Burke) Date: Tue, 28 Mar 2006 21:29:20 -0600 Subject: Low mortagge ratee approvall Message-ID: <6.7.7.6.2.62740196424940.816a4571@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1193 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: pest.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 29 00:47:16 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Mar 2006 10:47:16 +0200 Subject: [arma@mit.edu: Tor 0.1.1.17-rc is out] Message-ID: <20060329084716.GF25017@leitl.org> ----- Forwarded message from Roger Dingledine ----- From jgpz at mcrmail.com.jfet.org Wed Mar 29 10:05:32 2006 From: jgpz at mcrmail.com.jfet.org (Dana Griggs) Date: Wed, 29 Mar 2006 11:05:32 -0700 Subject: This thing is awesome! Message-ID: <56518772.68590083@mcrmail.com> technology. It may be informal in that it employs creative vanished, he is often referred to in legends in terms of an outstanding physical Other virtual reality enthusiasts are preaching that virtual THE OAKS presented a complaint to Jupiter, saying, We bear for -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 923 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: simmer.gif Type: image/gif Size: 17151 bytes Desc: not available URL: From rah at shipwright.com Wed Mar 29 13:25:43 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 29 Mar 2006 16:25:43 -0500 Subject: [Clips] Who's Spying Now? (was Re: OpinionJournal - Best of the Web Today - March 29, 2006) Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Wed, 29 Mar 2006 16:22:37 -0500 To: "Philodox Clips List" From: "R. A. Hettinga" Subject: [Clips] Who's Spying Now? (was Re: OpinionJournal - Best of the Web Today - March 29, 2006) Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com At 3:56 PM -0500 3/29/06, OpinionJournal wrote: >Who's Spying Now? http://www.breitbart.com/news/2006/03/28/D8GKO3I85.html > >Congressional Democrats' domestic spying program suffered a setback in >court yesterday, the Associated Press reports from Washington: > >*** QUOTE *** > >A federal appeals court ruled Tuesday that Rep. Jim McDermott violated >federal law by turning over an illegally taped telephone call to reporters >nearly a decade ago. > >In a 2-1 opinion, the U.S. Court of Appeals for the District of Columbia >upheld a lower court ruling that McDermott violated the rights of House >Majority Leader John Boehner, who was heard on the 1996 call involving >former House Speaker Newt Gingrich. . . . > >McDermott, D-Wash., leaked to The New York Times and other news >organizations a tape of a 1996 cell phone call The call included >discussion by Gingrich, R-Ga., and other House GOP leaders about a House >ethics committee investigation of Gingrich. Boehner, R-Ohio, was a >Gingrich lieutenant at the time and is now House majority leader. > >A lawyer for McDermott had argued that his actions were allowed under the >First Amendment, and said a ruling against him would have "a huge chilling >effect" on reporters and newsmakers alike. > >*** END QUOTE *** > >Meanwhile, the Washington Times >http://www.washtimes.com/national/20060329-120346-1901r.htm reports that >the president's terrorist surveillance program got support from some >experts in the field: > >*** QUOTE *** > >A panel of former Foreign Intelligence Surveillance Court judges yesterday >told members of the Senate Judiciary Committee that President Bush did not >act illegally when he created by executive order a wiretapping program >conducted by the National Security Agency (NSA). > >The five judges testifying before the committee said they could not speak >specifically to the NSA listening program without being briefed on it, but >that a Foreign Intelligence Surveillance Act does not override the >president's constitutional authority to spy on suspected international >agents under executive order. > >"If a court refuses a FISA application and there is not sufficient time >for the president to go to the court of review, the president can under >executive order act unilaterally, which he is doing now," said Judge Allan >Kornblum, magistrate judge of the U.S. District Court for the Northern >District of Florida and an author of the 1978 FISA Act. "I think that the >president would be remiss exercising his constitutional authority by >giving all of that power over to a statute." > >*** END QUOTE *** > >The Times, of course, has been crusading against the program. But in a >December 2000 editorial >http://www.nytimes.com/2000/12/07/opinion/07THU2.html?ex=1143781200&en=e9d860760a2ab08b&ei=5070 >it argued that because McDermott himself did not make the recording of the >GOP phone conversation, he should be off the hook: > >*** QUOTE *** > >[Boehner's] suit seeks damages from Mr. McDermott for his disclosure of a >tape he received from a Florida couple in which former House Speaker Newt >Gingrich was heard discussing his ethics case. The Times published >transcripts of those conversations. > >The correct way to combat illegal interception of private conversation is >to prosecute the people who actually do it, and to hasten the development >of technology to make interceptions more difficult. It is not to trample >on the rights of the press and ordinary citizens to disclose the content >of information they received legally. The Supreme Court needs to affirm >that. > >*** END QUOTE *** > >It would seem the Times is more troubled by the U.S. government spying on >foreign enemies than by Democrats spying on their domestic opponents. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Mar 29 14:22:07 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 29 Mar 2006 17:22:07 -0500 Subject: [Clips] Your secrets are safe with quasar encryption Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Wed, 29 Mar 2006 17:19:01 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Your secrets are safe with quasar encryption Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com - Breaking News | Print | New Scientist Your secrets are safe with quasar encryption * 16:00 29 March 2006 * NewScientist.com news service * Will Knight Intergalactic radio signals from quasars could emerge as an exotic but effective new tool for securing terrestrial communications against eavesdropping. Japanese scientists have come up with a method for encrypting messages using the distant astronomical objects, which emit radio waves and are thought to be powered by black holes. Ken Umeno and colleagues at the National Institute of Information and Communications Technology in Tokyo propose using the powerful radio signals emitted by quasars to lock and unlock digital communications in a secure fashion. The researchers believe quasars could make an ideal cryptographic tool because the strength and frequency of the radio pulses they emit is impossible to predict. "Quasar-based cryptography is based on a physical fact that such a space signal is random and has a very broad frequency spectrum," Umeno told New Scientist. One-time pad Randomness provides a simple means of high-security information encryption, providing two communicating parties have access to the same source of random information. For example, a randomly generated "one-time pad" shared by two parties can be used to encrypt and decrypt a message by simply transposing each individual bit of a message for bits on the pad. Genuine randomness is hard to generate artificially and the "pseudo-randomness" which most computers use is unsuitable for use in cryptography as patterns will be revealed over time. In addition, it is also tricky for two parties to share a source of randomness securely. Umeno and his colleagues suggest using an agreed quasar radio signal to add randomness to a stream cipher - a method of encrypting information at high speed. Each communicating party would only need to know which quasar to monitor and when to start in order to encrypt and decrypt a message. Without knowing the target quasar and time an eavesdropper should be unable to decrypt the message. Internet link Umeno believes astronomical cryptography could appeal to anyone who requires high-security communications. He adds that the method does not require a large radio antenna or that the communicating parties be located in the same hemisphere, as radio signals can be broadcast over the internet at high speed. "Concerning potential users, I suggest international financial institutions, governments and embassies," Umeno says. The researchers used quasar signals collected by Very Long Baseline Interferometry antenna at the institute to encrypt messages and have filed two patents covering quasar-based cryptography: one for locking and unlocking messages and another for generating digital signatures that can be used to match messages or files to a person. Related Articles * Photon detector is precursor to broadband in space * http://www.newscientist.com/article.ns?id=dn8877 * 21 March 2006 * Busted! A crisis in cryptography * http://www.newscientist.com/article.ns?id=mg18825301.600 * 17 December 2005 * Let chaos keep your secrets safe * http://www.newscientist.com/article.ns?id=mg18825262.000 * 19 November 2005 Weblinks * National Institute of Information and Communications Technology * http://www.nict.go.jp/ * Quasar Encryption patent * http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20050242987&OS=20050242987&RS=20050242987 * Quasar Authentication patent * http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20030145202&OS=20030145202&RS=20030145202 -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Wed Mar 29 07:33:09 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Mar 2006 17:33:09 +0200 Subject: scientia est potentia Message-ID: <20060329153309.GR25017@leitl.org> http://www.defensetech.org/archives/002275.html Mini-Sensors for "Military Omniscience" Spotting insurgents, sorting out friend from foe b it's beyond tough in todaybs guerilla war zones. So tough, that no single monitor can be counted on to handle the job. The Pentagon's answer: build a set of palm-sized, networked sensors that can be scattered around, and work together to b detect, classify, localize, and track dismounted combatants under foliage and in urban environments.b Itbs part of a larger Defense Department effort to establish b military omniscienceb and b ubiquitous monitoring.b The military has been working on gadgets for a while, now, that can be left behind in a bad neighborhood or a jihadist training site, and monitor the situation. These Camouflaged Long Endurance Nano-Sensors (CLENS) would be an order of magnitude smaller than previous surveillance gear of its type -- just 60 milimeters long, and 150 grams. Darpa, the Pentagon's far-out research arm, also wants the monitors to take up a 10,000th of the power of previous sensors. That would give the CLENS enough juice to keep watch over an area for up to 180 days. The way they'd keep watch would be different, too. Not as a individual sensors, but as a network of monitors, communicating with ultra wideband radios. The same frequencies could be used as a kind of radar, to track objects and people within the sensor net. "The best way to learn about an adversary b what hebs done, what hebs doing, and what hebs likely to do - is through continual observation using as many observation mechanisms as possible. We call this persistent surveillance," Dr. Ted Bially, head of Darpa's Information Exploitation Office, told a conference last year. "Webve learned that occasional or periodic snapshots donbt tell us enough of what we need to know. In order to really understand whatbs going on we have to observe our adversaries and their environment 24 hours a day, seven days a week, week-in and week-out." According to its recently-released budget, Darpa hopes to hand over its new, minature, persistent sensors to Special Operations Command by the end of fiscal year 2007. UPDATE 8:50 AM: Speaking of military omniscience, Darpa's "Combat Zones That See" effort, meant to network together an entire city's worth of surveillance cameras, gets $5 million in next year's budget. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed Mar 29 09:04:34 2006 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Mar 2006 19:04:34 +0200 Subject: [edrigram@edri.org: EDRI-gram newsletter - Number 4.6, 29 March 2006] Message-ID: <20060329170434.GS25017@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Mar 29 08:09:21 2006 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 29 Mar 2006 19:09:21 +0300 Subject: EDRI-gram newsletter - Number 4.6, 29 March 2006 Message-ID: ============================================================ EDRI-gram biweekly newsletter about digital civil rights in Europe Number 4.6, 29 March 2006 ============================================================ Contents ============================================================ 1. Telecom data to be retained for one year in France 2. Internet under attack on election day in Belarus 3. Slovenia : Draft Police act endangers privacy 4. Creative Commons license upheld in Dutch and Spanish courts 5. New anti-terror bill proposed in Denmark 6. Update on French EUCD Transposition 7. Damages on online defamatory statements in UK 8. Swedish Foreign Minister resigned following pressure on website 9. TACD debate on the politics and ideology of intellectual property 10. Commission progress report on electronic signatures 11. Agenda 12. About ============================================================ 1. Telecom data to be retained for one year in France ============================================================ The long-awaited application decree for telecommunication data retention was finally published in France on 26 March 2006. It requires telecommunication data operators (Internet and telephony) to retain data for one year. Concerned data are those allowing the identification of: - the user and its terminal equipment - the recipients of the communication - the date, time and duration of the communication - the additional services used and their suppliers - the origin and the location of the communication (for telephony services). The decree specifies provisions that were first introduced in the Daily Safety Law ('Loi sur la sicuriti quotidienne' or LSQ), in November 2001, as an allegedly urgent procedure to fight terrorism, after the 11 September attacks in the USA. Four years and four months after its adoption, this law becomes applicable. In the mean time, these provisions have been twice modified. In March 2003, the Home Safety Law ('Loi sur la sicuriti intirieure' or LSI) made these provisions perennial, while they were supposed to last only until December 2003 and be assessed by the Parliament. In January 2006, the new French anti-terror law has extended the concerned provisions in two ways. First, not only the judicial authority but also the police forces may access the retained data. Secondly, data retention obligations now apply to Internet cafes, hotels, restaurants, and more generally to any person or organisation providing Internet access, free or for a fee, as a main or side activity. France has then chosen the maximum period of retention allowed by its national law, instead of choosing the minimum period, according to the new EU legislation. The European Directive on telecom data retention, recently adopted by the Parliament and the Council of Justice and Home Affairs, requires a retention period of no less than 6 months and no more than 2 years. French EDRI member IRIS has qualified this decree as the "maximal penalty for privacy", in a press release issued on the day of the decree publication. The organisation reminds that short after the LSQ adoption, it has filed a complaint with the European Commission against France, for violating the EU legislation. However, this complaint remained in standby, the EC waiting for the application decree to process the complaint. In the mean time, two European Directives on data retention were adopted, in 2002 and 2006 respectively, making this complaint obsolete. The French ISP association (AFA, French EUROISPA member) announced on 28 March that it would challenge this application decree before the Conseil d'Etat, highest administrative court. The main disputed point is that, while the decree provides for reimbursement of costs incurred by a requirement of law enforcement authorites, on a case by case basis, it remains silent on the general data retention cost which needs important investment from ISPs. In addition, the AFA deplores the lack of transition period to set up the retention system, and more generally the lack of discussion on the decree. Decree no. 2006-358 of 24 March 2006 regarding electronic communications (in French, 26.03.2006) http://www.legifrance.gouv.fr/WAspad/UnTexteDeJorf?numjo=JUSD0630025D Decree LSQ - Maximum penalty for private life (in French, 26.03.2006) http://www.iris.sgdg.org/info-debat/comm-decretlsq0306.html ISP Association will file an appeal to Conseil d'Etat (in French, 28.03.2006) http://www.afa-france.com/p_20060328.html EDRI-gram : Data Retention Directive Adopted By JHA Council (01.03.2006) http://www.edri.org/edrigram/number4.4/dataretention IRIS dossier on data retention (with information on the complaint to EC) http://www.iris.sgdg.org/actions/retention/ (Contribution by Meryem Marzouki, EDRI-member IRIS) ============================================================ 2. Internet under attack on election day in Belarus ============================================================ On 19 March 2006, date of the presidential elections in Belarus, the major online independent news resources (svaboda.org, charter97.org, belapan.com, ucpb.org, naviny.by, kozylin.com, zubr-belarus.com) were the targets of various types of attacks. The Website of "Nasha Niva" newspaper was not available from Belarus on 18 March on the Internet. Other problems were spotted in accessing tut.by, a major Belarusian portal with about 60 000 visitors/day. Also, Milinkievich's (candidate from Unified Democratic Forces) official website was unavailable for 2 days starting on 19 March. According with website administrators, they lost control over the server. Charter97 press-centre websites were permanently attacked. Authorities not only used their usual techniques (IP address blocking, massive DoS attacks) but Internet filtering as well. As a result a number of websites were unavailable from Belarus. Belarus has a large system put in place in order to restrict Internet access and control unwanted content. Some laws make it illegal to publish information that is contrary to state interests. ISPs from Belarus have to buy their connectivity from the telecom monopoly company. Internet Filtering in Belarus ( 20.03.2006) http://www.e-belarus.org/news/200603201.html OpenNet Initiative to Monitor Internet during the Belarus Presidential Elections (17.03.2006) http://www.opennetinitiative.net/blog/?p=92 Charter '97 - Milinkevich's official web site broken open (19.03.2006) http://67.18.131.22/eng/news/2006/03/19/mil (Thanks to Mikhail Doroshevich - E-belarus.org) ============================================================ 3. Slovenia : Draft Police Act endangers privacy ============================================================ The draft of new Police Act has raised a lot of criticism in the last days from privacy activists and legal experts on its broad encroachment upon citizens' right to privacy, granted by the Slovenian Constitution. Through the suggested act, the Slovenian government grants more power to the police, using terrorism, the Schengen treaty and recent serious crimes as a handy excuse. The Minister for Interior Affairs replied that changes to the Police Act were inevitable due to demands of the Schengen treaty. Experts agree that the Police Act should recieve some new provisions if Slovenia wants to fully enter the Schengen regime, however, such disproportionate and overall measures are not required by the Schengen treaty. Goran Klemencic from the Faculty of Criminal Justice and Security says that the draft represents an unconstitutional and dangerous attempt to broaden police powers. Similar opinions came from the Faculty of Law in Ljubljana and some privacy advocates. The draft provides for concealed collection of personal data without court warrant and enables interpretation that allows targeted and continuous surveillance. Targeted data collection would include financial and welfare data, lists of co-passengers and relations, data about vehicle and luggage etc. And all this for individuals as well that might commit a crime somewhere in the future. To add some more oil on the fire, the decision-making for approving these invasive measures would not be granted to a court or public prosecutor, but to the police itself, namely to the Head of Criminal Police. The Minister for Interior Affairs, Dragutin Mate, responded in an interview for national television. His reaction showed that the draft Police Act might not be sent to the Parliament in the current form because of the numerous criticisms. However, in his opinion, this is not an invasion to privacy, it is "just collecting some data at the moment when an individual's data are entered into the Schengen database and when the respective individual is randomly stopped by the police inside the country or at the border [...] The data includes accurate destination, reason for stopping and of course all the data about how this individual travels". According to Mr. Mate, this complies with article 99 of Schengen treaty. This might be true but he did not list all the data to be collected according to the draft act. The latter includes "targeted data collection"; "discreet collection"; so called "serious suspicion" (which is not defined); "collection of personal data from other subjects"; family, financial and welfare data etc. The interpretation would therefore also allow gathering of telecommunications traffic and location data from telcos and ISPs ("collection of personal data from other subjects"), maybe even personal data gathered by employers. Moreover, the draft does not provide for an afterward notification to the individual that he or she was a subject of police surveillance. According to the draft, the police could "randomly" stop an individual (following a suspicion that he or she might commit a crime somewhere in the future) and gather the most private data about him or her, including the family and co-passengers that would be an "excellent" accessory for police to build the social networks. These disproportionate and invasive measures included in the draft of the Police Act may go well together with the Data Retention Directive that was passed by the European Parliament in December 2005. Seeing "the big picture", some are asking where Slovenia is heading. Is it really to become a police country? The critics might have been successful. The Minister for Interior Affairs later revealed that "they will most likely include judicial supervision" over measures that invade individual's constitutional rights. However, it is incredible how such totalitarian solutions even managed to get a place inside an official draft . Draft of the new Police Act - limiting privacy and more power for the police? (only in Slovenian, 19.3.2006) http://www.slo-tech.com/script/forum/izpisitemo.php?threadID=211864&mesto=0 Will police invade the privacy? (only in Slovenian, 17.3.2006) http://24ur.com/bin/article.php?article_id=3071039 Ministry does not want a police country (only in Slovenian, 18.3.2006) http://www.delo.si/index.php?sv_path=41,35,125949 (Contribution by Aljaz Marn, EDRI observer, privacyblog.net, Slovenia) ============================================================ 4. Creative Commons license upheld in Dutch and Spanish courts ============================================================ Both in The Netherlands and in Spain the Creative Commons license was judged in court. In both cases the validity of this alternative copyright license was upheld. In the Netherlands, the first court case about the validity of the Creative Commons license produced clear victory for the user of the license. On 9 March 2006 the district court of Amsterdam ruled in summary proceedings that the weekly gossip magazine 'Weekend' could not republish pictures that were published under a specific non-commercial CC license. The family pictures were made by Adam Curry, famous in internet circles for promoting podcasting. Curry had published the pictures on the pictures-website flickr.com under a so-called Attribution-Noncommercial-Sharealike license, with the text 'this photo is public' and a reference to the appropriate CC license. Weekend did not seek or obtain prior permission. Curry sued for both copyright and privacy infringement. Weekend defended itself by saying it did not understand the reference to the CC license. The magazine also claimed there could be no damages, since the pictures were freely available on the flickr website anyway. The court ruled the copyright was unmistakable. Especially a professional party like the publisher of the magazine should conduct a thorough investigation before publishing pictures taken from the Internet. Professor Bernt Hugenholtz, director of the Institute for Information Science of the University of Amsterdam and main creator of the Dutch CC license was very pleased with the ruling. He commented on the creative commons mailing-list: "The Dutch court's decision is especially noteworthy because it confirms that the conditions of a Creative Commons license automatically apply to the content licensed under it, and bind users of such content even without expressly agreeing to, or having knowledge of, the conditions of the license." A few weeks earlier, on 17 February 2006 the Spanish court of Badajoz decided against SGAE, the Spanish music rights collecting society, in favor of a bar owner who played music released under a Creative Commons license. The court said none of the music played in disco bar Metropol between November 2002 and August 2005 was actually licensed by the collecting society. On the other hand, the CC licenses did allow for public performance of the work. Full text of the Amsterdam district court decision (in Dutch only, 09.03.2006) http://www.rechtspraak.nl/ljn.asp?ljn=AV4204 Mailinglist iCommons community discussion http://lists.ibiblio.org/mailman/listinfo/cc-icommons Full text of the Badajoz court decision (in Spanish only, 17.02.2006) http://www.internautas.org/archivos/sentencia_metropoli.pdf Spanish Court Recognizes CC-Music (23.03.2006) http://creativecommons.org/weblog/entry/5830 (Contribution by Sjoera Nas, EDRI-member Bits of Freedom, the Netherlands) ============================================================ 5. New anti-terror bill proposed in Denmark ============================================================ As a follow up to the latest anti-terror plan of action (49 proposals) of November 2005, the Danish government is now proposing new anti-terror legislation. In the current round of public hearing, massive criticism has been raised by NGOs, legal experts, Danish industry, telecom providers, and from a number of political parties, including the Liberal Party, which is one of the ruling parties in the current government. The criticism concerns both the substance in the proposals and the process of their preparation. The proposals presented by the Ministry of Justice and Ministry of Science & Technology are quite far reaching and encompass a range of intrusions into citizens' privacy. Among the most debated proposals are: - An access for the police intelligence services (PET) to request information about a citizen from any public authority as long as the information "might serve a purpose" in relation to an investigation, i.e. without a request for the police to justify the request. Furthermore there is increased access for the intelligence services to exchange this information with the defence intelligence services (FET). - A request for telecom and Internet Service Providers to provide the police with information on a given cell phone location at a given point in time (so called tele observation). - An obligation for telecom and Internet Service Providers to implement technical measures to enable the authorities to wiretap any given communication at short notice. - An obligation for telecom and Internet Service Providers to implement technical measures to provide unspecified historical data about a citizen (data retention), though the specific data to be retained in Denmark are still unresolved and have been so since the adoption of the first anti-terror law in June 2002. - An access to the police to request that public authorities or private companies put in place CCTV surveillance of public spaces. Furthermore, access to the police to specify technical requirements for the surveillance records. - A request for airline companies to retain passenger and airline staff data for one year, and to hand these over to the police intelligence services upon request. A heated public hearing was held on 28 March at the Danish Human Rights Institute and a new round of debate will take place in the Parliamentary judicial committee on 31 March. The coming weeks will show whether the government will stick to the original proposals or whether some of the more controversial part will be modified. Revolt threatens anti-terror bill (28.03.2006) http://www.cphpost.dk/get/94770.html Responses from Digital Rights (in Danish) www.digitalrights.dk Responses from the Danish Human Rights Institute (in Danish) http://www.humanrights.dk/hoeringssvar/notat2006/ Government wants to strengthen the fight against terror (in Danish) http://www.jm.dk/wimpdoc.asp?page=document&objno=74912 Ministry of Justice draft bill (in Danish) http://hoeringsportalen.dk/pls/portal/docs/PAGE/HOERINGSPORTAL/JUSTITSMINISTE RIET/LOVFORSLAG_FRA_JUSTITSMINISTERIET/AENDRING_AF_LOV_OM_RETSPLEJELOVEN_MV._ 76/LOVUDKAST.PDF Ministry of Science & Technology draft bill (in Danish) http://www.videnskabsministeriet.dk/cgi-bin/left-lovstof-list.cgi?law_type=lo vudkthrng&Line=All Government Action Plan on anti-terrorism (in Danish) http://www.stm.dk/publikationer/terrorpakke/index.htm EDRI-gram : New anti-terrorism measures in Denmark (5.12.2005) http://www.edri.org/edrigram/number3.24/Danish_antiterror (Contribution by Rikke Frank Jxrgensen, EDRI-member Digital Rights Denmark) ============================================================ 6. Update on French EUCD Transposition ============================================================ The DADVSI draft law (French EUCD Transposition) made its first step on 21 March, with 286 votes in favour and 193 votes against. In an unusually crowded National Assembly, 501 out of the 577 Members of the Parliament took part in the vote. All the votes in favour came from representatives of the Conservative government party, which has the absolute majority. The NO votes repartition is: 7 from the government's party (14 abstentions), 162 from the Socio-democrat, Communist and Green opposition (4 abstentions), and 24 from the Liberal Democrat Centrists (4 abstentions). The result is largely a victory for the cultural industry majors: the 'global licence' idea is over, copyright exceptions granted by law are few and painless; while downsized, a penalty regime for unauthorized upload or download of content protected under intellectual property legislation is still in place for non commercial use; DRMs circumvention is assimilated to counterfeit, unless for research purpose; an administrative authority has been created to decide on the allowed number of private copies for cultural goods, with no minimum granted by law; and, most importantly, the so-called 'Vivendi Universal amendment' has been adopted, criminalizing P2P software edition and dissemination. However, the draft law brings important progress on the interoperability side: not only DRM vendors are required to open their technology to competitors, but also commercial platforms are required to make their files compatible with any player. This has soon led to strong criticism, with Apple accusing France of "State-sponsored piracy" and Americans for Technology Leadership (an industry coalition including members such as Microsoft) claiming that such measures "strip away the intellectual property rights of companies". The issue seems serious to US Commerce Secretary Carlos Gutierrez, who backed Apple protests. The draft law will go to the Senate, where discussions are scheduled in mid-May. Not only copyright, but also competition is clearly at stake now. No doubt that French Senators already start facing strong lobbying. EDRI-gram: What's so special about French EUCD transposition? (15.03.2006) http://www.edri.org/edrigram/number4.5/franceeucd Sign Of The (Digital) Times: France's Struggle With A New Copyright Law (18.03.2006) http://www.ip-watch.org/weblog/index.php?p=248 Draft law adopted by the National Assembly (in French, 21.03.2006) http://www.assemblee-nationale.fr/12/ta/ta0554.asp A compilation of reactions on the French draft copyright law (since 22.03.2006) http://eucd.info/index.php?2006/03/21/288-dadvsi-code-nirvana-or-nightmare (Contribution by Meryem Marzouki, EDRI-member IRIS) ============================================================ 7. Damages on online defamatory statements in UK ============================================================ Michael Keith Smith, a former parliamentary candidate for the UK Independence Party has received #10,000 in damages in a defamation case occurred on the internet Smith was a participant in a discussion on the Iraq war held on a discussion board run by Yahoo!. Tracy Williams, another participant in the discussion, posted under pseudonym series of defamatory remarks about Smith on an internet bulletin board calling him a "lard brain" a "Nazi", a "racist bigot" and a "nonce". She also alleged that he had sexually harassed a female co-worker. Although Smith had obtained court orders in June 2004 that allowed him to identify the person behind the remarks, Williams continued the defamatory campaign in 2005. Smith sued her and Judge Alistair MacDuff considered the remarks clearly defamatory and awarded Smith #10,000 damages - #5,000 general damages plus #5,000 aggravated damages to reflect Ms Williams' behaviour. He issued an injunction prohibiting Williams from repeating the remarks and ordered her to pay #7,200 costs involved in the legal action. Ms Williams did not defend the action. "I'm happy with the judge's ruling but firms hosting online chat rooms should be prepared to get involved and step in to moderate defamatory statements," Smith told The Guardian. Legal experts say the case, the first of this kind, should be taken as a warning that the lows of libel apply to chat rooms, message boards and personal blogs just as they apply to comments published in a newsletter. On the other hand, Mark Stephens, head of media law at Finer Stephens Innocent, said the case should lead to a larger discussion on whether such cases should reach the court. A chat room is self-moderating and has a limited circulation. Most such cases are solved much easier as the complaints are addressed to an ISP or site owner, which would take down the defamatory content as soon as it was notified. UKIP candidate wins #10,000 for internet libel (21.03.2006) http://www.timesonline.co.uk/article/0,,2-2096902,00.html #10,000 damages awarded for internet libel (23.03.2006) http://www.theregister.co.uk/2006/03/23/internet_libel_payout/ Warning to chatroom users after libel award for man labelled a Nazi (23.03.2006) http://www.guardian.co.uk/law/story/0,,1737445,00.html ============================================================ 8. Swedish Foreign Minister resigned following pressure on website ============================================================ Laila Freivalds, the Swedish Foreign Minister resigned on 21 March after having been cornered by the press on her involvement in the closure on 9 February of a far-right party's website. The Web site, which was planning to publish caricatures of Muhammad like those that led to deadly protests by Muslims all over the world, was contacted by a top Foreign Ministry official who said it should be closed for security reasons. Although, in the beginning, the minister denied having known about the official's action and having exerted pressure on the hosting company, a later report from the ministry said she had been involved in the decision. The minister told the media that the cartoons were "offensive to other peoples' religious beliefs" and admitted to the media that she was concerned that these cartoons may damage Sweden. Critics considered this action as an attack to freedom of speech. Sweden's government is forbidden by law to interfere with what is written in newspapers and on the Internet. Sweden FM quits over cartoon row (21.03.2006) http://news.bbc.co.uk/2/hi/europe/4828052.stm Swedish Foreign Minister Laila Freivalds Resigns (21.03.2006) http://www.bloomberg.com/apps/news?pid=10000085&sid=axCmZPNbpAF4&refer=europe ============================================================ 9. TACD debate on the politics and ideology of intellectual property ============================================================ Civil society groups from around the world met in Brussels 20/21 March to discuss the politics and ideology of intellectual property. Speakers included representatives from WIPO and the EU, former US Patent Commissioner Bruce Lehman, consumer and development campaigners and noted IP academics Peter Drahos and Susan Sell. The conference tried to step back from immediate IP controversies and take a look at the rhetoric and politicking behind the framing of IP debates and legislation. Jamie Love set the tone for the meeting by looking at the loaded terms used by proponents and critics of stronger IP rights, contrasting positive language such as "innovation", "value" and "wealth creation" with negative descriptions such as "monopoly", "privilege" and "exploitation". The practical politics of the recent software patent debate were laid out by pro-patent lobbyist Jonathan Zuck, anti-software patents campaigner Florian Muller and European Parliament member and patent attorney Sharon Bowles. Bowles complained that few involved in the debate understood even the definitions involved; many in the audience doubtless felt the same way! Bruce Lehman and Rufus Pollock described the pro-IP consensus that exists across mainstream US and EU political parties, which gave Green MEP David Hammerstein a chance to describe his party's lone stance that instead favours innovation and consumer rights. The most notable comment of the conference came from Bruce Lehman. While head of intellectual property policy for President Clinton, he drove the creation of the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS), which embedded IP into global trade treaties. But Lehman now feels that TRIPS has been a "huge failure" for the US, providing US market access to developing countries that have not reciprocated with strong IP enforcement. Europeans can only hope that those in the Commission and member state governments responsible for IP policy are listening to this gale of criticism of ever-stronger private property rights in ideas. Leonardo Cervera Navas of DG Internal Market said at the meeting that shorter copyright terms were politically unthinkable. The debate will only move forward once such blinkers are removed and we see evidence- rather than faith-based IP policy development. TACD Conference website: The Politics and Ideology of Intellectual Property http://www.tacd.org/docs/?id=286 Lehman: TRIPS was a mistake (20.03.2006) http://dooooooom.blogspot.com/2006/03/lehman-trips-was-mistake.html The debate on software patents as a litmus test for the knowledge society (in German, 21.03.2006) http://www.heise.de/newsticker/meldung/71069 Discussion over intellectual monopoly rights at TACD's Brussels conference (20.03.2006) https://www.fsfe.org/en/fellows/gerloff/blog/discussion_over_intellectual_mon opoly_rights_at_tacd_s_brussels_conference Experts: Intellectual Property Policy Not A Traditional Left-Right Political Issue (21.03.2006) http://www.ip-watch.org/weblog/index.php?p=250&res=1024_ff&print=0 The Politics and Ideology of Intellectual Property - A New Political Order(22.03.2006) http://patentinglives.blogspot.com/2006/03/politics-and-ideology-of-intellect ual.html (Contribution by EDRI board member Ian Brown) ============================================================ 10. Commission progress report on electronic signatures ============================================================ A new progress report by the European Commission on the evolution of the electronic signatures in the European Union was made public on 17 March 2006. The report highlights the low usage of the qualified electronic signatures by European businesses and citizens. The report focuses on the "Directive on a Community framework for electronic signatures" adopted in 1999. The directive has introduced legal certainty with respect to the general admissibility of electronic signatures, all the general principles being now included in the legislation of all 25 Member States. The commission sees a much larger use of the qualified electronic signatures - based on Public Key Infrastructure (PKI) technology - in the future with the introduction of the electronic ID cards and in some e-government services, such as on-line income tax returns. Information Society and Media Commissioner Viviane Reding said "much work still has to be done in particular to make signatures work across borders. I also see a need for asking whether we need further adaptations of our EU framework for electronic signatures to technological and market developments and to the better regulation-policy of this Commission." The official press release announced that The Commission would also prepare a report on standards for electronic signatures in 2006 to see whether further regulatory measures by the EU would be necessary. Also, the Commission will hold a series of meetings with EU Member State experts and stakeholders to consider possible complementary measures to address, where appropriate, any differences between national laws transposing the e-signatures Directive that could fragment the single market, any clarifications needed in specific articles of the e-signatures Directive and any technical and standardisation work necessary to improve the cross-border interoperability of the e-signature systems. Electronic signatures: legally recognised but cross-border take-up too slow, says Commission (17.03.2006) http://europa.eu.int/rapid/pressReleasesAction.do?reference=IP/06/325&format= HTML&aged=0&language=EN&guiLanguage=en Report on the operation of Directive 1999/93/EC on a Community framework for electronic signatures (15.03.2006) http://europa.eu.int/information_society/eeurope/i2010/docs/single_info_space /com_electronic_signatures_report_en.pdf ============================================================ 11. Agenda ============================================================ 12 April 2006, Dublin, Ireland Royal Irish Academy "Enabling Open Access to Scientific Data and Information within the Modern Knowledge Economy; the Case for a Scientific Commons" http://www.codataweb.org/codata-ria/ 15 April 2006, Deadline funding applications Civil rights organisations and initiatives are invited to send funding applications to the German foundation 'Bridge - B|rgerrechte in der digitalen Gesellschaft'. A total of 15 000 euro is available for applications that promote civil rights in the digitised society. http://www.stiftung-bridge.de 21-23 April 2006, Yale Law School, USA Access to Knowledge Conference Yale Information Society Project http://islandia.law.yale.edu/isp/a2kconfmain.html 27-28 April 2006, Washington, USA IP Disputes of the Future - TACD This conference will ask what will be the IP disputes in new fields of technology, and how advances in biotechnology and information technologies will change the nature of IP disputes. http://www.tacd.org/docs/?id=287 30 April - 2 May 2006, Hamburg, Germany LSPI Conference 2006 The First International Conference on Legal, Security and Privacy Issues in IT http://www.kierkegaard.co.uk/ 2-5 May 2006, Washington, USA CFP2006 The Sixteenth Conference on Computers, Freedom & Privacy http://www.cfp2006.org 3-6 May 2006, Wiesbaden, Germany LinuxTag - Europe's biggest fair and congress around free software, http://www.linuxtag.org 10 May - 23 July, Austria Annual decentralized community event around free software lectures, panel discussions, workshops, fairs and socialising http://www.linuxwochen.at 21 June 2006, Luxembourg Safer Internet Forum 2006 Focus on two topics: "Children's use of new media" and "Blocking access to illegal content: child sexual abuse images" http://europa.eu.int/information_society/activities/sip/si_forum/forum_june_2 006/index_en.htm 26-27 June 2006, Berlin, Germany The Rising Power of Search-Engines on the Internet: Impacts on Users, Media Policy, and Media Business http://www.uni-leipzig.de/journalistik/suma/home_e.html 16 - 28 July 2006, Oxford, UK Annenberg/Oxford Summer Institute: Global Media Policy: Technology and New Themes in Media Regulation Application deadline 1 May 2006. http://www.pgcs.asc.upenn.edu/events/ox06/index.php 2-4 August 2006, Bregenz, Austria, 2nd International Workshop on Electronic Voting 2006 Students may apply for funds to attend the workshop until 30 June 2006. http://www.e-voting.cc/stories/1246056/ =========================================================== 12. About =========================================================== EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 21 members from 14 European countries and 5 observers from 5 more countries (Italy, Ireland, Poland, Portugal and Slovenia). European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 2.0 License. See the full text at http://creativecommons.org/licenses/by/2.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/index.php?option=com_content&task=view&id=626 &Itemid=4&lang=mk - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From orozco at iomartinternet.com Wed Mar 29 19:54:26 2006 From: orozco at iomartinternet.com (Carolina Delacruz) Date: Wed, 29 Mar 2006 21:54:26 -0600 Subject: Re-finance before rates skyrocket Message-ID: <1.4.8.4.2.47022998174041.597a1159@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1185 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: cinerama.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From coderman at gmail.com Wed Mar 29 22:30:45 2006 From: coderman at gmail.com (coderman) Date: Wed, 29 Mar 2006 22:30:45 -0800 Subject: how to get johnny to encrypt (his hard drive) Message-ID: <4ef5fec60603292230t5bda1b8ftbebcaa56328b1896@mail.gmail.com> thoughts on making this simpler? 0. insert new second disk of equal or greater size 1. boot from trusted cd/dvd ISO image 2. insert USB memory stick (or two if you want a backup) 3. enter new password / passphrase (see good password howto) 4. agree/confirm to copy over empty / target disk 5. wait as new disk is encrypted via loop-aes, keys are stored on password protected USB image, all existing OS data* on source disk is copied to encrypted volume on new disk. 6. reboot into new encrypted volume and copy back over original source hard disk with loop-aes and store keys for this disk on USB image. 7. Johnny gets a data backup with his privacy. * ubuntu, knoppix, slackware, linspire and centos supported. a windoze or other partition (vfat, ntfs, etc) can be copied and mounted under a new installation of the previously mentioned linux OS'es on the new encrypted disk. (if one of these linux flavors is not already installed) From declan at well.com Wed Mar 29 22:42:00 2006 From: declan at well.com (Declan McCullagh) Date: Wed, 29 Mar 2006 22:42:00 -0800 Subject: [Politech] Surveillance in the sky: Homeland Security wants aerial drones with cameras [priv] Message-ID: Unmanned aerial vehicles (UAVs) have long been used over Iraq and Afghanistan. Now local police and Homeland Security want to use them in the U.S. for aerial surveillance. This raises two interesting issues: privacy and safety. The privacy one is familiar to Politech readers. If you have a fleet of UAVs overhead on a clear day, they could track when your car leaves your driveway, where you go, who you visit, how long you stay, how fast you drive, and add all that data to a massive information store that could be available to any Fed for the asking. (Networked terrestrial cameras and facecams raise essentially the same issue.) The safety issue involves sharing airspace with pilots carrying passengers. News coverage: http://news.com.com/Drone+aircraft+may+prowl+U.S.+skies/2100-11746_3-6055658. html Photos of UAVs: http://news.com.com/2300-11397_3-6055507.html The Aircraft Owners and Pilots Association's writeup of a North Carolina county's use of an UAV for monitoring its citizens: http://www.aopa.org/whatsnew/newsitems/2006/060215uav.html Summary of a House hearing on this today is below. -Declan --- http://www.house.gov/transportation/aviation/03-29-06/03-29-06memo.html PURPOSE The purpose of this hearing is to discuss the use of Unmanned Aerial Vehicles (UAVs) or Unmanned Aerial Systems in the National Airspace System (NAS) and the authority of the Federal Aviation Administration (FAA) to provide safety oversight and air traffic control over these systems in the NAS. BACKGROUND According to the Congressional Research Service, Unmanned Aerial Vehicles (UAVs) have been referred to in many ways: remotely piloted vehicle, drone, robot plane, and pilotless aircraft are a few such names. UAVs, which may have a wingspan as large as a Boeing 737 or be as small as a radio-controlled model airplane, are defined by the Department of Defense (DOD) as powered, aerial vehicles that * do not carry a human operator, * use aerodynamic forces to provide vehicle lift, * can fly autonomously or be piloted remotely, * can be expendable or recoverable, and * can carry a lethal or nonlethal payload. There are two different types of UAVs: drones and remotely piloted vehicles (RPVs). Both drones and RPVs are pilotless, but drones are programmed for autonomous flight. RPVs are actively flown b remotely b by a ground control operator. While historically UASs have been used primarily by the DOD in military settings outside of U.S. borders to enhance warfighting capabilities, there is growing demand to operate UAVs in the integrated NAS. In fact, Congress has repeatedly called for and funded programs to study and eventually mandate the use of UAVs in support of homeland security missions and for other purposes. Federal agencies, such as the Customs and Border Protection Service (CBP), the Drug Enforcement Agency, the Federal Bureau of Investigation, the Transportation Security Administration, the Federal Emergency Management Agency, and State and Local law enforcement agencies are interested in utilizing UAVs in the NAS. Public uses include border security, port security, surveillance, drug interdiction, search and rescue, fire fighting, and other law enforcement and homeland security initiatives. Some of these activities are taking place today; for instance, the CBP conducts UAV surveillance operations along the Nationbs southern border; a NASA-sponsored program has produced civilian UAVs to monitor pollution and measure ozone levels; and the Department of Energy is looking at UAVs outfitted with radiation sensors to detect potential nuclear reactor accidents. UAVs are also an emerging segment of the commercial aviation industry and commercial entities would like to be able to operate UAVs in the NAS. There are many possible commercial uses of UAVs. In fact, the FAA acknowledges that manufacturers and operators are conducting research on, or are designing, aircraft that could fill niche markets unimagined just a decade ago. According to the FAA, some of the research and development activities the commercial aviation industry already performs include supporting law enforcement, homeland security, firefighting, weather prediction and tracking activities. ROLE OF THE FEDERAL AVIATION ADMINISTRATION The FAA has sole authority over the safe and efficient use of the NAS. The FAA is responsible for overseeing the safety of the civil airspace, including operations by the military, government, private pilots and commercial entities. To this end, the FAA must take appropriate actions to ensure the safety of the public, which includes the flying public, as well as people and property on the ground. Public Uses of the Civil Airspace - Certificate of Waiver or Authorization According to the FAA, when the military or a government agency wants to fly a UAV in civil airspace (outside of Special Use Airspace or Military Operation Areas which are bno flyb areas and therefore not integrated with other operators), the FAA examines the request and issues a Certificate of Waiver or Authorization (COA), generally based on the following principles: * The COA authorizes an operator to use defined airspace for a specified time (up to one year, in some cases) and includes special provisions unique to each operation. For instance, a COA may include a requirement to operate only under Visual Flight Rules (VFR). * Most, if not all, COAs require coordination with an appropriate air traffic control facility and require the UAV to have a transponder able to operate in standard air traffic control mode with automatic altitude reporting. * To make sure the UAV will not interfere with other aircraft, a ground observer or an accompanying bchaseb aircraft must maintain visual contact with the UAV. The COA process has made possible research and development efforts and provided a means to introduce UAVs into the air traffic system. This process has aided the FAA, other government agencies, and the UAV manufacturers in identifying potential safety issues. Identified issues, such as the ability to bdetect, see and avoidb other traffic, need to be addressed through further technological advancements and additional research and development efforts. Currently, the COA process is not available to commercial entities. Public Uses of the Civil Airspace b Temporary Flight Restrictions In order to address a request by the CBP to conduct UAV operations along the southern border, the FAA established a Temporary Flight Restriction (TFR) along the U.S.-Mexico border in Arizona and New Mexico. The approximately 300 nm-long, 17-nm wide in most places, corridor is to prevent U.S. Customs and Border Patrol UAV aircraft from colliding with other civilian aircraft. The TFR is in effect from 12,000 to 14,000 feet and is active from 5 p.m. until 7 a.m. daily. The TFR is scheduled to be in effect until December 31, 2006, and may be renewed next year. Commercial Uses of the Civil Airspace To address the increasing needs of the civil market and the desire by civilian operators to fly UAVs in the NAS, the FAA has set up a UAV office and is developing new policies, procedures and approval processes. The FAA anticipates having draft UAV guidance in two years. The approach is to have the appropriate level of oversight without being overly restrictive in the early stages. More immediately, the FAA is reviewing certification requests from several UAV manufacturers. The first airworthiness certificates in the bExperimentalb category (for research and development, crew training, or market survey) were issued in 2005. RELATED ISSUES There are a number of other issues facing the FAA related to the emerging commercial UAV industry, including: Safety oversight: The FAA has identified two primary UAV safety issues that must be addressed for them to operate safely in the integrated civil airspace. * The need for proven UAV command and control redundancies should there be a disruption in communication or should the operator lose contact with the vehicle; and * The need for reliable bdetect and avoidb capability so that UAVs can sense and avoid other aircraft. Short term: The use of COAs, experimental certificates and TFRs are intended to be temporary fixes. As it stands today, the lack of UAV standards, operational procedures and regulations is problematic. The demand for UAV operations is growing, and the short-term safety processes put in place, while allowing the FAA to gather important operational data, are not feasible in the long-term. Permission to fly UAVs in the NAS typically takes 60-90 days and permission is often accompanied by operational restrictions. In addition, FAA regions are not always interpreting the existing regulations the same way, leading to inconsistent regulation and enforcement. The FAA, other government agencies, UAV manufacturers, and commercial aviation stakeholders must continue to look for innovative solutions to address the safety issues related to UAVs in the NAS. Long term: The FAA has asked RTCA, Inc., a private, not-for-profit corporation that develops consensus-based recommendations for the agency on technical issues, to help develop UAV standards. RTCA will answer two key questions: How will UAVs handle command and control, and how will they detect and avoid other aircraft? Both of these questions are dependent upon the development of technology and operational procedures. In the long term, it must be demonstrated to the FAA that UAVs can operate at the equivalent level of safety as a manned aircraft. This process will take time. All the stakeholders, the FAA, DOD, DHS, other Government agencies, the NAS users, and the UAV industry must work together to achieve this safety goal. Research and Development Programs and ACCESS 5: Until recently, the National Aeronautics and Space Administration (NASA) sponsored a government-industry project called ACCESS 5. The project brought together NASA, the FAA, the DOD, the DHS and the UAV National Industry Team (UNITE) to integrate UAVs or Remotely Operated Aircraft (ROA) into the national civil airspace via a four-step process. The first two steps of that process were funded by NASA in the High-Altitude, Long-Endurance Remotely Operated Aircraft in the National Airspace System (HALE ROA in the NAS) project. The HALE ROA in the NAS project was established in 2004 to develop policies, procedures and technical standards to enable remotely or autonomously operated aircraft to fly reliably and routinely in civil airspace with an equivalent level of safety as planes flown by on-board pilots. The last two steps in Access 5 were not part of NASA's HALE ROA in the NAS project, and funding them was left dependent upon the success achieved in the first two steps. The HALE ROA in the NAS project was funded primarily by NASA's Aeronautics Mission Directorate, with a planned budget for steps one and two of about $103 million through fiscal year 2009, or about 75 percent of the project's estimated cost over that five-year period. Industry members of the Access 5 project were contributing funding, with roughly 75 percent of the project's funding from NASA and 25 percent from industry. Unfortunately for UAV research and development efforts, NASA has recently announced a comprehensive restructuring of its research programs. As such, Access 5 has been defunded and important UAV research and development work has stopped. To date, no other agency or entity has taken on, or agreed to, fund the project. International cooperation: The use of UAVs in the civil airspace is a global issue. The FAA and other Government agencies continue to work closely with their international counterparts to harmonize standards, policies, procedures, and regulatory requirements. Recreational Model Aircraft Appropriate oversight of model aircraft operations must be considered as the FAA and interested parties develop standards and regulations for the use of UAVs in the NAS. The term bmodel aircraftb is defined by the Academy of Model Aeronautics (AMA) as a non-human-carrying device capable of sustained flight in the atmosphere, not exceeding the limitations established in the Official AMA National Model Aircraft Safety Code, exclusively for recreation, sport, and/or competition activities. The AMA has been in existence since 1936, and is a non-profit organization whose purpose is to promote the development of model aviation as a recognized sport and worthwhile recreation activity. The AMA coordinates with the FAA and self-polices the operation of model aircraft in AMA sanctioned events. Some of the operational requirements for AMA sanctioned activities include: * A maximum takeoff weight of a model aircraft, including fuel, is 55 pounds, except for those flown under the AMA Experimental Aircraft Rules; * Operations shall not take place higher than approximately 400 feet above ground level, when within three (3) miles of an airport without notifying the airport operator; * Yielding the right-of-way and avoiding flying in the proximity of full-scale aircraft and utilizing a spotter when appropriate; * Operators of radio control model aircraft shall control the aircraft from the ground and maintain un-enhanced visual contact with the aircraft throughout the entire flight; and * No model aircraft shall be equipped with devices that would allow for autonomous flight. The AMAbs position is that model aircraft should not be included in the standards and regulations for UAVs, and that in establishing the definition of UAV, the focus should be on the purpose of the vehicle operation as opposed to the size or ability of the vehicle. _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From rah at shipwright.com Wed Mar 29 20:45:25 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 29 Mar 2006 23:45:25 -0500 Subject: [Clips] eBay: Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 (item 6265092168 end time Apr-03-06 12:00:00 PDT) Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Wed, 29 Mar 2006 23:44:24 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] eBay: Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 (item 6265092168 end time Apr-03-06 12:00:00 PDT) Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com Sammeln & Seltenes > Militaria > 1918-1945 > Technik Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 ORIGINAL!!! KEIN NACHBAU!!! VOLL FUNKTIONST\CHTIG!!!! Item number: 6265092168 Bidder or seller of this item? Sign in for your status View larger picture Current bid: EUR 11,461.00 (Approximately US $13,842.60) End time: Apr-03-06 12:00:00 PDT (4 days 14 hours) Shipping costs: EUR 79.00 Versicherter Versand Ships to: Worldwide Item location: M|nchen, Germany History: 7 bids High bidder: julie_holm? ( 0 )? You can also: Watch this item Email to a friend Listing and payment details: Show Meet the seller Seller: saleservice-muc? ( 1307?)? Feedback: 99.5% Positive Member: since Mar-28-03 in Germany Registered as a business seller Read feedback comments Ask seller a question Add to Favorite Sellers View seller's other items: Store | List Visit seller's Store: SALESERVICE-MUC Buy safely 1. Check the seller's reputation Score: 1307 | 99.5% Positive Read feedback comments 2. Learn how you are protected Returns: Seller accepts returns. 14 Days Money Back Description Item Specifics Condition: Used This translation is provided as a service. eBay cannot guarantee its accuracy. View Item Specifics in original language. Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 3-Walzen ENIGMA Chiffriermaschine Au_erordentlich schvnes Exemplar einer 3-Walzen ENIGMA des 2. Weltkrieges in sehr gutem Zustand und voll funktionsfdhig. Die geschichtstrdchtige Maschine wurde 1941 bei Chiffriermaschinen Gesellschaft Heimsoeth and Rinke in Berlin hergestellt; eingebaut in einer Holzkiste aus massiver Eiche. Die dazugehvrenden Rotoren sind aus Metall und fortlaufend nummeriert; Umkehrwalze B". Die Seriennummern wurden entfernt. Zwei Ersatz-Rotoren in einem separaten Holzkdstchen. Das Steckerfeld ist beschriftet mit Buchstaben QWERTZU , die Walzen nummeriert 1-26. Es fehlen ein paar Gl|hlampen (siehe Fotos) Es handelt sich um ein echtes ORIGINAL! Kein Nachbau!! 3-Rotors German ENIGMA Cipher Machine Fine example of a WW II Enigma cipher machine in a very good condition and a great history; full functional. Year of construction 1941 by Manufacturer Chiffriermaschinen Gesellschaft Heimsoeth and Rinke, Berlin. The Enigma machine is placed in an oak woodwork case. Three high-quality, all-metal, matched rotors and an Umkehrwalze "B". The rotors are continuous numbered; serial numbers has been removed. There are two spare rotors in an additional small wooden box. Plug board is lettered QWERTZU , wheels numbered 1-26. 100% Original!!! No Copy!! There are missing a few lamps (see photos) Die Versandkosten sind so hoch, weil das Paket bis zu einem Wert von 10.000$ versichert wdre und dies bei diesem St|ck von Nvten ist. Hersteller: Heimsoeth und Rinke Modell: Enigma Alter: 65 Jahre Farbe: schwarz Ma_e (LxBxH in cm): 31x25,5x13 Gewicht: 10,35 kg Besuchen Sie uns auf unserer Homepage oder schauen Sie mal bei unseren anderen Artikeln vorbei. Saleservice-muc ist Mitglied des eBay.de Powerseller Programms. Saleservice-Artikelnummer / Saleservice-Itemnumber: 144.1 Bitte geben Sie bei der \berweisung immer die ebay Artikelnummer und die Saleservice Artikelnummer an! Please enter the ebay itemnumber and the saleservice itemnumber on your bank transfer! ! Sie haben jederzeit ein 14-tdgiges R|ckgaberecht! Gerne antworten wir auf Ihre Anfragen (Beschaffenheit, Preis etc.). Bei weiteren Fragen kvnnen Sie uns auch telefonisch kontaktieren unter: If you have any questions, then we will try to answer. Or you can call us under following Number: Tel.: +49 (0) 89 - 642 565 81 ? AGBs Kundeninformationen Der Vertrag kommt zwischen Ihnen als Kdufer und SALESERVICE GbR, vertreten durch die Gesellschafter Frank Pollner und Pierre Weitmann, geschdftsansdssig: Gr|nwalderstra_e 177, 81545 M|nchen / Deutschland, Tel.: +49 (0) 89 - 642 565 81, e Mail: info at saleservice. de zustande. Indem die SALESERVICE GbR als Anbieter zwecks Durchf|hrung einer Online-Auktion einen Artikel auf die eBay-Website einstellt, gibt sie ein verbindliches Angebot zum Vertragsschluss |ber diesen Artikel ab. \ber die Funktion Bieten" und durch Klicken auf den Button Gebot bestdtigen" geben Sie Ihre rechtlich bindende Willenserkldrung ab, nachdem Sie von eBay zur \berpr|fung Ihrer Angaben aufgefordert wurden und somit die Mvglichkeit hatten, etwaige Eingabefehler zu erkennen und zu berichtigen. Das Zustandekommen des Vertrages richtet sich, abhdngig von dem Angebotsformat, nach den in '' 9 ff. der AGB von eBay genannten Kriterien. Entsprechend der Datenschutzerkldrung von eBay haben Sie eingewilligt, dass der Vertragstext als eBay-Website nach Vertragsschluss bis zu 90 Tage gespeichert wird und von registrierten Mitgliedern unter der jeweiligen Artikelnummer eingesehen werden kann. Sie haben die Mvglichkeit, mittels der Druckfunktion Ihres Browsers, die Website auszudrucken. Weiterhin erhalten Sie nach Vertragsschluss automatisch weitere Informationen zur Kaufabwicklung per eMail zugesandt. Preis, Liefer- und Versandkosten Der auf dieser Angebots-Website angef|hrte Kaufpreis ist ein Endpreis, d.h. er beinhaltet sdmtliche Preisbestandteile einschlie_lich etwaig anfallender Steuern. Alle Preise gelten ohne Verpackung, Fracht, Porto und Versicherung, die in der weiter unten unter "Angaben zu Zahlung, Versand und R|cknahme" aufgef|hrten Hvhe zusdtzlich anfallen. Sollten weitere Kosten anfallen, werden diese in der jeweiligen Angebotsbeschreibung gesondert aufgef|hrt. Die eBay-Geb|hren und Provisionen trdgt dagegen die SALESERVICE GbR. Zahlung und Versand Zusdtzlich zu den unten angef|hrten "Angaben zu Zahlung, Versand und R|cknahme " gelten die folgenden Zahlungs- und Versandbedingungen: * Die Lieferung des Artikels erfolgt, wenn nicht ausnahmsweise etwas anderes ausdr|cklich vereinbart worden ist, gegen Vorkasse und auf dem Versandweg. * Teillieferung sind zuldssig, soweit sie Ihnen zumutbar sind. R|ckgabebelehrung Einem Verbraucher steht, bei Anwendbarkeit der Vorschriften |ber Fernabsatzvertrdge, in Bezug auf die gekauften Artikel ein R|ckgaberecht zu. Das mvgliche R|ckgaberecht besteht nach Ma_gabe der folgenden Belehrung: R|ckgaberecht Verbraucher kvnnen die erhaltene Ware ohne Angabe von Gr|nden innerhalb eines Monats durch R|cksendung der Ware zur|ckgeben. Die Frist beginnt fr|hestens mit Erhalt der Ware und dieser Belehrung. Nur bei nicht paketversandfdhiger Ware (z.B. bei sperrigen G|tern) kann die R|ckgabe auch durch R|cknahmeverlangen in Textform, also z.B. per Brief oder eMail erkldrt werden. Zur Wahrung der Frist gen|gt die rechtzeitige Absendung der Ware oder des R|cknahmeverlangens. In jedem Falle erfolgt die R|cksendung auf Kosten und Gefahr des Verkdufers. Die R|cksendung oder das R|cknahmeverlangen hat zu erfolgen an: SALESERVICE GbR Gr|nwalderstra_e 177 81545 M|nchen / Deutschland eMail: info at saleservice-muc.de Das R|ckgaberecht besteht entsprechend ' 312 d Abs. 4 BGB unter anderem nicht bei Vertrdgen * zur Lieferung von Waren, die nach Kundenspezifikationen angefertigt werden oder eindeutig auf die persvnlichen Bed|rfnisse zugeschnitten sind oder die aufgrund ihrer Beschaffenheit nicht f|r eine R|cksendung geeignet sind oder schnell verderben kvnnen oder deren Verfallsdatum |berschritten wurde, * zur Lieferung von Audio- oder Videoaufzeichnungen oder von Software, sofern die gelieferten Datentrdger vom Verbraucher entsiegelt worden sind, * zur Lieferung von Zeitungen, Zeitschriften und Illustrierten. R|ckgabefolgen Im Falle einer wirksamen R|ckgabe sind die beiderseits empfangenen Leistungen zur|ckzugewdhren und ggf. gezogene Nutzungen (z.B. Gebrauchsvorteile) herauszugeben. Bei einer Verschlechterung der Ware kann Wertersatz verlangt werden. Dies gilt nicht, wenn die Verschlechterung der Ware ausschlie_lich auf deren Pr|fung, wie sie dem Verbraucher etwa im Ladengeschdft mvglich gewesen wdre, zur|ckzuf|hren ist. Datenschutz Soweit die SALESERVICE GbR in ihrer Eigenschaft als Kommissiondr tdtig wird, erfolgt mitunter eine Weitergabe personenbezogener Daten an die Eigent|mer der in Kommission verkauften Artikel. Mit Vertragsschluss erkldren Sie sich einverstanden, dass Ihre Kundendaten im Rahmen der gesetzlichen Verpflichtung weitergegeben werden. Versandinformationen/Shipping Informations: For international shipping or price, please contact us!! Bitte vffnen Sie zusammen mit DPD bei Erhalt des Paketes das Paket und pr|fen den Inhalt. Bei nicht einhaltung, haften wir nicht f|r Schdden!! Eine Selbstabholung sowie Bar bezahlung bei uns in der Gr|nwalderstr. 177 in 81545 M|nchen ist jederzeit von Mo-Fr zwischen 11-18 Uhr mvglich. Bitte kontaktieren Sie uns trotzdem vor der Abholung nochmals. FREE Counters and Services from Andale See More Great Items From This Seller FORD Ka Kool Kakool Bj 1998 60 PS 6000 km Polarsilber EUR 2,710.00 Apple iMac G4 800 Mhz 17" TFT SuperDrive 256 MB 60 GB EUR 301.00 Sharp 903SH 903 SH Klapphandy Fotohandy wie neu OVP TOP EUR 251.00 10 Lots Umlaufm|nzen der BRD Spiegelglanz OVP 1974-1983 EUR 227.01 Fleischmann 4122 Lock Dampflok NEU OVP EUR 127.88 Nokia IP Firewall IP350 NEU & OVP NBB3350000 C2 EUR 122.00 Becker 6 fach CD Wechsler Silverstone BE 2660 TOP EUR 113.00 2 Arcus Lautsprecher Boxen Standlautsprecher AS 500 EUR 112.11 Second Chance Ultima Schusssichere Kugelsichere Weste EUR 111.00 Yamaha XV1600 XV 1600 White Star Motorrad Sitz Sattel EUR 72.00 Carl Zeiss Theaterglas Opernglas Fernglas Theatis 3,5 EUR 70.00 D&G Dolce & Gabbana Night & Day DW009 TOP vergoldet EUR 56.00 Visit seller's Store Shipping, payment details and return policy Shipping Cost Services Available Available to EUR 79.00 Versicherter Versand Germany only Will ship to Worldwide. Seller's return policy: Return policy may differ for international buyers. Contact seller for more details. Learn more. Der Kdufer hat das Recht, den Artikel zur|ckzugeben Seller's payment instructions For international shipping/price, please contact us!!! Bitte geben Sie bei der \berweisung immer die ebay Artikelnummer und die Saleservice Artikelnummer an! Please enter the ebay itemnumber and the saleservice itemnumber on your bank transfer! Payment methods accepted Learn about payment methods. Ready to bid? help Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 Item title: Enigma 3 Walzen Chiffriermaschine Chiper Weltkrieg 1941 Current bid: EUR 11,461.00 (Approximately US $13,842.60) Your maximum bid: EUR (Enter EUR 11,511.00 or more) You will confirm in the next step. eBay automatically bids on your behalf up to your maximum bid. Learn about bidding. What else can you do? Back to home page | Ask seller a question | Printer Version Seller assumes all responsibility for listing this item. eBay Pulse | eBay Reviews | eBay Stores | Half.com | Kijiji | PayPal | Popular Searches | ProStores | Rent.com | Shopping.com | Skype Australia | Austria | China | France | Germany | India | Italy | Spain | United Kingdom About eBay | Announcements | Security Center | Policies | Site Map | Help Copyright ) 1995-2006 eBay Inc. All Rights Reserved. Designated trademarks and brands are the property of their respective owners. Use of this Web site constitutes acceptance of the eBay User Agreement and Privacy Policy. eBay official time -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From justin-cypherpunks at soze.net Wed Mar 29 18:03:52 2006 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 30 Mar 2006 02:03:52 +0000 Subject: [Clips] Your secrets are safe with quasar encryption In-Reply-To: References: Message-ID: <20060330020352.GA805@arion.hive> On 2006-03-29T17:22:07-0500, R. A. Hettinga wrote: > --- begin forwarded text > > Date: Wed, 29 Mar 2006 17:19:01 -0500 > To: Philodox Clips List > From: "R. A. Hettinga" > Subject: [Clips] Your secrets are safe with quasar encryption > > > > The researchers believe quasars could make an ideal cryptographic tool > because the strength and frequency of the radio pulses they emit is > impossible to predict. "Quasar-based cryptography is based on a physical > fact that such a space signal is random and has a very broad frequency > spectrum," Umeno told New Scientist. > Weblinks I think a better source of random bits would be the brainwaves of these idiot "researchers." > * Quasar Encryption patent > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20050242987&OS=20050242987&RS=20050242987 > > * Quasar Authentication patent > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20030145202&OS=20030145202&RS=20030145202 The USPTO is right up there with the worst TLAs in stifling progress and legitimate activities. -- The six phases of a project: I. Enthusiasm. IV. Search for the Guilty. II. Disillusionment. V. Punishment of the Innocent. III. Panic. VI. Praise & Honor for the Nonparticipants. From coderman at gmail.com Thu Mar 30 02:46:15 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 02:46:15 -0800 Subject: [Full-disclosure] Fwd: On sandboxes, and why I ... don't care. In-Reply-To: <5e01c29a0603300233r3dcfa440l8f01f0fc58bb22da@mail.gmail.com> References: <67D0DD4C-614A-4BD4-BFCA-BC4C5B345FD6@greebo.net> <5e01c29a0603291448g3cc4548l7cbe79ed5d515fb1@mail.gmail.com> <5e01c29a0603300233r3dcfa440l8f01f0fc58bb22da@mail.gmail.com> Message-ID: <4ef5fec60603300246s22b5448ck8814e438efc29676@mail.gmail.com> On 3/30/06, michaelslists at gmail.com wrote: > Just because no-one has told you, or you haven't seen it doesn't mean > it doesn't happen. amen. what's the cost if you are wrong? (the likely case over a sufficient period of time against motivated attackers) that artificial security flavoring is only reassuring while the luck continues... > It's pretty concerning to me, as a java programmer, that the verifier > is off by default and hence any jar running can run free or the > contraints I've tried to enforce. Or that another j2ee app could > possibly be viewing the data I was processing in a shared-hosting > environment. in a shared processing environment you have bigger concerns, but i do agree this is disturbing if your system was designed to operate in privacy. > And further, if your code _doesn't_ run properly with the verifier, > then what the hell are you doing? probably coding like the other 97% of the planet. (now that's _really_ concerning) From coderman at gmail.com Thu Mar 30 02:53:57 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 02:53:57 -0800 Subject: [declan@well.com: [Politech] Surveillance in the sky: Homeland Security wants aerial drones with cameras [priv]] In-Reply-To: <20060330103535.GM31486@leitl.org> References: <20060330103535.GM31486@leitl.org> Message-ID: <4ef5fec60603300253m4612affbn354a91200f23dbab@mail.gmail.com> On 3/30/06, Eugen Leitl wrote: > ----- Forwarded message from Declan McCullagh ----- > ... > Unmanned aerial vehicles (UAVs) have long been used over Iraq and > Afghanistan. Now local police and Homeland Security want to use them in > the U.S. for aerial surveillance. > > This raises two interesting issues: privacy and safety. i wager $something_equivalent_to_the_cost_of_a_few_beers that the safety concerns will scuttle this program within a year or two. some radio punks with an fpga modem and homebrew front ends will deep 6 one of these units if occasional failure doesn't do it first. with so little value added it's hard to justify that kind of risk over the public's heads and homes. sats and manned planes are almost as effective at invading such aerial privacy anyway... From anopia at acsid.com Thu Mar 30 01:52:26 2006 From: anopia at acsid.com (Gina Thomas) Date: Thu, 30 Mar 2006 03:52:26 -0600 Subject: Ratess will skyrocket soon Message-ID: <923i299y.4065627@yahoo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1194 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: wealth.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From steiners at kirchhoffarchitects.com Thu Mar 30 01:55:25 2006 From: steiners at kirchhoffarchitects.com (Luther Cohen) Date: Thu, 30 Mar 2006 03:55:25 -0600 Subject: Notification: Loww ratess Message-ID: <5.4.6.6.7.30116515218871.109a1365@69.60.117.34> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1167 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: mascara.jpg Type: image/jpg Size: 7236 bytes Desc: not available URL: From coderman at gmail.com Thu Mar 30 04:08:16 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 04:08:16 -0800 Subject: [p2p-hackers] lockstep synchronization protocol problem In-Reply-To: <343538103.05175@ustc.edu.cn> References: <343538103.05175@ustc.edu.cn> Message-ID: <4ef5fec60603300408o198b047blb41c46a5be62eebf@mail.gmail.com> hi jinz, i don't have time for a detailed reply but i thought a little more info would be useful On 3/28/06, UE=x wrote: > I'm doing research about synchronization problem in P2P system,and the basic > synchronization protocol is the lockstep protocol,and it use rounds to synchronize > all the peer's movements,the problem is lockstep only synchronize peer's > movements?what about the event created by all the peers?can it use rounds to > synchronize them?and how to ? i mentioned quorum systems and group key distribution to achieve a shared and authenticated state among a group of peers that can be kept in sync / coherent via frequent attestation (group re keying with quorum consensus to distribute new keys). there are many ways to implement this so i'll stick to conceptual features / attributes and how this relates to a private group network system we are implementing. quorum authorities are those who sign all the other authorities keys as part of the group key distribution. quorum or group members are those who receive keys from one or more quorum authorities. the quorum authorities maintain an index of all known / trusted group members and the trust metrics assigned to the roles / services they can perform. and peer may solicit, provide and consume the services of another once they verify they are trusted to do so. they can contact any of the quorum authorities (who have a full index and trust metric state / graph) to certify the remote peer before doing so. a group authorities may issue a revocation signed by his current group identity key to disband the quorum / group. if consensus cannot be reached within the next group re-key interval (due to failure, lack of consensus at the meatspace / user level, or malicious attack / DoS) the group must be re-keyed from the face to face ground up and all reputation rebuilt. the identifiers signed by the quorum during each iteration consist of: - the key digests for each authority for the next group key exchange - the sha-256 digest of the current base share file state image (includes base OS and private group files/keys) - the sha-256 digests of all delta based overlay filesystem images. these are optional among group members but mandatory for all quorum authorities. upon this base you can build / tie to various group synchronization mechanisms that are strongly authenticated and yet still fully decentralized. i hope that helps. From coderman at gmail.com Thu Mar 30 03:16:02 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 06:16:02 -0500 Subject: [Full-disclosure] Fwd: On sandboxes, and why I ... don't care. In-Reply-To: <5e01c29a0603300233r3dcfa440l8f01f0fc58bb22da@mail.gmail.com> References: <67D0DD4C-614A-4BD4-BFCA-BC4C5B345FD6@greebo.net><5e01c29a0603291448g3cc4548l7cbe79ed5d515fb1@mail.gmail.com><5e01c29a0603300233r3dcfa440l8f01f0fc58bb22da@mail.gmail.com> Message-ID: <000001c653eb$543cf9a0$0201a8c0@Jaluno.local> On 3/30/06, michaelslists at gmail.com wrote: > Just because no-one has told you, or you haven't seen it doesn't mean > it doesn't happen. amen. what's the cost if you are wrong? (the likely case over a sufficient period of time against motivated attackers) that artificial security flavoring is only reassuring while the luck continues... > It's pretty concerning to me, as a java programmer, that the verifier > is off by default and hence any jar running can run free or the > contraints I've tried to enforce. Or that another j2ee app could > possibly be viewing the data I was processing in a shared-hosting > environment. in a shared processing environment you have bigger concerns, but i do agree this is disturbing if your system was designed to operate in privacy. > And further, if your code _doesn't_ run properly with the verifier, > then what the hell are you doing? probably coding like the other 97% of the planet. (now that's _really_ concerning) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ From coderman at gmail.com Thu Mar 30 06:18:49 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 06:18:49 -0800 Subject: Fwd: driver for Atheros 5213 chipset - temporarily killed by not quite clean enough room reverse engineering Message-ID: <4ef5fec60603300618t496eb7faidf0fb99f920e6877@mail.gmail.com> ---------- Forwarded message ---------- From: Mateusz Berezecki Date: Mar 28, 2006 3:35 AM Subject: Re: driver for Atheros 5213 chipset To: Srinivasa Rao Cc: ath-driver-devel at lists.gnumonks.org Hey On 3/28/06, Srinivasa Rao wrote: The project has been moved to the other team. This means that this one is put on hold to avoid potential litigations. This has several implications with one of them being that this version of the driver is no longer developed in public. The other is that the documentation is being written for atheros hardware and the other teams is developing the new version of the driver so you have to be a bit patient right now. kind regards, Mateusz From coderman at gmail.com Thu Mar 30 06:28:05 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 06:28:05 -0800 Subject: Fwd: [TSCM-L] Feds bugged bedroom, phones of FIU pair In-Reply-To: <6.2.3.4.2.20060329160346.07c46eb0@pop.tscm.com> References: <6.2.3.4.2.20060329160346.07c46eb0@pop.tscm.com> Message-ID: <4ef5fec60603300628u1898d458re040443df08f463c@mail.gmail.com> hey, that sounds like a rotor machine. they should have updated their ciphers... """ The prosecutor said the couple used their cover at FIU to infiltrate the exile community, spying on the university's president, Mitch Maidique, and other exile leaders. He said they secretly communicated with the Cuban intelligence directorate, using five-digit code in short-wave radio transmissions. Once the messages were received, they would input them into their home computer, equipped with decryption technology. """ [... and a new enigma on ebay. sounds a little fishy... *grin*] http://www.theregister.co.uk/2006/03/29/enigma_for_sale/ ---------- Forwarded message ---------- From: James M. Atkinson Date: Mar 29, 2006 1:06 PM Subject: [TSCM-L] Feds bugged bedroom, phones of FIU pair To: TSCM-L http://www.miami.com/mld/miamiherald/14209765.htm CUBAN SPY CASE Feds bugged bedroom, phones of FIU pair New court evidence in the Cuba spy case reveals the United States used wiretaps for years before agents arrested an FIU professor and his counselor wife. BY JAY WEAVER jweaver at MiamiHerald.com Federal agents planted a bug in the bedroom of a Florida International University a couple of years ago, netting evidence to charge them as unregistered agents for the Cuban government, according to court records. The FBI also wiretapped the home phones of Professor Carlos Alvarez and his counselor wife, Elsa Alvarez, from at least late 2001 until last summer, collecting electronic evidence on practically all of their conversations. The reams of intercepts included mundane exchanges and even the private musings between husband and wife. The FBI's eavesdropping of the couple's home goes far beyond what was first known about evidence in the case, which included alleged ''confessions'' to federal agents last summer and the confiscation of the Alvarezes' home and FIU computers. The surveillance evidence surfaced as part of their lawyers' efforts to revoke the couple's detention before their scheduled May 8 trial. It's unclear from the court record how these thousands and thousands of surveillance intercepts will help the U.S. attorney's office prosecute the couple, who are suspected of reporting on the exile community and its leaders to Cuban leader Fidel Castro's government. According to sources familiar with the case, the FBI had hoped the electronic intercepts would provide leads on alleged spying activity on behalf of the Cuban government. The evidence led only to the Alvarezes' arrests in January. It's unclear why prosecutors chose to charge them at that time. The couple's lawyers say prosecutors have produced ''about 200 supposedly pertinent conversations'' recorded by the FBI, court records show. The evidence remains sealed from the public. But the Alvarezes' lawyers say the ''majority deals only with mundane activities of daily life'' -- such as conversations about the Alvarezes' dinner plans, the tenting of their South Miami home for termites and meetings at their Catholic church. THE DEFENSE STANCE The couple's lawyers, Steven Chaykin and Jane Moscowitz, argue their clients would not leave for Cuba if released because they have strong ties to the community, including five children and elderly parents. They are challenging whether the FBI lawfully obtained warrants to conduct the electronic surveillance. The FBI obtained the warrants under the Foreign Intelligence Surveillance Act, which allows the government to wiretap people in the United States suspected of being agents for a foreign government or involved in terrorist activity overseas. In the war on terror, the Bush administration has attracted sharp criticism for authorizing warrantless domestic wiretaps without approval from the secretive FISA court -- an issue that doesn't apply to the Alvarez case. It is not clear from court records how long the FBI conducted electronic surveillance of the couple's home. But it appears the FISA wiretaps of the Alvarezes may have begun years before the Sept. 11, 2001, terrorist attacks. Post-9/11, Congress approved the USA Patriot Act that allows federal agencies to use foreign intelligence wiretap evidence for criminal investigations, such as the Alvarezes' case. 'On March 6, 2006, the government produced summaries of allegedly `pertinent' recorded conversations produced by that surveillance starting in December 2001 and ending July 4, 2005, although the government states that the eavesdropping began earlier and continued until the defendants' arrest on Jan. 6, 2006,'' the Alvarezes' lawyers wrote. The attorneys, in their motion, asked the government to disclose the documents related to the wiretap warrants. They are trying to challenge evidence that could affect their clients' case before a jury. They cited constitutional protections for Carlos Alvarez, 61, a psychology professor, and his wife, Elsa, 55, a psychology counselor, both U.S. citizens. Referring to the FISA law, the attorneys said: No U.S. citizen ``may be considered an agent of a foreign power solely upon the basis of activities that are protected by the First Amendment. . . .'' For example, they argued, more than 40 of the ''pertinent'' FISA recordings are telephone conversations between Carlos Alvarez and an unidentified colleague regarding legally licensed culture-exchange programs between the United States and Cuba. PROTECTIVE ORDER This month, federal prosecutors refused to turn over documents for the FISA warrants to the Alvarezes' attorneys. So far, U.S. District Judge K. Michael Moore has issued a protective order that allows only members of the legal teams and their staffs to review the declassified FISA intercepts for the upcoming trial. Prosecutors apparently disclosed evidence about the FISA wiretaps to show the judge that the Alvarezes are a ``serious risk of flight.'' Assistant U.S. attorney Brian Frazier cited Magistrate Judge Andrea Simonton's January ruling in which she said the couple would receive ''a hero's welcome'' in Cuba. The prosecutor said the couple used their cover at FIU to infiltrate the exile community, spying on the university's president, Mitch Maidique, and other exile leaders. He said they secretly communicated with the Cuban intelligence directorate, using five-digit code in short-wave radio transmissions. Once the messages were received, they would input them into their home computer, equipped with decryption technology. Prosecutors say the couple traveled to Cuba, Mexico and other countries to exchange information with their handlers from the Cuban Directorate of Intelligence. According to court filings, the Alvarezes reported on ''community attitudes'' after the FBI's 1998 arrests of 10 Cubans charged with spying. That high-profile espionage case was linked to the Cuban government's shoot-down of two Brothers to the Rescue exile planes over the Florida Straits that killed four Miami men two years earlier. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 546-3803 Granite Island Group Fax: (978) 546-9467 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk at tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- From vcxsatweuck at netscape.net Thu Mar 30 06:54:18 2006 From: vcxsatweuck at netscape.net (Franklin Mccray) Date: Thu, 30 Mar 2006 07:54:18 -0700 Subject: preventing premature ejaculation Message-ID: <311736n9aa56$0u6b8847$85q4kqjj@norrissummertimeharoldnc89> how are you: try our site 100% money back guarrantte !! http://62.193.240.107/sm/ Increase spermm vol... http://62.193.240.107/et/ Preventing premature ejjaculation... http://62.193.240.107/gip/ Generic C:alis soft tabs.... http://62.193.240.107/hv/ Herval V:agra 100% natural.... retinag7890gsgyuigyu From rah at shipwright.com Thu Mar 30 07:04:14 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 30 Mar 2006 10:04:14 -0500 Subject: [Clips] The Trouble With Socialist Anarchism Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Thu, 30 Mar 2006 10:01:58 -0500 To: "Philodox Clips List" From: "R. A. Hettinga" Subject: [Clips] The Trouble With Socialist Anarchism Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com --- begin forwarded text From: "Mises Daily Article"
To:
Subject: The Trouble With Socialist Anarchism Date: Thu, 30 Mar 2006 09:35:02 -0500 Organization: Mises Institute Mailing-List: contact article-help at mises.biglist.com The Trouble With Socialist Anarchism by Per Bylund [Posted on Thursday, March 30, 2006] Subscribe at email services and tell others. The new movie "V for Vendetta" has provoked public discussion of the meaning of anarchism. Murray Rothbard was an advocate of the stateless society, but he was never accepted by the anarchist movement and is still considered more a "capitalist lackey" than anarchist thinker. Indeed, anarcho-capitalism has always been considered an oxymoron by the self-proclaimed "true" anarchists. Part of the reason is a general inability to understand different uses and definitions of words in the classical socialist and liberal traditions. Socialists refer to "capitalism" as the system in which the state hands out and protects capitalists' privileges  and therefore oppression of labor workers. They don't see that capitalism, in the classical liberal tradition, means rather a free market based on free people, i.e., voluntary exchanges of value between free individuals. A deeper and more interesting reason is anarchism's socialist roots. As shown in, e.g., the Anarchist FAQ, most  if not all  historical anarchist thinkers were proud to announce their ideas belonged to the progressive socialist tradition. The "founding father" of anarchism, Pierre-Joseph Proudhon, was socialist; American 19th century individualist anarchists often claimed to be socialists; and the Russian communist anarchists Mikhail Bakunin and Peter Kropotkin were obviously socialists. There were however a few anarchists who were not explicit socialists, but they were few and relatively unknown if at all accepted as anarchists. The German egoist Max Stirner somehow managed to become generally accepted as an anarchist even though he never claimed to be a socialist. (He never claimed to be an anarchist, either). It would be futile to claim the anarchist tradition is not originally and mostly socialist and that is not the point of this essay. I do not refute socialism's importance to anarchism in theory nor in practice, but I will show how the definition of "socialism" is too rigid and statist, as opposed to what anarchists generally claim, and it seems to be based on an unfortunate misunderstanding of man and the market. The main problem is the socialist anarchists' refusal to think anew when new facts have been revealed. Peter Kropotkin, the famous late 19th- and early 20th-century Russian communist anarchist, stated that there are essentially two kinds of socialism: statist socialism and anarchism. The difference between the two is that statist socialism wishes to take control of the state and use it to enforce socialism, whereas [socialist] anarchism wishes to abolish the state and thereby the oppressive capitalist economic system. Kropotkin's distinction solves quite a few inherent contradictions and problems in statist socialism, such as enforcing equality through letting a few rule the many via the state. But some of the problems persist in the anarchist version of socialism. The problems arise due to the fact that socialists generally tend to have a static view of society, which makes them totally ignorant of how things change over time. Socialists would probably not admit this is the case, since they do know that things have been changing through the course of history (Karl Marx said so) and that things never seem to stay the same. But still they argue as if "ceteris paribus" is the divine principle of reality, and it is not. Socialism does not allow for a time component (or, it is deemed unimportant and therefore omitted) in the analysis of the world or the economy. Things are generally thought to be as they are even though they were not the same in history and that they need to be changed in the future. In a socialist world people are equal and should stay equal; the individual choices of actors in the free marketplace (yes, socialist anarchists do talk about the market) do not change this fact. In this socialist view of the world there is simply no understanding whatsoever for that characteristic of the market that Ludwig von Mises called time preference. This important piece of information about how the market works (that is, how people function) means a person usually prefers having a value now to having the same value some time in the future. This has nothing to do with earning interest on investments, but is rather a natural part of what it means to be a rational being (one would do better with a certain amount of food now than with that same amount food a week from now). Without knowledge about this (or even without time preference per se), calculating what "will be" on the market would be a whole lot easier (but totally wrong). But time preference is not a part of the socialist perception of the world or economics. Understanding this fact makes it a lot easier to understand the socialist demand for teleological equality, i.e., equality as a measure of justice applicable both before and [especially] after interactions and exchanges have taken place in the market place. If the world and economy would be perpetually static and thus no values are ever created, then economic equality is theoretically possible. (It is perhaps even fair.) But this is not the case, and thus the socialist analysis is wrong. This weakness, which we can call time ignorance, persists in the anarchist version of socialism. Socialist Time Ignorance Kropotkin defines this kind of socialism as "an effort to abolish the exploitation of Labour by Capital,"[1] and Benjamin Tucker says "the bottom claim of Socialism [is] that labour should be put in possession of its own."[2] Well, that doesn't sound that bad. Another way of saying the same thing would be that every individual has a natural right to that which he produces, and that it is a violation of his natural rights to forcefully remove this product of his labor from his hands. Whether you call it natural rights or not, this is the essence and common theoretical basis for how value is generated in both classical liberalism and Marxism. Whenever an individual invests his time, skill, and effort into trying to achieve a value, he creates value and is as its creator the rightful owner of that value. It is hard to argue the individual is not the rightful owner of his labor; John Locke even went so far as to call labor the "unquestionable property of the labourer." If the individual doing the work does not own his labor, then who does? The difference between classical socialism and liberalism is not in the definition of ownership or how it arises, but in its meaning. Pierre-Joseph Proudhon, even though he is famous for stating "property is theft" (meaning property privileges causing exploitative conditions), also stated that "property is freedom" in the sense that man is only free when he is the sole owner of that which is in his possession and that which he creates. What he was referring to is wage labor being exploitation of the labor worker by the privileged capitalist. To understand this view, we need to remember time preference is not applicable (or not allowed). From the socialist perspective, any difference in value between input and output is either fraud or theft (to use libertarian terminology). If you invest labor (input) to achieve a value of $100 and receive pay (output) of $95 dollars you are being oppressed. This is part of why capitalism, using the socialist definition, is oppressive. Whoever "offers" a job (i.e., the capitalist) makes a profit simply because the value of the workers' invested labor is greater than what they receive in pay. (The reason they can do this, socialists claim, is because of state-enforced property privileges indirectly forcing labor workers into wage slavery.) Another way of saying this is that surplus value is released for the managers and owners of industry through paying labor workers only part of their labor input. In this static view of how the world works under the capitalist economic system, employment sure is usury and "wage slavery." I can't argue with that, and I will not argue with the identification of many historical and contemporary employment schemes being de facto usury due to privileges handed out to capitalists by the political class. The analysis, however, is fundamentally wrong, and it is so simply because socialists don't understand time preference. It is of value (but not necessarily monetary value) to many a worker frequently to receive a fixed amount of pay for invested labor instead of taking the risks of producing, marketing, and selling a product in the market place (even if the enterprise is not carried out individually but in cooperation with other workers). It is also true in reverse: the "capitalist" values money now more than money later; thus, profits at a later time need to be greater than labor costs now to "break even." The point here is that if a worker would voluntarily choose between multiple different alternatives there is reason to believe employment is sometimes (or, in perhaps often) an attractive choice. The reason this is so, is because of division of labor, risks in the market place, and so on. But it is primarily because of time preference, meaning a worker might value a fixed wage now and at predetermined intervals more than investing his labor now and gain the full value later. The laborer could therefore be in equilibrium when investing labor generating $100 worth of products a month from now even if he is paid only $95 now. To some people less money now than more money later is indeed usury, but that is only a fact that strengthens the theory of time preference as put forth by Austrian economists. People have different perceptions of value and do value different things at different times, and therefore one individual may very well find employment is to his benefit while other individuals cannot for the world accept such terms. And the same individuals might think very differently at a different point in time. Values are Subjective This necessarily brings us to another important point that is closely related to the nature of time preference, and that is the identification of values as subjective. Monetary values are objective in the sense that $1 is always $1 (or, in other words, 1=1 or "A is A"), but receiving the amount of $1 could mean a lot to one individual and at the same time mean close to nothing to another. Of course, socialist anarchists and even statist socialists understand the relativity of values, e.g., that $1 to a poor person means a lot more than it ever would to a wealthy person (even though it is still only $1). That's why socialists often claim rich people have nothing to fear from taxes (even large sums don't mean much to them) whereas poor people can gain "a lot." But relative value in this sense means only that the individual assessment of the value of $1 is relative to how many dollars he or she already has (or can easily get). This is different from the identification of values as subjective. A subjective value does not necessarily mean a certain amount of money is compared to another amount. Values are subjective in the sense that something of value means you consider yourself being better off with it than without it. This has nothing to do with amounts of monetary units or comparing apples with apples; subjective value is the individual assessment of something as compared with the same individual's assessment of the alternatives. Values are subjective in the sense that the individual alone makes the assessment and makes it according to his or her individual preferential hierarchy. Thus, subjective value does not depend on what is being valued, but rather on how it is perceived! Therefore, a laborer's analysis of whether employment is beneficial does not only involve the monetary value of invested labor and received payment, but also everything else he values. Employment could be of great value to a risk aversive individual, since the risk of losing money is very low, whereas the same deal for someone else, who perhaps gets a kick out of taking risk, is nothing but outright slavery. People are different. This brings us to a third and last important point that follows directly from the fact that values are subjective: there are only individuals. Even though cultural and social identities tend to make people think in the same direction, they are still not the same and they do think differently. Socialists in general obviously fail to realize this. As has been shown in the example of employment versus no employment, individuals value things differently. Some individuals would accept wage labor and be fully satisfied with it (and even find it the best available alternative), while others cannot find employment to their benefit at all. Individuals are uniquely different, and that means they do have different preferences. This is one of the main reasons state policies are always oppressive and never can work satisfactorily: they provide one system or solution for one kind of people, and that has to cause problems when applied on a population such as the 300 million unique individuals living in the United States. Anarchism: A World of Sovereigns The fact that "there are only individuals" is also a great argument for anarchism. There cannot be a single system forced on any two individuals without it fitting one individual better than the other, and thus such a system would create legal inequalities (and therefore be oppressive). Also, since there are only individuals there is no reason to believe some individuals should have the power to rule other individuals. If there are only individuals, all of them should be sovereign self-owners and enjoy an equal full right to their selves. But this fact means also that people are different and that some people will value certain things while other people value completely different things. Some people will have high time preference for certain values, while others will have low time preference. Some people will be able to use their time and skill to create a lot of value to others (assessed subjectively), while others create value only recognized by a few. And individual choices will always be individual choices, the decisions made depending on the individual's subjective assessment of values he chooses to identify. Socialism, as commonly defined by the socialists (of both anarchist and statist varieties), fails to realize this fact and therefore categorically dismisses market solutions, functions, and institutions that arise voluntarily and spontaneously. It might be true that socialists themselves would never accept wage labor, but many others would perhaps happily accept employment as being beneficial to them individually or collectively. The same is true with the famous Marxian credo, usually advocated also by socialist anarchists, that the laborer is free only when he has taken ownership of the means of production. But how can we say a certain kind of profession or "class" shares the exact same values? That necessarily presupposes an extreme class consciousness, where individuals no longer exist. If "class consciousness" is instead interpreted rather as a sense of class belonging and unity in certain values, time preference and subjectivity of values would still apply! A free-market anarchist can embrace many of the socialist-anarchist goals, such as equality in the right to self, one's labor, and any fruits thereof. We can support the socialist anarchist goal to abolish the state as an inherently evil institution forcing individuals to relinquish that which is theirs by natural right. But we also see the shortcomings of socialism as currently defined; time preference is a fundamental piece of information on how people, and therefore the market and society, function. Mises crushed them: $25 Because of time preference it is not possible to dismiss totally the notion that inequalities might arise in the free marketplace.[3] Individuals will act in accordance with their perception of what is most beneficial to them and the people, gods, or artifacts important to them. Some value monetary wealth while others value health, leisure, family, a nice house, or fast cars. People will choose differently depending on their situation and their preferences, and even if they start off in a state of egalitarianism some choices will be better (with respect to something, e.g., amount of monetary assets) and some poorer. It is not unlikely some people will choose to accumulate wealth (to whatever degree possible without the existence of state privileges) while others will eagerly spend what they earn on entertainment or engage in conspicuous consumption. The choice should be the individual's and there is no way we can say it is "right" or "wrong"  it is for the individual to decide. Thus, if we truly believe in the individual as a self-owner and sovereign we shouldn't claim to know what he or she will (or should) choose, and we cannot say what he or she will not choose. In a society of only free individuals, all of them will be equal in their right to self and thus we cannot tell people they cannot trade their labor in the future for value now. They will do what they perceive to be in their interest, and I will do what I perceive to be in mine, and what is in our interests personally or mutually is for us to decide individually. This is the reason one cannot say employment and capital accumulation vanishes when the state is abolished. Indeed, the opposite is true. This is also the reason Murray Rothbard truly was an anarchist, even though he did not accept the illusion of a world without time preference. Per Bylund works as a business consultant in Sweden, in preparation for PhD studies. He is the founder of Anarchism.net. Send him mail. Visit his website. Comment on the blog. [1] Evolution and Environment, p. 81 [2] The Anarchist Reader, p. 144 [3] In a free market, it is however less likely than in a state system, since no one can gain coercively enforced privileges at the expense of others. [Print Friendly Page] Mises Email List Services Join the Mises Institute Mises.org Store Home | About | Email List | Search | Contact Us | Periodicals | Articles | Games & Fun FAQ | EBooks | Resources | Catalog | Contributions | Freedom Calendar You are subscribed as: rah at ibuc.com Manage your account. Unsubscribe here or send email to this address. Report abuse or Spam on the abuse page. --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From coderman at gmail.com Thu Mar 30 10:35:00 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 10:35:00 -0800 Subject: Fwd: driver for Atheros 5213 chipset (fuck the fcc!) Message-ID: <4ef5fec60603301035n1d42126fledabf61f04b92df1@mail.gmail.com> fuck the fcc! :P ---------- Forwarded message ---------- From: coderman Date: Mar 30, 2006 6:17 AM Subject: Re: driver for Atheros 5213 chipset On 3/28/06, Jean-Baptiste Note wrote: > ... > Can you elaborate on "the other team" or "other teams" you're referring > to ? Well, i'm only following this mailing-list, and have not heard > about all this -- apart from the possible litigation problems. their identities cannot be exposed lest the FCC sniper team neutralize their potential threat to authoritarian spectrum monopoly. > Is *everything*, specs and all, behind closed doors now? Can we get > access to the specs at least? and translated across three languages... just to be sure. > No info on the webpage either... the dcs1000 has been having problems. From coderman at gmail.com Thu Mar 30 11:05:56 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 11:05:56 -0800 Subject: cypherpunks write girl code? :) Message-ID: <4ef5fec60603301105s1f673eb3n5a3e869c8a761817@mail.gmail.com> http://headrush.typepad.com/creating_passionate_users/ Do engineers and programmers care about concepts like beauty and elegance? Should they? Designers have always known that looks matter--that the outside (interface) matters. But deep in the heart of those building the inside--the technology most users never see--lies the sensibility of an artist. In a kind of "Design Eye for the Code Guy" way. While I'm stereotyping with abandon, I might as well be honest. I've been going to tech conferences for the last 15 years, and I swear the ratio of pocket protectors to Urban Outfitter clothes has shifted dramatically. So maybe it's not accurate to say geeks today are better looking--but they're certainly better dressed. With hipper haircuts. Does this /mean/ anything? Maybe. What prompted this post--and it's whimsical title--is a post by Jamis Buck titled Beautiful code, test first, which includes the following: "He was telling me how he feels like he has to sit and tweak his code over and over until it not only acts right, but looks right. It cannot be merely functional, it must be beautiful, as well." But the best part was a comment by "Morten" that included the line: "As for spending too much time on making the code look right down to the last indentation - my code has been called "girl code" for the same reason..." And there you have it. I think "girl code" is quite a compliment. Because caring about things like beauty makes us better programmers and engineers. We make better things. Things that aren't just functional, but easy to read, elegantly maintainable, easier--and more joyful--to use, and sometimes flat-out sexy. And whether we like it or not, most of the world associates an appreciation for beauty more with women than men (especially geek men). Women may have a genetic advantage here. A passion for aesthetics can mean the difference between code that others enjoy working on vs. code that's stressful to look at. ... Yes, calling beautiful code "girl code" is both silly and some might believe sexist. But that doesn't mean there isn't some truth to it. As a female technologist in a heavily male-skewed industry, I don't need you to compliment my hair. But if you tell me my code is pretty, I might give you some tips. And if it makes you feel better, I'll refer to YOUR gorgeous code as metrosexual. But we'll both know the truth. From eugen at leitl.org Thu Mar 30 01:15:49 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 30 Mar 2006 11:15:49 +0200 Subject: /. [Unmanned Aerial Drones Coming Soon Above U.S.] Message-ID: <20060330091549.GF31486@leitl.org> Link: http://slashdot.org/article.pl?sid=06/03/30/0113220 Posted by: samzenpus, on 2006-03-30 02:15:00 [1]cnet-declan writes "Unmanned aerial vehicles (UAVs) have been flying over Iraq and Afghanistan, but now the Bush administration wants to use them for [2]domestic surveillance. A top Homeland Security official told Congress today, according to this CNET News.com article, that: "We need additional technology to supplement manned aircraft surveillance and current ground assets to ensure more effective monitoring of United States territory." One county in North Carolina is already using UAVs to [3]monitor public gatherings. But what happens when lots of relatively dumb drones have to share airspace with aircraft carrying passengers? A pilot's association is [4]worried." References 1. http://www.news.com/ 2. http://news.com.com/Drone+aircraft+may+prowl+U.S.+skies/2100-11746_3-6055658. html 3. http://www.aopa.org/whatsnew/newsitems/2006/060215uav.html 4. http://www.aopa.org/whatsnew/newsitems/2006/060109uav.html ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ecnwa at daniellarson.com Thu Mar 30 11:44:21 2006 From: ecnwa at daniellarson.com (Milton A. Plummer) Date: Thu, 30 Mar 2006 11:44:21 -0800 Subject: Your Status Message-ID: <946330.1403769867311.644748687386.JOSZ.7577@abysmal> handicraftsman maybarb tryhalfway someesophagi butinconvenient becockle amcconnel invexatious maymenu ,darn notsatisfaction notaccusative somechateau aelongate substitution theeightieth incecropia somechromatin ,jaguar aafflict !fife itadded acolicky thesway seeawkward onafternoon onnod ,equipped seediocesan notfelonious maysudan andinjudicious butkey tryintimidate inhustle seebox see -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1786 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: image374.gif Type: image/gif Size: 14945 bytes Desc: not available URL: From eugen at leitl.org Thu Mar 30 02:35:35 2006 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 30 Mar 2006 12:35:35 +0200 Subject: [declan@well.com: [Politech] Surveillance in the sky: Homeland Security wants aerial drones with cameras [priv]] Message-ID: <20060330103535.GM31486@leitl.org> ----- Forwarded message from Declan McCullagh ----- From coderman at gmail.com Thu Mar 30 16:09:38 2006 From: coderman at gmail.com (coderman) Date: Thu, 30 Mar 2006 16:09:38 -0800 Subject: [p2p-hackers] group key agreement (was: lockstep synchronization protocol problem) Message-ID: <4ef5fec60603301609jb422e7cr7464ba5656ddedb@mail.gmail.com> a very detailed paper on group key agreement for ad-hoc networks: http://eprint.iacr.org/2006/006 Abstract. Over the last 30 years the study of group key agreement has stimulated much work. And as a result of the increased popularity of ad hoc networks, some approaches for the group key establishment in such networks are proposed. However, they are either only for static group or the memory, computation and communication costs are unacceptable for ad-hoc networks. In this thesis some protocol suites from the literature (2^d-cube, 2^d-octopus, Asokan-Ginzboorg, CLIQUES, STR and TGDH) shall be discussed. We have optimized STR and TGDH by reducing the memory, communication and computation costs. The optimized version are denoted by 5STR and 5TGDH respectively. Based on the protocol suites 5STR and 5TGDH we present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable for ad-hoc networks with limited bandwidth and devices with limited memory and computation capability. To simulate the protocols, we have implemented TFAN, 5STR and 5TGDH with J2ME CDC. The TFAN API will be described in this thesis. From schepetov_t at bk.ru Thu Mar 30 15:00:33 2006 From: schepetov_t at bk.ru (Adele Farris) Date: Thu, 30 Mar 2006 21:00:33 -0200 Subject: Boost Sexual Performance Message-ID: <200603301800.k2UI0U5t023873@proton.jfet.org> With viagra, optimal sexual function can be restored for nearly every man who desire it, in a matter of minutes. Viagra helps you: * To have firmer erection * Enjoy sex life better * Fulfil partner's sexual needs * Bolster self confidence * Renew and strengthen sex life * Restore intimacy * Solidify sexual bonds http://bcemhjkladf.applearmyd.info/?giadfxwqowybcemzgvhjkl carboy From nationagamelotto at zwallet.com Thu Mar 30 08:57:13 2006 From: nationagamelotto at zwallet.com (Mrs Maria Rooney ) Date: Fri, 31 Mar 2006 00:57:13 +0800 Subject: YOU ARE LUCKY Message-ID: <4647EF18.AB56C20@zwallet.com> National Lotto Suite 179 1007 West/Zuld, L70 1NL Zwolle Holland (Customer Services) Ref: DEUK/9383/8161/99 Batch: GI/SE12-59 Government Accredited Licensed lottery promoters. International Promotions/Prize Award Department Login to http://lottery.co.uk/res We are please to announce you as one of the 10 lucky winners in the national lottery held on the 27th March, 2006. All 10 winning addresses were randomly selected from a batch of 50,000,000 international emails. Your email address emerged alongside 9 others as a category 2 winner in this year national lotto game draw Consequently, you have therefore been approved for a total pay out of �1,000,000 (one million pounds sterlings) only. In order to avoid unnecessary delays and complications please remember to quote your reference number and batch numbers: 1, Batch 7499-4206-5876 2, Ref: 739801527-Nll 3, lucky numbers 94-1-537-97-31-809 Please note that your lucky winning number falls within our European booklet representative office in Europe as indicated in your play coupon. In view of this, your �1,000,000 would be released to you by any of our payment offices in Europe. To file for your claim, please contact Advocate Patrick cox Telephone number +31 -6100- 234 82 Fax: +31-847-545-681 Email: bejesbejesn at netscape.net Bejes law & Associates This will enable the office of bejes & asscociates to send the claims application form (A4) to you the Beneficiary.you can confirm your winnings when you LOGIN TO http://lottery.co.uk/res For security reasons, you are advised to keep your winning information confidential till your claims is processed and your money remitted to you in whatever manner you deem fit to claim your prize. This is part of our precautionary measure to avoid double claiming and unwarranted abuse of this program. Please be warned. Remember, all winnings must be claim not later than April 5th, 2006, after this date, unclaimed funds will be returned to the national Lotto Good luck from me and members of staff of the NATIONAL LOTTERY. Yours faithfully, Mrs Maria Rooney Online coordinator for THE NATIONAL LOTTERY Sweepstakes International Program. From winters at carefirst.com Fri Mar 31 02:09:37 2006 From: winters at carefirst.com (Jami Davila) Date: Fri, 31 Mar 2006 04:09:37 -0600 Subject: Ratess will skyrocket soon Message-ID: <193k232e.7146117@hotmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1193 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bluebill.jpg Type: image/jpg Size: 5762 bytes Desc: not available URL: From spacecraft at cnnsi.com Fri Mar 31 08:59:40 2006 From: spacecraft at cnnsi.com (Lynn Macdonald) Date: Fri, 31 Mar 2006 08:59:40 -0800 Subject: Extending funding for the USA.Report Fri, 31 Mar 2006 15:57:40 -0100 Message-ID: <130.53@163.dyn.period.edu> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 907 bytes Desc: not available URL: From rah at shipwright.com Fri Mar 31 06:08:48 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 31 Mar 2006 09:08:48 -0500 Subject: [Clips] Rodney Dangerfield University Message-ID: Several well-known cypherpunks have been George Mason Alums. Most joined while they were in school there. Cheers, RAH -------- --- begin forwarded text Delivered-To: clips at philodox.com Date: Fri, 31 Mar 2006 08:21:10 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Rodney Dangerfield University Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com OpinionJournal WSJ Online DE GUSTIBUS Rodney Dangerfield University It's time that George Mason got a little respect. BY BRENDAN MINITER Friday, March 31, 2006 12:01 a.m. EST "You've got to be kidding." That was the reaction of CBS sportscaster Billy Packer when George Mason University was invited to play in this year's NCAA men's basketball tournament. Mason has since defeated Michigan State, the University of North Carolina, Wichita State and the top-seeded University of Connecticut to advance to the Final Four this weekend. The Patriots basketball team is finding out what the rest of the university has long known. George Mason is the Rodney Dangerfield of universities--it just can't get any respect. The school has attracted Nobel economists, developed a top-notch law school and, through the writings of its scholars, affected public policy in major ways. But it is continually dismissed as a no-name state school--a mere convenience for commuters from northern Virginia. Allow me to take offense. When I enrolled at Mason in 1993, a condescending friend described the school to me as a "glorified community college with pretensions of being an elite university." At that point, young and naive, I worried he might be right. By the time I graduated I knew better. With some 28,000 students, GMU resembles many large state schools in that it provides an affordable education to a broad range of people. For state residents, tuition is about $3,000 a semester; for those out of state, $8,500. (These amounts roughly correspond to a few weeks of classroom time at nearby Georgetown.) The education it offers is intellectually rigorous--I can attest to the rigor, having suffered through plenty of annoyingly demanding tests, paper-writing assignments and required courses. But George Mason has no intentions of being an "elite" institution, and a good thing too. Mason began as an extension of the University of Virginia in 1957 and became independent 15 years later. Such relative youth is a clear advantage. The school came into its own after the 1960s generation passed through the halls of higher education. Student protest, and the effort to appease it, never became part of its culture. George W. Johnson, GMU's president from 1978 to 1996, exploited this advantage. He grounded the school in technology, computer science and economics, leaving to elite institutions the competition for hot (read: postmodern) humanities scholars. He also exploited the school's proximity to Washington, using it as a selling point to bring professors to the area and also pulling into the professorial ranks various policy analysts, intellectuals and former government officials. The recruited professors included James Buchanan, who joined the university in 1983 and soon after won a Nobel Prize in economics for his groundbreaking research, with Gordon Tullock, on what drives government bureaucracies to make seemingly irrational decisions. The economists showed that government, no less than private enterprise, responds to economic incentives (e.g., bigger budgets) more than high-minded legislative goals. This idea--known as "Public Choice Theory"--became part of the intellectual framework of the Reagan Revolution. Mr. Johnson also brought to George Mason the Institute for Humane Studies, a constellation of scholars devoted to teaching undergrads (both at GMU and elsewhere) classical economics. Soon after Mr. Johnson stepped down, the economist Vernon Smith and six colleagues migrated to Mason from the University of Arizona. Mr. Smith won a Nobel Prize for developing standards to "lab test" economic theories with small groups, often using real money. Mason's law school isn't even three decades old, but it has already climbed into the first tier of the U.S. News & World Report rankings and is a leader in the field of intellectual property. It is also home to the National Center for Technology and Law, which studies how existing laws--e.g., patents and copyrights--will need to adapt to the information economy. Even the law school's legal-aid program has a novel slant. As John Miller has noted in National Review, George Mason's law students, rather than suing police departments or petitioning for access to government programs, volunteer their time to help, among others, members of the military and their families. Even the school's name cuts against the grain of conventional pieties. George Mason is the Founding Father most Americans have never heard of. He was a key architect of the Constitution (he had written the influential Virginia Bill of Rights more than a decade before) but doomed himself to obscurity by becoming one of the three delegates to the Constitutional Convention who refused to sign the final document. It bothered him that it lacked a bill of rights. Whether or not George Mason University wins on the basketball court this weekend, it is still a great school. And no, Mr. Packer, I'm not kidding. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From coderman at gmail.com Fri Mar 31 13:19:14 2006 From: coderman at gmail.com (coderman) Date: Fri, 31 Mar 2006 13:19:14 -0800 Subject: Fwd: [TSCM-L] Re: Feds bugged bedroom, phones of FIU pair In-Reply-To: References: <6.2.3.4.2.20060329160346.07c46eb0@pop.tscm.com> Message-ID: <4ef5fec60603311319jb2dc9cat63deec5dec8371a0@mail.gmail.com> code pad shortwave from cuba: ---------- Forwarded message ---------- From: Reginald Curtis Date: Mar 31, 2006 11:29 AM Subject: [TSCM-L] Re: Feds bugged bedroom, phones of FIU pair To: TSCM-L2006 at googlegroups.com Cc: garya_curtis at hotmail.com In regards to this piece - I found the following in the March 06 edition of Monitoring Times at page 8. "COMMUNICATIONS Broadcasting Spies Use Shortwave Broadcasts In January, a Florida couple was accused of operating as covert agents for Cuba's communist government for decades, using short-wave radios, 5-digit numerical-code language and computer-encrypted files to send information about Miami's exile community to top Castro intelligence commanders. Carlos Alverez and his wife Elsa, both staff members of Florida International University, were denied bond before trial on a charge of failing to register with the federal government as foreign agents. The indictment, which included no mention of top-secret U.S. government information being disclosed, came months after the couple confessed to the FBI. Assistant U.S. Attorney Brian Frazier said Carlos Alverez had spied for Cuba since 1977 and Elsa Alverez since 1982. (See page 28 for more on Cuban 'numbers' stations.)" Page 28 "UTILITY WORLD HF COMMUNICATIONS Cuban 'Numbers': A Pattern Emerges By: Hugh Stegman, NV6H hugh stegman at monitoring times.com www.ominous-valve.com/uteworld.html Collection and analysis of several months' loggings confirms that, just as others have observed, the Cuban voice 'numbers' station does indeed have what may be its first daily broadcast schedule ever. This station is also known as 'V2,' 'Attention' (from its callup), the 5-Figure Spanish Lady, and the 'SS/YL/5F' (same thing in shortwavese'). Its the latest version of the famous Cuban spy transmissions which have mystified listeners in much of the world, while inspiring some good pop music, for several decades now. And indeed, these broadcasts are compelling in their sheer strangeness. Mumbling voices, strange noises, Radio Havana, and even the occasional parrot, can turn up on the open tuning carriers run before the messages. Technical flubs, mostly of the 'oops, wrong button' variety, are many and legendary. If everything works (always a big "if" with this bunch), that ominous machine-spliced female finally barks the distinctive 'Atencion' ('Attention'). While the name 'V2' sounds appropriately like some kind of World War II German rocket bomb, it is simply the sequential designator given this particular broadcast on the list maintained by ENIGMA2000. They're the online incarnation of the European Numbers Intelligence Gathering and Monitoring Association. Over the years, this generic V2 has had a number of lettered variants. These differ in message structure or detailed formatting. After the callup, our V2a variant sends a message designator with three 5-number groups. These are the first groups in the three following messages, which are of equal length. Each message is always 150 5-number groups, beginning (as we've noted) with the one in the designator. The whole transmission usually ends with the Spanish 'final' ('end'), around 45 minutes after the hour. While the Cubans have traditionally preferred monthly and weekly schedules, the new local-daytime V2a is a daily one. It's a long schedule by 'numbers' standards. It's more like something you'd hear from an international broadcaster, changing frequency more of less hourly while maintaining a long program. This is pretty ambitious for an operation which is so audibly straining to keep its aging, hurricane-damaged equipment going. The daily schedule starts at 1600 Coordinated Universal Time (UTC), and goes until the 2100 broadcasts ends, nearly six hours later. The times in UTC and frequencies in kilohertz (kHz, AM mode) are: 1600 on 7975.0 1700 on 8010.0 1800 on 8097.0 1900 on 8097.0 2000 on 7887.0 2100 on 6855.0 That's it. By the standards of 'numbers' stations, which often confront listeners with a bewildering number of times and frequencies, this is pretty simple stuff. But there is way more: All of the other V2 schedules are still on the air. These are the more traditional ones, using what may or may not be a weekly frequency rotation. Parallel transmissions frequently occur, on two or three frequencies. At press time, the rest of V2a was on from as early as 0200 UTC until as late as 1500. In other words, there's a Cuban voice 'spy numbers' station going somewhere at nearly any hour of the day. This doesn't even count the hours of Morse code broadcasts in a similar format. For whatever its worth, which may not be much, this represents an awesome volume of traffic. V2a Message Continuity These transmissions have another most interesting feature. If one logs all of the initial three-group message designators, it becomes quickly evident that they are anyting but random. In fact, they ofter increment their last figures by one with each day's broadcast. The best way to explain this is by example. On December 11, 2005, one of several sets of message designators was 38641 45851 51761. On the 12th, this one changed to 38642 45852 71762, but the messages stayed the same. On the 13th, it became 38643 45853 51763. This continued until the last digits reached 6 on the 16th. At the same time, another sequence started out as 55911 12911 31311 (they always seem to start out ending in 1). This one did the same behavior, until reaching 5 on the 15th. Currently, in early January, we have 51871 10971 04481, incrementing daily. It's been theorized that this last digit refers to the number of times a message has been broadcast. In any event, it's a real good idea to keep track of these numbers when logging the Cuban stations. As special word of thanks is due to Camilo Castillo, a dedicated ham and numbers listener in Panama, for making most of the loggings used in the data. A few others appeared on the usual Internet mailing lists, and the showed the same patterns we describe." ....................... THE artilce also shows what they claim is a "Typical code pad used with 'numbers' broadcasts." It is a small booklike pad about the same size as the match box used for the small wood or kitchen type matches ( 2" x 1" x .5") with six columns of numbers printed on both sides of the page. THE END Reg Curtis VE9RWC From jyoewak at netscape.net Fri Mar 31 04:51:16 2006 From: jyoewak at netscape.net (Lindsay Benjamin) Date: Fri, 31 Mar 2006 13:51:16 +0100 Subject: preventing premature ejaculation Message-ID: <126744v8dz83$9x8f8743$69o6uncg@coypuhippopotamusjourneywn35> how are you: try our site 100% money back guarrantte !! http://62.193.240.107/sm/ Increase spermm vol... http://62.193.240.107/et/ Preventing premature ejjaculation... http://62.193.240.107/gip/ Generic C:alis soft tabs.... Herval V:agra 100% natural.... armamentg7890gsgyuig From coderman at gmail.com Fri Mar 31 14:12:02 2006 From: coderman at gmail.com (coderman) Date: Fri, 31 Mar 2006 14:12:02 -0800 Subject: keys and cards and user interaction Message-ID: <4ef5fec60603311412u1f7589e5m318cfe15d5f887f5@mail.gmail.com> comments? suggestions? "keys" store password/passphrase protected volumes with cryptographic keys, certs, and other credentials associated with digital identities. "cards" are read only volumes with the public keys and public identifiers associated with digital identities. it is very important that they not be confused, and that "keys" are only used on a trusted system. solution: "keys" are the only volume which will ever prompt for a password/passphrase to open them. if you are asked for a password it should only be on a system you trust and as expected when using or managing your keys. keys are stored on an XFS filesystem on USB or other media (USB by default) which contains the encrypted key store. this scales well (multi-gig USB volumes) and uses existing crypted file system support to implement privacy. Any number of other volumes (for example hdd installed OS'es) can be tied to this "keys" volume by storing the AES keys and disk identifiers associated with that volume inside the "keys" protected volume. the only boot targets which may use private "keys" are: - the "keys" secure key management mode. - the "install" mode to create new loop-aes keys and install OS on this trusted system. - the "hdd" mode to boot an encrypted OS installation on a trusted system. the other boot targets should only reference public "cards" and will never prompt for authentication at boot or during operation. "cards" are ISO9660 filesystems that can be stored on a public USB memory stick or burned to mini-CDR / DVD-R, etc. "cards" are public, and can be copied freely and will never ask for authentication. the "keys" authorized modes thus explicitly mount a USB volume as XFS when a "keys" volume is expected. the key mgmt mode will explicitly mount as iso9660 when a "cards" volume is expected. thus a confused user could not accidentally write secret "keys" data to a public "cards" volume, and vice versa. this also allows the key management mode to determine what kind of volume is present as indicated by the file system type. (the secure key management mode is the only mode where public "cards" can be imported to your secret "keys". the hdd and install modes will never prompt for a public card. note that the "live" boot mode may use "cards" to connect to remote services securely.) summary: "keys" storage: [XFS volume ... (petname for this volume) (public GUID / nonce) (GPG or loop-aes encrypted file) ] example: .../coderman/ (petname) .../coderman/id.txt (512 byte GUID / nonce in hex) .../coderman/keys.dat (encrypted key store, gpg or loop-aes) .../mpeck/ .../mpeck/id.txt .../mpeck/keys.dat coderman might be a social context while mpeck is a professional context. "cards" storage: [ ISO9660 volume ... (sha512 hash of identity public key) (identity public key) (nickname or alias for identified entity) (additional volumes or metadata) (signatures for nicknames and other metadata) ] example: .../1496b640690342ed/ (hex digits of first 8 bytes of sha512 digest of public.key) .../1496b640690342ed/digest.txt (full hex digits of sha512 digest of public.key) .../1496b640690342ed/public.key .../1496b640690342ed/nickname.txt ("coderman's public weblog") .../1496b640690342ed/nickname.sig .../1496b640690342ed/aaaaaa.dat (arbitrary metadata - an image? etc) .../1496b640690342ed/aaaaaa.sig (signature for above) .../1496b640690342ed/foo.dat "" .../1496b640690342ed/foo.dig "" From HNEIIYXBDD at yahoo.com Fri Mar 31 12:11:02 2006 From: HNEIIYXBDD at yahoo.com (Malcolm Dean) Date: Fri, 31 Mar 2006 18:11:02 -0200 Subject: No More Classes i1yFS Message-ID: Good News! Interested to obtain Bachelors', Masters', MBA's, Doctorate & Ph.D. degrees available in your field in 2 weeks time? It's available now... Call Us and get yours today 1-484-693-8861 Our Education office has someone available 24 hours a day, 7 Days a week Why waiting? 1-484-693-8861 4u2YEF From coderman at gmail.com Fri Mar 31 19:06:34 2006 From: coderman at gmail.com (coderman) Date: Fri, 31 Mar 2006 19:06:34 -0800 Subject: keys and cards and user interaction In-Reply-To: <4ef5fec60603311412u1f7589e5m318cfe15d5f887f5@mail.gmail.com> References: <4ef5fec60603311412u1f7589e5m318cfe15d5f887f5@mail.gmail.com> Message-ID: <4ef5fec60603311906s7b31bcb9waf908a181e28b6a1@mail.gmail.com> some corrections / clarification: On 3/31/06, coderman wrote: > ... > "keys" are the only volume which will ever prompt for a > password/passphrase to open them. if you are asked for a password it > should only be on a system you trust and as expected when using or > managing your keys. note that within a graphical environment you may be prompted for passwords or authentication unrelated to the root/core identities which are stored in the "keys" volume(s). within the janus wireless software all password/passphrase management for root/core identities (the "keys" volume(s)) occurs at a text console and usually during boot. facilities are in place to prevent you from needing passwords in other contexts although this cannot cover every possibility. (that is to say, within janus we encourage the use of certificates and signatures for authentication and captcha/PINs for liveness detection. the identity management provided by janus wireless software is intended to make these keys/certificates easy to create, distribute, manage and revoke in any external domains where they are used.) this console mode only password use is done to prevent UI attacks (phishing, spoofing, etc) and text console provides a good way to avoid these. > ... (the secure > key management mode is the only mode where public "cards" can be > imported to your secret "keys". the hdd and install modes will never > prompt for a public card. note that the "live" boot mode may use > "cards" to connect to remote services securely.) the secure key management mode can import and export keys and cards and supports a wide variety of filesystems to do so. key backup (if used, please do) occurs in this domain and may consist of saving the password protected volume to multiple USB keys, compact flash drives, hard disks, or burned to CD/DVD media. you can use a different password/passphrase for these backup volumes. (for example, a random 256bit key written on a card stored in a safe) the other "keys" authorized modes simply consume/use existing keys. the "live" and internet connected modes are ephemeral, and thus only use public "cards" when pubkeys/certificates are required to access resources. if replay / MITM is a concern the public keys used should be one time only. > example: > .../coderman/ (petname) > .../coderman/id.txt (512 byte GUID / nonce in hex) that should read: 512 _bit_ GUID or nonce in hex string. > coderman might be a social context while mpeck is a professional context. a social and professional context are the two types provided by default. the number of contexts supported is limited only by storage space on the "keys" volume and your ability to assign distinct pet names to each. From coderman at gmail.com Fri Mar 31 19:23:34 2006 From: coderman at gmail.com (coderman) Date: Fri, 31 Mar 2006 19:23:34 -0800 Subject: janus wireless faq Message-ID: <4ef5fec60603311923p7b385edn3e75c33ce88e860e@mail.gmail.com> On 3/28/06, coderman wrote: > ... - why "wireless"? we believe that wireless is the most robust form of communication when implemented properly*. we also believe that any communication between secure domains should be considered public and open to active attackers (like wireless is). for this reason strong privacy and authentication must always be used for secure network communication. a proper wireless implementation can transmit datagrams in an injection style manner and receive any datagrams in a monitor style manner. all packets received must be authenticated before passing up to higher level (IP/etc) stacks. all unauthenticated packets must be dropped silently. the rate of transmit should be as low as possible while still retaining sufficient communication bandwidth. the rate of transmit should also be considerate to the needs of others who can hear your transmission and may defer theirs accordingly. deference should not open up denial of service vulnerabilities but is encouraged when possible to provide a cooperative multi-network with sufficient bandwidth for all. [the technical complexity of this is high and we are being intentionally vague at this point until further refinements are in place and this can be described in detail via working implementation on atheros / prism2 hardware that does not DoS other wireless technologies. 802.11 is a good example of an improper implementation that is trivial to DoS via spoofed packets at the MAC layer (deauth/disassoc injection).] From rah at shipwright.com Fri Mar 31 21:23:23 2006 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 1 Apr 2006 00:23:23 -0500 Subject: [Clips] Irish have little defence against terror fundraisers Message-ID: --- begin forwarded text Delivered-To: clips at philodox.com Date: Sat, 1 Apr 2006 00:20:16 -0500 To: Philodox Clips List From: "R. A. Hettinga" Subject: [Clips] Irish have little defence against terror fundraisers Reply-To: rah at philodox.com Sender: clips-bounces at philodox.com Irish Independent Irish have little defence against terror fundraisers Saturday April 1st 2006 Tom Lyons IRELAND has major gaps in its ability to stamp out the financing of domestic and international terrorism. An international body had found that Ireland fails or only partly meets seven out of nine special UN resolutions to fight the financing of terrorism and crime. Monitoring of charities, auctioneers, lawyers, wire transfers and trusts are among the areas which need to be tightened up. The Financial Action Task Force (FATF) concludes that although Ireland is carrying out a review of the charity sector, it has "not yet implemented measures to ensure accountability and transparency" to prevent terrorists posing as legitimate non-profit organisations. This is in spite of the fact that over three years ago an Islamic charity based in Dublin was accused in a US court of having channelled money to supporters of Osama Bin Laden. And the FATF, which was founded in 1989, finds Ireland has only "limited ability" to freeze funds of terrorists who have yet to be designated as such by the EU. Resolution This is in breach of a UN resolution adopted just two weeks after the September 11 attacks. The FATF also concludes that non-financial businesses or professions (such as real estate agents, casino bosses, diamond dealers or lawyers) are "not adequately monitored for compliance". Its evaluation team found that the lack of anti-money laundering or terrorist financing requirements for trust and company services providers as well as of private gaming clubs operating as casinos was "a matter of concern". It also finds that Ireland is "non-compliant" in terms of another UN resolution governing wire transfers. It finds that the requirement to record and keep the names of people transferring money abroad is "limited and currently only contained in guidance". And there is "no obligation" to verify that the identities of people transferring money is "accurate and meaningful". The report also finds a legal loophole exists that prevents the Terrorist Finance offence being applied to the collection of money to fund groups of less than three terrorists - except when the funds are actually used to carry out a terrorist act. And it states that Ireland has "no powers" to obtain a truthful disclosure upon request from individuals suspected of bringing cash or bearer notes across borders. "No sanctions are available for false declarations" in such cases, it says. The FATF also warns that Ireland has no explicit requirement to watch all unusual, complex, or large transactions with no visible economic purpose. Furthermore, it criticises Ireland's trust laws which make it "difficult to obtain and verify in a timely fashion" the beneficial owners of property or other assets. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list Clips at philodox.com http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jewblueheronyogagox at blueheronyoga.ca Fri Mar 31 22:10:02 2006 From: jewblueheronyogagox at blueheronyoga.ca (Felix Meredith) Date: Sat, 1 Apr 2006 03:10:02 -0300 Subject: Stop gaining weight and get the figure you want Message-ID: <208825097.86551275936655@thhebat.net> Anatrim – The very up-to-date and most exciting lose flesh product available – As were seen on ABC Did you realize that excessive body kilograms kill a lot of people around the world? We know you hate the unsightly look of people like those and the social stigmata attached to them. Or, maybe, you have not the will to resist a siege of your pernicious eating habits. If this sounds familiar, then we got something for your consideration! Here Anatrim comes, the new product for the elimination of your body’s extra weight. The greatest thing about Anatrim is it improves the quality of your life, making you eat less and giving you better spirit. Pay you attention to some notes received from our customers: "This is a great thing! Instead of always glutting myself with food and watching TV I became more interested in doing exercise. Anatrim made me stride on confidently. I am in a great shape now and there are lots of men in my way!" Victoria K., San Diego "Passive weight losing was of little result to me. This terrible appetite would just rush in and spoil everything. One day I was told about Anatrim my very best friend by and I was really effected by the information. I had tried using it, and my wife said to me that I look very good now, 4 months later. 29 pounds off and I keep still losing them! And you know, it’s rather hot in our bedroom now." Serge Smith, Chicago Anatrim gives you an opportunity to realize that you don't need that much food. It improves your mood, provides you with extra energy, and attacks useless kilos. Especial thanks to its mighty original formula!! Pry out latest intelligence! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2219 bytes Desc: not available URL: