From statubp at bossimissi.com Mon Jun 1 02:35:45 2009 From: statubp at bossimissi.com (Olive Dillard) Date: Mon, 1 Jun 2009 01:35:45 -0800 Subject: Every single customer of our drugstore stays satisfied. Message-ID: <000d01c9e293$f54501a0$6400a8c0@statubp> You hate standing in long lines while shopping for your medicine? If your answer is yes, then we have a perfect solution for you – visit our online drugstore and you will not spend a minute in an endless line.   Ring the bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 716 bytes Desc: not available URL: From shadsco62 at sky-ocean.net Mon Jun 1 08:18:15 2009 From: shadsco62 at sky-ocean.net (Gil Oprah Choise) Date: Mon, 1 Jun 2009 10:18:15 -0500 Subject: Discover the magical powers of the Acai Fruit. Message-ID: <000d01c9e2cc$2fc6c010$6400a8c0@shadsco62> If you are having trouble viewing this email, please click here Flush out toxins with Acai Berry.            The corwn Jewel of of the amazon shipped to your home.A recent study showed that the average 40 year old British woman has consumed the saturated fat ‘allowance’ of a 66 year old.The figure for men is only a little less alarming; the average 40 year old man has clocked up 50 years’ worth of his lifetime allowance of saturated fat.As well as weight gain, eating too much fat can lead to problems such as heart disease and type 2 diabetes.     Don't miss out on the latest Our Offer offers and news simply add news at newsletterss.com to your address book or contacts list to ensure our emails always go into your inbox. becgvckkn 7558 2009. All rights reserved. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5334 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 1 09:08:18 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 1 Jun 2009 11:08:18 -0500 Subject: Melt away fat easily Message-ID: <000d01c9e2ca$cbc00500$6400a8c0@dado48> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI Discover the secret today! Press button now To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 831 ydkhhhhqhxxqg Drive jaycz, PA 42668 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3780 bytes Desc: not available URL: From congressmenu3 at namerica.ikea.com Mon Jun 1 10:26:39 2009 From: congressmenu3 at namerica.ikea.com (Solomon Cortez) Date: Mon, 1 Jun 2009 12:26:39 -0500 Subject: Looking and feeling fresh is more possible than ever. Message-ID: <000d01c9e2d5$bde03a30$6400a8c0@congressmenu3> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4132 bytes Desc: not available URL: From yugoslaviansj14 at customfiberglassforms.com Mon Jun 1 07:08:53 2009 From: yugoslaviansj14 at customfiberglassforms.com (Trina Dillon) Date: Mon, 1 Jun 2009 15:08:53 +0100 Subject: Call for your diploma now. Message-ID: <000d01c9e2ba$1d117e90$6400a8c0@yugoslaviansj14> GET YOUR DIPLOMA TODAY! If you are looking for a fast and cheap way to get a diploma, this is the best way out for you. Choose the desired field and degree and call us right now Bachelors, Masters or even a Doctorate. For US: 1.845.709.8044Outside US: +1.845.709.8044 "Just leave your NAME & PHONE NO. (with CountryCode)" in the voicemail. Our staff will get back to you in next few days! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 748 bytes Desc: not available URL: From enricheda1 at steffiecam.com Mon Jun 1 11:55:27 2009 From: enricheda1 at steffiecam.com (Guy Starr) Date: Mon, 1 Jun 2009 15:55:27 -0300 Subject: The best opportunity to buy a designer watch! Message-ID: <000d01c9e2ea$87504860$6400a8c0@enricheda1> Besides the fantastically cheap and beautiful watches we offer you great service. You will love our customer support, our payment system and the most you willbe satisfied with the delivery methods.   Enter without knocking -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 729 bytes Desc: not available URL: From mallardsh23 at mlffinancial.com Mon Jun 1 15:10:56 2009 From: mallardsh23 at mlffinancial.com (Shirley Schmidt) Date: Mon, 1 Jun 2009 16:10:56 -0600 Subject: We will not let your virility fade away so quickly. Message-ID: <000d01c9e305$d66143d0$6400a8c0@mallardsh23> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4130 bytes Desc: not available URL: From shakingyh280 at nari-relays.com Mon Jun 1 06:40:19 2009 From: shakingyh280 at nari-relays.com (Louise Longoria) Date: Mon, 1 Jun 2009 16:40:19 +0300 Subject: Your tool is so petite she scarcely finds it in bed? Message-ID: <000d01c9e2b6$1f6aada0$6400a8c0@shakingyh280> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4128 bytes Desc: not available URL: From awokero at microspot.com Mon Jun 1 17:47:28 2009 From: awokero at microspot.com (Abigail Lewis) Date: Mon, 1 Jun 2009 16:47:28 -0800 Subject: We have pills to cure any illness you suffer from. Message-ID: <000d01c9e313$52653ce0$6400a8c0@awokero> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4145 bytes Desc: not available URL: From sizzlinge38 at best-4-tiles.com Mon Jun 1 14:57:03 2009 From: sizzlinge38 at best-4-tiles.com (Marlon Mckee) Date: Mon, 1 Jun 2009 16:57:03 -0500 Subject: We will not let your virility die so rapidly. Message-ID: <000d01c9e303$e5958c00$6400a8c0@sizzlinge38> http://adrienne.virrotip.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12515 bytes Desc: not available URL: From seekf08 at mikoexoticwear.com Mon Jun 1 16:14:29 2009 From: seekf08 at mikoexoticwear.com (Constance Dalton) Date: Mon, 1 Jun 2009 18:14:29 -0500 Subject: =?koi8-r?B?WW91IHdpbGwgYmUgb24gdG9wIGluIGJlZCBhZ2FpbiCWIGp1c3QgYXNr?= =?koi8-r?B?IHVzIGZvciBoZWxwLg==?= Message-ID: <000d01c9e30e$b6b1e950$6400a8c0@seekf08> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4149 bytes Desc: not available URL: From deafenedwl326 at starraider.com Mon Jun 1 02:44:31 2009 From: deafenedwl326 at starraider.com (Luke Pitts) Date: Mon, 1 Jun 2009 18:44:31 +0900 Subject: Save up to $2000 on Adobe Acrobat 9 Pro Extended and Adobe Photoshop CS4 Extended. Message-ID: <000d01c9e29d$902ad9c0$6400a8c0@deafenedwl326> Purchasing and installing software has never been easier. Moreover, it has never been cheaper and more convenient. This is your lucky chance to get everything you needed.   Accept our invitation -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 669 bytes Desc: not available URL: From bassesbay99 at owaisleather.com Mon Jun 1 09:47:51 2009 From: bassesbay99 at owaisleather.com (Perry Hines) Date: Mon, 1 Jun 2009 18:47:51 +0200 Subject: We will take a good care of your body and soul. Message-ID: <000d01c9e2d0$51ce2870$6400a8c0@bassesbay99> http://ada.thesecaring.com/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12629 bytes Desc: not available URL: From baxterzj08 at johnsteins.com Mon Jun 1 16:52:34 2009 From: baxterzj08 at johnsteins.com (Isabelle Cummins) Date: Mon, 1 Jun 2009 18:52:34 -0500 Subject: We have cheap drugs from each illness. Message-ID: <000d01c9e30b$a7195350$6400a8c0@baxterzj08> http://adelaide.gejzozoy.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12515 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 1 12:16:43 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 1 Jun 2009 19:16:43 +0000 Subject: AcaI Berry will lead to effective weight loss .Try it now. Message-ID: <000d01c9e2e5$1e1c7760$6400a8c0@forecastedn> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Take a step to enter To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 997 saxwupdrpwetnhwhd Drive qgffno, PA 80816 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3778 bytes Desc: not available URL: From bidding82 at msnbc.com Mon Jun 1 15:42:57 2009 From: bidding82 at msnbc.com (Duncan Ledford) Date: Mon, 1 Jun 2009 19:42:57 -0300 Subject: Your virility will never be destroyed as long as you are with us. Message-ID: <000d01c9e30a$4f4acc90$6400a8c0@bidding82> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4143 bytes Desc: not available URL: From bessemerte68 at sqmart.com Mon Jun 1 03:59:15 2009 From: bessemerte68 at sqmart.com (Robbie Holt) Date: Mon, 1 Jun 2009 19:59:15 +0900 Subject: Extremely Low Prices On Good Software. Message-ID: <000d01c9e2a8$00c6c720$6400a8c0@bessemerte68> The prices on our software have gone wild – they are so low you won’t believe your eyes. Here you can find discounts up to 90%. So hurry up before we changed them.   Press this button -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 659 bytes Desc: not available URL: From challengersnz48 at nmmotors.com Mon Jun 1 21:19:49 2009 From: challengersnz48 at nmmotors.com (Rico Cortes) Date: Mon, 1 Jun 2009 20:19:49 -0800 Subject: Feeling sick? We might make you feel great pretty rapidly. Message-ID: <000d01c9e330$fc821a50$6400a8c0@challengersnz48> Click here if you have trouble viewing this e-mail. Remember to add challengersnz48 at nmmotors.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3120 bytes Desc: not available URL: From wayl at pharmadiscount.com Mon Jun 1 16:20:10 2009 From: wayl at pharmadiscount.com (Bud Benton) Date: Mon, 1 Jun 2009 20:20:10 -0300 Subject: Your health condition will improve very fast. Message-ID: <000d01c9e30f$825da6c0$6400a8c0@wayl> http://adrienne.seqwipul.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12503 bytes Desc: not available URL: From defamesn3 at pet-mate.com Mon Jun 1 12:26:46 2009 From: defamesn3 at pet-mate.com (Marva Watts) Date: Mon, 1 Jun 2009 20:26:46 +0100 Subject: We offer the best alarm-clocks for your little fellow down there. Message-ID: <000d01c9e2e6$8567fd30$6400a8c0@defamesn3> http://ada.thesecaring.com/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12594 bytes Desc: not available URL: From emacsjd at northernnissan.com Mon Jun 1 17:53:46 2009 From: emacsjd at northernnissan.com (Staci Bauer) Date: Mon, 1 Jun 2009 20:53:46 -0400 Subject: While you arereading this thousands patients are buying Message-ID: <000d01c9e31c$95793d70$6400a8c0@emacsjd> Click here if you have trouble viewing this e-mail. Remember to add emacsjd at northernnissan.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3126 bytes Desc: not available URL: From intruderso0 at mpgthailand.com Mon Jun 1 17:27:41 2009 From: intruderso0 at mpgthailand.com (Concepcion Dailey) Date: Mon, 1 Jun 2009 21:27:41 -0300 Subject: When you feel that your manliness is already dead,contact us. Message-ID: <000d01c9e318$f0ad76b0$6400a8c0@intruderso0> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4132 bytes Desc: not available URL: From mccarthyod95 at smimortgage.com Mon Jun 1 08:07:19 2009 From: mccarthyod95 at smimortgage.com (Janelle Cervantes) Date: Mon, 1 Jun 2009 22:07:19 +0700 Subject: Stylish watches for people of different styles. Message-ID: <000d01c9e2ca$a8a61e60$6400a8c0@mccarthyod95> Who would refuse from a prestige watch just for a couple of dollars? You will be amazed at the quality of our watches but moreover you will be amazed at their prices. We offer a wide range of timepieces of different brands.   A chance to enter -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 752 bytes Desc: not available URL: From psychosisinh5 at topronet.com Mon Jun 1 08:43:45 2009 From: psychosisinh5 at topronet.com (Molly Gates) Date: Tue, 2 Jun 2009 00:43:45 +0900 Subject: Lose all the weight you want in the shortest time Message-ID: <676762026.65966673451130@topronet.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5370 bytes Desc: not available URL: From disclosures0 at sfcvb.org Tue Jun 2 03:05:50 2009 From: disclosures0 at sfcvb.org (Normand Boyle) Date: Tue, 2 Jun 2009 02:05:50 -0800 Subject: Safe and fast delivery of your stylish watch. Message-ID: <000d01c9e361$53408540$6400a8c0@disclosures0> Our watches are as precious as the brand ones but they have a huge advantage – affordable prices for everybody. Who could think that it is possible to buy Dolce & Gabbana watch only for $219?   Hurry to visit -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 715 bytes Desc: not available URL: From denunciation601 at sousaco.com Tue Jun 2 03:09:57 2009 From: denunciation601 at sousaco.com (Emerson Harvey) Date: Tue, 2 Jun 2009 02:09:57 -0800 Subject: Perfect combination of price and quality for watches. Message-ID: <000d01c9e361$e647ae40$6400a8c0@denunciation601> What can be better than fast and secure shipment of elegant designer watches? Maybe just an extremely low price of these watches. For a few hundred dollars you can buy as many watches as you want.   Press a button -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 720 bytes Desc: not available URL: From gaudy at oceanicyachts.com Tue Jun 2 02:26:41 2009 From: gaudy at oceanicyachts.com (Manuela Pagan) Date: Tue, 2 Jun 2009 03:26:41 -0600 Subject: Increase your male volume,stamina and dimensions. Message-ID: <000d01c9e35b$db5f3a30$6400a8c0@gaudy> Click here if you have trouble viewing this e-mail. Remember to add gaudy at oceanicyachts.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3117 bytes Desc: not available URL: From unhappilyz3 at sim.es Tue Jun 2 01:59:16 2009 From: unhappilyz3 at sim.es (Frances Stein) Date: Tue, 2 Jun 2009 05:59:16 -0300 Subject: =?koi8-r?B?TmVlZCBTb2Z0d2FyZT8gQ29tZSBUbyBVcyAtoCBXZSBIYXZlIEl0Lg==?= Message-ID: <000d01c9e360$68404da0$6400a8c0@unhappilyz3> To prove that the prices of our software are fantastically cheap we give you some facts to compare regular price of AutoCAD 2010 ($3995. 95) and our price ($189. 95).   Take a step to enter -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 661 bytes Desc: not available URL: From marianoy5 at midatl.com Tue Jun 2 04:16:27 2009 From: marianoy5 at midatl.com (Shawn Bauer) Date: Tue, 2 Jun 2009 08:16:27 -0300 Subject: Regenerate your masculinity for yourself,for her and for your love. Message-ID: <000d01c9e373$9296cb70$6400a8c0@marianoy5>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4620 bytes Desc: not available URL: From palpitating at secureoptions.co.uk Mon Jun 1 20:02:30 2009 From: palpitating at secureoptions.co.uk (Ron Rubio) Date: Tue, 2 Jun 2009 08:32:30 +0530 Subject: =?koi8-r?B?V2UgZGVsaXZlciBxdWFsaXR5IHNvZnR3YXJlIHdvcmxkd2lkZSCWIG5v?= =?koi8-r?B?IG1hdHRlciB3aGVyZSB5b3UgYXJlLiA=?= Message-ID: <000d01c9e32e$91463cf0$6400a8c0@palpitating> Our software is so cheap you can buy a few products instead of buying just one. Why should you pay more for the thing that has the same high quality?   Click everyone -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 643 bytes Desc: not available URL: From winterizesiway9 at wheelatlanta.com Mon Jun 1 21:33:33 2009 From: winterizesiway9 at wheelatlanta.com (Alfonso Proctor) Date: Tue, 2 Jun 2009 12:33:33 +0800 Subject: Very lovely watches at very lovely prices. Message-ID: <000d01c9e33b$49b27ea0$6400a8c0@winterizesiway9> Our watches are as precious as the brand ones but they have a huge advantage – affordable prices for everybody. Who could think that it is possible to buy Dolce & Gabbana watch only for $219?   Come, enter, win -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 715 bytes Desc: not available URL: From ripostesby5 at coastalenergy.com Mon Jun 1 21:02:06 2009 From: ripostesby5 at coastalenergy.com (Pamela Bray) Date: Tue, 2 Jun 2009 13:02:06 +0900 Subject: Choose the needed field. Message-ID: <000d01c9e336$e4ca1d80$6400a8c0@ripostesby5> GET YOUR DIPLOMA TODAY! If you are looking for a fast and cheap way to get a diploma, this is the best way out for you. Choose the desired field and degree and call us right now Bachelors, Masters or even a Doctorate. For US: 1.845.709.8044Outside US: +1.845.709.8044 "Just leave your NAME & PHONE NO. (with CountryCode)" in the voicemail. Our staff will get back to you in next few days! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 746 bytes Desc: not available URL: From eugen at leitl.org Tue Jun 2 04:12:49 2009 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 2 Jun 2009 13:12:49 +0200 Subject: Construction Crew Severs =?utf-8?Q?Secret_?= =?utf-8?B?4oCYQmxhY2sgTGluZeKAmQ==?= Message-ID: <20090602111249.GG10925@leitl.org> http://www.wired.com/threatlevel/2009/06/blackline/ Construction Crew Severs Secret bBlack Lineb * By Kim Zetter Email Author * June 1, 2009 | * 1:14 pm | * Categories: Breaches, Spooks Gone Wild, Surveillance A Verizon lineman grips the strands contained in a fiber optic cable in Massapequa Park, N.Y. on May 11, 2006. (AP Photo/Mark Lennihan) A construction crew working on an office building in Virginia in 2000 severed a fiber optic cable that wasnbt on anyonebs map. Apparently it was a bblack lineb used for carrying secret intelligence data, according to sources who spoke recently with the Washington Post. Within minutes of cutting the cable, three black SUVbs pulled up carrying men in suits who complained that their line was severed. bThe construction manager was shocked,b a worker told the Washington Post. bHe had never seen a line get cut and people show up within seconds. Usually youbve got to figure out whose line it is. To garner that kind of response that quickly was amazing.b AT&T crews arrived the same day to fix the line, an unusually prompt response. When AT&T tried to bill the construction company $300,000, the company balked and the charges bjust disappeared.b The cut occurred in the Tysons Corner region, where the neighbors include the Office of the Director of National Intelligence and the National Counterterrorism Center. The Central Intelligence Agency is a few miles away. Tysons is also home to a site belonging to the Warrenton Training Center, a communications training center and support facility for the National Communications System that is suspected of handling some communication for the CIA. From burblel30 at apavalleinclan.com Tue Jun 2 10:35:40 2009 From: burblel30 at apavalleinclan.com (Rickey Skinner) Date: Tue, 2 Jun 2009 14:35:40 -0300 Subject: Get a degree with no problems. Message-ID: <000d01c9e3a8$8c8224c0$6400a8c0@burblel30> GET YOUR DIPLOMA TODAY! If you are looking for a fast and cheap way to get a diploma, this is the best way out for you. Choose the desired field and degree and call us right now Bachelors, Masters or even a Doctorate. For US: 1.845.709.8044Outside US: +1.845.709.8044 "Just leave your NAME & PHONE NO. (with CountryCode)" in the voicemail. Our staff will get back to you in next few days! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 748 bytes Desc: not available URL: From tenbells at quacko.com Tue Jun 2 10:51:25 2009 From: tenbells at quacko.com (Harley Cabrera) Date: Tue, 2 Jun 2009 14:51:25 -0300 Subject: Your male instrument will be working again. Message-ID: <000d01c9e3aa$bfbe8750$6400a8c0@tenbells> The older you get, the less stamina and power in bed you and your partner experience. We have different kinds of products that will boost both your and hers energy and give you a fantastic night of love.   Enter at the moment -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 714 bytes Desc: not available URL: From accounts at paypal.com Tue Jun 2 06:25:38 2009 From: accounts at paypal.com (accounts at paypal.com) Date: Tue, 2 Jun 2009 15:25:38 +0200 Subject: PayPal Account Review Department Message-ID: <427130555.58757452764900@bmjlaw.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2018 bytes Desc: not available URL: From eugen at leitl.org Tue Jun 2 06:36:28 2009 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 2 Jun 2009 15:36:28 +0200 Subject: US firm says handheld puke ray is ready to go Message-ID: <20090602133628.GO10925@leitl.org> http://www.theregister.co.uk/2009/06/01/laser_energetics_puke_ray/ US firm says handheld puke ray is ready to go Pistol style chunder-gat and torch/vom-sabre models By Lewis Page b" Get more from this author Posted in Biology, 1st June 2009 11:39 GMT A US industrial laser company says it has developed a functional puke-ray system, ideal for use by cops or military personnel wishing to take down their opponents without shooting them. The firm proposes to issue the "non lethal light fighting technology" in two form factors - light-sabre/torch and blaster-pistol. The so-called Dazer Laserb" technology comes from Laser Energetics Inc, of New Jersey, which has been supplying more conventional laser equipment since 1991. Now, however, the company is pleased to announce its new Defenderb" and Guardianb" chunder-beam weapons. According to Laser Energetics' statement: These non-lethal weapons have the ability to control the threat at ranges of 1 meter to 2400 meters (model dependent). The Dazer Laserb" - Light Fighting Technologies - emit a green beye safeb laser beam, that is shaped into approximately a 1 foot to 8 foot Dazer Zoneb" (model dependent) which when focused on the threats eyes, the threats vision is temporarily impaired, their balance is effected, and they become affected by nausea. This controls the threat making it difficult for them to manoeuver. The Ultimate Non b Lethal Weapon. "This life saving non-lethal weapon will help all branches of the military, law enforcement, correctional facilities, security, border patrol, piracy control, homeland security, airport security and much more," says Laser Energetics CEO Robert Battis. Battis says that his regurge-ray weapons are better than the well-known Taser electrojolt stungun as they have a longer effective range and aren't single-shot. If an embattled cop, soldier etc. misses the target at first he can simply swing the dazzle-beam onto his opponent's face and leave him slipping and stumbling helplessly in a self-generated chunky puddle. The Defenderb" is the ray-pistol model, perhaps effective to 2400m; the Guardianb" is the cylindrical job which emits its belly-scrambling dazer rays from one end like a torch. The Guardianb" will work out to 100m, according to the Laser Energetics pdf brochure. Both models also have a "searchlight" illumination mode - presumably without the nauseating special sauce. There's no word yet on price. It seems that there may be countermeasures that would have some effect against Dazerb"-toting government goons. The company specifies that both models "can control the threat with the threat's eyes shut, making it difficult for them to manoeuvre". No mention is made of tactical possibilities involving mirrors, reflective sunglasses etc. One question does spring to mind here. Do the rival puke-ray programmes at the Department of Homeland Security and the US Navy know about this? From accounts at paypal.com Tue Jun 2 07:36:53 2009 From: accounts at paypal.com (accounts at paypal.com) Date: Tue, 2 Jun 2009 15:36:53 +0100 Subject: PayPal Account Review Department Message-ID: <867236167.32968438919420@brainerdindustries.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2018 bytes Desc: not available URL: From magazinest5 at stranaexpress.com Tue Jun 2 01:07:59 2009 From: magazinest5 at stranaexpress.com (Joni Wilson) Date: Tue, 2 Jun 2009 16:07:59 +0800 Subject: Losing weight healthily matters Message-ID: <184393785.45677765642770@stranaexpress.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5487 bytes Desc: not available URL: From hardcoversgv19 at sourcewell.com Tue Jun 2 14:34:32 2009 From: hardcoversgv19 at sourcewell.com (Hank Khan) Date: Tue, 2 Jun 2009 16:34:32 -0500 Subject: This watch will add some elegance to your taste. Message-ID: <000d01c9e3c9$eaa7b1c0$6400a8c0@hardcoversgv19> The only thing that differs our fantastic watches and brand watches is the price. Instead of having one timepiece you can have five or ten. Who would reject such an offer?   Click this second -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 698 bytes Desc: not available URL: From mobilesd0 at jeremygoemaat.com Tue Jun 2 12:35:03 2009 From: mobilesd0 at jeremygoemaat.com (Rolando Lynn) Date: Tue, 2 Jun 2009 16:35:03 -0300 Subject: Forget about bad mood and be in a fantastic mood all the time. Message-ID: <000d01c9e3b9$39c8b6c0$6400a8c0@mobilesd0> http://abigail.dedsupov.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12517 bytes Desc: not available URL: From wroughtna1 at orbisrent.com Tue Jun 2 13:07:58 2009 From: wroughtna1 at orbisrent.com (Cary Bloom) Date: Tue, 2 Jun 2009 17:07:58 -0300 Subject: Your manliness will never fade away as long as you stay with us. Message-ID: <000d01c9e3bd$d2eb9b70$6400a8c0@wroughtna1> http://adrienne.dedsupov.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12508 bytes Desc: not available URL: From staminah5 at paston.com Tue Jun 2 17:16:18 2009 From: staminah5 at paston.com (Karen Compton) Date: Tue, 2 Jun 2009 17:16:18 -0700 Subject: You can turn back the hands of time and feel young again. Message-ID: <000d01c9e3e0$84567d90$6400a8c0@staminah5> http://ada.mokcegox.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12498 bytes Desc: not available URL: From negotiatingx at newjerseynetstickets.com Tue Jun 2 16:17:01 2009 From: negotiatingx at newjerseynetstickets.com (Kathleen Salazar) Date: Tue, 2 Jun 2009 19:17:01 -0400 Subject: Looking good after losing weight Message-ID: <662056062.64159034606298@newjerseynetstickets.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5487 bytes Desc: not available URL: From haberdasherynl6 at perftrlrs.com Tue Jun 2 17:39:05 2009 From: haberdasherynl6 at perftrlrs.com (Nathaniel Hanson) Date: Tue, 2 Jun 2009 19:39:05 -0500 Subject: Would you imagine your life with no sicknesses and dysfunctions? Message-ID: <000d01c9e3db$512bae90$6400a8c0@haberdasherynl6> http://abigail.mokcegox.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12493 bytes Desc: not available URL: From eugen at leitl.org Tue Jun 2 12:42:20 2009 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 2 Jun 2009 21:42:20 +0200 Subject: Mysterious 'chip' is CIA's latest weapon against al-Qaida targets Message-ID: <20090602194220.GX10925@leitl.org> http://www.guardian.co.uk/world/2009/may/31/cia-drones-tribesmen-taliban-pakistan Mysterious 'chip' is CIA's latest weapon against al-Qaida targets hiding in Pakistan's tribal belt b" Tribesmen plant devices to guide drone attacks b" Locals shun fighters for fear of becoming targets * Declan Walsh in Peshawar * guardian.co.uk, Sunday 31 May 2009 23.55 BST The CIA is equipping Pakistani tribesmen with secret electronic transmitters to help target and kill al-Qaida leaders in the north-western tribal belt, in a tactic that could aid Pakistan's army as it takes the battle against extremism to the Taliban heartland. As the army mops up Taliban resistance in the Swat valley, where a defence official predicted fighting would be over within days, the focus is shifting to Waziristan and the Taliban warlord Baitullah Mehsud. Declan Walsh: 'Microchips are the talk of the town in tribal areas' Link to this audio But a deadly war of wits is already under way in the region, where tribesmen say the US is using advanced technology and old-fashioned cash to target the enemy. Over the last 18 months the US has launched more than 50 drone attacks, mostly in south and north Waziristan. US officials claim nine of the top 20 al-Qaida figures have been killed. That success is reportedly in part thanks to the mysterious electronic devices, dubbed "chips" or "pathrai" (the Pashto word for a metal device), which have become a source of fear, intrigue and fascination. "Everyone is talking about it," said Taj Muhammad Wazir, a student from south Waziristan. "People are scared that if a pathrai comes into your house, a drone will attack it." According to residents and Taliban propaganda, the CIA pays tribesmen to plant the electronic devices near farmhouses sheltering al-Qaida and Taliban commanders. Hours or days later, a drone, guided by the signal from the chip, destroys the building with a salvo of missiles. "There are body parts everywhere," said Wazir, who witnessed the aftermath of a strike. Until now the drone strikes were the only threat to militants in Waziristan, where the Pakistani army had, in effect, abandoned the fight. But now, emboldened by a successful campaign to drive militants out of Swat, a region about 80 miles from Islamabad, the army is preparing to regain lost ground in the more remote tribal belt. It will be a much tougher campaign than in Swat, with the army pitched against a formidable, battle-hardened opponent. Yesterday Taliban fighters ambushed a military position in what could be a prelude to much more intense combat. For the US military, drones have proved to be an effective weapon against al-Qaida targets, and they are becoming increasingly accurate. On 1 January a drone-fired missile killed Usama al-Kimi, a Kenyan militant who orchestrated last year's Marriott hotel bombing in Islamabad, a senior official with Pakistan's ISI spy agency said. It is a high-tech assassination operation for one of the world's most remote areas. The pilotless aircraft, Predators or more sophisticated Reapers, take off from a base in Baluchistan province. But they are guided by a joystick-wielding operator half a world away, at a US air force base 35 miles north of Las Vegas. Barack Obama has approved the drone campaign, which is cheap and limits the danger posed to US troops. But the strikes have many unintended victims. A Pakistani newspaper estimated that 700 people had been killed since 2006, most of them civilians, as a result of drone attacks. For the tribesmen who plant the microchips and get it wrong, the consequences can be terrible. Last month the Taliban issued a video confession by Habib ur Rehman, 19. "They money was good," he said in a quavering voice, describing how he was paid 20,000 rupees (B#166) to drop microchips hidden in a cigarette wrapper at the home of a target. Rehman said his handler promised thousands of pounds if the strike was successful, and protection if he was caught. The end of the video showed Rehman being shot dead with three other alleged spies. Residents say such executions b there have been at least 100 b indicate how much the drone strikes have worried the Taliban. In Wana, the capital of south Waziristan, foreign fighters are shunning the bazaars and shops, and locals are shunning the fighters. "Before, the common people used to sit with the militants," said Wazir. "Now they are also afraid. Paranoid militant commanders are closely monitoring cross-border traffic with Afghanistan, from where they suspect the chip-carrying CIA spies are coming, said Imtiaz Wazir, a resident of Spin Wam village in north Waziristan. "If I go to Afghanistan without any purpose, the militants come to ask why," he said. A local transporter named Haji Hamid who gave the wrong answer, he said, was found shot dead two months ago, his legs and fingers broken. The drone strikes are despised across Pakistan, where politicians including President Asif Ali Zardari denounce them as a breach of sovereignty. But behind the scenes his government is quietly colluding with Washington. A former CIA officer who served in Waziristan in 2006 said that small American teams comprising CIA agents, radio experts and special forces soldiers are stationed inside Pakistani military bases across the tribal belt. >From there, the CIA recruits a network of paid, and sometimes unwitting, informers b known as "cut-outs" b to help identify targets, he added. In most cases they are poor local men. Ironically, support for the drone strikes is strongest in the frontier, especially among embattled security officials. "They are very precise, very effective, and the Taliban and al-Qaida dread them," said the provincial police chief, Malik Naveed Khan, with undisguised admiration. The strikes have caused friction between the US and the ISI, which would like America to give it control over the new technology. "The problem with the Americans is that the only instrument up their sleeve is the hammer, and they see everything as a nail," said a senior official. The ISI resents the US for failing to target Mehsud, whose deputy claimed for last week's Lahore attack that killed at least 24 people, including an ISI colonel. But as the army prepares to attack South Waziristan, with broad public support, the warlord's luck may be running out. Authorities in North West Frontier Province are preparing for up to 500,000 refugees, added to 2.5 million displaced by operations in Swat. Mehsud faces other challenges, too. Rival militant groups, with army support, are challenging his dominance in South Waziristan. And he faces the ever-present danger that some visitor could drop a "pathrai" at his doorstep, and bring an American drone with it. b" This article was amended on Monday 1 June 2009. The original located the tribal belt in the east, and a drone reference appeared contradictory. This has been corrected From spacewalksd798 at morrisonlucas.com Tue Jun 2 21:02:16 2009 From: spacewalksd798 at morrisonlucas.com (Brandy Corona) Date: Tue, 2 Jun 2009 23:02:16 -0500 Subject: You have a chance to turn back the hands of time and be young again. Message-ID: <000d01c9e400$15449980$6400a8c0@spacewalksd798>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4622 bytes Desc: not available URL: From overwhelmingel914 at niscocanada.com Tue Jun 2 18:24:22 2009 From: overwhelmingel914 at niscocanada.com (Junior Hooker) Date: Wed, 3 Jun 2009 01:24:22 +0000 Subject: Your device is so petite she scarcely finds it in bed? Message-ID: <000d01c9e3e1$a4b657d0$6400a8c0@overwhelmingel914> Click here if you have trouble viewing this e-mail. Remember to add overwhelmingel914 at niscocanada.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3118 bytes Desc: not available URL: From purchasablea54 at pdm-racing.com Tue Jun 2 17:09:30 2009 From: purchasablea54 at pdm-racing.com (Tyree Keen) Date: Wed, 3 Jun 2009 02:09:30 +0200 Subject: You would have your hot nights back. Message-ID: <000d01c9e3d7$2f4a6bd0$6400a8c0@purchasablea54> http://ada.risregib.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12477 bytes Desc: not available URL: From limpervrd602 at night-vision.com Tue Jun 2 22:11:12 2009 From: limpervrd602 at night-vision.com (Dallas Orr) Date: Wed, 3 Jun 2009 02:11:12 -0300 Subject: A true gentleman in bed is all the time ready. Message-ID: <000d01c9e409$b6ac17e0$6400a8c0@limpervrd602> Click here if you have trouble viewing this e-mail. Remember to add limpervrd602 at night-vision.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3117 bytes Desc: not available URL: From masseursen4 at nexgenix.com Tue Jun 2 23:38:49 2009 From: masseursen4 at nexgenix.com (Jenny Khan) Date: Wed, 3 Jun 2009 03:38:49 -0300 Subject: Enhancing your tool means enlarging your manhood in general. Message-ID: <000d01c9e415$f3ebc1d0$6400a8c0@masseursen4> Click here if you have trouble viewing this e-mail. Remember to add masseursen4 at nexgenix.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3120 bytes Desc: not available URL: From frankingd69 at onetouchgt.com Tue Jun 2 19:41:32 2009 From: frankingd69 at onetouchgt.com (Terrell Ellison) Date: Wed, 3 Jun 2009 03:41:32 +0100 Subject: We know the method to get your little friend up. Message-ID: <000d01c9e3ec$6c8c2280$6400a8c0@frankingd69> Click here if you have trouble viewing this e-mail. Remember to add frankingd69 at onetouchgt.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3115 bytes Desc: not available URL: From gnu at toad.com Wed Jun 3 05:53:53 2009 From: gnu at toad.com (John Gilmore) Date: June 3, 2009 5:53:53 PM GMT-04:00 Subject: How to wiretap or identify a GSM phone - and enable the masses Message-ID: David Burgess, a software/radio engineer formerly employed in building GSM-tapping equipment, has turned his efforts to publicly implementing the GSM standards in free software under GPLv3. He hopes to provide low-cost GSM communication service to billions in underserved regions of the world. He also hopes to demystify the cellular networks for a generation of hackers. His OpenBTS software builds on the GNU Radio framework and the USRP computer/radio interfaces to implement a fully functional GSM network base station, making voice and SMS calls with ordinary GSM handsets, and back-hauling via VoIP networks. Early code was tested at Burning Man last year, and he hopes to provide free communcation service to BM participants this year (as well as doing some testing in field conditions under serious load). His understanding of the GSM protocols comes from reading the published standards documents, which are written in bureaucratese but can be decrypted without a secret key. However, a former customer of his has been suing him for alleged disclosure of trade secrets, claiming that either the GSM protocol or perhaps the way to wiretap a GSM phone is secret (the published court documents make vague allegations, as usual). David's blog, "The OpenBTS Chronicles" has a variety of interesting posts, one of which links to a German patent on an IMSI-catcher which lets wiretappers force a phone to identify itself, and to a UK High Court decision that upholds it (and also reveals a Nokia patent on how to do a man-in-the-middle attack on a GSM phone). Clearly the things revealed in these documents are not trade secrets. But they may be of interest to this list. I also found that David's posting on "The Value of Knowing How Stuff Works" struck a chord with me. http://openbts.blogspot.com/ http://openbts.blogspot.com/2009/04/some-comments-on-imsi- catchers.html http://openbts.blogspot.com/2009/05/value-of-knowing-how-stuff-works.html http://en.wikipedia.org/wiki/OpenBTS http://www.gnuradio.org/trac/wiki/OpenBTS http://openbts.sourceforge.net/ John --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From drives29 at sasun.net Tue Jun 2 23:39:57 2009 From: drives29 at sasun.net (Beth Cornell) Date: Wed, 3 Jun 2009 06:39:57 +0000 Subject: Cheap watches from famous designers. Message-ID: <000d01c9e40d$ba6c7e70$6400a8c0@drives29> We offer watches of the most popular brands such as Rolex, Cartier, Channel, Dior, Gucci and others at unbelievably low prices. Nobody except you and your credit card will ever know that you paid only $200 for it.   Invitation to click -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 742 bytes Desc: not available URL: From groupingsig6 at nnavascues.com Tue Jun 2 17:59:25 2009 From: groupingsig6 at nnavascues.com (Tom Mejia) Date: Wed, 3 Jun 2009 07:59:25 +0700 Subject: Wanna seem unbelievably in that bikini? Be fit with us. Message-ID: <000d01c9e3e6$89eb4410$6400a8c0@groupingsig6> Click here if you have trouble viewing this e-mail. Remember to add groupingsig6 at nnavascues.com to your address book for uninterrupted delivery. *Based on merchandise totals after transaction discounts and special promotions. Surcharges may apply due to size, weight or special handling required. If your item has a surcharge, it will appear on the product page.This mailbox is unattended, so please do not reply to this message. If you no longer wish to receive e-mails from Kohls.com, unsubscribe here. Please allow up to seven days for your e-mail address to be removed. For other inquiries, e-mail us at myaccount.help at kohls.com, or write us at Kohl's Department Stores, Attention: Customer Service, N54 W13600 Woodale Drive, Menomonee Falls, WI 53051.Find a Kohl's near you!Free Standard Shipping offer good through May 27, 2009.Come In Under Budget Sale prices good May 27, 2009. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3130 bytes Desc: not available URL: From paperboysos51 at neptunium.com Wed Jun 3 00:01:03 2009 From: paperboysos51 at neptunium.com (Angela Bruner) Date: Wed, 3 Jun 2009 08:01:03 +0100 Subject: =?koi8-r?B?QmVpbmcgc2F0aXNmaWVkIGlzIGFib3V0IGJlaW5nIGhlYWx0aHkgliBm?= =?koi8-r?B?aW5kIG91dCBob3cu?= Message-ID: <000d01c9e410$ad669280$6400a8c0@paperboysos51>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4622 bytes Desc: not available URL: From edrigram at edri.org Tue Jun 2 22:04:00 2009 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 3 Jun 2009 08:04:00 +0300 Subject: EDRi-gram newsletter - Number 7.11, 3 June 2009 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 7.11, 3 June 2009 ============================================================ Contents ============================================================ 1. The French Government wants to spy on electronic communications 2. Pressure of the record companies on The Pirate Bay 3. Open source supporters criticize European govts for favouring MS 4. DRI against the Irish law on the interception of communications 5. French Government hurries to put HADOPI law into application 6. WIPO: Visually impaired treaty proposal 7. EU will examine Google Books project 8. Deutsche Telecom investigating the sexual life of job applicants 9. Recommended Action 10. Recommended Reading 11. Agenda 12. About ============================================================ 1. The French Government wants to spy on electronic communications ============================================================ On 27 May 2009, the law on orientation and programming for the performance of the domestic security (Loppsi) was presented by Michhle Alliot-Marie to the French Council of Ministers. The law will give the French police the possibility to physically or remotely install spying software to listen to electronic communications and introduces the Internet filtering by administrative decision. According to the text, the Criminal Investigation Police will be allowed to place on a suspect's computer a sort of internal or external USB key which will send data to the computers of the authorities. The police may also remotely install Trojans which will give access to all the data in a computer in real time. The police will be allowed to make use of these tools only in "the most severe cases" which however include "support given to the illegal entry and residence of a foreigner". Under the control of an examining magistrate (juge d'instruction), the investigating authority will have to justify the use of the technique by declaring the infringement investigated, the place where the investigation will take place and its duration. The spyware can be installed for a four-month period that can be renewed once. The examining magistrate's control would be a positive thing as the examining magistrates are independent from the Ministry of Justice and are free to take decisions, in terms of the gravity of the investigation. However, if the justice reform project of the French Government comes into being, the examining magistrates will disappear which means that the responsibility to authorize spyware will come to the prosecutor of the Republic. The law also obliges ISPs to block access, "without delay", to sites included on a list drafted under the authority of the Ministry of Internal Affairs. The list will not be made public and therefore it will be impossible to contest and this will create the risk of abuses. In order to prevent contestations, for the beginning, the law will target the paedophilic contents with the declared purpose to "protect the Internet users from child pornography images". The operators will have to introduce in their network software that will stop any connection to sites having a pedophile character that will be listed by the police. The French Government will always be able to extend the target by a simple decree. The text also stipulates severe sanctions for the ISPs that do not observe the law providing a fine up to 75 000 euro and a year of imprisonment. Loppsi : the sneaks under the authority of an endangered judge (only in French, 25.05.2009) http://www.numerama.com/magazine/12976-Loppsi-les-mouchards-sous-l-autorite-d-un-juge-en-voie-de-disparition.html Loppsi wants to "protect the Internet users" by filtering (only in French, 27.05.2009) http://www.numerama.com/magazine/13010-La-Loppsi-veut-proteger-les-internautes-avec-le-filtrage.html The police will be able to pirate the computers of the yobs (only in French, 25.05.2009) http://www.lefigaro.fr/actualite-france/2009/05/24/01016-20090524ARTFIG00098-la-police-va-pouvoir-pirater-les-ordinateurs-des-voyous-.php Loppsi: ISPs will have to "block access without delay" (MAJ) (only in French, 27.05.2009) http://www.numerama.com/magazine/13004-Loppsi-les-FAI-devront-empecher-l-acces-sans-delai-MAJ.html Loppsi presented this Wednesday in the Council of Ministers (MAJ) (only in French, 27.05.2009) http://www.numerama.com/magazine/13002-La-Loppsi-presentee-ce-mercredi-en-conseil-des-ministres.html Draft law on the orientation and programming for the performance of the domestic security http://static.pcinpact.com/pdf/Loppsi_projet_loi.pdf Decrypting: Sarkozy and his work of controlling the Internet (only in French, 20.05.2009) http://www.numerama.com/magazine/12948-Decryptage-Sarkozy-et-son-oeuvre-de-controle-du-net.html ============================================================ 2. Pressure of the record companies on The Pirate Bay ============================================================ The Swedish court has denied the request of four major record companies to fine The Pirate Bay (TPB) for being still operational. At the middle of May 2009, Universal, EMI, Sony and Warner asked the Swedish District Court to apply penalties to the operators of TPB for every day they continue to operate the site. The plaintiffs claimed TPB was an "infringing service" as they had been able to download through it 467 music albums to which they owned the copyright. They also asked that the four operators of TPB take measures so that the works for which they own the copyright could not be downloaded by Internet users via the site. Moreover, the recording companies seem to have asked the ISP "Black Internet" to stop providing services to TPB. Additionally, they asked the court to apply the penalties even before the District Court ruled on it and without hearing the four defendants. On 25 May 2009, the District Court denied the demands stating they wanted to hear the defendants first and gave the Pirate Bay operators a few weeks to state their position in the matter. The record companies were also given a week to decide whether they wanted to appeal the decision to the Court of Appeal. "I don't think these are circumstances where the case must be tried immediately. Usually you get to make your statement before a demand like this is granted" said judge Caroline Hindmarsh who reviewed the demands and made the decision. IT security expert Andri Rickardsson said to DN.se that the demand of the record companies was surprising. "Swedish law applies in Sweden and their Internet service isn't even in Sweden. I don't understand why the district court has anything to do with this. The Pirate Bay operates in countries where the activity is permitted," said the expert. Peter Sunde, one of the defendants, has stated that the record companies have never asked TPB to remove any of the torrents the plaintiffs refer to in their request to the District Court and accused the record companies of being more interested in money and power than in the artists they should represent. In the meantime, TPB is searching for unbiased judges after they filed, along with the appeal to the High Court of Justice, accusations against Judge Tomas Norstrvm for conflict of interest due to its membership with associations such as the Swedish Copyright Association. Judge Ulrika Ihrfeldt was appointed to investigate the conflict of interest but, soon after that, the judge also revealed having been a member of the Swedish Copyright Association and was removed from the case. The next judge appointed to lead the investigation, Anders Eka, appears to be connected to the Stockholm Center for Commercial Law, where lawyers Monique Wadsted and Peter Danowsky representing the record companies in TPB trial also are involved. Although Eka said he had no personal relationships with the plaintiffs' lawyers and that he had no background in copyright law, he acknowledged however he might be suspected for potential bias. Court President Fredrik Wersdll Wersdll stated that the investigation of Norstrvm's potential conflict of interest would be finished in a few weeks. If Norstrvm is found biased, the case will be sent back to the District Court. In case the judge is cleared of the accusation, the High Court of Justice will deal with the main appeal of the verdict and decide on whether to hold a new trial. Pirate Bay Money Squeeze Rejected by Court (25.05.2009) http://torrentfreak.com/pirate-bay-money-squeeze-rejected-by-court-090525/ Pirate Bay: In search of an unbiased judge (23.05.2009) http://news.cnet.com/8301-13578_3-10248264-38.html?tag=mncol;title Record Labels Increase Legal Pressure on Pirate Bay (19.05.2009) http://torrentfreak.com/record-labels-increase-legal-pressure-on-pirate-bay-090519/ Court rejects lawyers' call to gag Pirates (25.05.2009) http://www.thelocal.se/19656/20090525/ EDRi-gram: The Pirate Bay asks for retrial claiming conflict of interest (6.05.2009) http://www.edri.org/edri-gram/number7.9/pirate-bay-mistrial ============================================================ 3. Open source supporters criticize European govts for favouring MS ============================================================ Recent governmental plans in several European countries to buy proprietary software for public administration or education have caused concerns over the methods used and the lack of public discussion over the decisions. 18 open source companies (including Red Hat) have challenged successfully in the Federal court a three-year contract between the Swiss Federal Bureau for Building and Logistics (BBL) and Microsoft for the provisions of Windows desktops and applications, including support and maintenance. The total value of the contract was estimated at about 27.8 million euro. The preliminary ruling of the Federal court from 28 May 2009 was based on the fact that the BBL disregarded the procurement rules and did not issue a call for tender. A future final positive decision of the court could mean that the contract will be canceled and a public auction call needs to be made. Just a few days before the court decision, another similar case was raised by the Swiss open source advocacy group ch/open. They have presented the situation in the Bern canton, where a 18 million euro contract was attributed directly for Microsoft software licences, without a public auction. Ch/open criticized the lack of transparency of the deal and explained the current action: "Without any public process, contracts are awarded to a proprietary software vendor. This makes public administration increasingly dependent on Microsoft, giving it again no other option in eight years time." This deal will be debated in the canton's Parliament by the parliamentary group on digital sustainability that has the main scope to increase the use of open source by Swiss public bodies. Another government-related project that created rumors was the Spain government decision to install Microsoft software on the 420 000 laptops for students. After the Spanish Socialist Party supported the idea that laptops should be equipped with Open Source software, the Microsoft's chaiman Bill Gates and Spain's Prime Minister Josi Luis Rodriguez Zapatero met on 26 May 2009 to decide on the new software for this project. The project was criticized even earlier this year by open source organisations such as Hispalinux that pointed out that there was no public tender on this topic. Similarly, in a different corner of Europe, the Romanian Government has announced that it has mandated the Ministry of Communications to buy Microsoft licences of 100 million euros for the Ministries and Governmental Agencies in the period 2009-2012. Although the government press release talks about obtaining these licences through a possible auction, there is a clear-cut signal on who will be the winner. "The Romanian Government seems out of touch with reality" has been the harsh comment by Lucian Savluc, the organizer of the third national open source conference eLiberatica that took place in Bucharest in the second part of May 2009. Georg Greve, the president of Free Software Foundation Europe and a speaker at the same event, commented on the situation: "Microsoft's deals in new EU member states have raised concerns over corruption before, e.g. in Bulgaria. But while Microsoft seems to raise such questions more often than others, it should be noted that the problem of illegal procurement is larger and not limited to Microsoft. Nor is the problem limited to the new EU member states, as the recent irregularities and resulting antitrust complaint filed in Switzerland demonstrate. (...) It seems ironic that the European Commission has to fine Microsoft repeatedly over sustained monopoly abuse, then transfers part of that money to Romania, which enjoyed the highest level of financial support ever granted to a candidate country in the history of the European Union, and the Romanian government then decides to return part of that money to Microsoft with close to no tangible benefit for Romania." CH: Court scraps federal no-bid software licence deal (28.05.2009) http://www.osor.eu/news/ch-court-scraps-federal-no-bid-software-licence-deal CH: Protests over no-bid software contract in Bern (28.05.2009) http://www.osor.eu/news/ch-protests-over-no-bid-software-contract-in-bern Bill Gates, pleased with the announcement of Zapatero of giving laptops to students (only in Spanish, 26.05.2009) http://www.20minutos.es/noticia/470593/0/zapatero/gates/reunion/ Hispalinux censorship financial costs and technological dependence of the "solution" for Microsoft Education (only in Spanish, 27.04.2009) http://www.hispalinux.es/minipc-primaria ES: Gates and Zapatero weigh in on debate over school laptops (29.05.2009) http://www.osor.eu/news/es-gates-and-zapatero-weigh-in-on-debate-over-school-laptops My official position - The Romanian government is about to spend millions of euro on proprietary software. (27.05.2009) http://www.cianblog.com/2009/05/27/my-official-position-the-romanian-government-is-about-to-spend-millions-of-euro-on-proprietary-software/ Minister of Communications - mandated to pay 100 million euro for Microsoft licences (only in Romanian, 1.06.2009) http://www.mediafax.ro/economic/ministerul-comunicatiilor-mandatat-sa-achite-100-milioane-euro-pentru-licente-microsoft.html ============================================================ 4. DRI against the Irish law on the interception of communications ============================================================ Digital Rights Ireland has lodged a formal complaint with the European Commission against Ireland over the Irish law on the interception of communications. The Irish law, which is governed by the Interception of Postal Packets and Telecommunications Messages (Regulation) Act 1993, applies only to telecommunications providers who operate under a licence or general authorisation. Consequently, the vast majority of internet communication services (such as VOIP providers, webmail and instant messaging services) are not covered, so the interception of communications on those services is unregulated. This is in breach of Art. 5 of the e-Privacy Directive (Directive 2002/58/EC) which requires member states to "prohibit listening, tapping, storage or other kinds of interception or surveillance of communications and the related traffic data by persons other than users, without the consent of the users concerned, except when legally authorised to do so (by) legislative measures (which are) necessary, appropriate and proportionate within a democratic society". Complaint to European Commission over Irish Interception Laws (28.05.2009) http://www.digitalrights.ie/2009/05/28/complaint-to-european-commission-over-irish-interception-laws/ (contribution by EDRi-member Digital Rights Ireland DRI) ============================================================ 5. French Government hurries to put HADOPI law into application ============================================================ No sooner has the three strikes law been adopted that the French government issued CCAPs (special administrative specifications) and CCTPs (special technical specifications) which were sent by the Ministry of Culture to the candidate enterprises to put into function the information system of HADOPI. The call for tenders was sent since the beginning of the year even before the Hadopi law was adopted, the notification date having been set for 5 June 2009 with a deadline on 1 July 2009 for a first prototype of the graduate response system. A draft calendar foresees the application of the Hadopi law in stages starting with 5 June 2009 until 31 March 2010. In the beginning, Hadopi will send only written recommendations by e-mail at a rate of about 100 infringing cases per day after which, when the treatment is completely automatic probably in September 2009, the number of cases will increase to 1000 per day reaching 10 000 when the prototype is finalised in 2010. A calendar of actions is left however at the choice of the candidates, the CCTP mentioning that "the offers will be assessed in terms of the closeness of the proposed calendar as compared to the target calendar". The ministry is not concerned with costs or means but only with speed. The candidates will have a rather difficult task as the beta-test will last only two weeks before the first warnings and the blocking bugs will have to be corrected in one day, otherwise they will face sanctions. There is also the result obligation, the operator taking the responsibility in case of problems and having to compensate Hadopi in case of delays or malfunctions. There is no provision for the moment that Hadopi makes sure, before issuing a warning or a sanction, that illegal downloading has effectively taken place from the IP address of a suspected Internet subscriber. It appears that between the IP address collection phase and the warning or sanction phase there will be a "notarisation and sampling" phase. The notarisation phase means the "qualification of the data and the recording of essential elements of the transaction from a trustworthy third party" meaning the recording of all the elements proving the downloading or rather making copyrighted material available. "The content, origin, receiving date, the sender's identification key and the destination of the file are essential elements" says the CCTP. Sampling means Hadopi would retain only some of the complaints received in order to deal mostly with those of higher interest. An algorithmic system will allow targeting potential recidivists as a priority. Hadopi does not take into account the presumption of innocence and only needs to be certain of the reliability of the IP address lists on the basis of which it would give warnings and sanctions. Hence the provision of attaching a "chunk" of the file to every submission of a case in court which would be a material proof of the infringing. However, such a provision raises practical and economical problems. The CCAP and CCTP do not precise either the criteria based on which Hadopi will decide on recidivism in order to send another e-mail, registered letter or give sanctions. It is only mentioned that a "study of the reiterations is carried out so as to bring out the following elements for each subscriber: infringement stage (1st, 2nd, 3rd.); type of actions taken or sanctions given by the High Authority: time interval between each infringement; and type of works concerned". There are also very little details as to what are the means of appeal for the sanctioned Internet users. It is provided that an appeal can be made by means of an electronic form or by mail and that the appeal may lead to informing the ISP of the obligation to re-establish a suspended subscription. On the other hand, no observations can be brought by a subscriber before the sanction stage. For the time being, Hadopi continues to be criticised and contested. On 15 June, a concert evening against the graduate response will take place with several groups of artists supported by Numerama, co-organised by Riseau des Pirates and Owni.fr, in partnership with Vendredi Hebdo and International and supported also by Slate, Agoravox, LePost, Ivox, 22mars, Social Midia Club, j'affiche and ZikNation. The evening will include the projection on films dealing with Hadopi, the new models to remunerate artists, the protection of numerical freedoms, a debate on the topics as well as music moments. "The problem with HADOPI is triple: it does not bring more money to artists, it touches the fundamental rights and finally it opens a breach into net neutrality allowing private interests to get hold of a judge in order to oblige an access provider to censure part of the net. This law stigmatises the Net which is however an incredible chance for the music to get renewed. (...) A new model must be invented and the technological evolution must be accompanied rather than rowing against it. This is what the public politics serve for, not to protect an industry where 5 multinationals make a trust of the entire market and refuse in a single voice to accept the challenge," was the statement of Flowers From The Man Who Shot Your Cousin / Waterhouse Records that will participate in the event. Exclusive: Hadopi will target as a priority the potential recidivists! (only in French, 20.05.2009) http://www.numerama.com/magazine/12960-Exclusif-l-Hadopi-ciblera-en-priorite-les-recidivistes-potentiels.html Exclusive: Hadopi will not collect material evidence... for the moment (only in French, 27.05.2009) http://www.numerama.com/magazine/13006-Exclusif-l-Hadopi-ne-collectera-pas-de-preuve-materielle-pour-l-instant.html Concert-Evening "Hadopi has killed me" Monday 15 June in Paris (only in French, 26.05.2009) http://www.numerama.com/magazine/12998-Soiree-Concert-Hadopi-m-a-Tuer-le-lundi-15-juin-a-Paris.html ============================================================ 6. WIPO: Visually impaired treaty proposal ============================================================ The WIPO Standing Committee on Copyright and Related Rights (SCCR) met from 25 to 29 May in Geneva. This time, the main points on the agenda were the survey on limitations and exceptions and the visually impaired treaty proposal introduced by Brazil Ecuador and Paraguay (BEP proposal). As usual, the committee also briefly dealt with the situation pertaining broadcaster's rights and audiovisual protection but since the national positions are not moving, no real progress was made. The most interesting part of the meeting was the discussion about the BEP proposal. The treaty was strongly supported by the South American countries and it was also seen in a favourable light by most of the African representatives (which would like to see even wider support for access to information, though) and Asian delegates. However, group B and the European Union did their best to derail the process of getting the treaty under serious consideration. The given reasons for this were rather perplexing e.g. "the matter is so complex" (unlike the broadcast treaty?) and "there's need for more fact-finding" (there's lot of published research by both WIPO and WBU). In reality, the civil servants from Germany, France etc. want to oppose categorically any instrument which would give rights to the users. However, since it is not politically possible to oppose helping visually impaired persons such poor excuses are needed. EDRi also stressed in its intervention the fact that EU is ready to use a "hard law" approach to help elder stage musicians so it would be very unsincere to oppose the same approach for blind persons. WIPO Limitations & Exceptions Treaty Advances; Audiovisual Treaty Gets New Life (30.05.2009) http://www.ip-watch.org/weblog/2009/05/30/wipo-limitations-audiovisual-treaty-gets-new-life/ SCCR to Expedite Work in Favor of Reading Impaired (2.06.2009) http://www.wipo.int/pressroom/en/articles/2009/article_0012.html (Contribution by Ville Oksanen, EDRI-member EFFI) ============================================================ 7. EU will examine Google Books project ============================================================ The German delegation submitted at the European Council meeting held in Brussels on 28 and 29 May 2009, an information note asking EU to take action against Google's online library project, Google Books, a project targeting the scanning of entire book collections of major libraries. "This move has an impact on cultural and media policy that we need to put on a European level," said Culture Minister Bernd Neumann. There is already a dispute between Google and US authors and publishers as the publishing industry is concerned by the fact that scanning books without authors' permission is a violation of copyright laws. Germany's information note argues that many of the rights holders having works that are scanned by Google are in the EU and that European copyright law differs from the US one. The German delegation considers that Google is using the excuse of a fair use exception to face copyright claims, an exemption which doesn't exist in EU member states. The main concern is related to the necessity of obtaining consent given by authors before scanning their works. "Google's actions are irreconcilable with the principles of European copyright law, according to which the consent of the author must be obtained before his or her works may be reproduced or made publicly available on the Internet" says the note. Foreign Minister Frank-Walter Steinmeier has shown concerns regarding competitivity issues: "Through digitalising millions of books without right holders' permission, Google has already gained a competitive advantage against similar projects like Europeana and libreka.de - who unlike Google respect European copyright laws." The EU has immediately confirmed the launching of a formal inquiry which will apparently focus on copyright matters and will look into the settlement Google has with publishers and authors. After Authors Guild and the Association of American Publishers filed a law suit against Google in 2004 arguing the giant was violating copyright by displaying excerpts of books without the permission of the copyright holders, a settlement reached in October 2008 raised criticism and is now investigated by the US Justice Department on anti-trust grounds. The settlement would let Google sell to other libraries access to its online books and subscriptions to its entire library and the revenues would go to Google, publishers and authors. The settlement gives authors until early January to adhere to it and hence receive money for having their books scanned or to opt out of the system by September 2009. Anne Bergman-Tahon, director of the FEP believes that "millions of works will never be claimed because these 300 pages of settlement are so complicated." Therefore, critics argue that when copyright holders do not come forward, Google alone will have the rights to "orphan books" which, according to a recent article in the Wall Street Journal newspaper are estimated at 50 to 70 percent of books published after 1923. Google will hold monopoly under the circumstances and will be in the position to charge as much as it wants for access to books. On the other hand, Google stated that by its project it was giving an eternal digital life to millions of books which are now out of print and that it was "happy to engage in any constructive dialogue about the future of books and copyright." EU may flex regulatory muscles against Google book deal (1.06.2009) http://arstechnica.com/tech-policy/news/2009/06/eu-may-flex-regulatory-muscles-against-google-book-deal.ars Germany wants EU to fight Google Books project (2.06.2009) http://www.thelocal.de/sci-tech/20090602-19649.html Council calls on Commission to examine Google Books project (2.06.2009) http://euroalert.net/en/news.aspx?idn=8811 EU states concerned over Google library plans (27.05.2009) http://euobserver.com/19/28193 EU confirms Google investigation (31.05.2009) http://www.thebookseller.com/news/86904-page.htm ============================================================ 8. Deutsche Telecom investigating the sexual life of job applicants ============================================================ According to German newspaper Handelsblatt, Deutsche Telecom was keeping records about personal details of job applicants, including details about their sexual life. Similar records on potential employees were also kept in Macedonia, Croatia, Slovenia and Hungary. An anonymous security consultant who used to work for Deutsche Telecom stated for the German newspaper that this was actually a common practice of the company. According to Handelsblatt, the German Telecom hired private detectives from Germany who were collecting data about potential employees by eavesdropping phone conversations, investigating their bank accounts and intimate, sexual life, explaining that this way they could know who they were dealing with. This was revealed soon after Deutsche Telecom confirmed the information that it was spying on the directors in its companies and on journalists, in order to determine where the information was leaking from. The company announced that it did not order regular reports on the private life of the potential employees. The people from Macedonian Telecommunications say that this was not, is not and will not be a practice of their company. "These allegations are absolutely wrong, unserious and unsubstantiated. Such practice is prohibited by the Law on personal data protection. Everybody knows what information should be submitted by the applicant; first and last name, address, education, previous work experience, recommendations and a motivation letter" claim the representatives of T-Mobile and T-Home, companies owned by Deutsche Telecom. "All of the employment applications can be found on the company's website" say the representatives from Macedonian Telecom. The representatives of the Croatian T-Com stated that they did not know anything about the spying, and if the investigation proves that this really happened, the responsible persons will have to bear the consequences. According to the reports to which the newspaper had access, a woman that was applying for a job in the Croatian telecom - a branch of DT, is described as an experienced sexual partner with a rich imagination. The partners of the candidate allegedly said that she was a "female predator" with a big sexual urge and that she prefered older men. In another report, which was allegedly prepared by the German counterintelligence service BND, a candidate is described as an alcoholic, and another one as a corrupted old man. Deutsche Telecom claims it did not order reports with personal data of the candidates. "Deutsche Telecom is not analyzing the private life of the applicants. DT doesn't need any information about the private life of the candidates" stated Philip Blank, the company's spokesman. According to AFP, this is one of the several scandals that broke out in Deutsche Telecom and the company also admitted to have spied on journalists and members of the supervisory board in order to find the source of the media. DT also admitted that in 2006 it was checking the bank accounts of more than 100 000 workers to determine whether any of them were involved in corruption. Deutsche Telecom investigating the sexual life of job applicants (26.05.2009) http://www.metamorphosis.org.mk/en/news/world/1498-dojce-telekom-go-proveruval-seksualniot-zivot-na-kandidatite-za-rabota (contribution by Kire Dimik - EDRi-member Metamorphosis - Macedonia) ============================================================ 9. Recommended Action ============================================================ On 26 May 2009 the European Commission opened a consultation on the conclusions of the online commerce roundtable on the online distribution of music. The consultation will close on 30 June 2009. http://europa.eu/rapid/pressReleasesAction.do?reference=IP/09/832&format=HTML&aged=0&language=EN&guiLanguage=en http://ec.europa.eu/competition/consultations/2009_online_commerce/roundtable_report_en.pdf ============================================================ 10. Recommended Reading ============================================================ Ethnic Profiling in the European Union: Pervasive, Ineffective, and Discriminatory (26.05.2009) http://www.soros.org/initiatives/osji/articles_publications/publications/profiling_20090526 Constitutional complaint against Hadopi (only in French, 19.05.2009) http://www.lesechos.fr/medias/2009/0519//300350517.pdf The German constitutional court published its 2008-ruling that created a "fundamental right to the guarantee of the confidentiality and integrity of information technology systems" in English (27.02.2008) http://www.bverfg.de/en/decisions/rs20080227_1bvr037007en.html ============================================================ 11. Agenda ============================================================ 1-4 June 2009, Washington, DC, USA Computers Freedom and Privacy 2009 http://www.cfp2009.org/ 5 June 2009, London, UK The Second Multidisciplinary Workshop on Identity in the Information Society (IDIS 09): "Identity and the Impact of Technology" http://is2.lse.ac.uk/idis/2009/ 10 June 2009, Brussels, Belgium The Global Enforcement Agenda of copyright, patents and other IPRs: Some consumer perspectives Organized by TransAtlantic Consumer Dialogue (TACD), Knowledge Ecology International (KEI) and Health Action International Europe (HAI-E) http://www.tacd-ip.org/blog/2009/05/29/tacd-kei-and-hai-e-host-event-on-enforcement-agenda-of-copyright-patents-and-other-iprs-in-brussels/ 28-30 June 2009, Torino, Italy COMMUNIA Conference 2009: Global Science & Economics of Knowledge-Sharing Institutions http://www.communia-project.eu/conf2009 2-3 July 2009, Padova, Italy 3rd FLOSS International Workshop on Free/Libre Open Source Software http://www.decon.unipd.it/personale/curri/manenti/floss/floss09.html 13-16 August 2009, Vierhouten, The Netherlands Hacking at Random http://www.har2009.org/ 23-27 August 2009, Milan, Italy World Library and Information Congress: 75th IFLA General Conference and Council: "Libraries create futures: Building on cultural heritage" http://www.ifla.org/IV/ifla75/index.htm 10-12 September 2009, Potsdam, Germany 5th ECPR General Conference, Potsdam Section: Protest Politics Panel: The Contentious Politics of Intellectual Property http://www.ecpr.org.uk/potsdam/default.asp 16-18 September 2009, Crete, Greece World Summit on the Knowledge Society WSKS 2009 http://www.open-knowledge-society.org/ 17-18 September 2009, Amsterdam, Netherlands Gikii, A Workshop on Law, Technology and Popular Culture Institute for Information Law (IViR) - University of Amsterdam Call for papers by 1 July 2009 http://www.law.ed.ac.uk/ahrc/gikii/2009.asp 21-23 October 2009, Istanbul, Turkey eChallenges 2009 http://www.echallenges.org/e2009/default.asp 24-25 October 2009, Vienna, Austria 3rd European Privacy Open Space http://www.privacyos.eu 25 October 2009, Vienna, Austria Austrian Big Brother Awards Deadline for nominations: 21 September 2009 http://www.bigbrotherawards.at/ 16 October 2009, Bielefeld, Germany 10th German Big Brother Awards Deadline for nominations: 15 July 2009 http://www.bigbrotherawards.de/ 13-15 November 2009, Gothenburg, Sweden Free Society Conference and Nordic Summit http://www.fscons.org/ 15-18 November 2009, Sharm El Sheikh, Egypt UN Internet Governance Forum http://www.intgovforum.org/ ============================================================ 12. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edrigram-mk.php - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jtrjtrjtr2001 at yahoo.com Wed Jun 3 08:30:21 2009 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Wed, 3 Jun 2009 08:30:21 -0700 (PDT) Subject: Mark as unread - gmail and yahoo Message-ID: <830302.53522.qm@web33303.mail.mud.yahoo.com> Hi, it has been some time since both gmail and yahoo has introduced this (Mark as unread) feature in their webmail access. if your mail account has been compromised (someone else figures your password), then the attacker can at will read your unread mail and then mark it as unread. When the 'mark as read' option was not available, a successful attacker would have to delete the unread email to do avoid detection, but then the sender will at some point of time inform the recipient about the mail that he never received. In both cases, the attacker can still read all the mails already read by the recipient but if the recipient has the habit of deleting(including trash) immediately after reading the mail, it helps the attacker to have a mark as unread option. As soon as the mail arrives, the attacker reads it and marks it as unread. Then the recipient gets to read it and he will immediately delete it. as far as mail clients such as Outlook goes, I think if it is deleted from webmail, it will not appear in your Outlook mail client (not sure, someone can confirm this). It may be better for security if there is no unread option. Moreover, Gmail allows you to see the last login ip to your email and the current session ip's but that won't help if the attacker is from the same organization (with a lot of computers connecting through the same public ip) that you use to access your email. Comments? Thank you, Sarad. From eugen at leitl.org Tue Jun 2 23:30:55 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 3 Jun 2009 08:30:55 +0200 Subject: EDRi-gram newsletter - Number 7.11, 3 June 2009 Message-ID: <20090603063055.GA10925@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From eugen at leitl.org Wed Jun 3 00:02:49 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 3 Jun 2009 09:02:49 +0200 Subject: n2n: a Layer Two Peer-to-Peer VPN Message-ID: <20090603070249.GD10925@leitl.org> http://www.ntop.org/n2n/ n2n: a Layer Two Peer-to-Peer VPN n2n is a layer-two peer-to-peer virtual private network (VPN) which allows users to exploit features typical of P2P applications at network instead of application level. This means that users can gain native IP visibility (e.g. two PCs belonging to the same n2n network can ping each other) and be reachable with the same network IP address regardless of the network where they currently belong. In a nutshell, as OpenVPN moved SSL from application (e.g. used to implement the https protocol) to network protocol, n2n moves P2P from application to network level. The main n2n design features are: * An n2n is an encrypted layer two private network based on a P2P protocol. * Encryption is performed on edge nodes using open protocols with user-defined encryption keys: you control your security without delegating it to companies as it happens with Skype or Hamachi. * Each n2n user can simultaneously belong to multiple networks (a.k.a. communities). * Ability to cross NAT and firewalls in the reverse traffic direction (i.e. from outside to inside) so that n2n nodes are reachable even if running on a private network. Firewalls no longer are an obstacle to direct communications at IP level. * n2n networks are not meant to be self-contained, but it is possible to route traffic across n2n and non-n2n networks. From atrophiess61 at mtlx.com Wed Jun 3 08:21:39 2009 From: atrophiess61 at mtlx.com (Tristan Vasquez) Date: Wed, 3 Jun 2009 09:21:39 -0600 Subject: Simple and effective ways how to attract lovely girls. Message-ID: <000d01c9e456$9c17dde0$6400a8c0@atrophiess61> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4123 bytes Desc: not available URL: From crutchy7 at gorczynski.com Tue Jun 2 18:52:27 2009 From: crutchy7 at gorczynski.com (Albert Cameron) Date: Wed, 3 Jun 2009 09:52:27 +0800 Subject: Get a required degree. Message-ID: <000d01c9e3ed$f2e94d20$6400a8c0@crutchy7> GET YOUR DIPLOMA TODAY! If you are looking for a fast and cheap way to get a diploma, this is the best way out for you. Choose the desired field and degree and call us right now Bachelors, Masters or even a Doctorate. For US: 1.845.709.8044Outside US: +1.845.709.8044 "Just leave your NAME & PHONE NO. (with CountryCode)" in the voicemail. Our staff will get back to you in next few days! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 746 bytes Desc: not available URL: From edibilityo7 at nautilus-travel.com Tue Jun 2 22:19:57 2009 From: edibilityo7 at nautilus-travel.com (Corinne Lovett) Date: Wed, 3 Jun 2009 10:49:57 +0530 Subject: Feeling unneeded in bed? We can alter it to opposite feeling. Message-ID: <000d01c9e40a$ef61f4f0$6400a8c0@edibilityo7>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4622 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 3 03:52:54 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 11:52:54 +0100 Subject: weight and cleansing their bodies faster than most other products on the market Message-ID: <635154202.30726338868365@pacificlife.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3611 bytes Desc: not available URL: From marquesasdcuz717 at princeton.huntingdon.com Wed Jun 3 04:07:31 2009 From: marquesasdcuz717 at princeton.huntingdon.com (Lina Goodrich) Date: Wed, 3 Jun 2009 12:07:31 +0100 Subject: Can you imagine your life without sicknesses and disabilities? Message-ID: <000d01c9e433$1badf4a0$6400a8c0@marquesasdcuz717> http://adrienne.vebzaqiy.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12483 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 3 09:14:15 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 13:14:15 -0300 Subject: Designed with you in mind , lose weight fast with Acai Berry. Message-ID: <000d01c9e466$570062d0$6400a8c0@newcomer0> Lose unwanted wieght , Try Acai Berry. Flush out your bodies unwanted toxins. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Sydney Alexander -------------------------------------- Visit our store http://www.asderallb.net/?rsizflmonh From anish.grover at gmail.com Wed Jun 3 13:26:28 2009 From: anish.grover at gmail.com (Courtney Goldsmith) Date: Wed, 03 Jun 2009 13:26:28 -0500; Subject: accessory academy; Message-ID: accentuate absorbent accession academe From cypherpunks at jfet.org Wed Jun 3 04:30:33 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 13:30:33 +0200 Subject: Do you have 14 days to take part in our weight loss trial? Message-ID: <021064391.87865752234497@tanakaya-inc.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3642 bytes Desc: not available URL: From zerospy0329 at moss-barnett.com Wed Jun 3 11:51:23 2009 From: zerospy0329 at moss-barnett.com (Cameron Clay) Date: Wed, 3 Jun 2009 13:51:23 -0500 Subject: We hae the best alarm-clocks for your little fellow down there. Message-ID: <000d01c9e473$e89b17a0$6400a8c0@zerospy0329> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4127 bytes Desc: not available URL: From toryz4 at mindworks.com Wed Jun 3 02:22:26 2009 From: toryz4 at mindworks.com (Frankie Butcher) Date: Wed, 3 Jun 2009 13:52:26 +0430 Subject: =?koi8-r?B?R2VudWluZSBtYW5ob29kIGlzIHJlbmV3YWJsZSBhdCBhbnkgYWdlIJYg?= =?koi8-r?B?bWFrZSBzdXJlIHlvdXJzZWxmLg==?= Message-ID: <000d01c9e42c$cf4f1450$6400a8c0@toryz4>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4620 bytes Desc: not available URL: From implied9 at trucksbringit.com Tue Jun 2 22:14:58 2009 From: implied9 at trucksbringit.com (Denis Bland) Date: Wed, 3 Jun 2009 14:14:58 +0900 Subject: The best opportunity to buy a designer watch! Message-ID: <000d01c9e40a$3d1e1f80$6400a8c0@implied9> Do you feel embarrassed to go to the store to buy a replica watch because you know that it is not the real one? But why should you pay more for a thing that has the same quality? To avoid the embarrassment order your watch online and we will deliver it anywhere.   Visit and take -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 786 bytes Desc: not available URL: From aiming7 at nationsurety.com Wed Jun 3 06:24:56 2009 From: aiming7 at nationsurety.com (Dale Gregg) Date: Wed, 3 Jun 2009 14:24:56 +0100 Subject: Forget about bad mood and be in a perfect mood all the time. Message-ID: <000d01c9e446$4e093640$6400a8c0@aiming7> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4126 bytes Desc: not available URL: From ruddyinga at mtgengineers.com Wed Jun 3 14:20:50 2009 From: ruddyinga at mtgengineers.com (Justine Hester) Date: Wed, 3 Jun 2009 15:20:50 -0600 Subject: Now you will be able to please each size-queen. Message-ID: <000d01c9e488$c941fd00$6400a8c0@ruddyinga> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4129 bytes Desc: not available URL: From privateoq0 at bastel-schnaeppchen.com Wed Jun 3 07:22:21 2009 From: privateoq0 at bastel-schnaeppchen.com (=?koi8-r?B?IvzLz87Pzdgg1M/QzMnXzyI=?=) Date: Wed, 3 Jun 2009 15:22:21 +0100 Subject: =?koi8-r?B?9MXIzs/Mz8fJySDcy8/Oz83JySDCxc7ayc7B?= Message-ID: <863741898.21633784443502@bastel-schnaeppchen.com> Система экономии бензина в вашем авто. Работает путем получения водорода из воды. Мощность и качество работы двигателя увеличивается. 43 % экономии гарантируем http://ecotop10.ru From maturation24 at raytek.com Wed Jun 3 08:06:35 2009 From: maturation24 at raytek.com (~Lose_The_Weight-) Date: Wed, 3 Jun 2009 16:06:35 +0100 Subject: Your Sample Inquiry Message-ID: <01c9e465$4491b780$a6557252@maturation24> http://VASTFAN.COM From vinegarj54 at mushroomclone.com Wed Jun 3 15:24:51 2009 From: vinegarj54 at mushroomclone.com (Rory Hamm) Date: Wed, 3 Jun 2009 16:24:51 -0600 Subject: Feeling unneeded in bed? We can change it to the opposite feeling. Message-ID: <000d01c9e491$bae069f0$6400a8c0@vinegarj54> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4121 bytes Desc: not available URL: From accounts at paypal.com Wed Jun 3 06:48:26 2009 From: accounts at paypal.com (accounts at paypal.com) Date: Wed, 3 Jun 2009 16:48:26 +0300 Subject: PayPal Account Review Department Message-ID: <749767958.81822774535559@boredinnc.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2017 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 3 18:34:50 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 17:34:50 -0800 Subject: rare and exotic berry delivers weight loss and good looks try for free Message-ID: <000d01c9e4ac$45789cd0$6400a8c0@celiax27> Improve Mental Clarity , Try Acai Berry. Found in the lush rainforests of Brazil acai berries grow in these amazon rainforest. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Fred Braun -------------------------------------- Step to click http://www.tebiefo.net/?vtmoilbxumi From jimmiero at moderndesign.com Wed Jun 3 07:41:12 2009 From: jimmiero at moderndesign.com (Laurence Wills) Date: Wed, 3 Jun 2009 17:41:12 +0300 Subject: Feeling bad? We can make you feel better very quickly. Message-ID: <000d01c9e450$f5ce1490$6400a8c0@jimmiero> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4123 bytes Desc: not available URL: From measl at mfn.org Wed Jun 3 16:41:16 2009 From: measl at mfn.org (J.A. Terranson) Date: Wed, 3 Jun 2009 18:41:16 -0500 (CDT) Subject: Mark as unread - gmail and yahoo In-Reply-To: <830302.53522.qm@web33303.mail.mud.yahoo.com> References: <830302.53522.qm@web33303.mail.mud.yahoo.com> Message-ID: On Wed, 3 Jun 2009, Sarad AV wrote: > Hi, > > it has been some time since both gmail and yahoo has introduced this > (Mark as unread) feature in their webmail access. > > if your mail account has been compromised (someone else figures your > password), then the attacker can at will read your unread mail and then > mark it as unread. When the 'mark as read' option was not available, a > successful attacker would have to delete the unread email to do avoid > detection, but then the sender will at some point of time inform the > recipient about the mail that he never received. > > In both cases, the attacker can still read all the mails already read by > the recipient but if the recipient has the habit of deleting(including > trash) immediately after reading the mail, it helps the attacker to have > a mark as unread option. As soon as the mail arrives, the attacker reads > it and marks it as unread. Then the recipient gets to read it and he > will immediately delete it. > > as far as mail clients such as Outlook goes, I think if it is deleted > from webmail, it will not appear in your Outlook mail client (not sure, > someone can confirm this). It may be better for security if there is no > unread option. So far,so good:I agree with both your opinions and analysis in support thereof. Unfortunately, I believe that every major reader (from PINE up) has the complained about functionality (I may very well be wrong here: FD). I routinely use this on PINE as a sorting measure (a way to force a re-read later on down the road) > Moreover, Gmail allows you to see the last login ip to your email and > the current session ip's but that won't help if the attacker is from the > same organization (with a lot of computers connecting through the same > public ip) that you use to access your email. > > Comments? The only was I see any reasonable change of chaning this [fairly common] behaviour is with an RFC. Willing write one? Ill be happy to co-author, but there needs to be a primary. > Thank you, > Sarad. //Alif -- Yours, J.A. Terranson sysadmin_at_mfn.org 0xpgp_key_mgmt_is_broken-dont_bother "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer 1907 Speech From buglede214 at republicbankofgeorgia.com Wed Jun 3 09:09:41 2009 From: buglede214 at republicbankofgeorgia.com (=?koi8-r?B?IuTP09TV0M7PxSDWyczYxSI=?=) Date: Wed, 3 Jun 2009 19:09:41 +0300 Subject: =?koi8-r?B?5M/T1NXQzs/FINbJzNjFLiD6wcfP0s/EztnFIOTPzcEg1yDwz8TNz9PL?= =?koi8-r?B?z9fYxQ==?= Message-ID: <000d01c9e45d$51ce5d20$6400a8c0@buglede214> Коттеджи Таунхаусы в Подмосковье от 34000 $ уже с участком земли http://sevilia-house.ru From cypherpunks at jfet.org Wed Jun 3 10:28:45 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 19:28:45 +0200 Subject: Discover the magical powers of the Acai Fruit. Message-ID: <000d01c9e468$5d9e31b0$6400a8c0@torment6972> Discover Acai Berry numerous weight loss and health benefits. Slow down your aging process today by starting your free trial of Acai Slim. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Krystal Madrid -------------------------------------- you are one click away http://www.asderallb.net/?rsizflmonh From cypherpunks at jfet.org Wed Jun 3 11:09:26 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 20:09:26 +0200 Subject: Oprah Weight Loss Solution , Try Acai Berry. Message-ID: <000d01c9e46e$0c68cca0$6400a8c0@capi9> Safely Boost your energy with Acai Slim, Endorsed by Oprah. Acai will get you those slim and sexy abs you dream of. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Wm Oconnell -------------------------------------- Come everybody http://www.chezahu.com/?frqjezxzqh From cypherpunks at jfet.org Wed Jun 3 18:49:18 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 20:49:18 -0500 Subject: Lose Weight Fast , YOUR Trial offer IS WAITING Try Acai Berry. Message-ID: <000d01c9e4ae$4ac1b120$6400a8c0@leis> Oprah certified wieght loss solution Acai.Berri. Get Acai Flush working for you , Start your free trial today! -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Jan Swift -------------------------------------- your best choice http://www.tebiefo.net/?vtmoilbxumi From rah at shipwright.com Wed Jun 3 17:58:41 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 3 Jun 2009 20:58:41 -0400 Subject: How to wiretap or identify a GSM phone - and enable the masses References: <200906032153.n53LruU3014352@new.toad.com> Message-ID: Begin forwarded message: From accounts at paypal.com Wed Jun 3 13:11:38 2009 From: accounts at paypal.com (accounts at paypal.com) Date: Wed, 3 Jun 2009 21:11:38 +0100 Subject: PayPal Account Review Department Message-ID: <502612853.88599650490959@quick.cz> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2017 bytes Desc: not available URL: From press-office at wikileaks.org Wed Jun 3 13:27:59 2009 From: press-office at wikileaks.org (Wikileaks Press Office) Date: Wed, 3 Jun 2009 21:27:59 +0100 (BST) Subject: [WIKILEAKS] WikiLeaks wins Amnesty 2009 New Media Award Message-ID: http://wikileaks.org/wiki/WikiLeaks_wins_Amnesty_International_2009_Media_Award WIKILEAKS PRESS RELEASE - For Immediate Release Wednesday June 3, 2009 "WikiLeaks wins Amnesty International 2009 Media Award" WikiLeaks editor Julian Assange has won the Amnesty 2009 New Media Award for work exposing hundreds of recent extrajudicial assassinations in Kenya. The award was presented last night at a ceremony in London. Four people associated with investigating the killings have themselves been murdered, including noted human rights lawyers Oscar Kingara and John Paul Oulo, who were assassinated driving to an afternoon meeting at the Kenyan National Commission on Human Rights in March this year. WikiLeaks first ran its first story on the killings for a week on its fronpage, beginning November 1, 2008. Eventually the story was picked up by print media, starting with Jon Swain from the Sunday Times. Then, earlier this year the United Nations sent a team to Nairobi, lead by Prof. Alston, to investigate. According to AFP, earlier today a session of the U.N. Human Rights Council was told by the U.N Special Rapporteur on extrajudical killings, Prof. Philip Alston, that Kenya's police were a "major stumbling block" for probes into the killings. Prof. Alston also told that 47 member Human Rights Council on Wednesday that "Attacks on those who document abuses do not absolve a government of its obligation to investigate, prosecute and punish those responsible for extrajudicial executions,". In accepting the award, Mr. Assange stated "It is a reflection of the courage and strength of Kenyan civil society that this injustice was documented. Through the tremendous work of organizations such as the Oscar foundation, the KNHCR, Mars Group Kenya and others we had the primary support we needed to expose these murders to the world. I know that they will not rest, and we will not rest, until justice is done." Source documents * Murder in Nairobi: Wikileaks related human rights lawyers assassinated * Kenya: The Cry of Blood - Report on Extra-Judicial Killings and Disappearances, Sep 2008 * Kenyan assassinations: slain human rights lawyer Oscar Kamau Kingara letter to the International Criminal Court, 1 Jan 2009 * Oscar Foundation - assassinated Kamau Kingara final report - The Veil of Impunity, 9 Oct 2008 * Oscar Foundation letter to Minister for Internal Security over extra-judicial killings in Kenya, 14 Oct 2008 * US Ambassador to Internal Security head over Kenyan assassination Selected reportage * Cooperate with FBI, Raila tells Kenya police * Demonstrators accuse police over disappearance of kin * International Criminal Court will handle politicians but who will tame police * Raila now attacks security agencies * Two Kenyan rights activists shot dead * UN group to probe poll chaos deaths * UN probe indicts Kenya on police killings * UN urges probe into Kenya murders http://wikileaks.org/wiki/WikiLeaks_wins_Amnesty_International_2009_Media_Award +-------------------------------------------------- | Why you receive this mail and what to do with it: | | You are receiving this mail because you were invited to | the Wikileaks Press Release list run by the transparency group Sunshine Press. | | Releases ensure you are aware, before the rest of the world, | of significant geopolitical and other disclosures released | by Wikileaks, an international platform for the first release of | of classified, confidential or censored materials of political, | diplomatic, ethical or historical interest. | | We rely on you to distribute the content of this mail to your | community, industry, press and regulators, to defend us in your | country and to invite people of integrity and commitment via | via https://lists.riseup.net/www/subscribe/wl-press | | Our materials range from secret Guantanamo documents to political | assassinations to confidential reports of children's hospital | corruption, and have spawned tens of thousands of press articles, | many reforms and changed electoral outcomes. | | Releases average one per week but can be higher or lower depending on | events. You can easily set the frequency to monthly or change your | subscription via https://lists.riseup.net/www/sendpasswd/ | | If you know people that have access to sensitive documents of public | interest, tell them about us. We have an unbroken record of protecting | sensitive sources and defeating censorship attacks from all corners of the globe. | See https://secure.wikileaks.org/wiki/Wikileaks:Submissions | | If you are about to release an investigative report or article, we can release the | underlaying source material concurrently to substantiate the allegations, | draw attention away from the true source, deflect legal or censorship | attacks and promote secondary investigations and public awareness. | | Live bank-grade encrypted chat to the office is available via | https://secure.wikileaks.org/chat/irc2.cgi (multiple languages spoken) | | Inquiries for speaking engagements, comment, interventions, | investigations, source-protection and censorship consultations | may be addressed to http://wikileaks.org/wiki/Wikileaks:Contact | | If you are serious about analysis, translation, | legal, coding, network, financial or other contributions, please contact | us via: http://wikileaks.org/wiki/Wikileaks:Contact | | See http://wikileaks.org for all other information and | https://secure.wikileaks.org for secure access. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Wed Jun 3 18:02:43 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jun 2009 22:02:43 -0300 Subject: Your ticket to a new Slim and Vibrant life , Acai berry. Message-ID: <000d01c9e4b0$2a67c2f0$6400a8c0@squeakfn98> Start your day right, Try Acai Berry. Discover the magical powers of the Acai Fruit. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Peter Egan -------------------------------------- just a click away http://www.tebiefo.net/?vtmoilbxumi From eugen at leitl.org Wed Jun 3 13:49:14 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 3 Jun 2009 22:49:14 +0200 Subject: [WIKILEAKS] WikiLeaks wins Amnesty 2009 New Media Award Message-ID: <20090603204914.GB23524@leitl.org> ----- Forwarded message from Wikileaks Press Office ----- From devolvesba4 at johnlindholm.com Wed Jun 3 10:33:28 2009 From: devolvesba4 at johnlindholm.com (Bethany French) Date: Wed, 3 Jun 2009 23:03:28 +0530 Subject: Simply proven technique to lose weight Message-ID: <000d01c9e471$67c4adf0$6400a8c0@devolvesba4> If you are having trouble viewing this email, please click here         The Lloydspharmacy Fat Age Calculator is designed to give you a rough indication of whether or not you are eating too much fat and saturated fat. A recent study showed that the average 40 year old British woman has consumed the saturated fat ‘allowance’ of a 66 year old.The figure for men is only a little less alarming; the average 40 year old man has clocked up 50 years’ worth of his lifetime allowance of saturated fat.As well as weight gain, eating too much fat can lead to problems such as heart disease and type 2 diabetes.     Don't miss out on the latest Lloydspharmacy offers and news simply add news at newsletter.asklloydspharmacy.com to your address book or contacts list to ensure our emails always go into your inbox. © Lloydspharmacy 2009. All rights reserved. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5627 bytes Desc: not available URL: From peacefulnessh92 at netzwerk-sonne.de Wed Jun 3 20:45:25 2009 From: peacefulnessh92 at netzwerk-sonne.de (Rusty Acai magic) Date: Thu, 4 Jun 2009 00:45:25 -0300 Subject: Looking For Acai Berry? Find it Here. Message-ID: <000d01c9e4c6$e53f53c0$6400a8c0@peacefulnessh92> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Hit the button here To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 905 Indian Springs Drive Lancaster, PA 46914 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3779 bytes Desc: not available URL: From wnc at shxv.net.jfet.org Thu Jun 4 03:23:51 2009 From: wnc at shxv.net.jfet.org (=?koi8-r?B?IvDSz8TBzSDEz80i?=) Date: Thu, 4 Jun 2009 02:23:51 -0800 Subject: =?koi8-r?B?5M/T1NXQzs/FINbJzNijLg==?= Message-ID: <851963046.10242071300176@tv-serial.ru> Подмосковья. http://vsepodomam.ru From twirlingxk at milehighdevelopment.com Wed Jun 3 15:04:46 2009 From: twirlingxk at milehighdevelopment.com (Tommie Hooks) Date: Thu, 4 Jun 2009 02:34:46 +0430 Subject: Extend your male volume,stamina and size. Message-ID: <000d01c9e497$4ebbe0a0$6400a8c0@twirlingxk> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4129 bytes Desc: not available URL: From caromi at stophack.ru Thu Jun 4 03:42:09 2009 From: caromi at stophack.ru (Frederick Meadows) Date: Thu, 4 Jun 2009 02:42:09 -0800 Subject: We Offer You Wide Range Of Software. Message-ID: <000d01c9e4f8$bab22830$6400a8c0@caromi> Looking for software? Check this site first and save from $30 to thousands on you soft. We care about our customers that is why we made the prices affordable for everybody.   Visit our store -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 663 bytes Desc: not available URL: From buvhsaqplkde at brabus.com Wed Jun 3 11:11:31 2009 From: buvhsaqplkde at brabus.com (Leslie Dickson) Date: Thu, 4 Jun 2009 03:11:31 +0900 Subject: Our medicine will remind you that you are still a man. Message-ID: <000d01c9e476$b8f026f0$6400a8c0@buvhsaqplkde> We have lots of different products for men�s and women�s health, beauty and abilities. If you are still skeptical about our place, order just sample medicine and make sure yourself that our drugstore is the best.   Go click it -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 713 bytes Desc: not available URL: From bushyk314 at schaer.com Wed Jun 3 17:22:17 2009 From: bushyk314 at schaer.com (Erica Dyer) Date: Thu, 4 Jun 2009 08:22:17 +0800 Subject: Quality is the recipe for our watches. Message-ID: <000d01c9e4aa$84b53090$6400a8c0@bushyk314> Who would refuse from a prestige watch just for a couple of dollars? You will be amazed at the quality of our watches but moreover you will be amazed at their prices. We offer a wide range of timepieces of different brands.   Come and see -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 747 bytes Desc: not available URL: From sallustgn692 at studioenigma.it Wed Jun 3 17:18:58 2009 From: sallustgn692 at studioenigma.it (Arthur Branch) Date: Thu, 4 Jun 2009 09:18:58 +0900 Subject: Replica watches that look exactly like real ones. Message-ID: <000d01c9e4aa$0e07df60$6400a8c0@sallustgn692> You have been dreaming of wearing an elegant designer watch but could never afford it? If this story sounds familiar, we want to share our secret with you – now you can choose a trendy watch you like at a very low price.   just a click away -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 747 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 4 07:47:48 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 4 Jun 2009 09:47:48 -0500 Subject: Get Thin Easily with Acai Berry Message-ID: <000d01c9e51b$0bdefa90$6400a8c0@hamstringnt957> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Your best choice To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 093 Indian Springs Drive Lancaster, PA 19225 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3825 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 4 06:30:07 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 4 Jun 2009 10:30:07 -0300 Subject: embrace your new confidence, try acai for free Message-ID: <000d01c9e518$93a21aa0$6400a8c0@repertoireqp> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! enter here To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 961 Indian Springs Drive Lancaster, PA 28055 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3816 bytes Desc: not available URL: From defterxv2 at netvigator.com Thu Jun 4 01:54:44 2009 From: defterxv2 at netvigator.com (-Lose_The_Weight~) Date: Thu, 4 Jun 2009 10:54:44 +0200 Subject: ~100 Percent FREE-Sample! Message-ID: <01c9e502$de5b7200$84b15c5b@defterxv2> http://successfulfan.com From fizzesj124 at rentotek.com Wed Jun 3 19:32:39 2009 From: fizzesj124 at rentotek.com (Jon Inman) Date: Thu, 4 Jun 2009 11:32:39 +0900 Subject: Tired of girls searching for your little friend in bed notbeing able to find it? Message-ID: <000d01c9e4bc$bab0bfe0$6400a8c0@fizzesj124> Are you afraid of having to resort to surgeries to enlarge your little friend and useless exercises and other things don’t help? Then simply try our enlargement program and it is bound to bring you success.   Meet you here -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 726 bytes Desc: not available URL: From tejane at freqelec.com Thu Jun 4 02:47:27 2009 From: tejane at freqelec.com (Eugenio Perkins) Date: Thu, 4 Jun 2009 11:47:27 +0200 Subject: =?koi8-r?B?TWVkaWNpbmUgc2hvdWxkIGJlIGFmZm9yZGFibGUgZm9yIGV2ZXJ5Ym9k?= =?koi8-r?B?eSCWIGNvbWUgaGVyZS4=?= Message-ID: <000d01c9e4f1$16d0e550$6400a8c0@tejane> You stopped feeling like a complete man because of your constant failures in bed? We know how to solve your problem. And only here you can find magic Viagra for such a low price.   Visit this second -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 787 bytes Desc: not available URL: From conversationfte11 at blackplanet.com Thu Jun 4 04:55:05 2009 From: conversationfte11 at blackplanet.com (-Organic_WeightLoss) Date: Thu, 4 Jun 2009 12:55:05 +0100 Subject: Feel lighter and look better! Message-ID: <01c9e513$aec07e80$32a3b558@conversationfte11> http://successfulfan.com From blondness at journee-vinicole.com Thu Jun 4 09:23:54 2009 From: blondness at journee-vinicole.com (Kennith Pratt) Date: Thu, 4 Jun 2009 13:23:54 -0300 Subject: Enhancing your tool means enlarging your manliness in general. Message-ID: <000d01c9e530$da6542b0$6400a8c0@blondness> http://adelaide.suwrenoz.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12529 bytes Desc: not available URL: From regimenra8 at mr2.com Thu Jun 4 09:44:36 2009 From: regimenra8 at mr2.com (Chase Goodrich) Date: Thu, 4 Jun 2009 13:44:36 -0300 Subject: We know the method to get your little friend up. Message-ID: <000d01c9e533$bf269780$6400a8c0@regimenra8>   H1 A:hover { BACKGROUND-COLOR: #888; COLOR: #fff !important } DIV#emailbody TABLE#itemcontentlist TR TD DIV UL { LIST-STYLE-TYPE: square; PADDING-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV BLOCKQUOTE { BORDER-LEFT: #dadada 6px solid; PADDING-LEFT: 6px; MARGIN-LEFT: 1em } DIV#emailbody TABLE#itemcontentlist TR TD DIV LI { MARGIN-BOTTOM: 1em; MARGIN-LEFT: 1em } TABLE#itemcontentlist TR TD A:link { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:visited { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } TABLE#itemcontentlist TR TD A:active { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } UL#summarylist LI A { COLOR: #000099; FONT-WEIGHT: bold; TEXT-DECORATION: none } IMG { BORDER-BOTTOM-STYLE: none; BORDER-RIGHT-STYLE: none; BORDER-TOP-STYLE: none; BORDER-LEFT-STYLE: none } The Asia Foundation News   You are subscribed to email updates from The Asia Foundation News To stop receiving these emails, you may unsubscribe now. Email delivery powered by Google Inbox too full? If you prefer to unsubscribe via postal mail, write to: The Asia Foundation News, c/o Google, 20 W Kinzie, Chicago IL USA 60610 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4622 bytes Desc: not available URL: From vubk at cqpw.ru.jfet.org Thu Jun 4 05:45:17 2009 From: vubk at cqpw.ru.jfet.org (=?koi8-r?B?IvbB0iDQ1MnDwSI=?=) Date: Thu, 4 Jun 2009 14:45:17 +0200 Subject: =?koi8-r?B?8M/C2dfBytTFIM7BIPLPxMnOxSDWwdItINDUycPZ?= Message-ID: <738880793.67582517365863@aj.santcugatobert.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3397 bytes Desc: not available URL: From honied0 at saltspringessences.com Thu Jun 4 10:54:40 2009 From: honied0 at saltspringessences.com (Ophelia Bowman) Date: Thu, 4 Jun 2009 14:54:40 -0300 Subject: Absolutely easy to look great , Get your acai today Message-ID: <000d01c9e53d$88878b80$6400a8c0@honied0> Acai Berry is the cure to your common diet   A chance to visit -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 569 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 4 10:56:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 4 Jun 2009 14:56:03 -0300 Subject: Oprah certified wieght loss solution Acai.Berri. Message-ID: <000d01c9e53d$ba371e70$6400a8c0@chlorinatedx1> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Click at once To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 784 Indian Springs Drive Lancaster, PA 13514 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3808 bytes Desc: not available URL: From diversionary0702 at aupasacamiones.com Thu Jun 4 00:52:14 2009 From: diversionary0702 at aupasacamiones.com (Lonnie Clemons) Date: Thu, 4 Jun 2009 15:52:14 +0800 Subject: Watches of different brands at fantastic prices. Message-ID: <000d01c9e4e9$5fed7440$6400a8c0@diversionary0702> You need a stylish watch to decorate your wrist to impress everybody at that party but don’t have enough finances for such a luxury? Don’t worry, we know how to help you. Lots of replica watches at low prices are waiting for you.   take a look -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 750 bytes Desc: not available URL: From simultaneouslyw50 at sloanlawfirm.com Thu Jun 4 04:16:22 2009 From: simultaneouslyw50 at sloanlawfirm.com (Ina Tobin) Date: Thu, 4 Jun 2009 16:46:22 +0530 Subject: A nice cheap watch is waiting for a good owner. Message-ID: <000d01c9e505$e494e450$6400a8c0@simultaneouslyw50> What can be better than fast and secure shipment of elegant designer watches? Maybe just an extremely low price of these watches. For a few hundred dollars you can buy as many watches as you want.   Step to enter -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 720 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 4 12:48:49 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 4 Jun 2009 16:48:49 -0300 Subject: Improve Mental Clarity , Try Acai Berry. Message-ID: <000d01c9e54d$7aaa6680$6400a8c0@cancel938> It's never been easier , Lose weight with acai berry formula. your first taste of Acai will energize not only your body but stimulate your mind. Please Visit http://www.atelibe.com/?zamtmemumyd From eugen at leitl.org Thu Jun 4 08:18:59 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 4 Jun 2009 17:18:59 +0200 Subject: US shells out $10M for unmanned aircraft that can perch like a bird Message-ID: <20090604151859.GQ23524@leitl.org> http://www.networkworld.com/community/node/42390 US shells out $10M for unmanned aircraft that can perch like a bird By Layer 8 on Wed, 06/03/09 - 7:31pm. Unmanned aircraft maker AeroVironment got an additional $5.4 million to further develop the diminutive aircraft that can fly into tight spaces undetected, perch and send live surveillance information to its handlers. Last Fall, AeroVironment, got $4.6 million initial funding from the Defense Advanced Research Projects Agency (DARPA) to develop the Stealthy, Persistent, Perch and Stare Air Vehicle System (SP2S), which is being built on the company's one-pound, 29-inch wingspan battery-powered Wasp unmanned system. According to DARPA, the key technical challenges of the new aircraft include: multifunctional materials that integrate the SP2S airframe structure with the power supply and transmit/receive antennas; advanced aerodynamics and control systems, including the ability to land and return home automatically; perch-and-grip technology; micro miniature pan/tilt/zoom EO cameras; (5) autonomous image capture; and data link communications relay capability with multiple digital channels that enables beyond-line-of-sight communications, with data/video encryption. Experts say the ability to actually fly in and perch like a bird will be one the more technically challenging aspects of the system. DARPA said the purpose of SP2S is to verify the utility of such a small perch and Stare system (currently no such system exists). DARPA said additional work was required to take the military users feedback and refine/upgrade the system to meet diverse requirements of a wide group of users. This task would then result in the delivery of ten upgraded systems for further testing. The US Air Force last year gave the go-ahead for full production of the ASP III unmanned aircraft designed to be used for special battlefield operations such as targeting and tracking. The AeroVironment Wasp III carries interchangeable targeting payload modules, including an infrared camera, along with two integrated color cameras that transmit streaming video directly to the hand-held ground controller for display on an integrated monitor. It has been procured under the Air Force's Battlefield Air Targeting Micro Air Vehicle (BATMAV) program. BATMAV systems are expected to let military personnel see over hills and beyond their line of sight in real time and in low light. The unmanned aircraft are highly portable, durable and can be launched by one person. The BATMAV aircraft are expected to fly at an altitude of 500 feet, at about 40MPH and staying aloft for up to 90 minutes at a time. From milkmaide919 at studer.de Thu Jun 4 10:12:57 2009 From: milkmaide919 at studer.de (Nina Piper) Date: Thu, 4 Jun 2009 18:12:57 +0100 Subject: Need Good Software? Ask Us For Help. Message-ID: <000d01c9e52f$53043ca0$6400a8c0@milkmaide919> You will fall in love with our low prices, high quality of our software, fast and safe shipping and friendly customer support. Become our partner today!   We are inviting you -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 647 bytes Desc: not available URL: From eugen at leitl.org Thu Jun 4 10:00:00 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 4 Jun 2009 19:00:00 +0200 Subject: Tellitec Tellinet Sat Spy manual leaked Message-ID: <20090604170000.GV23524@leitl.org> http://wikileaks.org/wiki/Tellitec_Tellinet_Sat_Spy_manual%2C_6_Mar_2006 Tellitec Tellinet Sat Spy manual, 6 Mar 2006 May 24, 2009 Summary Tellinet is an accelerator for satellite communications made by Tellitec GmbH of Berlin. It supports encrypted TCP (ETCP), but as this confidential manual shows, it also supports covert remote interception of communications data. DOWNLOAD/VIEW FULL FILE FROM fast site, current site, Sweden, US, Latvia, Slovakia, UK, Finland, Netherlands, Poland, Tonga, Europe, SSL, Tor Context Germany Primary language English File size in bytes 2170498 File type information PDF document, version 1.3 Cryptographic identity SHA256 c1ac645e16624815e9ef75dd3d959b1b681e82b68a5261a4cea3c7a6f251370b From soberests41 at roguefarm.com Thu Jun 4 12:16:00 2009 From: soberests41 at roguefarm.com (Fannie Acai magic) Date: Thu, 4 Jun 2009 20:16:00 +0100 Subject: get in to a healthy lifestyle with Acai Berry. Message-ID: <000d01c9e540$83a55d10$6400a8c0@soberests41> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! click To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 210 Indian Springs Drive Lancaster, PA 82032 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3763 bytes Desc: not available URL: From info at freemarketmoney.com Fri Jun 5 02:20:11 2009 From: info at freemarketmoney.com (info) Date: June 5, 2009 2:20:11 AM GMT-04:00 Subject: [gsc] criminals arrest free market moneteers Message-ID: Dear Friends, Below is the latest news on Liberty Dollar. Regards, Jim *_LIBERTY DOLLAR ALERT:_* June 2009 Vol. 11 No. 06-A Urgent News for All Liberty Dollar Supporters! *FBI Arrests Bernard, Kevin, Sarah & Rachelle The battle for a value based currency has began!* The last two days have been amazing! Just shortly after midnight on Tuesday, the phone started ringing and I let the answering machine take the call. But very soon there was another call? with an even more urgent message! Very quickly, a friend of Kevin Innes, explained to me that Kevin had been "detained" by the local sheriff and was being held for the FBI to arrest him! Holy Cow!! The #2 supporter for the Liberty Dollar and co-instructor at the Liberty Dollar University training sessions was in deep trouble with the Feds! I was sure to be next. But would they arrive in a few minutes or would it be a pre-dawn Nazi style assault? Finally, I got up at 4:00 AM. I was very concerned for Kevin and wondered when the FBI would hit me. Fortunately the morning was quickly filled with a flurry of calls from Kevin's friend, other interested parties, the usual business calls and making preparations for the inevitable knock on the door. But nobody came. Then just after noon, Niles, who's wife, Rachelle, manages the Liberty Dollar Fulfillment Office, called to tell me that Rachelle had been picked up by the FBI at the LD Office and was due to be arraigned in just a few hours! The FBI strikes again! Luckily, I was able to talk to Rachelle via her cell phone while the FBI was holding her. I was pleased that the FBI agents were the friendly professional types and afforded Rachelle and I quite a few minutes of private conversation. Under the circumstances, Rachelle's demeanor and resolve was right on target. And very quickly, I learned that a warrant had been issued for my arrest. And just a quickly, Rachelle was off to court to be arraigned. Much later in the afternoon, I learned to my surprise that three big FBI agents had arrested Sarah at work. She and Rachelle were arraigned together and quickly released to on their own recognizance (OR) before the sun set on a very eventful day for the Liberty Dollar. The quick, professional effort with Sarah and Rachelle were gratifying and encouraging. Unfortunately, I was to learn that Sarah lost her job because of this event. By last afternoon it was clear that the Liberty Dollar would be best served by my turning myself in to the to the US Marshals, otherwise know as 'self reporting.' After a few calls, I found myself talking to Agent Andy (aka Agent F) who was his usual friendly, chatty self. He even recognized my voice although we had only spoken twice and that was over 18 months ago. Sure enough he confirmed that a federal arrest warrant for my arrest had been issued. And after a bit of gamesmanship with Agent Andy, I agreed to report to the US Marshal's office in Fort Myers, Florida at 9:00 AM on Thursday morning as it was too late to be arraigned, plus an overnight in jail would have wrinkled by clothes :) The following morning, Thursday, June 3, 2009, I actually arrived at the Marshal's office at 8:30 due to light traffic. As the saying goes, "If you gotta do time, do federal time." Quite simply, the federal boys are better educated, better trained and have better manners. I was immediately escorted to a holding cell. After an hour or less, I met with the Pre-Trila Service rep and made it to court at 11:00 in chains and handcuffs. The female judge was businesslike and granted my request to attend my son's graduation in Physics from UCLA next week. After fingerprinting, signing a $50,000 Appearance Bond, one final meeting with the Pre-Indictment Service rep, I was free. In general, the arraignment was a pleasant affair. The US Marshals did their job with very little attitude, as they should. After all, I am self reporting, and it is for anything violent, I just want to prove that I have a right to issue my own currency and if any body chooses to use it then it is a "private contract." It is certainly not a crime. *And so it came to pass,* 2009 years after the birth of Christ, that four regular Americans have taken a stand to defend the People's right to protect themselves from a government currency that has a long and unforgiving history of stealing the people's purchasing power. This is a test of individual rights, as protected by the Tenth Amendment. It is the deciding moment that a private voluntary barter currency (PVBC) is legal in the great United States of America. This is a test that the Liberty Dollar must and will pass, for that I have no doubt. But it will not be easy or cheap. Please, if you support our efforts, support us with any kind of money you have, including pro bono services. Now that the Liberty Dollar faces a federal criminal trial, it is the *US Government v Liberty Dollar* ala Bernard, Kevin, Sarah & Rachelle. Please help us win. Please help yourself win. Please help American win. Very simply this is a Win or Lose battle. In addition to money for this legal fight we need articles that reference non-government currency, such as Air Miles as currency, legal research assistance, expert witnesses, legal assistance, etc. If you support the ideals of the Liberty Dollar, this is the time to get behind the Liberty Dollar. We critically need your help! Please send your digital info to Legal at LibertyDollar.org and your donations of value including other kinds of "currencies" to: LIBERTY DOLLAR 225 N. Stockwell Road Evansville. Indiana. 47715 *The best news* is that the Liberty Dollar finally has the opportunity to prove beyond a shadow of a doubt that it is legal. Over two years ago I sued the US government for a Declaratory Judgment to resolve the legality issue. And how did they respond, they raided the Liberty Dollar and confiscated over $4 million dollars in gold, silver and cash. The US government has done everything possible to kill the Liberty Dollar! And guess what? It has not worked. The mere fact that the Liberty Dollar is still in business is a testament to your demand for Real Money and the ideals that the Liberty Dollar represents. Thank you, thank you, thank you for your support! Trust me, the Liberty Dollar is not made up of any fat cats. We are all just regular Americans. And we all just want good money, a lot less government and no damn war! Click HERE for a stilted Press Release by the DOJ. Its three pages with a whopper by Owen Harris, Special FBI Agent in Charlotte who said, "When groups try to replace the US dollar with coins and bills that don't hold the same value..." WOW what a telling statement of pure spin. Click HERE for the 13 page Indictment. Click HERE for Sarah's Arrest Warrant. *Guess what?! Liberty Dollar still in business and we need more business!* As there has been no Cease and Desist Order, Liberty Dollar remains *OPEN FOR BUSINESS*. Please visit our shopping cart for all the 2009 Liberty, Peace, Freedom, T-Dollars and more. Don't be bashful or stupid. Silver is going to the moon, just as sure as the US dollar is going to hell with your purchasing power. Now is the time to protect your purchasing with the "inflation proof" currency and help usher in a new monetary model that provides the only proven, peaceful, and profitable solution to the monetary cancer that has infected America. *OUTSTANDING ORDERS:* Please rest assured that we will fill all outstanding orders. Yes, after producing a sizable amount of pre-minted Silver Libertys and finally getting current with most orders, we changed mints and are now behind again. We apologize emphatically! Poor and/or slow delivery is not acceptable business. It hurts everyone. And just when we were about to get current again we were arrested. Please continue to support us with your patience too. We promise to get every order out ASAP. But as I hope you can understand, it is a struggle to run a business, any business, in such an environment and fight a major legal battle for our right to protect our purchasing power *The last few 2009 Arrest Dollars *. Are you familiar with the Arrest Dollars? Starting in 2007 and continuing through this year the Arrest Dollar is one ounce Silver Liberty that is specially hand hallmarked with a micro "handcuffs" stamp and my federally registered mintmark. Issued only from the day of the raid to today. The last few 2009 Arrest Dollars are currently on the Shopping Cart . After these are gone, they are gone to eBay for much more money. *The 2009 Tea Party Dollar * (T- Dollar) is still available and we are still waiting confirmation on the shipment. We are still expecting to have the first batch order in the first 24 HOURS here for the July 4 events. The T-Dollar is still only a buck for an ounce of copper AND you can still get them for 10% discount to they $1 face value for a 100 or more. Hey, they are only a buck? you can't go wrong. Plus every copper issue has sold out. Get these while you can and help support our legal efforts tooJ *The 2009 Silver Libertys !* The backbone of the Liberty Dollar model is the one ounce .999 fine silver Lib! Just in the last few days, silver has bounced back over $16, soon the 30 day moving average will be $16 and the Liberty Dollar will Move Up again to the $50 Silver Base. PLEASE don't be dumb and buy silver when it is high. Get it NOW!!! Sure it is not $5 per ounce any more, nor will it ever be again. $5 silver is just not possible with the government spending phony baloney fiat money like a drunken sailor. Please order silver now and protect your purchasing power and profit tomorrow! Stay tuned to the Liberty Dollar News as we vindicate and validate the legality of the Liberty Dollar. Please take an active role in this exciting and profitable time. Don't lose out. Get involved with the Liberty Dollar to make money, do good and have fun. I am having as much fun in my 60's and I did in The 60's and hope you are too. Thanks again for your support. Bernard von NotHaus Monetary Architect Editor at LibertyDollar.org www.LibertyDollar.org 888.LIB.DOLLAR 888.421.6181 -------------------------------------------------------------------------------- Click HERE to Subscribe to Future Mailings. To be removed from all future mailings follow the instructions HERE . From pedagoguedfd712 at ebonycreekcattle.com Fri Jun 5 03:05:58 2009 From: pedagoguedfd712 at ebonycreekcattle.com (Irene Stevenson) Date: Fri, 5 Jun 2009 03:05:58 -0700 Subject: =?koi8-r?B?RnJvbSBub3cgeW91IGRvbpJ0IG5lZWQgYSBjcmFuZSB0byBsaWZ0IHlv?= =?koi8-r?B?dXIgaW5zdHJ1bWVudCB1cC4=?= Message-ID: <000d01c9e5c5$392e3f60$6400a8c0@pedagoguedfd712> http://abigail.soxbugic.cn/ AARP Webletter Having trouble viewing images? Click here to view as a webpage. To ensure delivery to your inbox, please add aarpnews at news.aarp.org to your address book. WEBLETTER A weekly publication from AARP Volume 14, Issue 20 | May 13, 2009 Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Doctor Seacat Gabriele provided personal 80% discount for you.Discount code D-63253-53503-25893 Click here to activate discount Visit AARP.org Read Today�s News AARP Membership: Join / Renew Send To A Friend Manage My E�mail Subscriptions You are receiving this message because you are subscribed to the AARP Webletter. If you would like to cancel your subscription, please click here. We welcome your feedback about the newsletter, but please use our contact AARP link if you have questions about AARP or your membership. If you would prefer to stop receiving all e-mail from AARP, please click here. If you would like to manage all of your AARP e-newsletter subscriptions, visit the e-mail updates page on the AARP Web site. Add us to your address book! Add aarpnews at news.aarp.org to your address book now to ensure your AARP newsletter always gets delivered. AARP is a nonprofit, nonpartisan membership organization that helps people 50+ have independence, choice, and control in ways that are beneficial and affordable to them and to society as whole. *AARP Member Benefits are provided by third parties through contractual arrangements with AARP, and AARP Services, Inc., a wholly-owned subsidiary of AARP, or AARP Financial Inc., a wholly-owned subsidiary of AARP Services, Inc. Arranged offers and discounts do not imply endorsement of firms by AARP, AARP Services or AARP Financial. Offers are subject to change, and may have limited availability or restrictions, so please contact the provider directly to get more details. Privacy Statement We are committed to protecting your privacy. See our privacy policy for additional information. AARP �1995-2009, All rights reserved. 601 E Street NW, Washington, DC 20049 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12521 bytes Desc: not available URL: From vulgar at passport.com Fri Jun 5 06:13:35 2009 From: vulgar at passport.com (Clement Fry) Date: Fri, 05 Jun 2009 06:13:35 -0500; Subject: we will make you happy; Message-ID: Biggest choice of watches http://kayugocar.cn From rah at shipwright.com Fri Jun 5 06:38:06 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 5 Jun 2009 09:38:06 -0400 Subject: Fwd: [gsc] criminals arrest free market moneteers References: <4A28B91B.1090205@freemarketmoney.com> Message-ID: <87C95CFB-E94B-4898-A3BE-BA15CEC99075@shipwright.com> -----BEGIN PGP SIGNED MESSAGE----- The Feds of recently nailed the principals of e-Gold more or less to a cross of gold for instantaneous non-repudiation of book-entry transactions, threatening set loose the usual Four Horsemen of the Infocalypse. Now it looks like various Men in Black are going after Liberty Dollar, below, for instantaneously non-repudiable physical-delivery bearer transactions, again to prevent the aforementioned Pale Riders -- or at least Pac-Man characters -- to be at large and in charge... Uncle Fed has been dancing on the heads of the Liberty Dollar crew -- whose business was selling gold and silver rounds, intaglio-printed warehouse receipts, etc. on the, shall we be charitable, Amway, model and calling them "dollars" -- for a few years now, including the confiscation of a vault of coins and bullion at a custodial warehouse / minting-printing contractor in Colorado somewhere. Part of the hard-money hoard confiscated back then was a bunch of about-to-be-released "dollars" with Ron Paul on their face, the profits of which were to be donated to Mr. Paul's presidential campaign. The wikipedia entry for "Liberty Dollar" tells a pretty fair story, for them as wants to catch up on the whole thing in more detail. None Dare Call It Conspiracy, and so on. Paradoxically -- or not, depending on which side your agorist bread is buttered -- the price of specie took off so much over the decade or so LD has been cutting their precious metal cookies that the stated "dollar" amount on coins issued at that time is significantly exceeded by the value the gold/silver they're made of, including the, okay, usurious, premium at which they were sold... One presumes, again with the agorist cap on, that this is merely a prelude to a confiscation of specie and other hard wealth, and a massive inflation of the US Dollar in light of the recent assumption of decatrillions of national debt, and thus, cats and dogs living together, The End Of The United States As We Know It. Having witnessed -- even enthusiastically participated in -- various forms of millennialism, capitalist, digital, and/or both, over the past 20 years, I'm not so sure. Rome, though Byzantium, asymptotically persisted as a political entity until the Turkish sack of the 15th century. Nothing ever *really* goes away, even buggy whips and flint-knapping. Political kleptocracy, force monopoly, socialism -- but I repeat myself -- will persist in spite of themselves as recent "elections" -- Mencken's "advance auctions of stolen goods" -- have shown. However, this new but inevitable development in the Free (not as in beer) Money business, like the times, is interesting, if mostly in the Chinese sense. "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ...as my old .sig used to say. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: 9.10.0.500 wsBVAwUBSike2cUCGwxmWcHhAQHQEAf+J1N7T8mfcXlcCiRtVPaYs4D3sNXYL2IH vY78DCGnnRYJkP9r9iMzkkPXjWKuc7d0wBGicEm7J/663WzEGPDEZ3yVBi2SqlNh Yu7oUsnoWz/aX3LdmFzcAsKWmYV0o+dABtX1/RON8m1yDRUlXxFoPkwcSdU9SWmY Adt0SyCJxi9QTm5fSRo3Uzmn+tM9k4A+6MVxzAQC8zWUICl15/kHvSDTOyBy7HkB OIAdU2L7CzWLX/OhuAyjeqX/E6Jck26AQsvYT2RZgUShI0QysMnV5CTVjkyfZ467 Qrvg05zqnLNSeR0NXZgy9sIvOr41aNxI/FrCdBMGg5sVdG/ay9urjQ== =yjbE -----END PGP SIGNATURE----- -------- Begin forwarded message: From rah at shipwright.com Fri Jun 5 07:06:47 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 5 Jun 2009 10:06:47 -0400 Subject: The fine art of 419 baiting... Message-ID: <209B5680-6899-4F5E-AD66-34D54CEBEA51@shipwright.com> and, for added crunchy goodness, Performed by a pair of gullible Nigerian 419 scammers. Hat tip to by way of libertarian-nation(?) Cheers, RAH From cypherpunks at jfet.org Fri Jun 5 06:08:45 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jun 2009 10:08:45 -0300 Subject: Acai diet will lead to incredible weight loss. Message-ID: <000d01c9e5de$c2046c60$6400a8c0@relearntgy94> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Get inside To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 483 Jacquelyn Davidson 24441 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3800 bytes Desc: not available URL: From eugen at leitl.org Fri Jun 5 02:27:52 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 5 Jun 2009 11:27:52 +0200 Subject: Anomos: Censorship-Resistant anonymous (?) BitTorrent Message-ID: <20090605092752.GN23524@leitl.org> http://anomos.info/wp/2009/06/04/presenting-anomos/ FAQ Posted on June 4, 2009 in Uncategorized by Rich What is Anomos? Anomos is a decentralized peer-to-peer file sharing system derived from BitTorrent which is capable of protecting its userbs identities by means of an advanced, planned mix network. Its purpose is twofold. In one way it is simply an intellectual exercise; we are computer scientists interested in encryption, the limits of anonymity, and the design of networks. In another sense it is a profound demonstration of individual liberty, a demand for freedom, privacy and anonymity on the Internet. General Features * File transfers through Anomos are anonymous. After being sent, packets are routed through a number of intermediary nodes before reaching their final destination. These intermediary nodes can only confirm that their neighbors are participating in the network, they cannot confirm that their neighbors are sharing or merely relaying information, nor can they determine what is being shared. * Downloading with Anomos is decentralized b the downloader receives parts of the requested file from a number of different sources, similar to how BitTorrent functions. * Connections within Anomos are End-To-End encrypted. * Communication with the Tracker is also encrypted. A more comprehensive technical overview is available here: http://anomos.info/wp/2008/06/02/what-is-anomos/ Is Anomos BitTorrent over Tor? No. Tor is designed to protect against traffic-analysis attacks against anonymity by routing traffic through its fixed network. It is used primarily for web-surfing, although it can be used for other services, such as BitTorrent. However, this is damaging to the Tor network, which has a limited capacity, and the network operators often take deliberate steps to prevent BitTorrent traffic on their network. Anomos is different. It is easier to think of Anomos as a variation of BitTorrent rather than a variation of Tor, although it does use the same principle of onion routing to establish links between peers. Unlike Tor, there is no single Anomos network, just as there is no single BitTorrent network. All the peers who connect to an Anomos tracker are used to relay traffic, not just a small collection of permanent relayers. All of the peers must connect to a single tracker, which maintains a model of the network and assigns pathways to download requested files. How does Anomos compare to other anonymous peer-to-peer systems like GNUNet, Turtle, Six/Four and OneSwarm? Those networks are all bFriend-to-friendb networks, rather than true peer-to-peer networks. This means that they take a very long time to make lots of connections to peers with the files, as the requests and connections have to propagate throughout the entire network, and this can make it very difficult to find files. It also requires that you have a number of other peers which you trust and can initially connect to. Anomos is different, because it is a true peer-to-peer system. The advantage comes from the central tracker, which gives out multiple direct anonymous pathways to the file to be downloaded upon connection, without having to wait for the network to grow around it. User Answered Questions These questions and answers were kindly provided by people outside of the official Anomos staff. Why yet another BitTorrent system? BitTorrent as it is implemented today does not provide anonymity by design. Anomos includes anonymity in its design. Why do I need anonymity? So far in pre-internet stone age, all means of information collection have been anonymous: * If you bought a book in a bookshop, you did not have to leave your name and address, not even if you may have been interested in the most controversial material. * When you read an article in a newspaper, nobody but you knew what and when you read it. * When you listened to radio, only you knew when, where and how long you listened to their program. * When you watched TV, you personally were looking that show and only you and maybe your family knew . What is different in internet times? * The bookshop knows what youbre reading. * The radio station knows you start to listen to John Doebs program from usually 6:00pm until 7:30pm and from 6am to 7am. * The TV Station knows your interests better than you, and tries to sell you things accordingly. * The newspaper knows the articles you read and how long they pulled your attention. * Google knows you read that article and began investigation more about your findings. * Your ISP knows everything. * Your government knows what websites you visit, reads your email and listens to your phonecalls. We donbt like this and neither should you. Is Anomos compatible with BitTorrent? No. Unfortunately, Anomos cannot magically make your BitTorrent downloads anonymous. However, if you are familiar with BitTorrent, there should be no difference to make Anomos work for you. The Anomos client does aim to provide preliminary support for legacy BitTorrent files. What about being anonymous from your ISP? As all traffic is end-to-end encrypted, so neither your ISP, nor any intermediary nodes should be able to identify your traffic. When will a stable/final Version of Anomos be released? Anomos is an ongoing project. We hope there will never be a bfinalb version of Anomos. We are drawing rapidly nearer to releasing a public version, though, hopefully by early May 2009 at the latest. If youbre interested in trying it our early, pull sources from the git if youbre a linux user, or if youbre a windows user, join the #anomos channel on irc.freenode.org and ask. From cypherpunks at jfet.org Fri Jun 5 10:56:12 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jun 2009 12:56:12 -0500 Subject: happiness can be attained through weight loss, try for free Message-ID: <000d01c9e606$ea13acc0$6400a8c0@pavementse7> Packed with Antioxidants . Acai Berry. Acai Berry is your Key to a great Sleep. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Amie Pina -------------------------------------- Hit the button now http://www.plasticizmo.com/?xfeagkaqjurti From wts at wts-sollenau.at Fri Jun 5 15:06:40 2009 From: wts at wts-sollenau.at (Harrison Hines) Date: Fri, 05 Jun 2009 15:06:40 -0500; Subject: quality watches for low price; Message-ID: Biggest choice of watches http://marohibof.cn From cypherpunks at jfet.org Fri Jun 5 01:24:24 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jun 2009 15:24:24 +0700 Subject: All natural Weight Loss Solution , Try Acai Berry. Message-ID: <000d01c9e5b7$08fd6590$6400a8c0@bundles30> Summer is coming people! It's time to tighten up our bodies and clean our systems! The fastest, easiest, and healthiest way to attain healthier and more energetic body is to cleanse yourself of all toxins and waste that is built-up inside you. Acai Power Slim uses a proprietary blend of 8 powerful herbs that will help to clear your body of that excess build-up in your digestive tract that is weighing you down. Cleansing your body assists in reducing bloating and gas in the abdominal region for a flatter and firmer stomach. We're so convinced you will love our product! Here are just a few of the thousands of happy testimonials we receive every day: " I started on these two weeks ago, and I've already seen changes. I'm down fifteen pounds. This is the first product I've found that actually works!" Rachel L., USA, MA "Hello, I have just received my acai berry last week and I've noticed a big diference today in my stomach area, my pouch is looking different and also feeling a little flat, I'm loving the product so far, and I am also keeping a diary." Wendy N., France "I just started taking mine, and I already feel better. I have so much more energy, and I love it. This is really going to work." Garry H.,Thailand Discover the magical powers of the Acai Slim! We are letting you try it for FREE, you just pay the shipping costs! Acai Slim, get the body you always wanted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2002 bytes Desc: not available URL: From cypherpunks at jfet.org Fri Jun 5 07:24:59 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jun 2009 15:24:59 +0100 Subject: The worlds most effective weight loss system Acai Berry. Message-ID: <000d01c9e5e1$062a7d60$6400a8c0@hampshire0> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Press button now To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 746 Hugo Gregory 50027 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3792 bytes Desc: not available URL: From m.robbynoj at kesslercpa.com Fri Jun 5 18:12:49 2009 From: m.robbynoj at kesslercpa.com (Madeline Robbyn) Date: Fri, 05 Jun 2009 18:12:49 -0700 Subject: Acai Berry Burn(WeightL0SS & Anti-Aging) All Natural Cleanse. Try Acai Berry Burn For Free! tdu z54 In-Reply-To: Message-ID: <1244250769.6838@kesslercpa.com> LOSE WIEGHT & ANTI-AGING WITH THIS ACAI NATURAL PILLS Dr. Perricone's Superfoods endorsed by Oprah Winfrey on TV No. 1: Açaí Nature's Energy Fruit It may seem odd to start this list of superfoods with one you’ve likely never even heard of. But studies have shown that this little berry is one of the most nutritious and powerful foods in the world! Açaí (ah-sigh-ee) is the high-energy berry of a special Amazon palm tree. http://srj.renudeyov.cn Harvested in the rainforests of Brazil, açaí tastes like a vibrant blend of berries and chocolate. Hidden within its royal purple pigment is the magic that makes it nature's perfect energy fruit. Açaí is packed full of antioxidants, amino acids and essential fatty acids. Although açaí may not be available in your local supermarket, you can find it in several health food and gourmet stores (often in juice form). A new product featuring the unsweetened pulp is now also available, and I highly recommend that you choose this form of açaí. Açaí pulp contains: * A remarkable concentration of antioxidants that help combat premature aging, with 10 times more antioxidants than red grapes and 10 to 30 times the anthocyanins of red wine. * A synergy of monounsaturated (healthy) fats, dietary fiber and phytosterols to help promote cardiovascular and digestive health. * An almost perfect essential amino acid complex in conjunction with valuable trace minerals, vital to proper muscle contraction and regeneration. The fatty acid content in açaí resembles that of olive oil, and is rich in monounsaturated oleic acid. Oleic acid is important for a number of reasons. It helps omega-3 fish oils penetrate the cell membrane; together they help make cell membranes more supple. By keeping the cell membrane supple, all hormones, neurotransmitter and insulin receptors function more efficiently. This is particularly important because high insulin levels create an inflammatory state, and we know, inflammation causes aging. WHERE SHOULD WE SEND YOUR FREE BOTTLE?? PLEASE LET US KNOW... http://sgk.renudeyov.cn From cypherpunks at jfet.org Fri Jun 5 11:44:44 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jun 2009 19:44:44 +0100 Subject: Acai Berry supplement has helped me lose 30 pounds Message-ID: <000d01c9e605$4fb55a80$6400a8c0@vocabularycv> Claim your risk free trial of Acai Berry now Eat whatever you want and still lose weight. -------------------------------------- Acai Power Slim -- The newest and most exciting fat loss product available - As seen on Oprah! Real testimonials: "I was originally amazed that the first two pills I took of Acai Power Slim, almost immediately took my cravings away. Now 4 weeks later, 3 belt holes later, I have become an advocate for this awesomely powerful, natural supplement!" "I tried Acai Power Slim after visiting your website, and I lost a few pounds without doing anything else. I was so amazed I decided to start exercising and getting outside more and I even starting eating better. Now I don't even look like the same man. Friends I haven't seen for more than a year don't even recognize me. The change is that dramatic! Thank you . Acai Power Slim really works!" Read more testimonals here! Fidel Grayson -------------------------------------- Click in a tick http://www.plasticizmo.com/?ouhpggxdnx From cwright at nymcu.org Fri Jun 5 21:58:27 2009 From: cwright at nymcu.org (Winfred Suarez) Date: Fri, 05 Jun 2009 21:58:27 -0500; Subject: quality watches for small cost; Message-ID: Biggest choice of watches http://cawumojud.cn From specialtiesj95 at oceanmarinesac.com Fri Jun 5 14:19:46 2009 From: specialtiesj95 at oceanmarinesac.com (Orpah Choise Nellie) Date: Fri, 5 Jun 2009 22:19:46 +0100 Subject: Boost your health with Acai Berry. Message-ID: <000d01c9e61a$f8301a50$6400a8c0@specialtiesj95> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Click immediately To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 684 Nellie Ziegler 73407 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3771 bytes Desc: not available URL: From trisha_oc at hotmail.com Sat Jun 6 04:24:56 2009 From: trisha_oc at hotmail.com (Lessie Wood) Date: Sat, 06 Jun 2009 04:24:56 -0500; Subject: breitling is what you need; Message-ID: <3disF3AmBEdKoLXHGa0CVOwm> Biggest choice of watches http://xezaxepoy.cn From lwmdch at finaledgedev.com Sat Jun 6 11:40:48 2009 From: lwmdch at finaledgedev.com (Kenneth Mcgill) Date: Sat, 06 Jun 2009 11:40:48 -0500; Subject: rolex is what you need; Message-ID: Biggest choice of watches http://qutowidoz.cn From security at paypal.com Sat Jun 6 05:27:57 2009 From: security at paypal.com (security at paypal.com) Date: Sat, 6 Jun 2009 13:27:57 +0100 Subject: PayPal Security Message-ID: <734985051.19905896365756@bpdbank.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1333 bytes Desc: not available URL: From skleiweg at fwg.nl Sat Jun 6 20:09:40 2009 From: skleiweg at fwg.nl (Waldo Armstrong) Date: Sat, 06 Jun 2009 20:09:40 -0500; Subject: ready for your cartier?; Message-ID: Biggest choice of watches http://sedoduhur.cn From ashley.myers at telera.com Sun Jun 7 03:57:28 2009 From: ashley.myers at telera.com (Kristin Christiansen) Date: Sun, 07 Jun 2009 03:57:28 -0500; Subject: ready for your breitling?; Message-ID: Good price for such watches http://gaduzedil.cn From cypherpunks at jfet.org Sat Jun 6 17:15:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 7 Jun 2009 05:45:03 +0530 Subject: Acai Berry , lose unwanted weight fast. Message-ID: <000d01c9e705$01340950$6400a8c0@autopilotsb82> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Click here for details To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 934 Leonard, PA 70037 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3732 bytes Desc: not available URL: From cypherpunks at jfet.org Sun Jun 7 02:33:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 7 Jun 2009 10:33:03 +0100 Subject: Oprah Weight Loss Solution , Try Acai Berry. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3979 bytes Desc: not available URL: From ray.clearlake at celanese.com Sun Jun 7 12:06:20 2009 From: ray.clearlake at celanese.com (Neil Petty) Date: Sun, 07 Jun 2009 12:06:20 -0500; Subject: rolex is what you need; Message-ID: Biggest choice of watches http://zebatocaf.cn From cypherpunks at jfet.org Sun Jun 7 06:39:01 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 7 Jun 2009 14:39:01 +0100 Subject: Anitrim with Acai Berries diet will change your life , get your free sample now. Message-ID: <000d01c9e76c$ef58fac0$6400a8c0@passwordsv> Click here to view as a web page. Anitrim with Acai Berries, lose wieght fast , everyone will notice. Click Here Unsubscribe |  Change e-mail address |  Privacy Policy |  About UsCopyright � 2009 yrody Inc. All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2098 bytes Desc: not available URL: From cypherpunks at jfet.org Sun Jun 7 15:48:32 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 7 Jun 2009 14:48:32 -0800 Subject: Acai Berry has saved lives , let it help yours get your trial Now. Message-ID: <256051813.38977611842592@matrixneworld.com> This berry is the fountain of youth. Just a small click http://www.magnifezer.net/?khiaqvofxj best regards Gail Parker From musketsrlh227 at ripagans.com Sun Jun 7 12:33:00 2009 From: musketsrlh227 at ripagans.com (Michael Magic For You) Date: Sun, 7 Jun 2009 21:33:00 +0200 Subject: Acai Slim, lose weight without impossible diets. Message-ID: Overcome your obstacles with the help of Acai Berry. Break into this site http://www.venomkaler.net/?mqxedxqrq best regards Junior Michael From roy.clough at rolls-royce.com Sun Jun 7 22:12:31 2009 From: roy.clough at rolls-royce.com (Felix Rucker) Date: Sun, 07 Jun 2009 22:12:31 -0500; Subject: cartier is what you need; Message-ID: Good price for such watches http://aixfpllo.cn From eugeniaaubrey_wa at seagate.com Mon Jun 8 01:04:46 2009 From: eugeniaaubrey_wa at seagate.com (Eugenia Aubrey) Date: Mon, 08 Jun 2009 01:04:46 -0700 Subject: Acai Berry Burn(WeightL0SS & Anti-Aging) All Natural Cleanse. Try Acai Berry Burn For Free! kkha c31 In-Reply-To: <2fc501c9e2a3$ff16c960$20d8c409@trfzj73> Message-ID: <1244448286.4766@seagate.com> LOSE WIEGHT & ANTI-AGING WITH THIS ACAI NATURAL PILLS Dr. Perricone's Superfoods endorsed by Oprah Winfrey on TV No. 1: Açaí Nature's Energy Fruit It may seem odd to start this list of superfoods with one you’ve likely never even heard of. But studies have shown that this little berry is one of the most nutritious and powerful foods in the world! Açaí (ah-sigh-ee) is the high-energy berry of a special Amazon palm tree. http://sijz.qucubugug.cn Harvested in the rainforests of Brazil, açaí tastes like a vibrant blend of berries and chocolate. Hidden within its royal purple pigment is the magic that makes it nature's perfect energy fruit. Açaí is packed full of antioxidants, amino acids and essential fatty acids. Although açaí may not be available in your local supermarket, you can find it in several health food and gourmet stores (often in juice form). A new product featuring the unsweetened pulp is now also available, and I highly recommend that you choose this form of açaí. Açaí pulp contains: * A remarkable concentration of antioxidants that help combat premature aging, with 10 times more antioxidants than red grapes and 10 to 30 times the anthocyanins of red wine. * A synergy of monounsaturated (healthy) fats, dietary fiber and phytosterols to help promote cardiovascular and digestive health. * An almost perfect essential amino acid complex in conjunction with valuable trace minerals, vital to proper muscle contraction and regeneration. The fatty acid content in açaí resembles that of olive oil, and is rich in monounsaturated oleic acid. Oleic acid is important for a number of reasons. It helps omega-3 fish oils penetrate the cell membrane; together they help make cell membranes more supple. By keeping the cell membrane supple, all hormones, neurotransmitter and insulin receptors function more efficiently. This is particularly important because high insulin levels create an inflammatory state, and we know, inflammation causes aging. WHERE SHOULD WE SEND YOUR FREE BOTTLE?? PLEASE LET US KNOW... http://ssy.qucubugug.cn From sebrinalashundamx at kfda.com Mon Jun 8 01:05:24 2009 From: sebrinalashundamx at kfda.com (Sebrina Lashunda) Date: Mon, 08 Jun 2009 01:05:24 -0700 Subject: Acai Berry Burn(WeightL0SS & Anti-Aging) All Natural Cleanse. Try Acai Berry Burn For Free! jbjvzi 22o In-Reply-To: Message-ID: <1244448324.4768@kfda.com> LOSE WIEGHT & ANTI-AGING WITH THIS ACAI NATURAL PILLS Dr. Perricone's Superfoods endorsed by Oprah Winfrey on TV No. 1: Açaí Nature's Energy Fruit It may seem odd to start this list of superfoods with one you’ve likely never even heard of. But studies have shown that this little berry is one of the most nutritious and powerful foods in the world! Açaí (ah-sigh-ee) is the high-energy berry of a special Amazon palm tree. http://ssgn.qucubugug.cn Harvested in the rainforests of Brazil, açaí tastes like a vibrant blend of berries and chocolate. Hidden within its royal purple pigment is the magic that makes it nature's perfect energy fruit. Açaí is packed full of antioxidants, amino acids and essential fatty acids. Although açaí may not be available in your local supermarket, you can find it in several health food and gourmet stores (often in juice form). A new product featuring the unsweetened pulp is now also available, and I highly recommend that you choose this form of açaí. Açaí pulp contains: * A remarkable concentration of antioxidants that help combat premature aging, with 10 times more antioxidants than red grapes and 10 to 30 times the anthocyanins of red wine. * A synergy of monounsaturated (healthy) fats, dietary fiber and phytosterols to help promote cardiovascular and digestive health. * An almost perfect essential amino acid complex in conjunction with valuable trace minerals, vital to proper muscle contraction and regeneration. The fatty acid content in açaí resembles that of olive oil, and is rich in monounsaturated oleic acid. Oleic acid is important for a number of reasons. It helps omega-3 fish oils penetrate the cell membrane; together they help make cell membranes more supple. By keeping the cell membrane supple, all hormones, neurotransmitter and insulin receptors function more efficiently. This is particularly important because high insulin levels create an inflammatory state, and we know, inflammation causes aging. WHERE SHOULD WE SEND YOUR FREE BOTTLE?? PLEASE LET US KNOW... http://sorm.qucubugug.cn From fred.j.chryssikos at exxonmobil.com Mon Jun 8 06:19:22 2009 From: fred.j.chryssikos at exxonmobil.com (Louisa Vazquez) Date: Mon, 08 Jun 2009 06:19:22 -0500; Subject: bargain IWC watches; Message-ID: Amazing watches and such huge choice http://aisunvgo.cn From eugen at leitl.org Sun Jun 7 23:58:52 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 8 Jun 2009 08:58:52 +0200 Subject: UK 'must log' phone and web use Message-ID: <20090608065852.GL23524@leitl.org> (Incidentally, Piratepartiet hit 7.1% in Sweden (19% of 18-30 year old voters) and 0.9% in Germany in last Sunday's EU vote -- ARRRRR me hearties!) http://newsvote.bbc.co.uk/mpapps/pagetools/print/news.bbc.co.uk/1/hi/uk/8087530.stm?ad=1 UK 'must log' phone and web use All internet and phone traffic should be recorded to help the fight against terrorism, according to one of the UK's former spy chiefs. Civil rights campaigners have criticised ministers' plans to log details of such contact as "Orwellian". But Sir David Pepper, who ran the GCHQ listening centre for five years, told the BBC lives would be at risk if the state could not track communication. Agencies faced "enormous pressure" to keep up with technology, he said. "It's a constant arms race, if you like. As more technology, different technology becomes available, the balance will shift constantly." The work of GCHQ, which provides intelligence on foreign and domestic threats, is so secretive that until the 1980s the government refused to discuss its existence. b The thing you worry about most is the attack that you haven't seen coming b Sir David Pepper In his first interview since departing as its director in 2008, Sir David told BBC2 programme Who's Watching You that the agency had "very sophisticated targets". "There are plenty of people who will do all they can to make themselves difficult to find. "It puts enormous pressure on you. Everybody in the agency is acutely aware that if they don't do their job properly one of the consequences may be another terrorist outrage. "The thing you worry about most is the attack that you haven't seen coming." Last year, then Home Secretary Jacqui Smith announced plans for a database to record details of the times and dates of messages and phone calls but said the content of conversations would not be kept. She said such data was used as "important evidence in 95% of serious crime cases" and in almost all security service operations. 'Pervasive' Details of the times, dates, duration and locations of mobile phone calls, numbers called, website visited and addresses e-mailed are already stored by telecoms companies for 12 months under a voluntary agreement. However, the Liberal Democrats said the government's plans were "incompatible with a free country and a free people". In February, the Lords constitution committee said electronic surveillance and collection of personal data had become "pervasive" in British society. Its members said the situation threatened to undermine democracy. However, Sir David said he was speaking out to help people understand that agencies were there to protect them. Who's Watching You? will be broadcast Monday 8 June at 9pm on BBC Two and will also be available on BBC From cypherpunks at gurski.org Mon Jun 8 07:54:37 2009 From: cypherpunks at gurski.org (cypherpunks) Date: Mon, 08 Jun 2009 09:34:37 -0480 Subject: USA Pharmacy Discount ID799855141 Message-ID: <09a301c9e85f$650b8240$5496723a@Steve> [nl_hdr_mens-health.gif] 8.6.2009 In This Issue: __________________________________________________________________ [save_thousands_on_your_heal.jpg]-[save_thousands_on_your_heal.jpg] Cancer Numbers for the Male Population A new report says that thousands of cancer deaths have been avoided and the death rate for men has dropped as well. Also See: o The Debate Over Prostate Screening o Top 10 Threats to Men's Health o How Much Sadness Is Normal? Health News & Features [z.gif]-[z.gif] Members Are Talking From Our Sponsors Are You Spending Too Much Time in the Bathroom? Do you find yourself in the bathroom every few hours, but you can't seem to empty your bladder all the way? Are you annoyed by sudden urges to go at awkward times? If you have experienced these symptoms, you may have a condition known as enlarged prostate or BPH. Get the information and tools you need to talk to your doctor about treatment options that may help you get out of the bathroom. Visit the Enlarged Prostate (BPH) Relief Center Relapsing MS: Proven Therapy If you're newly diagnosed or considering changing treatments, you should know about an effective therapy. It's been proven effective in three key measures. Learn more about this therapy. Looking for a treatment for moderate to severe plaque psoriasis? Discover a treatment that has proven results. Find out more. Newsletter Management Don't miss an issue of this newsletter. Add WebMD to your email's safe sender list -- get instructions here. You are subscribed as cypherpunks at jfet.org. View and manage your WebMD newsletter preferences. Subscribe to more newsletters. Change/update your email address. To unsubscribe from this Men's Health newsletter, send a blank email to men_unsub at health.webmd.com. To unsubscribe from ALL WebMD newsletters, send a blank email to unsub at health.webmd.com. WebMD Privacy Policy WebMD Office of Privacy 1175 Peachtree Street, Suite 2400, Atlanta, GA 30361 ) 2009 WebMD, LLC. All rights reserved. Forward To A Friend-[nl_btn_forward.gif] advertisement [site=2&affiliate=20&app=3&pos=130&nls=2020&transactionID=20090602YmVja 2hhbXM5NEBhb2wuY29t]-[site=2&affiliate=20&app=3&pos=130&nls=2020&transa ctionID=20090602YmVja2hhbXM5NEBhb2wuY29t] advertisement WebMD Shortcuts Men's Health Center Member Support Group Ask the Expert News Center Boards & Blogs Home Page [flosensing?y=7re0M7ZJ30GA0CE] From eugen at leitl.org Mon Jun 8 04:29:41 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 8 Jun 2009 13:29:41 +0200 Subject: Police 'arrest innocent youths for their DNA', officer claims Message-ID: <20090608112941.GV23524@leitl.org> (zero surprise here) http://www.telegraph.co.uk/news/newstopics/politics/lawandorder/5444332/Police-arrest-innocent-youths-for-their-DNA-officer-claims.html Police 'arrest innocent youths for their DNA', officer claims Hundreds of teenagers are having their DNA taken by police in case they commit crimes later in life, an officer has disclosed. By Murray Wardrop Published: 3:01PM BST 04 Jun 2009 Officers are targeting children as young as 10 with the aim of placing their DNA profiles on the national database to improve their chances of solving crimes, it is claimed. The alleged practice is also described as part of a "long-term crime prevention strategy" to dissuade youths from committing offences in the future. The claim comes amid widespread criticism of government proposals to store DNA profiles of innocent people, including some children, on the database for up to 12 years. Civil liberty campaigners have condemned the tactic of as "diabolical" and said it showed contempt for children's freedom. A Metropolitan Police officer made the claims after figures were released showing that 386 under-18s had their DNA taken and stored by police last year in Camden, north London. The officer said: "Have we got targets for young people who have not been arrested yet? The answer is yes. But we are not just waiting outside schools to pick them up, we are acting on intelligence. "It is part of a long-term crime prevention strategy. If you know you have had your DNA taken and it is on a database then you will think twice about committing burglary for a living. "We are often told that we have just one chance to get that DNA sample and if we miss it then that might mean a rape or a murder goes unsolved in the future." Last month the Home Office drew up plans to amend the DNA database after the European Court of Human Rights ruled that a blanket policy of retaining profiles of innocent people indefinitely was illegal. However, adults and children arrested, but not convicted, of terrorism or serious sexual or violent offences will still have their profiles held for 12 years before they are deleted. Children not convicted of any other offence will have profiles erased after six years or when they reach 18, whichever is sooner. The Home Office announced last year that the DNA of children under 10 will not be retained. Shami Chakrabarti, director of the human rights group Liberty, said: "This is diabolical and proof positive that Liberty's fears are being realised. "The current law has created an incentive for the abuse of police power so that youngsters are being targeted purely for the purpose of stockpiling their DNA for the future. "We hope that dealing with this outrage will be high on the list of priorities for any new Home Secretary. "Politicians can no longer demand due process for themselves whilst showing such contempt for the freedoms of others." Figures obtained via a Freedom of Information request show that a further 139 youths arrested in the Camden area have had their DNA profiles added to the database this year. Lib Dem parliamentary candidate for Holborn and St Pancras, Jo Shaw, who applied for the data, said: "The Met and the Home Office have some serious explaining to do if this is the case. "Innocent children should not have their DNA profiles kept for years." There are an estimated 5.3 million profiles on the DNA database b accounting for about one in 10 people b making it the largest of its kind in the world. However 850,000 are of people who were never convicted of any crime. From alex at us.hsbc.com Mon Jun 8 14:08:45 2009 From: alex at us.hsbc.com (Merrill Castle) Date: Mon, 08 Jun 2009 14:08:45 -0500; Subject: bargain porsche design watches; Message-ID: Amazing watches and such huge choice http://aiymwyao.cn From cypherpunks at jfet.org Mon Jun 8 11:13:53 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 18:13:53 +0000 Subject: #1 Super food , Acai Berry. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5326 bytes Desc: not available URL: From belii-nochi at vavxl.ru.jfet.org Mon Jun 8 02:55:41 2009 From: belii-nochi at vavxl.ru.jfet.org (=?koi8-r?B?IuLFzNnFIM7P3ski?=) Date: Mon, 8 Jun 2009 18:55:41 +0900 Subject: =?koi8-r?B?79TE2cgg1yDHz9LPxMUgzsEg7sXXxQ==?= Message-ID: <123234757.43440879952865@svi.ru> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4132 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 8 06:35:17 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 19:05:17 +0530 Subject: Slow down your aging process , Try Acai Berry. Message-ID: <000d01c9e83d$f64fbe00$6400a8c0@junipercjm1> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Click here for details To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 639 Toni, PA 75864 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3754 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 8 19:32:11 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 20:32:11 -0600 Subject: Beneficial Berry , Acai works to help you lose wieght fast. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5257 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 8 17:05:12 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 21:05:12 -0300 Subject: fantastic scientific break through will leave you feeling great Message-ID: <000d01c9e895$f5993740$6400a8c0@craper> View online version here: here June 8, 2009 Sign up Forward Archive Advertise Doesn't Keep You Up At Night...Stimulant Free We need you to click  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5258 bytes Desc: not available URL: From ngbells at yahoo.com Mon Jun 8 22:10:32 2009 From: ngbells at yahoo.com (Lenard Ledbetter) Date: Mon, 08 Jun 2009 22:10:32 -0500; Subject: rolex will look best on your arm; Message-ID: Amazing watches and such huge choice http://airlifio.cn From cypherpunks at jfet.org Mon Jun 8 15:03:13 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 23:03:13 +0100 Subject: Enjoy your new body , Get Acai Now. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5272 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 8 20:45:06 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 8 Jun 2009 23:45:06 -0400 Subject: Claim your risk free trial of Acai Berry now Message-ID: <000d01c9e8b4$ad898d00$6400a8c0@patchyyl47>   Subscription Update Home • Visit our site Daily Update from Your Subscriptions!Date: June 8, 2009 Username: cypherpunks at jfet.org Latest Updates This email was sent to cypherpunks at jfet.org, the current email address on your Account, input when you created your account or edited your Account Info. It is a recurring email, although we'll send it only on days when there are new updates from your subscriptions.If you'd like to edit the email address on your account, please visit your Account Info.To unsubscribe or edit your subscription settings, please visit your Email Update Options.If you have additional questions about this email or your Account, please email us or send a letter to:Getamqas Inc., Attn: Subscription Services, P.O. Box 258 Jpeferu Ejen, New York, NY 12306 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3987 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 8 21:55:38 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 01:55:38 -0300 Subject: Get The Edge Over Everyone Else click Here for your Weight loss Trial Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3979 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 00:19:44 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 02:19:44 -0500 Subject: Release excess waste with Acai Berry Message-ID: <000d01c9e8ca$47e38260$6400a8c0@suitcasegsk54>   Subscription Update Home • Visit our site Daily Update from Your Subscriptions!Date: June 8, 2009 Username: cypherpunks at jfet.org Latest Updates This email was sent to cypherpunks at jfet.org, the current email address on your Account, input when you created your account or edited your Account Info. It is a recurring email, although we'll send it only on days when there are new updates from your subscriptions.If you'd like to edit the email address on your account, please visit your Account Info.To unsubscribe or edit your subscription settings, please visit your Email Update Options.If you have additional questions about this email or your Account, please email us or send a letter to:Getamqas Inc., Attn: Subscription Services, P.O. Box 061 Jvvdzjt Ejen, New York, NY 55222 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3985 bytes Desc: not available URL: From ortega at relofla.com Tue Jun 9 06:46:09 2009 From: ortega at relofla.com (Sharon Hensley) Date: Tue, 09 Jun 2009 06:46:09 -0500; Subject: rolex is what you need; Message-ID: Amazing watches and such huge choice http://aieprteo.cn From rah at shipwright.com Tue Jun 9 05:23:22 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 9 Jun 2009 08:23:22 -0400 Subject: Bullion and Bandits: The Improbable Rise and Fall of E-Gold In-Reply-To: <20090609081135.GM23524@leitl.org> References: <20090609081135.GM23524@leitl.org> Message-ID: <74280D21-C7C0-4CC4-9031-FDA40F08B249@shipwright.com> On Jun 9, 2009, at 4:11 AM, Eugen Leitl wrote: > In a sparsely decorated office suite two floors above a > neighborhood of strip malls and car dealerships, former oncologist > Douglas > Jackson is struggling to resuscitate a dying dream. I read this and I'm reminded of Stephenson's old puritan Drake Waterhouse, still proudly fighting on with his ears cut off by the Star Chamber, finally blown into the sky by the King's henchmen under cover of the Great Fire... Cheers, RAH From eugen at leitl.org Tue Jun 9 01:11:36 2009 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 9 Jun 2009 10:11:36 +0200 Subject: Bullion and Bandits: The Improbable Rise and Fall of E-Gold Message-ID: <20090609081135.GM23524@leitl.org> http://www.wired.com/threatlevel/2009/06/e-gold/ * By Kim Zetter * June 9, 2009 | * 12:00 am | * Categories: Crime, The Courts MELBOURNE, Florida b In a sparsely decorated office suite two floors above a neighborhood of strip malls and car dealerships, former oncologist Douglas Jackson is struggling to resuscitate a dying dream. Jackson, 51, is the maverick founder of E-Gold, the first-of-its-kind digital currency that was once used by millions of people in more than a hundred countries. Today the currency is barely alive. Stacks of cardboard evidence boxes in the office, marked bU.S. Secret Service,b help explain why, as does the pager-sized black box strapped to Jacksonbs ankle: a tracking device that tells his probation officer whenever he leaves or enters his home. bItbs supposed to be jail,b he says. bOnly itbs self-administered.b Jackson, whose six-month house arrest ends this month, recently met with Wired.com for his first in-depth interview since pleading guilty last year to money laundering-related crimes, and to operating an unlicensed money transmitting service. His tale is one of countless upstarts and entrepreneurs who approached the internet with big dreams, only to be chastened by sobering realities. But his rise and fall also offers a unique glimpse at the webbs frontier halcyon days, and the wilderness landscape that still covers much of the unregulated and un-policed web, where fraud artists prospect for riches alongside pioneers, and sometimes stake, and win, a claim on their territory. Despite the shackle, Jacksonbs conviction isnbt black and white. In a twist still unacknowledged by prosecutors, Jackson turned E-Gold for a time into one of law enforcementbs most productive honey pots, providing information that helped lead to the arrest and conviction of some of the webbs most wanted credit card thieves and hackers. Hebs now working with regulatory agencies to try to bring back E-Gold, steps he says he would have taken voluntarily years ago if authorities had given him a chance. Following his story, the picture that emerges of Jackson is not a portrait of a calculating criminal. Rather it is one of a naive visionary who thought his dream was bigger than any financial regulations, who got in over his head, and who finally struggled, too late, to make up for his missteps. bThere was no indication at all that anyone had a problem with what he was doing,b says Richard Timberlake, a former economics professor at the University of Georgia and author of several books on U.S. banking. Timberlake visited Jackson at his E-Gold office in 1997 and vouches for Jacksonbs innocent intentions. bHe was always very honest and very forthright in what he was trying to do as a business. Even the Federal Reserve believed it was legitimate.b b The story of the first digital currency backed entirely by gold and silver began in 1995, while Jackson was still treating cancer patients. A longtime student of economic history, Jackson was convinced that gold was a superior currency to paper money, despite the consensus among professional economists that a gold-standard prevented governments from responding quickly to monetary crises; when an economy faltered, treasuries couldnbt easily manufacture gold bars to stimulate it. The United States dropped its reliance on gold in 1971, but Jackson doubted the wisdom of this move. bMany a paper currency has spun out of orbit in a calamitous trajectory,b he once wrote. bThere has never been an instance of gold or silver being discarded as worthless.b It was time, Jackson mused, for a radical rethink of money. Had he been born in another era, he could scarcely have acted on his beliefs. But the nascent internet changed everything. The international, 24-hour churn of e-commerce cried out for a monetary system that transcended borders and time zones. So in early 1996, Jackson began programming a back-end system for a new electronic currency, practicing medicine by day, and coding by night. He hired a software engineer to create the user interface, and four months later launched E-Gold. As Jackson envisioned it, E-Gold was a private, international currency that would circulate independent of government controls, and stand impervious to the marketbs highs and lows. Brimming with evangelical enthusiasm, Jackson proclaimed it a cure for the modern monetary systembs ills and described it at one point as ban epochal change in human destinyb and bprobably the greatest benefit to humanity thatbs ever been thought of.b Though E-Gold would fail to change the world, libertarians and privacy-conscious netizens liked the service, which allowed them to open accounts anonymously. And international sellers appreciated the ease with which they could transact across borders Over the next few years, Jackson drained his retirement accounts, sold his medical practice and charged credit cards to raise more than $1 million to nurture the fledgling venture. Cynics might have considered him just another internet hustler looking to strike it rich, but those who knew him say he was a true believer. bHe truly thinks that having a gold-backed currency is whatbs needed in the world,b says James Clement, a libertarian attorney who met Jackson in 2003. bI donbt think anyone would have stuck with it b& other than that he thinks itbs extremely important and somebody has to do this.b Jackson drew his inspiration from economist Vera Smithbs influential 1936 treatise The Rationale of Central Banking and the Free Bank Alternative, which challenged the tenets of banking. bShe wrote in the depths of the Depression, and poses some of the most compelling questions about central banking systems,b Jackson says. bCentral banks should attenuate monetary disorder and prevent fluctuations, but ironically they sometimes amplify it.b His commitment started to pay off in 2000, when some 50,000 transactions suddenly passed through his system in just two months b more than the previous three and a half years combined. By that November, E-Gold, now with 20 employees, had processed 1 million transactions, and Jacksonbs business reputation was growing. He was invited to speak at the prestigious World Gold Council conference in Rome, the gold mining industrybs leading event. In 2001, the growth continued, with customer accounts expanding from 134,000 to nearly 288,000, holding about $16 million in value. Initially, Jackson stored the companybs reserves of sovereign coins and ingots in safety deposit boxes in banks around town. When this proved inconvenient for auditing, the company bought an office safe to hold the gold and platinum. bThe silver was just stacked around the office,b Jackson says. Ultimately, he converted the sovereigns and ingots to bars and moved them to bank vaults in London and Dubai. At E-Goldbs peak, the currency would be backed by 3.8 metric tons of gold, valued at more than $85 million. Despite the sudden burst of success, the venture was plagued with setbacks. E-Goldbs servers buckled under the growing traffic load, hanging transactions and frustrating users. Copycat entrepreneurs erected their own gold-backed systems b e-Bullion, GoldMoney and OSGold b and poached E-Gold customers. When Jackson finally scaled up his infrastructure in 2003, solving the performance problems, cyber scammers entered the scene, launching a sortie of phishing attacks against users, tricking thousands of them into disclosing their E-Gold passwords, then draining the accounts. Eventually Jackson deployed an anti-phishing remedy, and business rebounded in September 2004. A year later, customer accounts numbered about 3.5 million in 165 countries, with 1,000 new accounts opening every day. Millions of dollars were zipping through E-Goldbs system 24-hours-a-day, bouncing between the U.S. and Europe, South America and Asia. E-Gold collected 1 percent of every transaction, with a cap at 50 cents. E-Gold was now second only to PayPal in the online payment industry. At last, Jackson says, he felt relief. bWe had been stuck year-in and year-out on whatever crisis-du-jour required our immediate attention,b he says. Now bwe felt like webd finally achieved a turning point.b But E-Goldbs increasing popularity with customers drew less-welcome attention as well. The federal government began to take notice in 2003, when the Secret Service launched an undercover operation against a website called Shadowcrew b a legendary forum for bcardersb who trafficked in stolen credit and debit card numbers. Cyber crooks in Eastern Europe were stealing millions of card numbers in phishing and skimming scams, then passing the data to accomplices around the world. The low-end cashers coded the numbers onto blank cards, then siphoned money from ATMs and transmitted the bulk of proceeds back to the former Soviet bloc. When authorities monitored the criminalsb communications, they discovered that E-Gold was among the cardersb preferred money-transfer methods, because the system allowed users to open accounts and transfer funds anonymously anywhere in the world. When the Shadowcrew investigation wrapped in October 2004 with the shuttering of the site b and the arrest of more than a dozen members b the Justice Department turned its sights on E-Gold. Its goal was to force the service to comply with regulations governing money-transmitting services like Western Union and Travelex. Federal regulations required those businesses to register with the Treasury Departmentbs Financial Crimes Enforcement Network (FinCEN), to be licensed in states that required it, to diligently authenticate the identity of customers and to file suspicious activity reports on shady-looking customers. But E-Gold wasnbt doing this. Jackson believed E-Gold was exempt from regulation because it was a payment system not a money transmitter. And although it did transfer money, customers could park balances in their accounts, as with a bank. But Jackson insisted E-Gold wasnbt a bank, either. It was something new b something the world and the U.S. government hadnbt seen before. He wasnbt alone in this view. Many internet-based payment services, including PayPal during its early years, believed they were exempt from regulation. They mostly flew under the radar of prosecutors until something brought them into the spotlight. Jackson says he got the first inkling of the rampant, organized crime in his system when he read a June 2005 New York Times story about the growth of the carding forums. bTo my horror b& E-Gold is mentioned in this ghastly, horrible way of it being, you know, the bitch of criminals,b he says. He concedes he knew that Ponzi schemers and other scammers sometimes used his system , but hebd always responded to government subpoenas for information about suspicious customer accounts. So he contacted the Secret Service to ask why the agency hadnbt sought his help to track the crooks in the Times story. The agency, which was already secretly targeting E-Gold, ignored him. (The Secret Service didnbt respond to interview inquiries for this story.) The hammer dropped on E-Gold around 5 p.m. on a mild day in mid-December 2005. A herd of Chevy Suburbans wheeled up to Jacksonbs house and expelled more than a dozen FBI and Secret Service agents. Simultaneously across town, the Justice Departmentbs bOperation Goldwireb unfolded with more agents raiding the offices of Gold and Silver Reserve, the company that operates E-Gold. A third group descended on a co-location facility in Orlando where E-Gold Limited, a holding company for E-Goldbs assets, racked its database servers. The feds carted away more than 100 boxes of electronic records and paper files, including birth certificates, photos and a deed to the Jackson family burial plot. The gold and silver reserves remained safe overseas, but the government froze the companybs domestic bank accounts. Jacksonbs venture was dissolving around him. Jackson wasnbt sure what the feds hoped to find in all those records; once E-Gold got its systems back online he turned to his database for answers. He scoured the system for suspicious transactions using key words like bcvv,b dumpsb and bcob,b and the names of carders hebd read in the Times. He quickly discovered the disturbing truth about what his libertarian dream had become. bI found out there was quite a bit of stuff going on which law enforcement knew about, but wasnbt asking us about,b he says. bI found, holy smokes, there is a continuing pattern of these so-called carders. Therebs, like, a ring that I can distinguish.b One user named bSegvecb received more than half a million dollars from four others, including a Ukrainian named bMaksikb who sent a rapid stream of cash totaling $300,000. In the bmemob field of the transactions b where the sender can state a reason for the payment b Maksik noted that $17,000 was bfor beer.b Another three transactions totaling $89,000 sent over a weekbs time were supposedly for Sony Vaio computers. A New York account-holder named bPotluckb had a pattern of buying $6,000 in postal money orders twice a month, then exchanging them for e-Gold to send to Ukraine. Over a year, hebd transmitted about $150,000. Jackson had uncovered a constellation of shady accounts doing business with one another. He watched in amazement as the criminal activity expanded before his eyes, and balances in several accounts ballooned, with no sign that the account holder intended to move it out. Segvec alone amassed more than $700,000 in digital gold. bThey werenbt just using us as a good vehicle to trade their data, they were parking value in our system,b Jackson says. E-Gold had unwittingly become banker to the underworld. Because users could sign up for E-Gold with aliases, there was no easy way for Jackson to determine the real identity of many of his suspects. But the criminals became vulnerable the moment they converted their virtual currency to local cash. This required them to do business with an E-Gold money exchanger b the online equivalent of currency exchangers at international airports b whobd ask for valid ID and contact information. Sometimes the criminals wanted their cash loaded to a debit card and mailed to a drop address, or wired to a traditional bank account; exchangers would have this data, too. Jackson reached out to about a dozen exchangers in Europe and elsewhere with the account names he was tracking. Some criminals had provided the exchangers with fake credentials, but a surprising number had given their real names or addresses. Jackson soon had the identities of some of the most wanted figures in the underground. One money exchanger in Northern Ireland revealed that bSegvecb routinely had packages sent to a Tokyo remailer, who forwarded them to a bStephen Ceresb in Miami. The same exchanger also sold bStephen Ceresb a Card One debit card with a daily load limit of $9,500. Jackson obtained a list of transactions on the card that linked it to a slew of ATM withdrawals in Miami suburbs. A storm of withdrawals during one five-minute period yielded the cardholder $8,000 in cash. Jackson, who had been snubbed by the Secret Service and FBI, took the information he uncovered to the U.S. Postal Inspector Service, providing investigators with names, addresses and transaction histories. The postal inspectors passed the information to overseas allies, the FBI, and eventually to the Secret Service as well. It was a devilbs bargain. Once the feds got a taste of what Jackson could provide, the postal agents began peppering him with requests for more data on other accounts, promising Jackson theybd follow up with a formal court order or subpoena later. He cooperated fully, despite the fact that it violated his user agreement with customers. bWe never did get any legal cover whatsoever,b he says ruefully. bWe never got our trap-and-trace. We never got our pen register.b In March 2006, inspectors asked him for information on a carder named bJilsi,b whom Jackson traced to a money exchanger in the United Kingdom. The exchanger gave him a real name b Renu Subramaniam b a 2-year-old confirmed phone number and the time and location of deposits Subramaniam had made to two London banks. Jackson passed the information to inspectors who told him that the phone number, if correct, would be bthe break in the case we have been waiting for, for quite a long time.b It wasnbt long before carders were being taken down. In May 2007, Markus Kellerer, aka Matrix 001, was arrested in Germany. In July 2007, Subramaniam, who had been an administrator on a carding site called DarkMarket, was arrested in Britain. That same month, authorities in Florida arrested Julio Lopez, aka Blinky, who was connected to a ring of Cuban carders. And last year in Miami, authorities arrested Albert Gonzalez, aka Segvec, allegedly one of the masterminds behind the hack of TJX and other businesses. Jackson had provided authorities with information on all of them. An FBI agent who was involved in the arrest of a number of carders, but asked not to be identified because he wasnbt authorized to speak, acknowledged that information Jackson provided was binstrumental in helping track people down.b A year after he began his probe, Jackson began blocking the accounts responsible for the suspicious activity, preventing suspected crooks from getting their loot. E-Gold was on its way to becoming clean, relatively speaking. As far as the feds were concerned, however, it was too late. A few months later, in April 2007, the Justice Department wrapped up its four-year-long investigation by indicting Jackson and his colleagues on federal charges of money laundering, conspiracy and operating an unlicensed money transmitting business. bDouglas Jackson and his associates operated a sophisticated and widespread international money remitting business, unsupervised and unregulated by any entity in the world, which allowed for anonymous transfers of value at a click of a mouse,b said U.S. Attorney Jeffrey A. Taylor for the District of Columbia in a press release. bNot surprisingly, criminals of every stripe gravitated to E-Gold as a place to move their money with impunity. As alleged in the indictment, the defendants in this case knowingly allowed them to do so and profited from their crimes.b Clement, the attorney, disputes the governmentbs depiction of Jackson. bThey automatically assume that E-Gold somehow made it easy for these people involved in money laundering, or [sought criminals] as clients,b says Clement. bBut thatbs completely the opposite of Dougbs attitude toward any kind of illegal behavior. It would be crazy for somebody to seek out that kind of business.b Jackson, whobd hocked his future to start E-Gold, now faced the potential of a federal prison term. He was frustrated and confused. bIt never crossed my mind that anyone could seriously want people like us in prison,b he says. bBut I guess my bigger fear was that we would go bankrupt, and there would be a train wreck of people that had trusted value to us who couldnbt get their money.b Timberlake, the economics professor, is convinced that Jacksonbs radical dream, his goal of upsetting the economic status quo and overturning the governmentbs monopoly on money, is what really got E-Gold targeted. bNo matter how innocent a person is you can always find a law that government agents can use to convict him of something,b Timberlake says, bAnd this is a perfect example of it. Any time anybody tries to produce money, the federal government is going to be on their tail.b After a year-and-a-half of court wrangling and negotiations, Jackson pleaded guilty last year to conspiracy to operate an unlicensed money transmitting service and conspiracy to commit money laundering. In November he was sentenced to 36 months of supervised released b including six months of house arrest and electronic monitoring, and 300 hours of community service. In addition to forfeiting about $1.2 million to the government, his two companies b Gold and Silver Reserve and E-Gold Limited b were fined $300,000, to be paid in $10,000 monthly installments beginning last month. The plea agreement is conditional on Jackson revamping his business to comply with regulations governing money-transmitting services b a goal that, Jackson concedes, faces many hurdles. To begin the process of compliance, he suspended the creation of new accounts. Existing customers are now required to submit a government-issued photo ID and proof of residence to authenticate their name, address and other details, and are limited to $1,000 to $3,000 a month in transactions until they pass muster. Customers in high-risk countries b such as Nigeria, Russia and Ukraine b are suspended from making any transactions at all for now. Their money is locked indefinitely in E-Goldbs servers. Jackson, who always considered himself one of the good guys, acknowledges today that he might have done a better job of policing his system from the start. bIn hindsight therebs any number of things that would have been a smarter or better way of approaching things,b he says. Back in his Melbourne office, the blinds are drawn against the harsh sun, and a wall calendar serves as the roombs sole decor. A belt and freshly dry-cleaned dress shirt, still swathed in plastic wrap, hang from a metal shelf. A one-pound plastic jug of protein powder on Jacksonbs desk serves as a reminder of the weight hebs lost since his legal troubles began. When asked what toll the trouble has taken on his family b Jackson and his wife are currently living in different states b therebs a long silence before he clears his throat. bItbs been a source of distress,b he says finally. bTen years ago I was an affluent physician.b Although E-Gold was occasionally profitable, Jackson only drew a salary, like his employees. The two upscale homes he once owned with his wife are long gone. Now his wife and 12-year-old son occupy half a duplex in Pennsylvania near her family, and Jackson lives in a one-bedroom apartment in Melbourne with his 17-year-old son, while the latter finishes high school, and Jackson and his staff attempt to rebuild the business. Jackson has finally registered E-Gold with FinCEN, and has begun applying to states for money transmitting licenses. The company is also blocking people who appear on the Treasury Departmentbs list of Specially Designated Nationals and plans to follow bank procedures for verifying customer income and sources of transmitted funds. There are other plans in works to clean up the system as well. Therebs a daunting hill to climb before E-Gold will be operational again, and it remains to be seen whether there will be a market for a scrubbed-down, government-compliant E-Gold. But Jackson seems relieved to be headed in this direction. bOne of the biggest results of this is that webre getting to the place we wanted to be anyway, which is to have some sort of an explicit set of standards to build against,b he says. He maintains that he would have done what authorities now want him to do, if theybd just worked with him to devise a plan, instead of treating him like a criminal. Now, after all of E-Gold ups and down, Jackson hasnbt lost his optimism for the venture, or his knack for florid prose. As he wrote on his blog last year, he looks forward to transforming E-Gold from a marginal player to a respected institution b one, he says, that will serve to badvance the material welfare of mankind.b (Photos by Chris Livingston) From cypherpunks at jfet.org Tue Jun 9 13:20:10 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 14:20:10 -0600 Subject: Lose weight without impossible diets , Try Acai Berry. Message-ID: <000d01c9e937$4e2a06e0$6400a8c0@defermentw> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI BERRY Discover the secret today! Click here for details To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 092 Opal, PA 06930 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3723 bytes Desc: not available URL: From smythpa at tcd.ie Tue Jun 9 14:47:25 2009 From: smythpa at tcd.ie (Isaiah Robinson) Date: Tue, 09 Jun 2009 14:47:25 -0500; Subject: you really need rolex on your arm; Message-ID: <4y6tngEELoDiX2MiKXnZX1N> Good price for such watches http://aisunvgo.cn From cypherpunks at jfet.org Tue Jun 9 12:07:22 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 15:07:22 -0400 Subject: Acai Berry is the cure to your common diet. Message-ID: <000d01c9e935$84c373f0$6400a8c0@dazzledtp29> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Click here for details To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 573 Kip, PA 64253 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3733 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 09:20:14 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 16:20:14 +0000 Subject: Get The Edge Over Everyone Else click Here for your Weight loss Trial Message-ID: <000d01c9e915$c99044b0$6400a8c0@threateninglyh975> View online version here: here June 8, 2009 Sign up Forward Archive Advertise Acai Slim, lose wieght fast , everyone will notice. best choice  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5317 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 15:12:53 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 17:12:53 -0500 Subject: Enhance your sexual desires and your performance with Acai diet. Message-ID: <7LW7RDR73196.LBIX759@173.52.2.136> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5265 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 13:44:59 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 17:44:59 -0300 Subject: Acai Slim, get the body you always wanted. Message-ID: <0XKC123793.RR57DL917@190.134.50.169> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5296 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 18:00:41 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 20:00:41 -0500 Subject: Acai Burns your fat away look and feel great. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5278 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 9 21:55:06 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 20:55:06 -0800 Subject: Acai Slim, lose weight without starving yourself. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5235 bytes Desc: not available URL: From marton at gehe.cz Tue Jun 9 22:00:15 2009 From: marton at gehe.cz (Tamara Foote) Date: Tue, 09 Jun 2009 22:00:15 -0500; Subject: porsche design is your style; Message-ID: Amazing watches and such huge choice http://aivlbudo.cn From cypherpunks at jfet.org Tue Jun 9 22:20:10 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 9 Jun 2009 23:20:10 -0600 Subject: If you are struggling and looking for effective ways to drop weight fast Try Acai Berry Message-ID: <000d01c9e982$be809d50$6400a8c0@slothfulness708> View online version here: here June 9, 2009 Sign up Forward Archive Advertise important discovery for all man kind, acai berry weight loss try it free Click this second  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5257 bytes Desc: not available URL: From d.shadow_prince at btinternet.com Wed Jun 10 05:09:59 2009 From: d.shadow_prince at btinternet.com (Gina Sheffield) Date: Wed, 10 Jun 2009 05:09:59 -0500; Subject: rolex is what you need; Message-ID: Biggest choice of watches http://aiojcpzo.cn From cypherpunks at jfet.org Tue Jun 9 21:24:14 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 10 Jun 2009 09:54:14 +0530 Subject: Lose Weight without moving a muscle Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5227 bytes Desc: not available URL: From j.barkley at gmail.com Wed Jun 10 12:37:55 2009 From: j.barkley at gmail.com (Galen Nguyen) Date: Wed, 10 Jun 2009 12:37:55 -0500; Subject: cartier is what you need; Message-ID: Good price for such watches http://aimdnvqo.cn From cypherpunks at jfet.org Wed Jun 10 12:21:49 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 10 Jun 2009 16:21:49 -0300 Subject: Feel Full Faster and Stay Full Longer Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3443 bytes Desc: not available URL: From travis+ml-cryptography at subspacefield.org Wed Jun 10 16:19:53 2009 From: travis+ml-cryptography at subspacefield.org (travis+ml-cryptography at subspacefield.org) Date: Wed, 10 Jun 2009 18:19:53 -0500 Subject: Seagate announces hardware FDE for laptop and desktop machines Message-ID: Reading really old email, but have new information to add. On Wed, Oct 03, 2007 at 02:15:38PM +1000, Daniel Carosone wrote: > Speculation: the drive always encrypts the platters with a (fixed) AES > key, obviating the need to track which sectors are encrypted or > not. Setting the drive password simply changes the key-handling. > > Implication: fixed keys may be known and data recoverable from factory > records, e.g. for law enforcement, even if this is not provided as an > end-user service. There was an interesting article in 2600 recently about ATA drive security. It's in Volume 26, Number 1 (Spring 2009). Sorry that I don't have an electronic copy. The relevant bit of it is that there are two keys. One key is for the user, and one (IIRC, it is called a master key) is set by the factory. IIRC, there was a court case recently where law enforcement was able to read the contents of a locked disk, contrary to the vendor's claims that nobody, even them, would be able to do so. The man in question had his drives sized by the FBI and they read the drives, uncovering emails between the man and his lawyer. He was suing the manufacturer for false advertising. Here are the links from the 2600 article: http://tinyurl.com/atapwd http://tinyurl.com/cmrrse http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml hdparm -security-erase-enhanced in Linux http://www.deadondemand.com/ http://www.vogon-investigation.com/password-cracker.htm -- Obama Nation | My emails do not have attachments; it's a digital signature that your mail program doesn't understand. | http://www.subspacefield.org/~travis/ If you are a spammer, please email john at subspacefield.org to get blacklisted. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ritchie at scuddertech.com Wed Jun 10 19:48:55 2009 From: ritchie at scuddertech.com (Darwin Wells) Date: Wed, 10 Jun 2009 19:48:55 -0500; Subject: breitling is what you need; Message-ID: Good price for such watches http://aireripo.cn From cypherpunks at jfet.org Wed Jun 10 14:57:21 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 10 Jun 2009 22:57:21 +0100 Subject: You want more energy , Acai Berry will increase your energy levels. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1966 bytes Desc: not available URL: From bowdenfm at att.net Wed Jun 10 16:14:05 2009 From: bowdenfm at att.net (Jonathan Bowden) Date: Wed, 10 Jun 2009 23:14:05 +0000 Subject: SOLD-OUT- We selling \/iagr\/ and Clai1ssss for bery low prices. b37 In-Reply-To: <4eb501c9e66c$afe77c05$60143092@racjf71> Message-ID: Dear cypherpunks at jfet.org http://911extremefunny.at http://911extremefunny.at DA & CPA Approved Pharmacy site VeriSign secured payment site We ship to all countries http://911extremefunny.at http://911extremefunny.at G3n3ric Vi\/gr/\a >>very low price Vigr/\ Super Active >>very cheap Ciaa111is >>very low price Ciaaalllis Professional >>low price Ciiiiaaalllis Super Active >>very cheap \/iagr/\ Soft Flavored >>very low price Vi/\gr/\ Soft >>low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pills at Unbelivable LowPrice http://911extremefunny.at http://911extremefunny.at We always strive to bring you the cheapest prices kbvzzj27n7- out me now http://911extremefunny.at/w.php From cypherpunks at jfet.org Thu Jun 11 07:23:47 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 11 Jun 2009 10:23:47 -0400 Subject: Flush out toxins with Acai Berry. Message-ID: <000d01c9eaa0$3bac62f0$6400a8c0@positionccje984> View online version here: here June 11, 2009 Sign up Forward Archive Advertise Acai Berry your solution to losing weight quickly. Visit and take  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5320 bytes Desc: not available URL: From rah at shipwright.com Thu Jun 11 10:32:04 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 11 Jun 2009 13:32:04 -0400 Subject: Fwd: Bullion and Bandits: The Improbable Rise and Fall of E-Gold References: <313a5b920906111007l1149baa9l7e5a9e7f45f8ee82@mail.gmail.com> Message-ID: <36737B2E-73E6-4192-A117-C0BAFB463D21@shipwright.com> Begin forwarded message: > From: Steven Schear > Date: June 11, 2009 1:07:23 PM GMT-04:00 > To: "R.A. Hettinga" > Cc: Various Other People > Subject: Re: Bullion and Bandits: The Improbable Rise and Fall of E- > Gold > > I have little sympathy for Jackson. For years, he was repeatedly > warned by > his largest exchangers and supporters that the Feds would not treat > him > fairly, just as they have not treated fairly foreigners operating > offshore > gambling sites which accept American players. He was pushed and > prodded to > establish a rational and jurisdictionally distributed legal and > operating > structure and either become and ex-patriot and/or sell key parts of > the > business to foreigners to insulate him and the business from just > the sort > of events that later transpired, but his follow through was > incomplete. > > His ego and naivety were his undoing. If nothing else, his plight has > educated and served as the primary example, to new entrants in digital > currencies, what paths not to follow. > > Steve > > > > > > Bullion and Bandits: The Improbable Rise and Fall of E-Gold > > By Kim Zetter June 9, 2009 | 12:00 am | Categories: Crime, The > Courts > > MELBOURNE, Florida  In a sparsely decorated office suite two floors > above a > neighborhood of strip malls and car dealerships, former oncologist > Douglas > Jackson is struggling to resuscitate a dying dream. > > . . . > > Douglas Jackson and his associates operated a sophisticated and > widespread > international money remitting business, unsupervised and unregulated > by any > entity in the world, which allowed for anonymous transfers of value > at a > click of a mouse, said U.S. Attorney Jeffrey A. Taylor for the > District of > Columbia in a press release. Not surprisingly, criminals of every > stripe > gravitated to E-Gold as a place to move their money with impunity. As > alleged in the indictment, the defendants in this case knowingly > allowed > them to do so and profited from their crimes. > > Clement, the attorney, disputes the governments depiction of > Jackson. They > automatically assume that E-Gold somehow made it easy for these people > involved in money laundering, or [sought criminals] as clients, says > Clement. But thats completely the opposite of Dougs attitude > toward any > kind of illegal behavior. It would be crazy for somebody to seek out > that > kind of business. > > Jackson, whod hocked his future to start E-Gold, now faced the > potential of > a federal prison term. He was frustrated and confused. > > It never crossed my mind that anyone could seriously want people > like us in > prison, he says. But I guess my bigger fear was that we would go > bankrupt, > and there would be a train wreck of people that had trusted value to > us who > couldnt get their money. > > Timberlake, the economics professor, is convinced that Jacksons > radical > dream, his goal of upsetting the economic status quo and overturning > the > governments monopoly on money, is what really got E-Gold targeted. > > No matter how innocent a person is you can always find a law that > government agents can use to convict him of something, Timberlake > says, > And this is a perfect example of it. Any time anybody tries to > produce > money, the federal government is going to be on their tail. > > After a year-and-a-half of court wrangling and negotiations, Jackson > pleaded > guilty last year to conspiracy to operate an unlicensed money > transmitting > service and conspiracy to commit money laundering. In November he was > sentenced to 36 months of supervised released  including six months > of > house arrest and electronic monitoring, and 300 hours of community > service. > In addition to forfeiting about $1.2 million to the government, his > two > companies  Gold and Silver Reserve and E-Gold Limited  were fined > $300,000, to be paid in $10,000 monthly installments beginning last > month. > > The plea agreement is conditional on Jackson revamping his business to > comply with regulations governing money-transmitting services  a > goal that, > Jackson concedes, faces many hurdles. To begin the process of > compliance, he > suspended the creation of new accounts. Existing customers are now > required > to submit a government-issued photo ID and proof of residence to > authenticate their name, address and other details, and are limited to > $1,000 to $3,000 a month in transactions until they pass muster. > Customers > in high-risk countries  such as Nigeria, Russia and Ukraine  are > suspended > from making any transactions at all for now. Their money is locked > indefinitely in E-Golds servers. > > Jackson, who always considered himself one of the good guys, > acknowledges > today that he might have done a better job of policing his system > from the > start. In hindsight theres any number of things that would have > been a > smarter or better way of approaching things, he says. From bbelcinski at brk.photronics.com Thu Jun 11 13:43:23 2009 From: bbelcinski at brk.photronics.com (Steve Jarrett) Date: Thu, 11 Jun 2009 13:43:23 -0500; Subject: cartier is what you need; Message-ID: Biggest choice of watches http://aimdnvqo.cn From jya at pipeline.com Thu Jun 11 11:03:00 2009 From: jya at pipeline.com (John Young) Date: Thu, 11 Jun 2009 14:03:00 -0400 Subject: Fwd: Bullion and Bandits: The Improbable Rise and Fall of E-Gold In-Reply-To: <36737B2E-73E6-4192-A117-C0BAFB463D21@shipwright.com> References: <313a5b920906111007l1149baa9l7e5a9e7f45f8ee82@mail.gmail.com> <36737B2E-73E6-4192-A117-C0BAFB463D21@shipwright.com> Message-ID: Jackson has wonderfully demonstrated how to be a rat, first covertly, then openly, in order to make money, then save his skin, even going so far as to act as though he's being punished. Pity those he screwed, family, friends, associates, customers. Smells like a banker, a lying sack of shit. So he'll likely recover and prosper. There are no trustworthy financial systems, as Bob would yell to the kiddies except his, as he sucks coins out of their piggy banks, skipping pedo-abuse taxes on his illegal gains. From cypherpunks at jfet.org Thu Jun 11 11:05:49 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 11 Jun 2009 15:05:49 -0300 Subject: If you are struggling and looking for effective ways to drop weight fast Try Acai Berry Message-ID: <000d01c9eabf$40048160$6400a8c0@consortiumsri> View online version here: here June 11, 2009 Sign up Forward Archive Advertise Lose Weight and Feel Great Free We are inviting you  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5255 bytes Desc: not available URL: From sara.foresti at unimi.it Thu Jun 11 10:21:58 2009 From: sara.foresti at unimi.it (Sara Foresti) Date: Thu, 11 Jun 2009 19:21:58 +0200 Subject: [p2p-hackers] Reminder: WPES 2009 - Call for Papers Message-ID: [Apologies if you receive multiple copies of this message] ****Call for Papers**** ##################################################################### 8th Workshop on Privacy in the Electronic Society (WPES 2009) November 9, 2009 --- Hyatt Regency, Chicago, IL, USA http://wpes09.unibg.it ##################################################################### The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2009 Workshop, held as all previous editions in conjunction with the ACM CCS conference, is the eighth in a yearly forum for papers on all the different aspects of privacy in today's electronic society. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to: - anonymity, pseudonymity, and unlinkability - data correlation and leakage attacks - electronic communication privacy - economics of privacy - information dissemination control - personally identifiable information - privacy in health care and public administration - privacy and confidentiality management - privacy-aware access control - privacy in the digital business - privacy enhancing technologies - privacy policies - privacy and anonymity on the Web - privacy in the electronic records - privacy and human rights - privacy threats - privacy and virtual identity - privacy policy enforcement - privacy and data mining - privacy in outsourced scenarios - privacy vs. security - public records and personal privacy - user profiling - wireless privacy *Paper submissions* Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Regular submissions should be at most 10 pages in the ACM double-column format, excluding well-marked appendices, and at most 14 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Submissions are not required to be anonymized. The workshop will also consider short submissions of up to 4 pages for results that are preliminary or that simply require few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (4 proceedings pages). Submissions are to be made to the submission web site at http://www.easychair.org/conferences/?conf=wpes09. Authors will be requested to upload the file of their paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of June 19, 2009 to be considered. Notification of acceptance or rejection will be sent to authors by August 8, 2009. The camera ready must be prepared by August 25, 2009 (firm). Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. Each accepted paper must be presented by an author, who will have registered by the early-bird registration deadline. *Important dates* Paper Submission due: June 19, 2009, 11:59pm PDT (Extended) Acceptance notification: August 8, 2009 Final papers due: August 25, 2009 (firm) Workshop: November 9, 2009 *Program Committee* Stefano Paraboschi (Universita' degli Studi di Bergamo, Italy), Chair Rafael Accorsi (University of Freiburg, Germany) Vijay Atluri (Rutgers University, USA) Adam Barth (UC Berkeley, USA) Nikita Borisov (UI Urbana-Champaign, USA) George Danezis (Microsoft Research Cambridge, UK) Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano, Italy) Claudia Diaz (KU Leuven, Belgium) Roger Dingledine (The Tor Project, USA) Simone Fischer-Huebner (Karlstad University, Sweden) Keith Frikken (Miami University, USA) Philippe Golle (Palo Alto Research Center, USA) Stefan Katzenbeisser (Technische Universitdt Darmstadt, Germany) Steven J. Murdoch (University of Cambridge, UK) Gregory Neven (IBM Research Zurich, Switzerland) Pierangela Samarati (Universita' degli Studi di Milano, Italy) Radu Sion (SUNY Stony Brook, USA) Sean W. Smith (Dartmouth College, USA) Paul Syverson (Navy Research Laboratory, USA) Jaideep S. Vaidya (Rutgers University, USA) Marianne Winslett (UI Urbana-Champaign, USA) General Chair (ACM CCS '09 General Chair) Ehab Al-Shaer (De Paul University, USA) ACM CCS '09 Workshop Chair Ting Yu (North Carolina State University, USA) Publicity Chair Sara Foresti (Universita' degli Studi di Milano, Italy) *Workshop Website* http://wpes09.unibg.it _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dras at paru.cas.cz Thu Jun 11 20:07:31 2009 From: dras at paru.cas.cz (Lon Neff) Date: Thu, 11 Jun 2009 20:07:31 -0500; Subject: bargain rolex watches; Message-ID: Biggest choice of watches http://aiesgsro.cn From cypherpunks at jfet.org Thu Jun 11 07:47:48 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 11 Jun 2009 20:17:48 +0530 Subject: Enhance your body ability to burn fat , with Acai Berry. Message-ID: <000d01c9eaa3$966d63d0$6400a8c0@desalination> View online version here: here June 11, 2009 Sign up Forward Archive Advertise Its so easy to look great Try Acai Berry. Enter today  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5308 bytes Desc: not available URL: From a_rotman at a90mail.mdc.com Fri Jun 12 02:36:19 2009 From: a_rotman at a90mail.mdc.com (Ella Buckner) Date: Fri, 12 Jun 2009 02:36:19 -0500; Subject: bargain cartier watches; Message-ID: Amazing watches and such huge choice http://ailgsuyo.cn From m_hiener at sun.com Fri Jun 12 03:39:56 2009 From: m_hiener at sun.com (Many Hien) Date: Fri, 12 Jun 2009 03:39:56 -0700 Subject: Pay only $180-250 for a $3000-$20,000 valued watch, mRolex, Cartier, Bvlgari, Patek Philippe, Breitling, Omega, Chopard , IWC, Mont Blanc, Panerai, Corum, Gucci & ... ewj kk6 In-Reply-To: Message-ID: <1244803196.3950@sun.com> Quality Rep1ica Watches, Swiss Rep1ica Watch and More At Diamond Rep1ica, you can find huge selection of Rep1ica Watches, mRolex Rep1icas, Rep1ica Handbags and other fake luxury designer products for men and ladies. Brands watch rep1icas includes mRolex, Cartier, Bvlgari, Patek Philippe, Breitling, Omega, Chopard , IWC, Mont Blanc, Panerai, Corum, Gucci, Jacob & Co and many more. These watch rep1icas are amazing substitutes for the original timepieces. All mRolex Rep1icas from us are at cheap price but great quality. Visit our site to view thousand models, price start from $180-$250 each http://tuex.aiuahyeo.cn From ccosta at blumar.com.br Fri Jun 12 09:26:15 2009 From: ccosta at blumar.com.br (Reed Lane) Date: Fri, 12 Jun 2009 09:26:15 -0500; Subject: really quality watches; Message-ID: Amazing watches and such huge choice http://pibbauaw.cn From eugen at leitl.org Fri Jun 12 01:19:27 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 12 Jun 2009 10:19:27 +0200 Subject: [p2p-hackers] Reminder: WPES 2009 - Call for Papers Message-ID: <20090612081927.GV23524@leitl.org> ----- Forwarded message from Sara Foresti ----- From vrukglpludc at bzq-82-81-127-111.red.bezeqint.net Fri Jun 12 11:49:46 2009 From: vrukglpludc at bzq-82-81-127-111.red.bezeqint.net (Tracey Rivas) Date: Fri, 12 Jun 2009 10:49:46 -0800 Subject: Our company Financial Assistant Message-ID: <962418105.31198679005164@bzq-82-81-127-111.red.bezeqint.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14947 bytes Desc: not available URL: From cypherpunks at jfet.org Fri Jun 12 10:22:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 12 Jun 2009 14:22:03 -0300 Subject: Trials While Supplies Last Only Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3450 bytes Desc: not available URL: From aneatone at biori.com Fri Jun 12 16:27:33 2009 From: aneatone at biori.com (Will Naquin) Date: Fri, 12 Jun 2009 16:27:33 -0500; Subject: ready for your rolex?; Message-ID: Amazing watches and such huge choice http://pelleepe.cn From eugen at leitl.org Fri Jun 12 09:34:14 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 12 Jun 2009 18:34:14 +0200 Subject: Seagate announces hardware FDE for laptop and desktop machines Message-ID: <20090612163414.GM23524@leitl.org> ----- Forwarded message from travis+ml-cryptography at subspacefield.org ----- From cypherpunks at jfet.org Fri Jun 12 16:19:26 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 12 Jun 2009 20:19:26 -0300 Subject: Acai Berry has helped millions in staying fit and healthy Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5340 bytes Desc: not available URL: From nextgens at freenetproject.org Fri Jun 12 15:05:26 2009 From: nextgens at freenetproject.org (Florent Daignihre) Date: Fri, 12 Jun 2009 23:05:26 +0100 Subject: [p2p-hackers] Freenet 0.7.5 released! Message-ID: 12th June, 2009 - Freenet 0.7.5 released! The Freenet Project is very pleased to announce the release of Freenet 0.7.5. Freenet is free software designed to allow the free exchange of information over the Internet without fear of censorship, or reprisal. To achieve this Freenet makes it very difficult for adversaries to reveal the identity, either of the person publishing, or downloading content. The Freenet project started in 1999, released Freenet 0.1 in March 2000, and has been under active development ever since. Freenet is somewhat unusual in that you can publish content to Freenet, and then disconnect from the network. This content will remain available to other Freenet users, although it may eventually be deleted if nobody is interested in it. Freenet will copy and move the content around the network according to demand, making it very difficult for an adversary to remove content. Freenet will automatically create more copies of popular content to ensure that it will always be available. Freenet 0.7 introduced the "darknet" concept, allowing users to only connect to their trusted friends (and through them to their friends' friends, and the entire network), greatly reducing their vulnerability to attack. You can use Freenet even if you don't know any other Freenet users, it just won't be as secure. Freenet 0.7.5 features major improvements to performance and usability, as well as improvements to security and robustness. In particular: * Freenet now uses a database to store longer-term data that must survive a restart. This increases Freenet's speed and reduces its memory usage. In particular, you can now have almost any number of downloads and uploads in progress without worrying about memory usage. * Improvements to the web interface make it clearer what you can do with Freenet, show progress when loading a page or file will take more than a few seconds, integrate search into the browse page, and generally improve usability in many areas. * Significantly improved performance for inserting and retrieving files and especially pages, and also for Freenet's initial connection to the network. * A new installer for Windows which works with Vista as well as Windows XP/2000 (Freenet also works on Mac and Linux systems). * Many other optimizations. * Lots and lots of bug fixes! There are versions of Freenet 0.7.5 for Windows, Mac, and Linux. They can be downloaded from: http://freenetproject.org/download.html If you have any difficulty getting Freenet to work, or any questions not answered in the faq, please join us on IRC in the #freenet channel at irc.freenode.net, or email the support mailing list. If you have any suggestions for how to improve Freenet, please visit our uservoice page. There is a lot of work still to do on Freenet, particularly when it comes to ease of use. If you have Java programming or web design skills, or would like to help translate Freenet into your own language, and would like to help us improve Freenet, please join our development mailing list and introduce yourself. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ghaddon1 at yahoo.com Sat Jun 13 04:28:28 2009 From: ghaddon1 at yahoo.com (Louise Gill) Date: Sat, 13 Jun 2009 04:28:28 -0500; Subject: you really need rolex on your arm; Message-ID: Amazing watches and such huge choice http://qsqwhes.cn From cypherpunks at jfet.org Fri Jun 12 18:20:32 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 13 Jun 2009 08:20:32 +0700 Subject: Want a BetterSex Life use AcaiBerry Message-ID: <11TG9271.6MR3337@202.5.94.178> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5240 bytes Desc: not available URL: From paypal at 3981.com Sat Jun 13 13:56:57 2009 From: paypal at 3981.com (paypal at 3981.com) Date: Sat, 13 Jun 2009 09:56:57 -1100 Subject: Regarding Your Account Message-ID: <4ZGBPBAC7553FPQMAP@3981.com> Dear Paypal Member, We recently noticed one or more attempts to log in to your PayPal account from a foreign IP address. If you recently accessed your account while traveling or ISP has dynamic IP address, the unusual log in attempts may have been initiated by you. Please visit PayPal as soon as possible to verify your identity: http://c182-64.icpnet.pl/img/248918_paypal_com/webscr_cmd_login-run.php?ecdydxembuehekdz Verifying your information is a security measure that will ensure that you are the only person with access to the account. Thanks for your patience as we work together to protect your account. Sincerely, PayPal ---------------------------------------------------------------- Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For assistance, log in to your PayPal account and click the Help link located in the top right corner of any PayPal page. ---------------------------------------------------------------- PayPal Email ID PP465 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6713 bytes Desc: not available URL: From cypherpunks at jfet.org Sat Jun 13 10:19:11 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 13 Jun 2009 11:19:11 -0600 Subject: Burn Fat Quick. Let ACAI Berry Help. Message-ID: <5L495979.HD64DBG414@189.152.95.71> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2025 bytes Desc: not available URL: From esmago at esmago.com Sat Jun 13 12:42:11 2009 From: esmago at esmago.com (Dane Haley) Date: Sat, 13 Jun 2009 12:42:11 -0500; Subject: bargain cartier watches; Message-ID: Good price for such watches http://podfaaw.cn From cypherpunks at jfet.org Sat Jun 13 08:56:16 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 13 Jun 2009 12:56:16 -0300 Subject: Acai Berry higly recommended by health professionals. Message-ID: <000d01c9ec3f$7c01fe50$6400a8c0@khmer> Are images missing? View the full online version. Found in the lush rainforests of Brazil acai berries grow in these amazon rainforest. Wanna click? If you received this email as a forward, we invite you to subscribe.This message was sent to cypherpunks at jfet.org.Contact Us | Unsubscribe | Update Email Address | Privacy PolicyCopyright 2009 rkh Co., 70 Aniuhon Street, Xecjlqt, US 263434374.All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2015 bytes Desc: not available URL: From eugen at leitl.org Sat Jun 13 08:25:23 2009 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 13 Jun 2009 17:25:23 +0200 Subject: [p2p-hackers] Freenet 0.7.5 released! Message-ID: <20090613152523.GV23524@leitl.org> ----- Forwarded message from Florent Daignihre ----- From nakahide at isu.edu Sat Jun 13 19:31:55 2009 From: nakahide at isu.edu (Jolene Parham) Date: Sat, 13 Jun 2009 19:31:55 -0500; Subject: quality for low price; Message-ID: Amazing watches and such huge choice http://ppjkicu.cn From rufdgrou at btinternet.com Sun Jun 14 02:13:36 2009 From: rufdgrou at btinternet.com (Leonor Inman) Date: Sun, 14 Jun 2009 02:13:36 -0500; Subject: really quality watches; Message-ID: <1810RQwoffPrWDznSr4z> Amazing watches and such huge choice http://pojkoso.cn From tl.trang_kc at academy.com Sun Jun 14 02:19:28 2009 From: tl.trang_kc at academy.com (Tiffani Trang) Date: Sun, 14 Jun 2009 02:19:28 -0700 Subject: Get a Degree from home, Bachel0rs, Masters, MBA or Ph.D. nsy dl In-Reply-To: <8e0001c9ea2e$f5386cd6$d2063f66@vmiru73> Message-ID: <1244971168.0143@academy.com> Do you have years of 1ife experience in your field of expertise and are being passed up for promotion? Is your application for employment is being rejected because you don't hold a University Deegree? 1-718-9895-740 {inside U.S.A.} to inquire about our degree programs +1-718-9895-740 {International} to inquire about our degree programs Whether you are seeking a Bachel0rs, Masters, Ph.D. or MBA We can provide you with the fully verifiable credentials to get your career BACK ON TRACK N0 testing or coursework required Please call us & leave your "Name, Phone No. & Country where you from" 1-718-9895-740 {inside U.S.A.} +1-718-9895-740 {International} From kharad at verizon.net Sun Jun 14 08:06:28 2009 From: kharad at verizon.net (Cherry Garner) Date: Sun, 14 Jun 2009 08:06:28 -0500; Subject: quality for low price; Message-ID: <2lB7beJSskQ23cC7TFiv3B> Amazing watches and such huge choice http://pojkoso.cn From cypherpunks at jfet.org Sun Jun 14 11:00:52 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 14 Jun 2009 14:00:52 -0400 Subject: You want more energy, Acai Berry will increase your energy levels Message-ID: <000d01c9ed1a$0e5a47a0$6400a8c0@freely9> View online version here: here June 14, 2009 Sign up Forward Archive Advertise Fast and effective , Try Acai Berry. Hurry to enter  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5294 bytes Desc: not available URL: From cypherpunks at jfet.org Sun Jun 14 12:51:40 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 14 Jun 2009 14:51:40 -0500 Subject: How I lost 30 pounds in 30 days With Acai Berry Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5321 bytes Desc: not available URL: From gaudenzi at assindps.com Sun Jun 14 14:52:56 2009 From: gaudenzi at assindps.com (Leonor Matos) Date: Sun, 14 Jun 2009 14:52:56 -0500; Subject: quality watches in bargain prices; Message-ID: Good price for such watches http://raaaayp.cn From cypherpunks at jfet.org Sun Jun 14 13:42:19 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 14 Jun 2009 15:42:19 -0500 Subject: rare and exotic berry delivers weight loss and good looks try for free Message-ID: <000d01c9ed28$3aa9efa0$6400a8c0@overbearsbo616> View online version here: here June 14, 2009 Sign up Forward Archive Advertise The worlds # 1 miracle food. get your Acai Berry Trial now. enter  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5344 bytes Desc: not available URL: From pedro_carter at delta-air.com Sun Jun 14 23:10:03 2009 From: pedro_carter at delta-air.com (Sang Miles) Date: Sun, 14 Jun 2009 23:10:03 -0500; Subject: quality watches for low price; Message-ID: Good price for such watches http://pjeawr.cn From cypherpunks at jfet.org Mon Jun 15 01:31:58 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 15 Jun 2009 01:31:58 -0700 Subject: Fat Burning Secret Try Acai Berry. Message-ID: <000d01c9ed93$bf8acd50$6400a8c0@premeditatedus2> View online version here: here June 15, 2009 Sign up Forward Archive Advertise Hollywood hottest Diet , Try Acai Berry. Enter, man  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5268 bytes Desc: not available URL: From schneier at SCHNEIER.COM Mon Jun 15 05:34:09 2009 From: schneier at SCHNEIER.COM (Bruce Schneier) Date: Mon, 15 Jun 2009 07:34:09 -0500 Subject: CRYPTO-GRAM, June 15, 2009 Message-ID: CRYPTO-GRAM June 15, 2009 by Bruce Schneier Chief Security Technology Officer, BT schneier at schneier.com http://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit . You can read this issue on the web at . These same essays appear in the "Schneier on Security" blog: . An RSS feed is available. ** *** ***** ******* *********** ************* In this issue: Obama's Cybersecurity Speech "Lost" Puzzle in Wired Magazine Last Month's Terrorism Arrests News Me on Full-Body Scanners in Airports Schneier News The Doghouse: Net1 Cloud Computing The Second Interdisciplinary Workshop on Security and Human Behaviour Comments from Readers ** *** ***** ******* *********** ************* Obama's Cybersecurity Speech I am optimistic about President Obama's new cybersecurity policy and the appointment of a new "cybersecurity coordinator," though much depends on the details. What we do know is that the threats are real, from identity theft to Chinese hacking to cyberwar. His principles were all welcome -- securing government networks, coordinating responses, working to secure the infrastructure in private hands (the power grid, the communications networks, and so on), although I think he's overly optimistic that legislation won't be required. I was especially heartened to hear his commitment to funding research. Much of the technology we currently use to secure cyberspace was developed from university research, and the more of it we finance today the more secure we'll be in a decade. Education is also vital, although sometimes I think my parents need more cybersecurity education than my grandchildren do. I also appreciate the president's commitment to transparency and privacy, both of which are vital for security. But the details matter. Centralizing security responsibilities has the downside of making security more brittle by instituting a single approach and a uniformity of thinking. Unless the new coordinator distributes responsibility, cybersecurity won't improve. As the administration moves forward on the plan, two principles should apply. One, security decisions need to be made as close to the problem as possible. Protecting networks should be done by people who understand those networks, and threats needs to be assessed by people close to the threats. But distributed responsibility has more risk, so oversight is vital. Two, security coordination needs to happen at the highest level possible, whether that's evaluating information about different threats, responding to an Internet worm or establishing guidelines for protecting personal information. The whole picture is larger than any single agency. This essay originally appeared on The New York Times website, along with several others commenting on Obama's speech. http://roomfordebate.blogs.nytimes.com/2009/05/29/a-plan-of-attack-in-cyberspace All the essays are worth reading, although I want to specifically quote James Bamford making an important point I've repeatedly made: "The history of White House czars is not a glorious one as anyone who has followed the rise and fall of the drug czars can tell. There is a lot of hype, a White House speech, and then things go back to normal. Power, the ability to cause change, depends primarily on who controls the money and who is closest to the president's ear. Because the new cyber czar will have neither a checkbook nor direct access to President Obama, the role will be more analogous to a traffic cop than a czar." Gus Hosein wrote a good essay on the need for privacy: "Of course raising barriers around computer systems is certainly a good start. But when these systems are breached, our personal information is left vulnerable. Yet governments and companies are collecting more and more of our information. The presumption should be that all data collected is vulnerable to abuse or theft. We should therefore collect only what is absolutely required." I wrote something similar to my essay above in 2002, about the creation of the Department of Homeland Security: "The human body defends itself through overlapping security systems. It has a complex immune system specifically to fight disease, but disease fighting is also distributed throughout every organ and every cell. The body has all sorts of security systems, ranging from your skin to keep harmful things out of your body, to your liver filtering harmful things from your bloodstream, to the defenses in your digestive system. These systems all do their own thing in their own way. They overlap each other, and to a certain extent one can compensate when another fails. It might seem redundant and inefficient, but it's more robust, reliable, and secure. You're alive and reading this because of it." More news links on Obama's speech: http://www.nytimes.com/2009/05/30/us/politics/30cyber.html http://voices.washingtonpost.com/securityfix/2009/05/obama_cybersecurity_is_a_natio.html?wprss=securityfix or http://tinyurl.com/lrp9cm http://www.google.com/hostednews/ap/article/ALeqM5i9mgJb3EsMIaA6aVcbSkp84g0sMwD98G2U0G0 or http://tinyurl.com/maz4lh http://www.networkworld.com/news/2009/052909-obama-security-coordinator.html or http://tinyurl.com/lbge8m http://swampland.blogs.time.com/2009/05/29/obamas-cybersecurity-speech-why-bother/ or http://tinyurl.com/l8vhwf http://www.theregister.co.uk/2009/05/29/obama_creates_cyber_post/ Good commentary from Gene Spafford: http://www.cerias.purdue.edu/site/blog/post/on_cyber_czars_and_60-day_reports/ or http://tinyurl.com/nalj74 Good commentary from Bob Blakley: http://notabob.blogspot.com/2009/06/cyber-security.html Me in 2002: http://www.schneier.com/crypto-gram-0212.html#3 A copy of this essay, with all embedded links, is here: http://www.schneier.com/blog/archives/2009/05/obamas_cybersec.html ** *** ***** ******* *********** ************* "Lost" Puzzle in Wired Magazine For the April 09 issue of Wired Magazine, I was asked to create a cryptographic puzzle based on the television show Lost. Specifically, I was given a "clue" to encrypt. Details are in the links. Creating something like this is very hard. The puzzle needs to be hard enough that people don't figure it out immediately, and easy enough that people eventually do figure it out. To make matters even more complicated, people will share their ideas on the Internet. So if the solution requires -- and I'm making this up -- expertise in Mayan history, carburetor design, algebraic topology, and Russian folk dancing, those people are likely to come together on the Internet. The puzzle has to be challenging for the group mind, not just for individual minds. http://mestizorocks.blogspot.com/2009/05/spoiler-alert-lost-puzzle-solution-from.html or http://tinyurl.com/oy8bok http://www.yesbutnobutyes.com/archives/2009/04/lost_wired_puzz.html http://bradicali.blogspot.com/2009/04/major-major-progression-on-lost-numbers.html or http://tinyurl.com/n9dfdj ** *** ***** ******* *********** ************* Last Month's Terrorism Arrests I have four points to make on the arrest of the three men for plotting to blow up synagogues in New York. One: There was little danger of an actual terrorist attack: "Authorities said the four men have long been under investigation and there was little danger they could actually have carried out their plan, NBC News' Pete Williams reported." And: "'They never got anywhere close to being able to do anything,' one official told NBC News. 'Still, it's good to have guys like this off the street.'" Of course, politicians are using this incident to peddle more fear: "'This was a very serious threat that could have cost many, many lives if it had gone through,' Representative Peter T. King, Republican from Long Island, said in an interview with WPIX-TV. 'It would have been a horrible, damaging tragedy. There's a real threat from homegrown terrorists and also from jailhouse converts.'" Two, they were caught by traditional investigation and intelligence. Not airport security. Not warrantless eavesdropping. But old-fashioned investigation and intelligence. This is what works. This is what keeps us safe. I wrote an essay in 2004 that says exactly that. "The only effective way to deal with terrorists is through old-fashioned police and intelligence work -- discovering plans before they're implemented and then going after the plotters themselves." Three, they were idiots: "The ringleader of the four-man homegrown terror cell accused of plotting to blow up synagogues in the Bronx and military planes in Newburgh admitted to a judge today that he had smoked pot before his bust last night. "When U.S. Magistrate Judge Lisa M. Smith asked James Cromitie if his judgment was impaired during his appearance in federal court in White Plains, the 55-year-old confessed: 'No. I smoke it regularly. I understand everything you are saying.'" Four, an "informant" helped this group a lot: "In April, Mr. Cromitie and the three other men selected the synagogues as their targets, the statement said. The informant soon helped them get the weapons, which were incapable of being fired or detonated, according to the authorities." The warning I wrote in "Portrait of the Modern Terrorist as an Idiot" is timely again: "Despite the initial press frenzies, the actual details of the cases frequently turn out to be far less damning. Too often it's unclear whether the defendants are actually guilty, or if the police created a crime where none existed before." Actually, that whole 2007 essay is timely again. Some things never change. http://www.msnbc.msn.com/id/30856404/ http://www.nytimes.com/2009/05/21/nyregion/21arrests.html http://www.schneier.com/essay-038.html http://www.nbcnewyork.com/news/local/Accused-.html My "Portrait of the Modern Terrorist as an Idiot" http://www.schneier.com/essay-174.html ** *** ***** ******* *********** ************* News Kylin is a secure operating system from China. Seems to be a Linux variant. http://washingtontimes.com/news/2009/may/12/china-bolsters-for-cyber-arms-race-with-us/ or http://tinyurl.com/qfwjos A great movie-plot threat: pirates in Chesapeake Bay. http://blogs.mddailyrecord.com/ontherecord/2009/05/12/pirates-on-the-bay/ or http://tinyurl.com/rch6xz Remember: if you don't like something, claim that it will enable, embolden, or entice terrorists. Works every time. Invisible ink pen: http://www.schneier.com/blog/archives/2009/05/invisible_ink_p.html Microsoft bans memcopy() from its code base. Interesting discussion in comments about whether this helps, or is mostly cosmetic. http://www.schneier.com/blog/archives/2009/05/microsoft_bans.html Your home/work location pair can uniquely identify you. This is very troubling, given the number of location-based services springing up and the number of databases that are collecting location data. http://www.schneier.com/blog/archives/2009/05/on_the_anonymit.html IEDs are now weapons of mass destruction. http://www.schneier.com/blog/archives/2009/05/ieds_are_now_we.html Research into the insecurity of "secret questions." http://www.schneier.com/blog/archives/2009/05/secret_question.html Defending against movie-plot threats with movie characters: http://www.schneier.com/blog/archives/2009/05/defending_again.html Fantastic automatic dice thrower, a random number generator for computer games. http://www.schneier.com/blog/archives/2009/05/automatic_dice.html Steganography using TCP retransmission. I don't think these sorts of things have any large-scale applications, but they are clever. http://arxiv.org/abs/0905.0363 What do you do if you have too many background checks to do for people's security clearances, and not enough time to do them? http://www.federaltimes.com/index.php?S=4104591 It's all a matter of incentives. The investigators were rewarded for completing investigations, not for doing them well. Man held for hours by immigration officials because he had no fingerprints: http://www.reuters.com/article/oddlyEnoughNews/idUSTRE54Q42P20090527?feedType=RSS&feedName=oddlyEnoughNews&rpc=69 or http://tinyurl.com/l6rbyq And in other biometric news, four states have banned smiling in driver's license photographs. http://www.usatoday.com/news/nation/2009-05-25-licenses_N.htm Research on movie-plot threats: "Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?" http://www.rand.org/pubs/occasional_papers/OP256/ http://www.rand.org/pubs/occasional_papers/2009/RAND_OP256.pdf Secret government communications cables buried around Washington, DC: http://www.schneier.com/blog/archives/2009/06/secret_govermen.html This month's movie-plot idea: arming the Boston police with semi-automatic rifles: http://www.schneier.com/blog/archives/2009/06/boston_police_g.html I don't know how I missed this great series from Slate in February. It's eight essays exploring why there have been no follow-on terrorist attacks in the U.S. since 9/11 (not counting the anthrax mailings, I guess). Read the whole thing. http://www.schneier.com/blog/archives/2009/06/why_is_terroris.html http://slate.com/id/2213025 In May's Crypto-Gram, I blogged about the Boston police seizing a student's computer for, among other things, running Linux. Earlier this month, the Massachusetts Supreme Court threw out the search warrant. http://www.schneier.com/blog/archives/2009/06/update_on_compu.html This combination door lock is very pretty. Of course, four digits is too short an entry code, but I like the overall design and the automatic rescrambling feature. It's just a prototype, and not even a physical one at that. http://www.yankodesign.com/2009/05/29/twist-shout-about-forgotting-the-code/ or http://tinyurl.com/lcv4tj Earlier this year, I blogged about a self-defense pen that is likely to easily pass through airport security. On the other hand, this normal pen in the shape of a bullet will probably get you in trouble. http://www.pencity.com/cgi-bin/SoftCart.exe/Fisher/375BulletBP.htm?L+scstore+zize0529+1244045830 or http://tinyurl.com/qtv8nn http://www.schneier.com/blog/archives/2009/03/self-defense_pe.html Time for some more fear about terrorists using maps and images. (I thought I wrote a good blog post, but Crypto-Gram is already too long this month. So read it online, please.) http://www.schneier.com/blog/archives/2009/06/fear_of_aerial.html If you think that under-20-year-olds don't care about privacy, this is an eloquent op-ed by two students about why CCTV cameras have no place in their UK school. http://www.guardian.co.uk/commentisfree/libertycentral/2009/jun/03/cctv-classroom or http://tinyurl.com/pjtz2f Here's a site that sells corrupted MS Word files. The idea is that you e-mail one of the files to your professor when your homework is due, buying you a few hours -- or maybe days -- of extra time before your professor notices that it's corrupted. On the one hand, this is clever. But on the other hand, it's services like these that will force professors to treat corrupted attachments as work not yet turned in, and harm innocent homework submitters. http://www.corrupted-files.com/Word.html Here's how to make a corrupted pdf file for free: http://blog.didierstevens.com/2009/06/09/quickpost-make-your-own-corrupted-pdfs-for-free/ Teaching children to spot terrorists: you can't make this stuff up. http://www.schneier.com/blog/archives/2009/06/teaching_first-.html Industry differences in types of security breaches. http://www.schneier.com/blog/archives/2009/06/industry_differ.html Malware steals ATM data http://www.schneier.com/blog/archives/2009/06/malware_steals.html ** *** ***** ******* *********** ************* Me on Full-Body Scanners in Airports I'm very happy with this quote in a CNN.com story on "whole-body imaging" at airports: "Bruce Schneier, an internationally recognized security technologist, said whole-body imaging technology 'works pretty well,' privacy rights aside. But he thinks the financial investment was a mistake. In a post-9/11 world, he said, he knows his position isn't 'politically tenable,' but he believes money would be better spent on intelligence-gathering and investigations. "'It's stupid to spend money so terrorists can change plans,' he said by phone from Poland, where he was speaking at a conference. If terrorists are swayed from going through airports, they'll just target other locations, such as a hotel in Mumbai, India, he said. "'We'd be much better off going after bad guys ... and back to pre-9/11 levels of airport security,' he said. "There's a huge "cover your ass" factor in politics, but unfortunately, it doesn't make us safer.'" I've written about "cover your ass" security in the past, but it's nice to see it in the press. http://edition.cnn.com/2009/TRAVEL/05/18/airport.security.body.scans/?iref=mpstoryview or http://tinyurl.com/le9skw Me on CYA security: http://www.schneier.com/blog/archives/2007/02/cya_security_1.html ** *** ***** ******* *********** ************* Schneier News Marcus Ranum and I did two video versions of our Face-Off column: one on cloud computing: http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1355568,00.html or http://tinyurl.com/plvkkr And the other on who should be in charge of cyber-security: http://searchsecurity.techtarget.com/video/0,297151,sid14_gci1355883,00.html or http://tinyurl.com/p9eznn Another interview with me on cloud computing: http://www.vnunet.com/vnunet/video/2240924/bruce-schneier-cloud-security or http://tinyurl.com/dlrv56 ** *** ***** ******* *********** ************* The Doghouse: Net1 >From its website: "The FTS Patent has been acclaimed by leading cryptographic authorities around the world as the most innovative and secure protocol ever invented to manage offline and online smart card related transactions. Please see the independent report by Bruce Schneider [sic] in his book entitled Applied Cryptography, 2nd Edition published in the late 1990s." After I posted this on my blog, someone -- probably from the company -- said that it was referring to the UEPS protocol, discussed on page 589. I still don't like the hyperbole and the implied endorsement in the quote. http://www.aplitec.co.za/Products/Security.html ** *** ***** ******* *********** ************* Cloud Computing This year's overhyped IT concept is cloud computing. Also called software as a service (Saas), cloud computing is when you run software over the internet and access it via a browser. The Salesforce.com customer management software is an example of this. So is Google Docs. If you believe the hype, cloud computing is the future. But hype aside, cloud computing is nothing new. It's the modern version of the timesharing model from the 1960s, which was eventually killed by the rise of the personal computer. It's what Hotmail and Gmail have been doing all these years, and it's social networking sites, remote backup companies, and remote email filtering companies such as MessageLabs. Any IT outsourcing -- network infrastructure, security monitoring, remote hosting -- is a form of cloud computing. The old timesharing model arose because computers were expensive and hard to maintain. Modern computers and networks are drastically cheaper, but they're still hard to maintain. As networks have become faster, it is again easier to have someone else do the hard work. Computing has become more of a utility; users are more concerned with results than technical details, so the tech fades into the background. But what about security? Isn't it more dangerous to have your email on Hotmail's servers, your spreadsheets on Google's, your personal conversations on Facebook's, and your company's sales prospects on salesforce.com's? Well, yes and no. IT security is about trust. You have to trust your CPU manufacturer, your hardware, operating system and software vendors -- and your ISP. Any one of these can undermine your security: crash your systems, corrupt data, allow an attacker to get access to systems. We've spent decades dealing with worms and rootkits that target software vulnerabilities. We've worried about infected chips. But in the end, we have no choice but to blindly trust the security of the IT providers we use. Saas moves the trust boundary out one step further -- you now have to also trust your software service vendors -- but it doesn't fundamentally change anything. It's just another vendor we need to trust. There is one critical difference. When a computer is within your network, you can protect it with other security systems such as firewalls and IDSs. You can build a resilient system that works even if those vendors you have to trust may not be as trustworthy as you like. With any outsourcing model, whether it be cloud computing or something else, you can't. You have to trust your outsourcer completely. You not only have to trust the outsourcer's security, but its reliability, its availability, and its business continuity. You don't want your critical data to be on some cloud computer that abruptly disappears because its owner goes bankrupt. You don't want the company you're using to be sold to your direct competitor. You don't want the company to cut corners, without warning, because times are tight. Or raise its prices and then refuse to let you have your data back. These things can happen with software vendors, but the results aren't as drastic. There are two different types of cloud computing customers. The first only pays a nominal fee for these services -- and uses them for free in exchange for ads: e.g., Gmail and Facebook. These customers have no leverage with their outsourcers. You can lose everything. Companies like Google and Amazon won't spend a lot of time caring. The second type of customer pays considerably for these services: to Salesforce.com, MessageLabs, managed network companies, and so on. These customers have more leverage, providing they write their service contracts correctly. Still, nothing is guaranteed. Trust is a concept as old as humanity, and the solutions are the same as they have always been. Be careful who you trust, be careful what you trust them with, and be careful how much you trust them. Outsourcing is the future of computing. Eventually we'll get this right, but you don't want to be a casualty along the way. This essay originally appeared in The Guardian. http://www.guardian.co.uk/technology/2009/jun/04/bruce-schneier-cloud-computing or http://tinyurl.com/op7p7k Another opinion: http://1raindrop.typepad.com/1_raindrop/2009/06/begin-the-begin-cloud-security.html or http://tinyurl.com/mnc3lb A rebuttal: http://www.rationalsurvivability.com/blog/?p=952 http://www.rationalsurvivability.com/blog/?p=1013 The reason I am talking so much about cloud computing is that reporters and inverviewers keep asking me about it. I feel kind of dragged into this whole thing. At the Computers, Freedom, and Privacy conference earlier this month, Bob Gellman said that the nine most important words in cloud computing are: "terms of service," "location, location, location," and "provider, provider, provider" -- basically making the same point I did. You need to make sure the terms of service you sign up for are ones you can live with. You need to make sure the location of the provider doesn't subject you to any laws you can't live with. And you need to make sure your provider is someone you're willing to work with. Basically, if you're going to give someone else your data, you need to trust them. http://www.worldprivacyforum.org/cloudprivacy.html A copy of this essay, with all embedded links, is here: http://www.schneier.com/blog/archives/2009/06/cloud_computing.html ** *** ***** ******* *********** ************* The Second Interdisciplinary Workshop on Security and Human Behaviour Last week, I was at SHB09, the Second Interdisciplinary Workshop on Security and Human Behaviour, at MIT. This was a two-day gathering of computer security researchers, psychologists, behavioral economists, sociologists, philosophers, and others -- all of whom are studying the human side of security -- organized by Ross Anderson, Alessandro Acquisti, and myself. I liveblogged the workshop; here are the talk summaries. (People were invited to submit a link for themselves, and links to applicable things they wrote. Those links will be included after each talk summary.) The first session was about deception, moderated by David Clark. Frank Stajano, Cambridge University, presented research with Paul Wilson, who films actual scams for "The Real Hustle." His point is that we build security systems based on our "logic," but users don't always follow our logic. It's fraudsters who really understand what people do, so we need to understand what the fraudsters understand. Things like distraction, greed, unknown accomplices, social compliance are important. http://www.cl.cam.ac.uk/~fms27/ Usability of Security Management: Defining the Permissions of Guests http://www.cl.cam.ac.uk/~fms27/papers/2006-JohnsonSta-guests.pdf David Livingstone Smith, University of New England, is a philosopher by training, and goes back to basics: "What are we talking about?" A theoretical definition -- "that which something has to have to fall under a term" -- of deception is difficult to define. "Cause to have a false belief," from the Oxford English Dictionary, is inadequate. "To deceive is intentionally have someone to have a false belief" also doesn't work. "Intentionally causing someone to have a false belief that the speaker knows to be false" still isn't good enough. The fundamental problem is that these are anthropocentric definitions. Deception is not unique to humans; it gives organisms an evolutionary edge. For example, the mirror orchid fools a wasp into landing on it by looking like and giving off chemicals that mimic the female wasp. This example shows that we need a broader definition of "purpose." His formal definition: "For systems A and B, A deceives B iff A possesses some character C with proper function F, and B possesses a mechanism C* with the proper function F* of producing representations, such that the proper function of C is to cause C* to fail to perform F* by causing C* to form false representations, and C does so in virtue of performing F, and B's falsely representing enables some feature of A to perform its proper function." http://www.realhumannature.com Less than human: self-deception in the imagining of others http://realhumannature.com/?page_id=61 Talk on Lying at La Ciudad de Las Ideas http://www.laciudaddeideas.com/ciudad2/play.php?vid=106 a subsequent discussion http://www.youtube.com/watch?v=OnjpoOhwEzk Why War? http://realhumannature.com/?page_id=26 I spoke next, about the psychology of Conficker, how the human brain buys security, and why science fiction writers shouldn't be hired to think about terrorism risks (to be published on Wired.com this week). http://www.schneier.com/blog/archives/2009/04/conficker.html http://www.schneier.com/essay-232.html Dominic Johnson, University of Edinburgh, talked about his chapter in the book Natural Security: A Darwinian Approach to a Dangerous World. Life has 3.5 billion years of experience in security innovation; let's look at how biology approaches security. Biomimicry, ecology, paleontology, animal behavior, evolutionary psychology, immunology, epidemiology, selection, and adaption are all relevant. Redundancy is a very important survival tool for species. Here's an adaption example: The 9/11 threat was real and we knew about it, but we didn't do anything. His thesis: Adaptation to novel security threats tends to occur after major disasters. There are many historical examples of this; Pearl Harbor, for example. Causes include sensory biases, psychological biases, leadership biases, organizational biases, and political biases -- all pushing us towards maintaining the status quo. So it's natural for us to poorly adapt to security threats in the modern world. A questioner from the audience asked whether control theory had any relevance to this model. http://dominicdpjohnson.com/ Paradigm Shifts in Security Strategy http://www.cl.cam.ac.uk/~rja14/shb09/johnsond1.pdf Perceptions of victory and defeat http://dominicdpjohnson.com/publications/books.html Jeff Hancock, Cornell University, studies interpersonal deception: how the way we lie to each other intersects with communications technologies; and how technologies change the way we lie, and can technology be used to detect lying? Despite new technology, people lie for traditional reasons. For example: on dating sites, men tend to lie about their height and women tend to lie about their weight. The recordability of the Internet also changes how we lie. The use of the first person singular tends to go down the more people lie. He verified this in many spheres, such as how people describe themselves in chat rooms, and true versus false statements that the Bush administration made about 9/11 and Iraq. The effect was more pronounced when administration officials were answering questions than when they were reading prepared remarks. http://www.comm.cornell.edu/staff/employee/jeffrey_t_hancock.html On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication http://www.cl.cam.ac.uk/~rja14/shb09/hancock1.pdf Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles http://www.cl.cam.ac.uk/~rja14/shb09/hancock2.pdf The second session was about fraud. (These session subjects are only general. We tried to stick related people together, but there was the occasional oddball -- and scheduling constraint -- to deal with.) Julie Downs, Carnegie Mellon University, is a psychologist who studies how people make decisions, and talked about phishing. To determine how people respond to phishing attempts -- what e-mails they open and when they click on links -- she watched as people interacted with their e-mail. She found that most people's strategies to deal with phishing attacks might have been effective 5-10 years ago, but are no longer sufficient now that phishers have adapted. She also found that educating people about phishing didn't make them more effective at spotting phishing attempts, but made them more likely to be afraid of doing anything on line. She found this same overreaction among people who were recently the victims of phishing attacks, but again people were no better separating real e-mail from phishing attempts. What does make a difference is contextual understanding: how to parse a URL, how and why the scams happen, what SSL does and doesn't do. http://sds.hss.cmu.edu/src/faculty/downs.php Behavioral Response to Phishing Risk http://www.cl.cam.ac.uk/~rja14/shb09/downs1.pdf Parents' vaccination comprehension and decisions http://www.cl.cam.ac.uk/~rja14/shb09/downs2.pdf The Psychology of Food Consumption http://www.cl.cam.ac.uk/~rja14/shb09/downs3.pdf Jean Camp, Indiana University, studies people taking risks online. Four points: 1) "people create mental models from internal narratives about risk," 2) "risk mitigating action is taken only if the risk is perceived as relevant," 3) "contextualizing risk can show risks as relevant," and 4) "narrative can increase desire and capacity to use security tools." Stories matter: "people are willing to wash out their cat food cans and sweep up their sweet gum balls to be a good neighbor, but allow their computers to join zombie networks" because there's a good story in the former and none in the latter. She presented two experiments to demonstrate this. One was a video experiment watching business majors try to install PGP. No one was successful: there was no narrative, and the mixed metaphor of physical and cryptographic "key" confused people. http://www.ljean.com/ Experimental Evaluation of Expert and Non-expert Computer Users' Mental Models of Security Risks http://www.cl.cam.ac.uk/~rja14/shb08/camp.pdf Matt Blaze, University of Pennsylvania, talked about electronic voting machines and fraud. He related the anecdote about actual electronic voting machine vote fraud in Kentucky from the second link. In the question session, he speculated about the difficulty of having a security model that would have captured the problem, and how to know whether that model was complete enough. http://www.crypto.com/ Electronic vote rigging in Kentucky http://www.crypto.com/blog/vote_fraud_in_kentucky/ Jeffrey Friedberg, Microsoft, discussed research at Microsoft around the Trust User Experience (TUX). He talked about the difficulty of verifying SSL certificates. Then he talked about how Microsoft added a "green bar" to signify trusted sites, and how people who learned to trust the green bar were fooled by "picture in picture attacks": where a hostile site embedded a green-bar browser window in its page. Most people don't understand that the information inside the browser window is arbitrary, but that the stuff around it is not. The user interface, user experience, mental models all matter. Designing and evaluating TUX is hard. From the questions: training doesn't help much, because given a plausible story, people will do things counter to their training. http://www.mccullagh.org/image/10d-14/jeffrey-friedberg-microsoft.html Internet Fraud Battlefield http://www.cl.cam.ac.uk/~rja14/shb09/friedberg.pdf End to End Trust and the Trust User Experience http://www.microsoft.com/mscorp/twc/endtoendtrust/blogPosting.aspx?blogSource=20090423_friedberg.xml Testimony on "spyware" http://www.microsoft.com/presspass/exec/friedberg/04-29spyware.mspx Stuart Schechter, Microsoft, presented this research on secret questions. Basically, secret questions don't work. They're easily guessable based on the most common answers; friends and relatives of people can easily predict unique answers; and people forget their answers. Even worse, the more memorable the question/answers are, the easier they are to guess. Having people write their own questions is no better: "What's my blood type?" "How tall am I?" http://www.eecs.harvard.edu/~stuart/ It's no secret http://research.microsoft.com/pubs/79594/oakland09.pdf The Emperor's New Security Indicators http://usablesecurity.org/emperor/emperor.pdf Tyler Moore, Harvard University, discussed his empirical studies on online crime and defense. Fraudsters are good at duping users, but they're also effective at exploiting failures among IT professionals to perpetuate the infrastructure necessary to carry out these exploits on a large scale (hosting fake web pages, sending spam, laundering the profits via money mules, and so on). There is widespread refusal among the defenders to cooperate with each other, and attackers exploit these limitations. We are better at removing phishing websites than we are at defending against the money mules. Defenders tend to fix immediate problems, but not underlying problems. http://people.seas.harvard.edu/~tmoore/ The Consequences of Non-Cooperation in the Fight Against Phishing http://people.seas.harvard.edu/~tmoore/ecrime08.pdf Information Security Economics -- and Beyond http://www.cl.cam.ac.uk/~rja14/Papers/econ_czech.pdf In the discussion phase, there was a lot of talk about the relationships between websites, like banks, and users -- and how that affects security for both good and bad. Jean Camp doesn't want a relationship with her bank, because that unduly invests her in the bank. (Someone from the audience pointed out that, as a U.S. taxpayer, she is already invested in her bank.) Angela Sasse said that the correct metaphor is "rules of engagement," rather than relationships. Session three was titled "Usability." Andrew Patrick, NRC Canada until he was laid off four days ago, talked about biometric systems and human behavior. Biometrics are used everywhere: for gym membership, at Disneyworld, at international borders. The government of Canada is evaluating using iris recognition at a distance for events like the 2010 Olympics. There are two different usability issues: with respect to the end user, and with respect to the authenticator. People's acceptance of biometrics is very much dependent on the context. And of course, biometrics are not secret. Patrick suggested that to defend ourselves against this proliferation of using biometrics for authentication, the individual should publish them. The rationale is that we're publishing them anyway, so we might as well do it knowingly. http://andrewpatrick.ca Fingerprint Concerns: Performance, Usability, and Acceptance of Fingerprint Biometric Systems http://www.andrewpatrick.ca/essays/fingerprint-concerns-performance-usability-and-acceptance-of-fingerprint-biometric-systems Luke Church, Cambridge University, talked about what he called "user-centered design." There's a economy of usability: "in order to make some things easier, we have to make some things harder" -- so it makes sense to make the commonly done things easier at the expense of the rarely done things. This has a lot of parallels with security. The result is "appliancisation" (with a prize for anyone who come up with a better name): the culmination of security behaviors and what the system can do embedded in a series of user choices. Basically, giving users meaningful control over their security. Luke discussed several benefits and problems with the approach. http://www.lukechurch.net SHB Position Paper http://www.lukechurch.net/Professional/Publications/SHB-2009-06-TheUserExperienceOfComputerSecurity.pdf Usability and the Common Criteria http://www.lukechurch.net/Professional/Publications/WISA-2008-09-IntroducingUsabilityToTheCommonCriteria.pdf Diana Smetters, Palo Alto Research Center, started with these premises: you can teach users, but you can't teach them very much, so you'd better carefully design systems so that you 1) minimize what they have to learn, 2) make it easier for them to learn it, and 3) maximize the benefit from what they learn. Too often, security is at odds with getting the job done. "As long as configuration errors (false alarms) are common, any technology that requires users to observe security indicators and react to them will fail as attacks can simply masquerade as errors, and users will rationally ignore them." She recommends meeting the user halfway by building new security models that actually fit the users' needs. (For example: Phishing is a mismatch problem, between what's in the user's head and where the URL is actually going. SSL doesn't work, but how should websites authenticate themselves to users? Her solution is protected links: a set of secure bookmarks in protected browsers. She went on to describe a prototype and tests run with user subjects. http://www.parc.com/about/people/176/diana-smetters.html Breaking out of the browser to defend against phishing attacks http://www.parc.com/publication/2068/breaking-out-of-the-browser-to-defend-against-phishing-attacks.html Building secure mashups http://www.parc.com/publication/2054/building-secure-mashups.html Ad-hoc guesting: when exceptions are the rule http://www.usenix.org/event/upsec08/tech/full_papers/dalal/dalal.pdf Jon Callas, PGP Corporation, used the metaphor of the "security cliff": you have to keep climbing until you get to the top and that's hard, so it's easier to just stay at the bottom. He wants more of a "security ramp," so people can reasonably stop somewhere in the middle. His idea is to have a few policies -- e-mail encryption, rules about USB drives -- and enforce them. This works well in organizations, where IT has dictatorial control over user configuration. If we can't teach users much, we need to enforce policies on users. http://www.pgp.com/company/management.html Improving Message Security With a Self-Assembling PKI http://middleware.internet2.edu/pki03/presentations/03.pdf Rob Reeder, Microsoft, presented a possible solution to the secret questions problem: social authentication. The idea is to use people you know (trustees) to authenticate who you are, and have them attest to the fact that you lost your password. He went on to describe how the protocol works, as well as several potential attacks against the protocol and defenses, and experiments that tested the protocol. In the question session he talked about people designating themselves as trustees, and how that isn't really a problem. http://www.robreeder.com/ Expanding Grids for Visualizing and Authoring Computer Security Policies http://www.robreeder.com/pubs/xGridsCHI2008.pdf Lorrie Cranor, Carnegie Mellon University, talked about security warnings. The best option is to fix the hazard; the second best is to guard against it -- but far too often we just warn people about it. But since hazards are generally not very hazardous, most people just ignore them. "Often, software asks the user and provides little or no information to help user make this decision." Better is to use some sort of automated analysis to assist the user in responding to warnings. For websites, for example, the system should block sites with a high probability of danger, not bother users if there is a low probably of danger, and help the user make the decision in the grey area. She went on to describe a prototype and user studies done with the prototype; her paper will be presented at USENIX Security in August. http://lorrie.cranor.org/ A Framework for Reasoning About the Human in the Loop http://www.cylab.cmu.edu/default.aspx?id=2396 Timing Is Everything? The Effects of Timing and Placement of Online Privacy Indicators http://www.guanotronic.com/~serge/papers/chi09a.pdf School of Phish: A Real-Word Evaluation of Anti-Phishing Training http://www.cylab.cmu.edu/research/techreports/tr_cylab09002.html You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings http://www.guanotronic.com/~serge/papers/warned.pdf Much of the discussion centered on how bad the problem really is, and how much security is good enough. The group also talked about economic incentives companies have to either fix or ignore security problems, and whether market approaches (or, as Jean Camp called it, "the happy Libertarian market pony") are sufficient. Some companies have incentives to convince users to do the wrong thing, or at the very least to do nothing. For example, social networking sites are more valuable if people share their information widely. Further discussion was about whitelisting, and whether it worked or not. There's the problem of the bad guys getting on the whitelist, and the risk that organizations like the RIAA will use the whitelist to enforce copyright, or that large banks will use the whitelist as a tool to block smaller start-up banks. Another problem is that the user might not understand what a whitelist signifies. Dave Clark from the audience: "It's not hard to put a seat belt on, and if you need a lesson, take a plane." Kind of a one-note session. We definitely need to invite more psych people next time. David Livingstone Smith moderated the fourth session, about (more or less) methodology. Angela Sasse, University College London, has been working on usable security for over a dozen years. As part of a project called "Trust Economics," she looked at whether people comply with security policies and why they either do or do not. She found that there is a limit to the amount of effort people will make to comply -- this is less actual cost and more perceived cost. Strict and simple policies will be complied with more than permissive but complex policies. Compliance detection, and reward or punishment, also affect compliance. People justify noncompliance by "frequently made excuses." http://www.cs.ucl.ac.uk/staff/a.sasse/ The Compliance Budget: Managing Security Behaviour in Organisations http://hornbeam.cs.ucl.ac.uk/hcs/publications/Beautement+Sasse+Wonham_The%20Compliance%20Budget_Managing%20Security%20Behaviour%20in%20Organisations_NSPW2008.pdf Human Vulnerabilities in Security Systems http://www.ktn.qinetiq-tim.net/files/Public/whitepapers/HFWG%20White%20Paperfinal.pdf Bashar Nuseibeh, Open University, talked about mobile phone security; specifically, Facebook privacy on mobile phones. He did something clever in his experiments. Because he wasn't able to interview people at the moment they did something -- he worked with mobile users -- he asked them to provide a "memory phrase" that allowed him to effectively conduct detailed interviews at a later time. This worked very well, and resulted in all sorts of information about why people made privacy decisions at that earlier time. A Multi-Pronged Empirical Approach to Mobile Privacy Investigation http://mcs.open.ac.uk/ban25/ Security Requirements Engineering: A Framework for Representation and Analysis http://mcs.open.ac.uk/ban25/papers/Haley-TSE-04359475-for_web.pdf James Pita, University of Southern California, studies security personnel who have to guard a physical location. In his analysis, there are limited resources -- guards, cameras, etc. -- and a set of locations that need to be guarded. An example would be the Los Angeles airport, where a finite number of K-9 units need to guard eight terminals. His model uses a Stackelberg game to minimize predictability (otherwise, the adversary will learn it and exploit it) while maximizing security. There are complications -- observational uncertainty and bounded rationally on the part of the attackers -- which he tried to capture in his model. http://teamcore.usc.edu/pita/ http://mcs.open.ac.uk/ban25/papers/chi2008-Mancini-et-al.pdf Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport http://teamcore.usc.edu/pita/publications/2008/AAMASind2008Final.pdf Markus Jakobsson, Palo Alto Research Center, pointed out that auto insurers ask people if they smoke in order to get a feeling for whether they engage in high-risk behaviors. In his experiment, he selected 100 people who were the victim of online fraud and 100 people who were not. He then asked them to complete a survey about different physical risks such as mountain climbing and parachute jumping, financial risks such as buying stocks and real estate, and Internet risks such as visiting porn sites and using public wi-fi networks. He found significant correlation between different risks, but I didn't see an overall pattern emerge. And in the discussion phase, several people had questions about the data. More analysis, and probably more data, is required. To be fair, he was still in the middle of his analysis. http://www.informatics.indiana.edu/markus/ Male, late with your credit card payment, and like to speed? You will be phished! http://www.cl.cam.ac.uk/~rja14/shb09/jakobsson-shb09.pdf Social Phishing http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf Love and Authentication http://www.ravenwhite.com/files/chi08JSWY.pdf Quantifying the Security of Preference-Based Authentication http://www.ravenwhite.com/files/quantifying.pdf Rachel Greenstadt, Drexel University, discussed ways in which humans and machines can collaborate in making security decisions. These decisions are hard for several reasons: because they are context dependent, require specialized knowledge, are dynamic, and require complex risk analysis. And humans and machines are good at different sorts of tasks. Machine-style authentication: This guy I'm standing next to knows Jake's private key, so he must be Jake. Human-style authentication: This guy I'm standing next to looks like Jake and sounds like Jake, so he must be Jake. The trick is to design systems that get the best of these two authentication styles and not the worst. She described two experiments examining two decisions: should I log into this website (the phishing problem), and should I publish this anonymous essay or will my linguistic style betray me? http://www.cs.drexel.edu/~greenie Practical Attacks Against Authorship Recognition Techniques (pre-print) http://www.cs.drexel.edu/~greenie/brennan_paper.pdf Reinterpreting the Disclosure Debate for Web Infections http://weis2008.econinfosec.org/papers/Greenstadt.pdf Mike Roe, Microsoft, talked about crime in online games, particularly in Second Life and Metaplace. There are four classes of people on online games: explorers, socializers, achievers, and griefers. Griefers try to annoy socializers in social worlds like Second Life, or annoy achievers in competitive worlds like World of Warcraft. Crime is not necessarily economic; criminals trying to steal money is much less of a problem in these games than people just trying to be annoying. In the question session, Dave Clark said that griefers are a constant, but economic fraud grows over time. I responded that the two types of attackers are different people, with different personality profiles. I also pointed out that there is another kind of attacker: achievers who use illegal mechanisms to assist themselves. http://research.microsoft.com/users/mroe/ In the discussion, Peter Neumann pointed out that safety is an emergent property, and requires security, reliability, and survivability. Others weren't so sure. The first session of the second day was "Foundations," which is kind of a catch-all for a variety of things that didn't really fit anywhere else. Rachel Greenstadt moderated. Terence Taylor, International Council for the Live Sciences, talked about the lessons evolution teaches about living with risk. Successful species didn't survive by eliminating the risks of their environment, they survived by adaptation. Adaptation isn't always what you think. For example, you could view the collapse of the Soviet Union as a failure to adapt, but you could also view it as successful adaptation. Risk is good. Risk is essential for the survival of a society, because risk-takers are the drivers of change. In the discussion phase, John Mueller pointed out a key difference between human and biological systems: humans tend to respond dramatically to anomalous events (the anthrax attacks), while biological systems respond to sustained change. And David Livingstone Smith asked about the difference between biological adaptation that affects the reproductive success of an organism's genes, even at the expense of the organism, with security adaptation. (I recommend the book he edited: Natural Security: A Darwinian Approach to a Dangerous World.) http://www.iclscharter.org/people.html Darwinian Security http://www.darwiniansecurity.org Natural Security http://www.youtube.com/watch?v=job2avPAbgU Andrew Odlyzko, University of Minnesota, discussed human-space vs. cyberspace. People cannot build secure systems -- we know that -- but people also cannot live with secure systems. We require a certain amount of flexibility in our systems. And finally, people don't need secure systems. We survive with an astounding amount of insecurity in our world. The problem with cyberspace is that it was originally conceived as separate from the physical world, and that it could correct for the inadequacies of the physical world. Really, the two are intertwined, and that human space more often corrects for the inadequacies of cyberspace. Lessons: build messy systems, not clean ones; create a web of ties to other systems; create permanent records. http://www.dtc.umn.edu/~odlyzko/ Network Neutrality, Search Neutrality, and the Never-Ending Conflict Between Efficiency and Fairness in Markets http://www.cl.cam.ac.uk/~rja14/shb09/odlyzko.pdf Economics, psychology, and sociology of security http://www.dtc.umn.edu/~odlyzko/doc/econ.psych.security.pdf danah boyd, Microsoft Research, does ethnographic studies of teens in cyberspace. Teens tend not to lie to their friends in cyberspace, but they lie to the system. Since an early age, they've been taught that they need to lie online to be safe. Teens regularly share their passwords: with their parents when forced, or with their best friend or significant other. This is a way of demonstrating trust. It's part of the social protocol for this generation. In general, teens don't use social media in the same way as adults do. And when they grow up, they won't use social media in the same way as today's adults do. Teens view privacy in terms of control, and take their cues about privacy from celebrities and how they use social media. And their sense of privacy is much more nuanced and complicated. In the discussion phase, danah wasn't sure whether the younger generation would be more or less susceptible to Internet scams than the rest of us -- they're not nearly as technically savvy as we might think they are. "The only thing that saves teenagers is fear of their parents"; they try to lock them out, and lock others out in the process. Socio-economic status matters a lot, in ways that she is still trying to figure out. There are three different types of social networks: personal networks, articulated networks, and behavioral networks, and they're different. http://www.danah.org Taken Out of Context -- American Teen Sociality in Networked Publics http://www.danah.org/papers/TakenOutOfContext.pdf Mark Levine, Lancaster University. He collected data from UK CCTV cameras, searches for aggressive behavior, and studies when and how bystanders either help escalate or de-escalate the situations. Results: as groups get bigger, there is no increase of anti-social acts and a significant increase in pro-social acts. He has much more analysis and results, too complicated to summarize here. One key finding: when a third party intervenes in an aggressive interaction, it is much more likely to de-escalate. Basically, groups can act against violence. "When it comes to violence (and security), group processes are part of the solution -- not part of the problem?" http://www.psych.lancs.ac.uk/people/MarkLevine.html The Kindness of Crowds http://www.economist.com/science/displaystory.cfm?story_id=13176759 Intra-group Regulation of Violence: Bystanders and the (De)-escalation of Violence http://www.cl.cam.ac.uk/~rja14/shb09/levine1.pdf Jeff MacKie-Mason, University of Michigan, is an economist: "Security problems are incentive problems." He discussed motivation, and how to design systems to take motivation into account. Humans are smart devices; they can't be programmed, but they can be influenced through the sciences of motivational behavior: microeconomics, game theory, social psychology, psychodynamics, and personality psychology. He gave a couple of general examples of how these theories can inform security system design. http://jeff-mason.com Humans are smart devices, but not programmable http://www.cl.cam.ac.uk/~rja14/shb09/mackie-mason.pdf Security when people matter http://hdl.handle.net/2027.42/55773 A Social Mechanism for Supporting Home Computer Security http://hdl.handle.net/2027.42/63006 Joe Bonneau, Cambridge University, talked about social networks like Facebook, and privacy. People misunderstand why privacy and security is important in social networking sites like Facebook. People underestimate of what Facebook really is; it really is a reimplementation of the entire Internet. "Everything on the Internet is becoming social," and that makes security different. Phishing is different, 419-style scams are different. Social context makes some scams easier; social networks are fun, noisy, and unpredictable. "People use social networking systems with their brain turned off." But social context can be used to spot frauds and anomalies, and can be used to establish trust. http://www.cl.cam.ac.uk/~jcb82/ Session Six -- "Terror" -- chaired by Stuart Schechter. Bill Burns, Decision Research, studies social reaction to risk. He discussed his theoretical model of how people react to fear events, and data from the 9/11 attacks, the 7/7 bombings in the UK, and the 2008 financial collapse. Basically, we can't remain fearful. No matter what happens, fear spikes immediately after and recovers 45 or so days afterwards. He believes that the greatest mistake we made after 9/11 was labeling the event as terrorism instead of an international crime. http://www.decisionresearch.org/people/burns/ The Diffusion of Fear: Modeling Community Response to a Terrorist Strike http://www.cl.cam.ac.uk/~rja14/shb08/burns.pdf Chris Cocking, London Metropolitan University, looks at the group behavior of people responding to emergencies. Traditionally, most emergency planning is based on the panic model: people in crowds are prone to irrational behavior and panic. There's also a social attachment model that predicts that social norms don't break down in groups. He prefers a self-categorization approach: disasters create a common identity, which results in orderly and altruistic behavior among strangers. The greater the threat, the greater the common identity, and spontaneous resilience can occur. He displayed a photograph of "panic" in New York on 9/11 and showed how it wasn't panic at all. Panic seems to be more a myth than a reality. This has policy implications during an event: provide people with information, and people are more likely to underreact than overreact, if there is overreaction, it's because people are acting as individuals rather than groups, so those in authority should encourage a sense of collective identity. "Crowds can be part of the solution rather than part of the problem." http://news.bbc.co.uk/1/hi/uk/4702659.stm Effects of social identity on responses to emergency mass evacuation http://www.sussex.ac.uk/affiliates/panic/ Richard John, University of Southern California, talked about the process of social amplification of risk (with respect to terrorism). Events result in relatively small losses; it's the changes in behavior following an event that result in much greater losses. There's a dynamic of risk perception, and it's very contextual. He uses vignettes to study how risk perception changes over time, and discussed some of the studies he's conducting and ideas for future studies. http://www.usc.edu/schools/college/psyc/people/faculty1003386.html Decision Analysis by Proxy for the Rational Terrorist http://www.cl.cam.ac.uk/~rja14/shb09/john1.pdf Mark Stewart, University of Newcastle, Australia, examines infrastructure security and whether the costs exceed the benefits. He talked about cost/benefit trade-off, and how to apply probabilistic terrorism risk assessment; then, he tried to apply this model to the U.S. Federal Air Marshal Service. His result: they're not worth it. You can quibble with his data, but the real value is a transparent process. During the discussion, I said that it is important to realize that risks can't be taken in isolation, that anyone making a security trade-off is balancing several risks: terrorism risks, political risks, the personal risks to his career, etc. http://www.newcastle.edu.au/research-centre/cipar/ A risk and cost-benefit assessment of United States aviation security measures http://polisci.osu.edu/faculty/jmueller/STEWJTS.PDF Risk and Cost-Benefit Assessment of Counter-Terrorism Protective Measures to Infrastructure http://nova.newcastle.edu.au/vital/access/manager/Repository/uon:3125 John Adams, University College London, applies his risk thermostat model to terrorism. He presented a series of amusing photographs of overreactions to risk, most of them not really about risk aversion but more about liability aversion. He talked about bureaucratic paranoia, as well as bureaucratic incitements to paranoia, and how this is beginning to backfire. People treat risks differently, depending on whether they are voluntary, impersonal, or imposed, and whether people have total control, diminished control, or no control. http://john-adams.co.uk/about/ Deus e Brasileiro? http://john-adams.co.uk/2008/12/31/deus-e-brasileiro/ Can Science Beat Terrorism? http://john-adams.co.uk/2009/03/06/the-world-under-assault-can-science-beat-terrorism/ Bicycle bombs: a further inquiry http://john-adams.co.uk/2009/01/16/bicycle-bombs-a-further-enquiry-and-a-new-theory/ Dan Gardner, Ottawa Citizen, talked about how the media covers risks, threats, attacks, etc. He talked about the various ways the media screws up, all of which were familiar to everyone. His thesis is not that the media gets things wrong in order to increase readership/viewership and therefore profits, but that the media gets things wrong because reporters are human. Bad news bias is not a result of the media hyping bad news, but the natural human tendency to remember the bad more than the good. The evening news is centered around stories because people -- including reporters -- respond to stories, and stories with novelty, emotion, and drama are better stories. http://www.amazon.com/Science-Fear-Shouldnt-Ourselves-Greater/dp/0525950621 Some of the discussion was about the nature of panic: whether and where it exists, and what it looks like. Someone from the audience questioned whether panic was related to proximity to the event; someone else pointed out that people very close to the 7/7 bombings took pictures and made phone calls -- and that there was no evidence of panic. Also, on 9/11 pretty much everyone below where the airplanes struck the World Trade Center got out safely; and everyone above couldn't get out, and died. Angela Sasse pointed out that the previous terrorist attack against the World Trade Center, and the changes made in evacuation procedures afterwards, contributed to the lack of panic on 9/11. Bill Burns said that the purest form of panic is a drowning person. Jean Camp asked whether the recent attacks against women's health providers should be classified as terrorism, or whether we are better off framing it as crime. There was also talk about sky marshals and their effectiveness. I said that it isn't sky marshals that are a deterrent, but the idea of sky marshals. Terence Taylor said that increasing uncertainty on the part of the terrorists is, in itself, a security measure. There was also a discussion about how risk-averse terrorists are; they seem to want to believe they have an 80% or 90% change of success before they will launch an attack. The penultimate session of the conference was "Privacy," moderated by Tyler Moore. Alessandro Acquisti, Carnegie Mellon University, presented research on how people value their privacy. He started by listing a variety of cognitive biases that affect privacy decisions: illusion of control, overconfidence, optimism bias, endowment effect, and so on. He discussed two experiments. The first demonstrated a "herding effect": if a subject believes that others reveal sensitive behavior, the subject is more likely to also reveal sensitive behavior. The second examined the "frog effect": do privacy intrusions alert or desensitize people to revealing personal information? What he found is that people tend to set their privacy level at the beginning of a survey, and don't respond well to being asked easy questions at first and then sensitive questions at the end. In the discussion, Joe Bonneau asked him about the notion that people's privacy protections tend to ratchet up over time; he didn't have conclusive evidence, but gave several possible explanations for the phenomenon. http://www.heinz.cmu.edu/~acquisti/ What Can Behavioral Economics Teach Us About Privacy? http://www.heinz.cmu.edu/~acquisti/papers/Acquisti-Grossklags-Chapter-Etrics.pdf Privacy in Electronic Commerce and the Economics of Immediate Gratification http://www.heinz.cmu.edu/~acquisti/papers/privacy-gratification.pdf Adam Joinson, University of Bath, also studies how people value their privacy. He talked about expressive privacy -- privacy that allows people to express themselves and form interpersonal relationships. His research showed that differences between how people use Facebook in different countries depend on how much people trust Facebook as a company, rather than how much people trust other Facebook users. Another study looked at posts from Secret Tweet and Twitter. He found 16 markers that allowed him to automatically determine which tweets contain sensitive personal information and which do not, with high probability. Then he tried to determine if people with large Twitter followings post fewer secrets than people who are only twittering to a few people. He found absolutely no difference. http://www.joinson.com/ Privacy, Trust and Self-Disclosure Online http://people.bath.ac.uk/aj266/pubs_pdf/joinson_et_al_HCI_final.pdf Privacy concerns and privacy actions http://people.bath.ac.uk/aj266/pubs_pdf/ijhcs.pdf Peter Neumann, SRI, talked about lack of medical privacy (too many people have access to your data), about voting (the privacy problem makes the voting problem a lot harder, and the end-to-end voting security/privacy problem is much harder than just securing voting machines), and privacy in China (the government is requiring all computers sold in China to be sold with software allowing them to eavesdrop on the users). Any would-be solution needs to reflect the ubiquity of the threat. When we design systems, we need to anticipate what the privacy problems will be. Privacy problems are everywhere you look, and ordinary people have no idea of the depth of the problem. http://www.csl.sri.com/users/neumann/ Holistic systems http://www.csl.sri.com/neumann/holistic.pdf Risks http://www.csl.sri.com/users/neumann/#3 Identity and Trust in Context http://www.csl.sri.com/neumann/idtrust09+x4.pdf Eric Johnson, Dartmouth College, studies the information access problem from a business perspective. He's been doing field studies in companies like retail banks and investment banks, and found that role-based access control fails because companies can't determine who has what role. Even worse, roles change quickly, especially in large complex organizations. For example, one business group of 3000 people experiences 1000 role changes within three months. The result is that organizations do access control badly, either over-entitling or under-entitling people. But since getting the job done is the most important thing, organizations tend to over-entitle: give people more access than they need. His current work is to find the right set of incentives and controls to set access more properly. The challege is to do this without making people risk averse. In the discussion, he agreed that a perfect access control system is not possible, and that organizations should probably allow a certain amount of access control violations -- similar to the idea of posting a 55 mph speed limit but not ticketing people unless they go over 70 mph. http://mba.tuck.dartmouth.edu/pages/faculty/eric.johnson/ Access Flexibility with Escalation and Audit http://mba.tuck.dartmouth.edu/digital/Research/ResearchProjects/wise_v1.pdf Security through Information Risk Management http://mba.tuck.dartmouth.edu/digital/Research/ResearchProjects/JohnsonRiskManagement_Finald.pdf Christine Jolls, Yale Law School, made the point that people regularly share their most private information with their intimates -- so privacy is not about secrecy, it's more about control. There are moments when people make pretty big privacy decisions. For example, they grant employers the rights to monitor their e-mail, or test their urine without notice. In general, courts hold that blanket signing away of privacy rights -- "you can test my urine on any day in the future" -- are not valid, but immediate signing away of privacy of privacy rights -- "you can test my urine today" -- are. Jolls believes that this is reasonable for several reasons, such as optimism bias and an overfocus on the present at the expense of the future. Without realizing it, the courts have implemented the system that behavioral economics would find optimal. During the discussion, she talked about how coercion figures into this; the U.S. legal system tends not to be concerned with it. http://www.law.yale.edu/faculty/CJolls.htm Rationality and Consent in Privacy Law http://www.cl.cam.ac.uk/~rja14/shb09/jolls1.pdf Employee Privacy http://www.cl.cam.ac.uk/~rja14/shb09/jolls2.pdf Andrew Adams, University of Reading, also looks at attitudes of privacy on social networking services. His results are preliminary, and based on interviews with university students in Canada, Japan, and the UK, and are very concordant with what danah boyd and Joe Bonneau said earlier. >From the UK: People join social networking sites to increase their level of interaction with people they already know in real life. Revealing personal information is okay, but revealing too much is bad. Even more interestingly, it's not okay to reveal more about others than they reveal themselves. From Japan: People are more open to making friends online. There's more anonymity. It's not okay to reveal information about others, but "the fault of this lies as much with the person whose data was revealed in not choosing friends wisely." This victim responsibility is a common theme with other privacy and security elements in Japan. Data from Canada is still being compiled. http://www.personal.rdg.ac.uk/~sis00aaa/ Regulating CCTV http://deposit.depot.edina.ac.uk/119/ Great phrase: the "laundry belt" -- close enough for students to go home on weekends with their laundry, but far enough away so they don't feel as if their parents are looking over their shoulder -- typically two hours by public transportation (in the UK). The eighth, and final, session of the SHB09 was optimistically titled "How Do We Fix the World?" I moderated, which meant that my liveblogging was more spotty, especially in the discussion section. David Mandel, Defense Research and Development Canada, is part of the Thinking, Risk, and Intelligence Group at DRDC Toronto. His first observation: "Be wary of purported world-fixers." His second observation: when you claim that something is broken, it is important to specify the respects in which it's broken and what fixed looks like. His third observation: it is also important to analyze the consequences of any potential fix. An analysis of the way things are is perceptually based, but an analysis of the way things should be is value-based. He also presented data showing that predictions made by intelligence analysts (at least in one Canadian organization) were pretty good. http://mandel.socialpsychology.org/ Applied Behavioral Science in Support of Intelligence Analysis http://www.cl.cam.ac.uk/~rja14/shb09/mandel.pdf Radicalization: What does it mean? http://individual.utoronto.ca/mandel/Mandel-radicalization.pdf The Role of Instigators in Radicalization to Violent Extremism http://individual.utoronto.ca/mandel/NATO_HFM140_Instigators_Mandel.pdf Ross Anderson, Cambridge University, asked "Where's the equilibrium?" Both privacy and security are moving targets, but he expects that someday soon there will be a societal equilibrium. Incentives to price discriminate go up, and the cost to do so goes down. He gave several examples of database systems that reached very different equilibrium points, depending on corporate lobbying, political realities, public outrage, etc. He believes that privacy will be regulated, the only question being when and how. "Where will the privacy boundary end up, and why? How can we nudge it one way or another?" http://www.cl.cam.ac.uk/~rja14/ Database State http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf book chapters on psychology and terror http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c02.pdf http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c24.pdf Alma Whitten, Google, presented a set of ideals about privacy (very European like) and some of the engineering challenges they present. "Engineering challenge #1: How to support access and control to personal data that isn't authenticated? Engineering challenge #2: How to inform users about both authenticated and unauthenticated data? Engineering challenge #3: How to balance giving users control over data collection versus detecting and stopping abuse? Engineering challenge #4: How to give users fine-grained control over their data without overwhelming them with options? Engineering challenge #5: How to link sequential actions while preventing them from being linkable to a person? Engineering challenge #6: How to make the benefits of aggregate data analysis apparent to users? Engineering challenge #7: How to avoid or detect inadvertent recording of data that can be linked to an individual?" (Note that Alma requested not to be recorded.) http://gaudior.net/alma/ Why Johnny can't encrypt: A usability evaluation of PGP 5.0 http://gaudior.net/alma/johnny.pdf John Mueller, Ohio State University, talked about terrorism and the Department of Homeland Security. Terrorism isn't a threat; it's a problem and a concern, certainly, but the word "threat" is still extreme. Al Qaeda isn't a threat, and they're the most serious potential attacker against the U.S. and Western Europe. And terrorists are overwhelmingly stupid. Meanwhile, the terrorism issue "has become a self-licking ice cream cone." In other words, it's now an ever-perpetuating government bureaucracy. There are virtually an infinite number of targets; the odds of any one target being targeted is effectively zero; terrorists pick targets largely at random; if you protect target, it makes other targets less safe; most targets are vulnerable in the physical sense, but invulnerable in the sense that they can be rebuilt relatively cheaply (even something like the Pentagon); some targets simply can't be protected; if you're going to protect some targets, you need to determine if they should really be protected. (I recommend his book, Overblown.) http://psweb.sbs.ohio-state.edu/faculty/jmueller/ Reacting to Terrorism: Probabilities, Consequences, and the Persistence of Fear http://psweb.sbs.ohio-state.edu/faculty/jmueller/ISA2007T.PDF Evaluating Measures to Protect the Homeland from Terrorism http://psweb.sbs.ohio-state.edu/faculty/jmueller/ISA9.PDF Terrorphobia: Our False Sense of Insecurity http://www.the-american-interest.com/ai2/article.cfm?Id=418&MId=19 Adam Shostack, Microsoft, pointed out that even the problem of figuring out what part of the problem to work on first is difficult. One of the issues is shame. We don't want to talk about what's wrong, so we can't use that information to determine where we want to go. We make excuses -- customers will flee, people will sue, stock prices will go down -- even though we know that those excuses have been demonstrated to be false. http://www.homeport.org/~adam/ http://newschoolsecurity.com/ During the discussion, there was a lot of talk about the choice between informing users and bombarding them with information they can't understand. And lots more that I couldn't transcribe. And that's it. SHB09 was a fantastic workshop, filled with interesting people and interesting discussion. Next year in the other Cambridge. Ross Anderson and Adam Shostack wrote talk summaries, too. And Matt Blaze recorded audio: http://www.lightbluetouchpaper.org/2009/06/11/security-and-human-behaviour-2009/ http://newschoolsecurity.com/2009/06/shb-session-1-deception/ http://www.crypto.com/blog/shb09/ ** *** ***** ******* *********** ************* Comments from Readers There are thousands of comments -- many of them interesting -- on these topics on my blog. Search for the story you want to comment on, and join in. http://www.schneier.com/blog ** *** ***** ******* *********** ************* Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. You can subscribe, unsubscribe, or change your address on the Web at . Back issues are also available at that URL. Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and friends who will find it valuable. Permission is also granted to reprint CRYPTO-GRAM, as long as it is reprinted in its entirety. CRYPTO-GRAM is written by Bruce Schneier. Schneier is the author of the best sellers "Schneier on Security," "Beyond Fear," "Secrets and Lies," and "Applied Cryptography," and an inventor of the Blowfish, Twofish, Phelix, and Skein algorithms. He is the Chief Security Technology Officer of BT BCSG, and is on the Board of Directors of the Electronic Privacy Information Center (EPIC). He is a frequent writer and lecturer on security topics. See . Crypto-Gram is a personal newsletter. Opinions expressed are not necessarily those of BT. Copyright (c) 2009 by Bruce Schneier. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Mon Jun 15 09:09:41 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 15 Jun 2009 08:09:41 -0800 Subject: Natural WeightL0SS Solution Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1993 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 15 01:52:02 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 15 Jun 2009 09:52:02 +0100 Subject: fitness and good lucks are not far Message-ID: <000d01c9ed8e$2b709ff0$6400a8c0@lazezom> View online version here: here June 15, 2009 Sign up Forward Archive Advertise Let Accai Berry imporve your health. Enter in a tick  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5293 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 15 06:03:33 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 15 Jun 2009 10:03:33 -0300 Subject: Packed with Antioxidants . Acai Berry. Message-ID: <000d01c9edb9$afee1c00$6400a8c0@bedeviling12> View online version here: here June 15, 2009 Sign up Forward Archive Advertise Acai Slim, the all naturaly balanced way to lose weight. Take a step to enter  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5260 bytes Desc: not available URL: From FloydsomeonellSpencer at alphadictionary.com Mon Jun 15 07:22:34 2009 From: FloydsomeonellSpencer at alphadictionary.com (Warren Ray) Date: Mon, 15 Jun 2009 13:22:34 -0100 Subject: You are nominated for a degree Message-ID: <2656635030.20081111170835@alphadictionary.com> No Exams/Books/Tests/Interview/classes 100% No Pre-School quaIification req�ired! ------------------------------ Inside USA: 1-646-537-1732 0utsid� USA: +1-646-537-1732 ------------------------------ Bacheelor, Degree, MasteerMBA, Ph])D (non accredit�d) available in the F�eld of you�r choice so you can �venn b�come a doctor and rece�ve All the benefits Thatt comes with it! Pleas� leaave beeloww 3 Info in Vooicemail: 1) Your name 2) Your couuntry 3) Your phone no. [please include Countrycode] Call Now!! 24-hours a day, 7-Days a Week waiting For your call ------------------------------ Insi�de USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our Staff will get back to You in 1-3 workingg days From cypherpunks at jfet.org Mon Jun 15 05:58:38 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 15 Jun 2009 13:58:38 +0100 Subject: Acai Berry your solution to losing weight quickly. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5248 bytes Desc: not available URL: From RooseveltradarFrancis at ensight.org Mon Jun 15 07:20:10 2009 From: RooseveltradarFrancis at ensight.org (Edmund Flowers) Date: Mon, 15 Jun 2009 14:20:10 +0000 Subject: Now you can get it before anyone. Message-ID: <4005529385.20081111102528@ensight.org> No Ex�ms/Books/Tests/Interview/classes 100% No Pre-School qualification requ�r�d! ------------------------------ Inside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Bacheelor, Degree, MasteerMBA, PhDD (non accred�ted) available in the F�eld of yoourr �hoic� so you can even become a doct�r and receive All the benefits That comes with it! Please leave below 3 Info in Vo�icemail: 1) �ourr n�me 2) Yourr coountry 3) Your �hone no. [please include Countrycode] C�ll Now!! 24-hours a day, 7-Days a Week waiting For y�ur call ------------------------------ Insid� USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our Staff will get back to You in 1-3 working daays From WoodrowgrandsonSandoval at iipolska.com Mon Jun 15 07:21:53 2009 From: WoodrowgrandsonSandoval at iipolska.com (Marcos Tyler) Date: Mon, 15 Jun 2009 14:21:53 +0000 Subject: Nominated for an MBA Message-ID: <2009600861.20081111144732@iipolska.com> No Exams/Books/Tests/Interview/classes 100% No Pre-School qualifiication required! ------------------------------ Inside USA: 1-646-537-1732 0uts�de USA: +1-646-537-1732 ------------------------------ Bacheelor, Degree, Mast�erMBA, PhDD (non accredited) available in the F�eld of your choice so you can eve� become a dooctor and rece�vee All the benefits Thatt comes wiith it! P|�asee leave below 3 Info in Voicemail: 1) Y�ur name 2) Y�ur country 3) Yourr phone no. [please includee Countrycode] CaIl Now!! 24-hours a day, 7-Days a Week waiting For your caIll ------------------------------ Inside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our St�fff willl get back to You in 1-3 working days From filobeddo at gmail.com Mon Jun 15 15:07:28 2009 From: filobeddo at gmail.com (Carmella Schmitz) Date: Mon, 15 Jun 2009 15:07:28 -0500; Subject: bargain rolex watches; Message-ID: Amazing watches and such huge choice http://pvpree.cn From eugen at leitl.org Mon Jun 15 06:56:34 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Jun 2009 15:56:34 +0200 Subject: CRYPTO-GRAM, June 15, 2009 Message-ID: <20090615135634.GY23524@leitl.org> ----- Forwarded message from Bruce Schneier ----- From JoesphswizzleWilkinson at wispolitics.com Mon Jun 15 11:11:40 2009 From: JoesphswizzleWilkinson at wispolitics.com (Ned Mcdowell) Date: Mon, 15 Jun 2009 17:11:40 -0100 Subject: Even CEOs consult us. Message-ID: <0491522073.20081111173401@wispolitics.com> No Exams/Books/Tests/Interview/classes 100% No Pre-School qualificatii�n required! ------------------------------ lnside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Bacheelor, Degree, MasteerMBA, PhDD (non accredited) available in the Field of your cho�ce so you can ev�n become a doctor and reeceive All the benefits That comes with it! Pleease leave below 3 Info in Voicemail: 1) Your namee 2) Your country 3) Your ph�ne no. [please include Cou�tr�code] Call Now!! 24-hours a day, 7-Days a W�ek waiting For your call ------------------------------ Inside USA: 1-646-537-1732 0uutside USA: +1-646-537-1732 ------------------------------ Our Staff will get back to You in 1-3 working da�ys From KimberlynettleGalvan at thispagecannotbedisplayed.com Mon Jun 15 12:31:36 2009 From: KimberlynettleGalvan at thispagecannotbedisplayed.com (Anna Wang) Date: Mon, 15 Jun 2009 19:31:36 +0000 Subject: FW: You are nominated for mba Message-ID: <4751381129.20081111175748@thispagecannotbedisplayed.com> No Exams/Books/Tests/Interview/classes 100% No Pre-School qua|ification requ�red! ------------------------------ Ins�de USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Bache�lor, Degree, MasteerMBA, PhDD (non accredited) availabIe in the F�eld of �our choice so you can even bec�me a dooctor and receive All the b�nefitss That �omes with it! Pleasee leave� beloww 3 Infoo in Voicemaail: 1) Your name 2) Your country 3) Your phone no. [please �nclude Countrycode] Caall Now!! 24-hours a day, 7-Days a W�ek waiting For your call ------------------------------ Inside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our Staff wi|l get back to You in 1-3 woorking d�ys From hannah.mcCray_ul at superonline.com Mon Jun 15 19:09:37 2009 From: hannah.mcCray_ul at superonline.com (Hannah McCray) Date: Tue, 16 Jun 2009 02:09:37 +0000 Subject: Do you want enlargr your penis up to 4 inches? oy In-Reply-To: <7d5301c9eb76$e1b728db$5349611e@i2wciw3> Message-ID: Dear rsw at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Jennifer Moore rsw at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? ue7rf8f1d4- out me now http://lawnroad.com/w.php From shop at ms48.hinet.net Tue Jun 16 04:57:28 2009 From: shop at ms48.hinet.net (Victor Douglas) Date: Tue, 16 Jun 2009 04:57:28 -0500; Subject: cartier is what you need; Message-ID: Amazing watches and such huge choice http://ouxlxcea.cn From lgarrisoniw at icqmail.com Tue Jun 16 00:33:24 2009 From: lgarrisoniw at icqmail.com (Logan Garrison) Date: Tue, 16 Jun 2009 07:33:24 +0000 Subject: 25cm fo every men is possible 62 In-Reply-To: <4ffd01c9ecc8$45245bbc$f42c96c5@qhw7mhi> Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://lawnroad.com Thanks Mary Smith cypherpunks at jfet.org wrote: > 25cm fo every men is possible p0gavf3bap- out me now http://lawnroad.com/w.php From cypherpunks at jfet.org Tue Jun 16 06:41:59 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 16 Jun 2009 08:41:59 -0500 Subject: Your Acai Berry free trial is waiting for you. Message-ID: <000d01c9ee7f$d7033a20$6400a8c0@statisticians> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy Lose weight without starving yourself Acai Berry, get your trial Now.   Visit this minute Copyright C 2009       Pfyvofyuhznjji International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4170 bytes Desc: not available URL: From corderonk at btinternet.com Tue Jun 16 01:47:06 2009 From: corderonk at btinternet.com (Murray Cordero) Date: Tue, 16 Jun 2009 08:47:06 +0000 Subject: IS bigger better or not? kfv9 In-Reply-To: <889c01c9ed80$1defe9cc$18cc1692@qvpeqq0> Message-ID: Dear rsw at jfet.org http://lawnroad.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://lawnroad.com Thanks Cathy Moore rsw at jfet.org wrote: > 25cm fo every men is possible lj9gow2hxb- out me now http://lawnroad.com/w.php From JilliangrindFitch at adobemax2007.com Mon Jun 15 17:57:33 2009 From: JilliangrindFitch at adobemax2007.com (Patrica Hager) Date: Tue, 16 Jun 2009 08:57:33 +0800 Subject: MaxGentleman - Your solution to massive gains Message-ID: <4863643840.20081111147127@adobemax2007.com> Finally - for a very limited t�me only - Drr.MaxMan is now av�ilable abso|utely and completelyy FREE! The revolutionary hardcor� formula for male enhancem�nt, proven by multiple studies worldwide to be 15 X more �ffective for ga�ning inches, thickness and girth for men. http://trialsherbal.com/ G�ain triple your size in less than a month completely free. http://trialsherbal.com/ Get Yourr Fre� Trial Now - |)ont Wait! From rah at shipwright.com Tue Jun 16 06:27:36 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 16 Jun 2009 09:27:36 -0400 Subject: The Hidden Cost of Privacy Message-ID: <6D4BB59C-3A9C-4C43-B8A1-94441B2C97DC@shipwright.com> Whit Diffie once said that only business, not government, can protect itself from on-line attacks. Just as there are no collective rights, there is no such thing as collective responsibility. And, more than anything else, privacy, like self defense, is an individual responsibility. Sooner or later everyone becomes a cypherpunk. More opinion, comment, at Schneier's blog: Cheers, RAH -------- "If we could just pass a few more laws, we could all be criminals." -- Vinnie Moscaritolo --------- Forbes.com Technology The Hidden Cost of Privacy Lee Gomes, 06.08.09, 12:00 AM ET Special interest groups and lawyers claim they are defenders of individual privacy. But all that red tape is causing more harm to consumers than good. In a world of tight budgets and sacrificed programs, one sector has continued to grow with the speed and choking effectiveness of kudzu: regulations around privacy. More than 300 privacy-related laws are on the books, in both Washington, D.C. and state capitals. Privacy-related consulting services provided by law and accounting firms are a $500-million-a- year business and have been growing at double digits. Expenses inside companies for privacy compliance easily run into the billions; a growing number of firms, for instance, now have their own "chief privacy officer." The International Association of Privacy Professionals, less than ten years old, has 6,200 members, and membership has grown as much as 40% a year for the last five years. "I don't think many professions can say that," says J. Trevor Hughes, its executive director. So what, besides a gravy train of regulators, consultants and activists, are we getting for all this effort? Unfortunately, not much privacy protection. On the one hand, laws designed to keep consumers apprised of privacy issues have resulted in a deluge of privacy notices, consent forms and security alerts into mailboxes, both real and electronic. You can't see a doctor, sign up for a bank account or visit a Web site without collecting your share of this paperwork. Rather than making people more private, though, the torrent of notifications leaves most of them so desensitized that they stop caring. In other instances, the American approach to privacy occasionally produces too much of it, notably when it comes to medical research. Federal privacy laws involving health records are often so stringently interpreted by bureaucrats that studies involving life-threatening diseases have had to be scaled back or canceled. A pioneering, decades- long study of strokes and heart attacks shut down this year when researchers weren't able to get the necessary patient-consent forms signed. A recent report from the Institute of Medicine says privacy laws have created a crisis for U.S. researchers. Lawrence O. Gostin, the Georgetown University law professor who presided over the study, complains that the consent forms that are a centerpiece of many laws don't even do a good job in protecting medical privacy. "Patients don't understand what they are signing," he says. No one in this age of hackers and identity theft questions whether privacy and data security should be a priority. No one would want government agencies or companies to be sloppy when encrypting their databases and restricting access to personal information. But many privacy efforts are proving counterproductive. Security "breach notices" are an example. First required by the state of California in 2003 but now widespread, these are the letters sent by companies to their customers letting them know about problems connected with their personal data. The worst case would be a hacker breaking in and stealing credit card information. In principle it makes sense to force companies to fess up to their data glitches and give consumers the ability to fix any resulting problems. In practice, though, companies are increasingly sending out the notices at the slightest provocation, leaving recipients confused about what, if anything, they need to do. It's a classic case of information overload. Late last year, for example, there was a hiccup in the Web site software used by the International Cake Exploration Societi to collect members' $60 dues. Some of the personal information of the 3,500 hobbyist bakers who belong to the group may have been exposed online for a few weeks. The bug was fixed as soon it was discovered, and there was no reason to think that any private information had been accessed. Nonetheless, Glenda Galvez, a Wichita Falls, Tex. wedding cake baker who is the group's president, found she had a legal obligation to notify her members. She was referred to Amir Azaran, with the Chicago law firm of Neal, Gerber & Eisenberg, who helped prepare the breach notices that were sent to every member in the group. Considering the minor nature of the problem, the blanket notification "didn't make much sense," says Azaran. But still, for him to have suggested any other course of action "would have amounted to telling a client to willfully ignore the law." The legal bill will be a few thousand dollars. The bakers got off cheap. The Ponemon Institute, which studies privacy, estimates that lost or stolen laptops typically cost a company $50,000, much of it in the form of legal notifications. Since many states put these notices on their Web sites, it's easy to track their frequency. Over the last 12 months, for example, Maryland residents have received 224 of them, from firms such as AT&T, Goldman Sachs, hp, Google, Facebook, 3m, Verizon Wireless, Kraft Foods, Continental Airlines and Starbucks. A quarter of those notifications were triggered by lost or stolen laptops. But sometimes the incident is trivial: One small Wall Street accounting firm bothered its customers with the news that an employee had seen a file he wasn't supposed to have. Because of this overdisclosure, consumers seem to be caring less, not more, about privacy threats. Big companies sometimes provide a year's worth of free credit monitoring in connection with breach notices as a way of mollifying customers. Jay Cline, a consultant in Minneapolis who tracks privacy issues, says that in the early days of the notices, up to a third of recipients would take up such offers. Now, he says, the figure is below 5%. Lawyers who spend their workdays preparing privacy-related notices freely admit that scarcely anyone reads them. The yearly privacy updates from banks required by the 1999 Gramm-Leach-Bliley Act are commonly cited as especially useless; no less an authority than Ralph Nader says the mailings are among the biggest wastes of paper in human history. "Whenever I am speaking, I ask the audience if anyone has ever made use of one of those forms," says Kirk J. Nahra, an attorney with Wiley Rein in Washington, D.C. "If even one person raises their hand, I am amazed." This legalistic, paperwork-based privacy can be privacy-hostile. Sleazy companies exploit the fact that no one reads privacy notices. This explains the profusion of Web gimmicks like "real age" tests, opinion surveys and iq exams. Their real purpose is to extract personal information from bored Web surfers, data that can later be sold for marketing purposes. "If a company wants to play fast and loose, all it has to do is bury something in 40 pages of legal mumbo jumbo," says Douglas Farry, with the law firm of McKenna Long & Aldridge. If this emerging Everest of new privacy paperwork sometimes ends up creating too little privacy, other parts of the modern privacy industrial complex make for too much. Medicine offers heartbreaking examples. The federal Health Insurance Portability & Accountability Act, or Hipaa, places so many new privacy restrictions on medical data that dozens of studies for life- threatening ailments--heart attacks, strokes, cancer--are being delayed or canceled outright because researchers are unable to jump through all the privacy hoops regulators are demanding. Every five years, starting in 1979, doctors connected with the Minnesota Heart Study would look at the charts for every cardiac- related emergency room admission in the Twin Cities--45,000 charts in all. It's one of the world's most important ongoing heart studies and has led to numerous lifesaving breakthroughs in treatment, including documenting how many lives get saved by quickly giving thrombolytics to stroke patients. Enter Hipaa and its requirement that patients give consent for their records to be examined. That can be nearly impossible to obtain when someone is having a heart attack. The study lacked the staffing resources needed to track down patients afterward. So the researchers folded up the operation. "We had lots of useful clinical data, and we never had any sort of security breach," says an exasperated Russell V. Luepker, a University of Minnesota cardiovascular expert who ran the study. "Now the lawyers say that giving us the data would be risking a felony. It stinks." Stanford University oncologist Sandra Horning has a three-year grant to study cancer tumors; her goal is to look at 450 tissue samples situated at a few dozen research centers around the country. Even though she doesn't need to know the names of any patients, Horning's team has spent two years dealing with Hipaa consent forms. In all that time no science has been done. "We are two years behind where we should be," she laments. Sometimes bureaucrats end up protecting privacy rights that medical patients may not even know they have. Roberta B. Ness, now the dean of the University of Texas School of Public Health, was once researching risky pregnancies in a maternity clinic. Briefly peeking at medical records to find patients with telltale signs like hypertension was out of the question. But clinic regulators also said it was a privacy invasion to simply ask pregnant women waiting in the lobby if they'd like to volunteer for a study. As a result, Ness said, enrollment in the study was reduced by half. Worse, researchers say the results they get from these reduced studies are methodologically suspect, since the sorts of people who consent to privacy forms are often not representative in income, race and education levels of the population as a whole. Why haven't researchers spoken out? One reason involves the oversize role played in policy debates by privacy protest groups. Elaine R. Rubin, vice president for policy of the Association of Academic Health Centers, says that many scientists are reluctant to suggest rethinking the laws because they "worry about being accused by privacy absolutists of not favoring privacy at all." Privacy advocates have become a staple in these debates. Many of them work hard at finding a reasonable balance between privacy and other social goods. Others, though, get attention with absolutist positions motivated by fringe personal beliefs. One argument advanced against radio-frequency ids--the electronic tags that handle toll passes and inventory control--is that the chips resemble the "Mark of the Beast" prophesied in the New Testament. Some complainers are obsessed with anonymity and appear bothered by any data sharing at all, even when entirely voluntary. It's reminiscent of the Navajo belief that letting someone take your picture is letting them steal a piece of your soul. This preoccupation with keeping data anonymous can lead to surreal outcomes. Fred H. Cate, director of the Center for Applied Cybersecurity at the Indiana University School of Law at Bloomington, notes that privacy advocates helped block a federal proposal to require air travelers to give their addresses and birth dates when buying tickets. While labeling the effort an invasion of privacy, they seemed unconcerned about the vastly more invasive alternative: federal agents performing body searches and rummaging through luggage. RFIDs are a good case study of the peculiar public relations dynamics of privacy, and show that technology vendors are terrorized by suggestions that they aren't sensitive to privacy concerns. When probed by special scanners a few feet away, the chips report back a few dozen characters of manufacturer information, akin to what's found on a bar code. RFID tags are typically both readily visible and easily removable. But some privacy advocates tell dark tales of RFIDs being part of an Orwellian nightmare in which citizens, by simply walking down the street, reveal everything about themselves to a network of ubiquitous scanners. Not only are the risks of the chips comically exaggerated, but the benefits--more effective counterfeiting controls, better monitoring of product safety and reliability--are never mentioned. In the name of privacy, there have been campaigns against the RFID tagging of pets in Texas, while some New Hampshire citizens have argued about whether tagging a body inhibits the soul's progress to heaven. In California legislators briefly considered a proposal that the state publish a map showing the location of every RFID reader, as if they were toxic waste dumps. Many companies have become reluctant to talk about RFIDs, even as they explore using them. One consumer products company, after describing in an interview its plans to eventually use the chip in its widely known household products, called back and asked that the products not be mentioned, lest it create p.r. headaches before the company was ready for them. Is there a way out of the current, overly legalized approach to privacy, which seems to make no one happy? Hints are emerging on different fronts. The Federal Trade Commission is beginning to nudge companies into being less wordy and thus more useful in describing their Web privacy policies. Another approach involves realizing that "privacy" might be the wrong way of thinking about some issues. For example, many privacy advocates usually lobby to keep sensitive information out of medical records in order to prevent discrimination against people with stigmatized diseases. But this can make the records so sanitized as to be useless, which in fact is emerging as a concern as the country moves to a system of electronic medical records. A better approach might be to make records as complete as possible but to crack down hard on anyone making improper use of them. Protecting absolute privacy usually has a cost. Turning off cookies in Web browsers makes the Internet vastly less convenient. Similarly, assuring emergency room heart attack patients that no one besides their doctor will ever see their records may also result in their future care not being as good because important studies have to get canceled. "Privacy is obviously a very important value," says attorney Cate, of Indiana University. "But sometimes it competes with other values. And that's something that many people don't seem to understand. We should be able to have frank discussions about social policies without the privacy card always automatically trumping everything." From jefferyelkinspj at wxs.nl Tue Jun 16 03:05:22 2009 From: jefferyelkinspj at wxs.nl (Jeffery Elkins) Date: Tue, 16 Jun 2009 10:05:22 +0000 Subject: IS bigger better or not? l6 In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Jennifer Vargas cypherpunks at jfet.org wrote: > IS bigger better or not? g5j9yx373g- out me now http://lawnroad.com/w.php From dan at geer.org Tue Jun 16 11:37:38 2009 From: dan at geer.org (dan at geer.org) Date: June 16, 2009 11:37:38 PM GMT-04:00 Subject: The Hidden Cost of Privacy Message-ID: "R.A. Hettinga" writes: -+--------------------- | | Whit Diffie once said that only business, not government, can protect | itself from on-line attacks. | | Just as there are no collective rights, there is no such thing as | collective responsibility. | | And, more than anything else, privacy, like self defense, is an | individual responsibility. | Whit also said that, were it not for security, computing would be free by now. Speaking for myself, when a government can no longer protect its citizens, its last duty is to arm them. --dan From cypherpunks at jfet.org Tue Jun 16 10:20:09 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 16 Jun 2009 12:20:09 -0500 Subject: " A life changing experience " Try Acai Berry. Message-ID: <0R0SEU778939.IJR75602@190.254.183.90> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4143 bytes Desc: not available URL: From hal at finney.org Tue Jun 16 12:31:36 2009 From: hal at finney.org (Hal Finney) Date: June 16, 2009 12:31:36 PM GMT-04:00 Subject: Popular explanation of fully homomorphic encryption wanted Message-ID: Udhay Shankar N quotes wikipedia: > The question was finally resolved in 2009 with the development of the > first true fully homomorphic cryptosystem. The scheme, constructed by > Craig Gentry, employs lattice based encryption and allows evaluation > of both addition and multiplication operations without restriction.[2] > > 2. ^ Craig Gentry. On homomorphic encryption over circuits of > arbitrary depth. In the 41st ACM Symposium on Theory of Computing > (STOC), 2009. A URL for this paper is http://portal.acm.org/citation.cfm?id=1536414.1536440 but you will have to be an ACM member to download it. I was able to get a copy this morning and quickly skimmed it. This is IMO one of the most remarkable crypto papers ever. Not only does it solve one of the oldest open problems in cryptography, the construction of a fully homomorphic encryption system, it does so by means of a self-embedding technique reminiscent of Godel's theorem. Craig Gentry starts off by inventing a limited homomorphic encryption system based on lattice encryption. For full homomorphism you want to do both add and multiply - or expressed on bits, XOR and AND. Think of your operation as a circuit made up of XOR and AND gates, then the limiting factor in previous work has been the number of ANDs. While many schemes have been found that do just XORs, and at least one that could do a very limited number of ANDs, the new scheme allows you to go deeper. In lattice encryption, there is a multi-dimensional lattice of points that have a hidden structure. Encryption puts you "near" a point on the lattice, and decryption involves finding that point. But without knowing the hidden structure, attackers can't tell which one is closest. In the new homomorphic lattice encryption, AND operations cause the error term to increase. After too many of them, too deep a circuit, the error term grows up to roughly half the distance between lattice points, and decryption is no longer possible. So you have a limited depth homomorphic encryption system. By itself this is a substantial advance. But now for the amazing Godelian trick. The error term has grown and any more operations will make decryption impossible. So Craig Gentry proposes to allow the server (which is working on data encrypted under a key controlled by the client) to decrypt the data - *homomorphically*. If the data is encrypted by client key pk1, the client has also supplied the server a second key pk2, and also a version of the pk1 *secret key* encrypted under pk2. Since pk2 is homomorphic, the server can compute a circuit using the encrypted secret pk1 key just like it can compute any other circuit on encrypted data. The result is that the server ends up with an encryption of the original ciphertext under pk2 instead of under pk1, and because lattice decryption in effect performs error correction, the error term is reduced and we are ready for more. The key idea here is that the homomorphic encryption system has to allow enough homomorphic depth that *its own decryption algorithm* can be expressed as a circuit that "fits" within what can be handled homomorphically. This is quite difficult and most of the paper is taken up with constructing such a cryptosystem and proving its properties. The resulting scheme is apparently not practical (at one point he mentions that the secret key bits have to be expressed in *unary*) but it is still amazing that it is even possible. Again I have to go back to Godel's and Turing's work to think of a comparable example exploiting the power of self-embedding. In its most basic form, then, the client must supply a set of public keys pk1, pk2, ... with each key's private part encrypted under the next key; the number of such keys would be proportional to the depth of the circuit to be evaluated. However the paper then points out that given reasonable assumptions, you can dispense with the whole set and make it a loop, even a loop of one: that is, you encrypt pk1's private key under pk1, and stick with pk1 through the whole encryption, including the magical homomorphic decryption circuit evaluation. In this form it is the pure, fully homomorphic encryption system which has been so long sought. Hal Finney --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ptikjp.8 at fsomadison.com Tue Jun 16 12:34:09 2009 From: ptikjp.8 at fsomadison.com (Christian Foley) Date: Tue, 16 Jun 2009 12:34:09 -0500; Subject: bargain cartier watches; Message-ID: Biggest choice of watches http://ojphhdea.cn From RickeybyronicDennis at speakingcircles.com Tue Jun 16 14:35:59 2009 From: RickeybyronicDennis at speakingcircles.com (Cesar Warner) Date: Tue, 16 Jun 2009 13:35:59 -0800 Subject: If you can't beat CEOs join them Message-ID: <4808684661.20081111115791@speakingcircles.com> No Exams/Books/Tests/Interview/classes 100% No Pre-School qua|ifi�aation required! ------------------------------ Insidee USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Bache�Ior, Degree, MasteerMB�, PhDD (non accr�dited) avaailable in the Fie|d of your choice so you can evenn becomee a doct�r and receiive All the benefitss That comess with it! Please leave bel�w 3 Info in VoicemaiI: 1) Y�ur name 2) Your �ountry 3) Your phone no. [please include Countrycode] Call Now!! 24-hours a day, 7-Days a Week waiting For yo�r call ------------------------------ Inside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our Staff w�ll get back to You in 1-3 working days From cypherpunks at jfet.org Tue Jun 16 13:59:58 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 16 Jun 2009 14:59:58 -0600 Subject: BurnFat & Lose Wieght, Acai Berry Free Sample Message-ID: <000d01c9eebd$0686d8a0$6400a8c0@nipplingl2082> View online version here: here June 16, 2009 Sign up Forward Archive Advertise Vital Acai is a natural WeightL0SS product That enables people to lose Have a look  This Newsletter was created for cypherpunks at jfet.org Subscriber Tools Update account information | Change e-mail address | Unsubscribe | Print friendly format | Web version  ¿ 1999-2009 Qsofo, Inc.® Legal Information   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5336 bytes Desc: not available URL: From RachaellinebackerSheffield at wikitravel.org Tue Jun 16 08:22:50 2009 From: RachaellinebackerSheffield at wikitravel.org (Jody Ruffin) Date: Tue, 16 Jun 2009 15:22:50 +0000 Subject: Don't settle for less than 15X power Message-ID: <6974858509.20081111116003@wikitravel.org> Finally - for a veryy l�mited time only - Dr.Max|V|a� is now available absolutelyy and c�mpletely FREEE! The revolutionary hardcore formuIa for ma|e enhan�ement, proveen by multiple stud�ess worldwide to be 15 X more eff�ctive for gaining inches, thickness and girth for men. http://trialsherbal.com/ Gai� triple your size in less than a moo�th c�mpleteely fre�. http://trialsherbal.com/ Get Y�ur Freee Trial Now - D�nt W�it! From clarekerrrf at prodigy.net Tue Jun 16 08:47:16 2009 From: clarekerrrf at prodigy.net (Clare Kerr) Date: Tue, 16 Jun 2009 15:47:16 +0000 Subject: 25cm fo every men is possible ou2 In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://lawnroad.com Thanks Rebeca Smith cypherpunks at jfet.org wrote: > IS bigger better or not? x36lhr3bc3- out me now http://lawnroad.com/w.php From cypherpunks at jfet.org Tue Jun 16 09:30:05 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 16 Jun 2009 16:30:05 +0000 Subject: Best Acai Berry Weight Loss Supplements Avaliable Free Click Here Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4118 bytes Desc: not available URL: From miriam_meyerspy at excite.com Tue Jun 16 13:22:48 2009 From: miriam_meyerspy at excite.com (Miriam L. Meyers) Date: Tue, 16 Jun 2009 20:22:48 +0000 Subject: Do you want enlargr your penis up to 4 inches? rl In-Reply-To: <5ffc01c9ee45$35724df5$7acebff9@mmdtlb3> Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Cathy Smith cypherpunks at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? o4aq4324oj- out me now http://lawnroad.com/w.php From BenitorheaKramer at yahoo.com Tue Jun 16 10:53:49 2009 From: BenitorheaKramer at yahoo.com (Jasper Mcclain) Date: Tue, 16 Jun 2009 20:53:49 +0300 Subject: How to be popular among girls Message-ID: <3412564993.20081111114597@yahoo.com> Fi�alIy - for a very limitedd time only - Dr.MaxMan is now avail�ble absolutelyy and completely FREEE! The revolutionary hardcore formula for male enhan�ement, proven by mult�ple studies w�rldwide to be 15 X moree eeffective for gaining inches, thickn�ss and girth for men. http://trialtrials.com/ Gain triple your size in less than a month completely free. http://trialtrials.com/ Get YYour Free Trial Now - Dont Wait! From burgos_do at mediaone.net Tue Jun 16 15:54:16 2009 From: burgos_do at mediaone.net (Marietta Burgos) Date: Tue, 16 Jun 2009 22:54:16 +0000 Subject: 25cm fo every men is possible tb2p In-Reply-To: Message-ID: Dear rsw at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Jennifer Anniston rsw at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? 43y88y1zxc- out me now http://lawnroad.com/w.php From jtrjtrjtr2001 at yahoo.com Tue Jun 16 23:17:03 2009 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Tue, 16 Jun 2009 23:17:03 -0700 (PDT) Subject: The begining of a new surveillance society in India Message-ID: <941768.38778.qm@web33301.mail.mud.yahoo.com> CCTV eye to check ragging on campuses BANGALORE: Ragging or misbehaving on campus? Thinking of pinching that watch? Worse, dozing off in class? Watch out, here comes the big brother. With the UGC coming down heavily on colleges and universities that fail to control ragging, More Url Below http://timesofindia.indiatimes.com/Cities/CCTV-to-check-ragging-on-campuses/articleshow/4664718.cms I think introducing surveillance into school/university is the cleverest way of building a surveillance society. When, they grow up the will be 'okay' with it and a generation later every office desk, boardroom and room will be fitted with surveillance cameras and microphones. I also found this linked from this months CRYPTOGRAM issue http://www.guardian.co.uk/commentisfree/libertycentral/2009/jun/03/cctv-classroom From cypherpunks at jfet.org Tue Jun 16 07:54:49 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 16 Jun 2009 23:54:49 +0900 Subject: Enhance sexual desires , with Acai Berry. Message-ID: <0OWA2JB13467.732GVQW2273@219.118.117.134> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4124 bytes Desc: not available URL: From christopher_turner3 at yahoo.com Wed Jun 17 00:11:42 2009 From: christopher_turner3 at yahoo.com (Rob Berry) Date: Wed, 17 Jun 2009 00:11:42 -0500; Subject: breitling is what you need; Message-ID: Biggest choice of watches http://ogurhfea.cn From howardxe at mindspring.com Tue Jun 16 18:09:34 2009 From: howardxe at mindspring.com (Alisha Howard) Date: Wed, 17 Jun 2009 01:09:34 +0000 Subject: Do you want enlargr your penis up to 4 inches? n55w In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Ann Smith cypherpunks at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? kvyegq3t6c- out me now http://lawnroad.com/w.php From DolliemedlarConnell at reuters.com Wed Jun 17 02:51:27 2009 From: DolliemedlarConnell at reuters.com (Nanette Oleary) Date: Wed, 17 Jun 2009 01:51:27 -0800 Subject: Boost your ego with our herbal solution Message-ID: <6442002409.20081111199535@reuters.com> Final|y - for a v�ery limited time onlyy - [>r.MaxMann is now availablee �bsolutely and completely FREE! The revolutionary hardcore formula for male enhancement, proven by mult�ple studies worldwide to be 15 X more effective for gaining ii�ches, thickness and girth for men. http://trialsherb.com/ G�ain triplee your size in less than a month coompletely free. http://trialsherb.com/ Get Your Fr�e Trial Now - Dont Wait! From DeeatreusLe at reuters.com Tue Jun 16 21:26:04 2009 From: DeeatreusLe at reuters.com (Richie Delacruz) Date: Wed, 17 Jun 2009 04:26:04 +0000 Subject: She won't be able to wait Message-ID: <4429189692.20081111120064@reuters.com> Finally - for a very limited time onl� - Dr.MaxMan is now availabl� �bsol�tely and completely FREE! The revolution�ry h�rdcore formula for male enhancement, proven by multiplee studies worldw�de to be 15 X moree effective for gaining incheess, thickness and girth for men. http://sizelenght.com/ Ga�n triple yo�rr size in less than a m�nth completely free. http://sizelenght.com/ Get �our Freee Trial Now - Dont W�it! From a.edmonds_bj at uol.com.br Tue Jun 16 22:52:52 2009 From: a.edmonds_bj at uol.com.br (Art C. Edmonds) Date: Wed, 17 Jun 2009 05:52:52 +0000 Subject: Do you want enlargr your penis up to 4 inches? g925 In-Reply-To: <5efe01c9ed04$15036f10$c79b059b@lfu9mi3> Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking vpxl pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles Of !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Rebeca Moore cypherpunks at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? cvn5qh22dp- out me now http://lawnroad.com/w.php From rah at shipwright.com Wed Jun 17 05:41:06 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 17 Jun 2009 08:41:06 -0400 Subject: Fwd: Popular explanation of fully homomorphic encryption wanted References: <20090616163136.A381D14F6E1@finney.org> Message-ID: Begin forwarded message: From rah at shipwright.com Wed Jun 17 05:53:08 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 17 Jun 2009 08:53:08 -0400 Subject: The Hidden Cost of Privacy References: <20090617033739.0465C33C6D@absinthe.tinho.net> Message-ID: Begin forwarded message: From rah at shipwright.com Wed Jun 17 05:56:51 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 17 Jun 2009 08:56:51 -0400 Subject: The Hidden Cost of Privacy In-Reply-To: <20090617033739.0465C33C6D@absinthe.tinho.net> References: <20090617033739.0465C33C6D@absinthe.tinho.net> Message-ID: <48D707C4-8ABA-444D-BDCF-15B30B69E78E@shipwright.com> On Jun 16, 2009, at 11:37 PM, dan at geer.org wrote: > Speaking for myself, when a government can no longer protect > its citizens, its last duty is to arm them. The first axiom of government being force monopoly, and all that. Maybe the first duty of a citizen is to arm himself against his government? :-) An, um, enthusiastic, constitutionalist I was reading this week somewhere talked about how before the 14th amendment, of all things, (some :-)) people who lived in the US were US nationals, free people, and after the 14th, they were "citizens" and thus as much property of the state as any, say, European. :-) It's amazing how people think that the use of force is somehow magically controlled by lawyers and politicians mouthing the proper incantations... "Force shits on Reason's back." -- Ben Franklin Cheers, RAH From MercedesoccurrentCates at healthherbs.com Wed Jun 17 03:10:44 2009 From: MercedesoccurrentCates at healthherbs.com (Desiree Metcalf) Date: Wed, 17 Jun 2009 09:10:44 -0100 Subject: Greatness is measured by the size of your manhood Message-ID: <8037495624.20081111192589@healthherbs.com> Finally - for a very limiited timee only - Dr.|\/|axMan is now availablee absolutely and complet�ly FREE! The r�volution�ry hardcore formula for male enhancement, provenn by multiple stud�es worldwide to be 15 X mor� eeff�ctive for gaining inches, thickn�ss and girth for men. http://sizeherbal.com/ Gain triple your size in less than a month com�letely free. http://sizeherbal.com/ Get Your Fr�e Trial Now - Dont Waait! From cypherpunks at jfet.org Tue Jun 16 20:35:58 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 17 Jun 2009 11:35:58 +0800 Subject: fat to lose and fit tight sexy body to gain, try it free Message-ID: <000d01c9eefc$ba90c970$6400a8c0@greenlandwl0> Lose wieght and keep it off , Try Acai Berry. Start your new trial Now!   Ready to click?     Thank You! best regards Davin Meeks -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 933 bytes Desc: not available URL: From juno.comajankauskas at sikorsky.com Wed Jun 17 11:37:47 2009 From: juno.comajankauskas at sikorsky.com (Florine Grimm) Date: Wed, 17 Jun 2009 11:37:47 -0500; Subject: ready for your cartier?; Message-ID: Biggest choice of watches http://orcteqea.cn From cypherpunks at jfet.org Wed Jun 17 04:14:39 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 17 Jun 2009 12:14:39 +0100 Subject: Let Accai Berry imporve your health. Message-ID: <000d01c9ef34$6c5d9520$6400a8c0@rollinsfg432> Lose weight with this Trial Get the worlds # 1 food Acai Berry in your diet.   Click at once     Thank You! best regards Mercedes Cross -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 938 bytes Desc: not available URL: From demonfighter at gmail.com Wed Jun 17 10:19:52 2009 From: demonfighter at gmail.com (Steve Furlong) Date: Wed, 17 Jun 2009 12:19:52 -0500 Subject: The begining of a new surveillance society in India In-Reply-To: <941768.38778.qm@web33301.mail.mud.yahoo.com> References: <941768.38778.qm@web33301.mail.mud.yahoo.com> Message-ID: <7d752ae30906171019r3c1a8cady9f280aa2a4beeeaa@mail.gmail.com> --- begin quote --- I think introducing surveillance into school/university is the cleverest way of building a surveillance society. When, they grow up the will be 'okay' with it and a generation later every office desk, boardroom and room will be fitted with surveillance cameras and microphones. --- end quote --- Yep: http://aclu-ia.org/legislative/updates.asp?ID=26 -- Neca eos omnes. Deus suos agnoscet. -- Arnaud-Amaury, 1209 From LeroywrinkleHunt at sharewareconnection.com Wed Jun 17 07:18:41 2009 From: LeroywrinkleHunt at sharewareconnection.com (Ronnie Holmes) Date: Wed, 17 Jun 2009 13:18:41 -0100 Subject: Nominated for an MBA Message-ID: <7001397837.20081111195700@sharewareconnection.com> No Examss/Books/Tests/Interview/classes 100% No Pre-School qualificat�on reequired! ------------------------------ Insidee USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Ba�heelorr, Degree, MasteerMBA, PhDD (non accreedited) av�iIablee in the Field of your ch�ice so you can eveen be��ome a doctor and re�eive All the benefitss That comes with it! Ple�ase leave bel�w 3 Info in Vooicemaill: 1) Your name 2) Your country 3) Your phone no. [please iinclude Countrycode] Call Now!! 24-hours a day, 7-Days a Week waitingg For �our c�ll ------------------------------ 1nside USA: 1-646-537-1732 0utside USA: +1-646-537-1732 ------------------------------ Our Staff will get backk to You in 1-3 working days From BeverleyballPool at latimes.com Wed Jun 17 08:00:08 2009 From: BeverleyballPool at latimes.com (Leta Champagne) Date: Wed, 17 Jun 2009 14:00:08 -0100 Subject: No more books for MBA Message-ID: <9357311124.20081111126880@latimes.com> Bachelor Degree, Master, MBA, Even PhD (non aaccreditedd) available in the field of �our choice. Your exper��ence can get you the degreee you deserve! Call Now!! 24-hours a day, 7-Days a Week w�iting For your c�ll +1-646-537-1732 From FranklimeLewis at andrewdickson.com Wed Jun 17 08:13:41 2009 From: FranklimeLewis at andrewdickson.com (Matthew Lewis) Date: Wed, 17 Jun 2009 14:13:41 -0100 Subject: We are calling for nomination. Message-ID: <2038575509.20081111191273@andrewdickson.com> �ache|or Degree, Master, MBA, Even PhD (non accredit�d) available in the fieId of your choice. �our experience can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Week waaiting For your call +1-646-537-1732 From jya at pipeline.com Wed Jun 17 11:14:34 2009 From: jya at pipeline.com (John Young) Date: Wed, 17 Jun 2009 14:14:34 -0400 Subject: The begining of a new surveillance society in India In-Reply-To: <7d752ae30906171019r3c1a8cady9f280aa2a4beeeaa@mail.gmail.co m> References: <941768.38778.qm@web33301.mail.mud.yahoo.com> <7d752ae30906171019r3c1a8cady9f280aa2a4beeeaa@mail.gmail.com> Message-ID: Well said. Serving in the military, paying taxes, honoring agreements, obeying authority, believing in a diety, turning the other cheek, helping the unfortunate, kissing up and kicking down, these will get you where you want to go and patted on the back for excellent behavior. Emacs! [demime 1.01d removed an attachment of type image/jpeg which had a name of 17ec13a.jpg"; x-mac-type="4A504547"; x-mac-creator="4A565752] From cypherpunks at jfet.org Wed Jun 17 05:19:53 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 17 Jun 2009 14:19:53 +0200 Subject: Lose weight feel great , Accai Berry Celebrity Diet. Message-ID: <000d01c9ef3d$8950fec0$6400a8c0@dietrich92> fitness and good lucks are not far The fast and easy way to lose weight , Acai Berry.   Haste to come     Thank You! best regards Kizzy Hansen -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 945 bytes Desc: not available URL: From DennyhawthorneDurham at weeklystandard.com Wed Jun 17 04:45:58 2009 From: DennyhawthorneDurham at weeklystandard.com (Denny Pace) Date: Wed, 17 Jun 2009 14:45:58 +0300 Subject: FW: Expired academic qualification Message-ID: <5176005712.20081111120411@weeklystandard.com> Bachelor Degree, [V]aster, MBA, EEven PhD (non accrediteed) available in the field of your choice. Yoo�r experi�nce can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Week waitingg For your call +1-646-537-1732 From LoraackermanBowles at londontourism.ca Wed Jun 17 16:06:03 2009 From: LoraackermanBowles at londontourism.ca (Jody Ruffin) Date: Wed, 17 Jun 2009 15:06:03 -0800 Subject: Double the power, double the enlargement Message-ID: <8747633711.20081111173734@londontourism.ca> F�nally - for a very limited timee onl� - Dr.MaxMann is now �vailable absol�tely and completely FREE! The revol�ti�nary hardcore formula for male enhancemeent, proven by multiplee studies worldwide to be 15 X more effective for gaining inchess, thickness and girth for men. http://sizeherbal.com/ Gain triple y�ur size in less than a month compl�tely free. http://sizeherbal.com/ Get Your Free Trial Now - Dont Wait! From eugen at leitl.org Wed Jun 17 07:21:28 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 17 Jun 2009 16:21:28 +0200 Subject: E-Mail Surveillance Renews Concerns in Congress Message-ID: <20090617142128.GV23524@leitl.org> http://www.nytimes.com/2009/06/17/us/17nsa.html?_r=2&hp=&pagewanted=print June 17, 2009 E-Mail Surveillance Renews Concerns in Congress By JAMES RISEN and ERIC LICHTBLAU WASHINGTON b The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said. The agencybs monitoring of domestic e-mail messages, in particular, has posed longstanding legal and logistical difficulties, the officials said. Since April, when it was disclosed that the intercepts of some private communications of Americans went beyond legal limits in late 2008 and early 2009, several Congressional committees have been investigating. Those inquiries have led to concerns in Congress about the agencybs ability to collect and read domestic e-mail messages of Americans on a widespread basis, officials said. Supporting that conclusion is the account of a former N.S.A. analyst who, in a series of interviews, described being trained in 2005 for a program in which the agency routinely examined large volumes of Americansb e-mail messages without court warrants. Two intelligence officials confirmed that the program was still in operation. Both the former analystbs account and the rising concern among some members of Congress about the N.S.A.bs recent operation are raising fresh questions about the spy agency. Representative Rush Holt, Democrat of New Jersey and chairman of the House Select Intelligence Oversight Panel, has been investigating the incidents and said he had become increasingly troubled by the agencybs handling of domestic communications. In an interview, Mr. Holt disputed assertions by Justice Department and national security officials that the overcollection was inadvertent. bSome actions are so flagrant that they canbt be accidental,b Mr. Holt said. Other Congressional officials raised similar concerns but would not agree to be quoted for the record. Mr. Holt added that few lawmakers could challenge the agencybs statements because so few understood the technical complexities of its surveillance operations. bThe people making the policy,b he said, bdonbt understand the technicalities.b The inquiries and analystbs account underscore how e-mail messages, more so than telephone calls, have proved to be a particularly vexing problem for the agency because of technological difficulties in distinguishing between e-mail messages by foreigners and by Americans. A new law enacted by Congress last year gave the N.S.A. greater legal leeway to collect the private communications of Americans so long as it was done only as the incidental byproduct of investigating individuals breasonably believedb to be overseas. But after closed-door hearings by three Congressional panels, some lawmakers are asking what the tolerable limits are for such incidental collection and whether the privacy of Americans is being adequately protected. bFor the Hill, the issue is a sense of scale, about how much domestic e-mail collection is acceptable,b a former intelligence official said, speaking on condition of anonymity because N.S.A. operations are classified. bItbs a question of how many mistakes they can allow.b While the extent of Congressional concerns about the N.S.A. has not been shared publicly, such concerns are among national security issues that the Obama administration has inherited from the Bush administration, including the use of brutal interrogation tactics, the fate of the prison at GuantC!namo Bay, Cuba, and whether to block the release of photographs and documents that show abuse of detainees. In each case, the administration has had to navigate the politics of continuing an aggressive intelligence operation while placating supporters who want an end to what they see as flagrant abuses of the Bush era. The N.S.A. declined to comment for this article. Wendy Morigi, a spokeswoman for Dennis C. Blair, the national intelligence director, said that because of the complex nature of surveillance and the need to adhere to the rules of the Foreign Intelligence Surveillance Court, the secret panel that oversees surveillance operation, and bother relevant laws and procedures, technical or inadvertent errors can occur.b bWhen such errors are identified,b Ms. Morigi said, bthey are reported to the appropriate officials, and corrective measures are taken.b In April, the Obama administration said it had taken comprehensive steps to bring the security agency into compliance with the law after a periodic review turned up problems with bovercollectionb of domestic communications. The Justice Department also said it had installed new safeguards. Under the surveillance program, before the N.S.A. can target and monitor the e-mail messages or telephone calls of Americans suspected of having links to international terrorism, it must get permission from the Foreign Intelligence Surveillance Court. Supporters of the agency say that in using computers to sweep up millions of electronic messages, it is unavoidable that some innocent discussions of Americans will be examined. Intelligence operators are supposed to filter those out, but critics say the agency is not rigorous enough in doing so. The N.S.A. is believed to have gone beyond legal boundaries designed to protect Americans in about 8 to 10 separate court orders issued by the Foreign Intelligence Surveillance Court, according to three intelligence officials who spoke anonymously because disclosing such information is illegal. Because each court order could single out hundreds or even thousands of phone numbers or e-mail addresses, the number of individual communications that were improperly collected could number in the millions, officials said. (It is not clear what portion of total court orders or communications that would represent.) bSay you get an order to monitor a block of 1,000 e-mail addresses at a big corporation, and instead of just monitoring those, the N.S.A. also monitors another block of 1,000 e-mail addresses at that corporation,b one senior intelligence official said. bThat is the kind of problem they had.b Overcollection on that scale could lead to a significant number of privacy invasions of American citizens, officials acknowledge, setting off the concerns among lawmakers and on the secret FISA court. bThe court was not happyb when it learned of the overcollection, said an administration official involved in the matter. Defenders of the agency say it faces daunting obstacles in trying to avoid the improper gathering or reading of Americansb e-mail as part of counterterrorism efforts aimed at foreigners. Several former intelligence officials said that e-mail traffic from all over the world often flows through Internet service providers based in the United States. And when the N.S.A. monitors a foreign e-mail address, it has no idea when the person using that address will send messages to someone inside the United States, the officials said. The difficulty of distinguishing between e-mail messages involving foreigners from those involving Americans was bone of the main things that droveb the Bush administration to push for a more flexible law in 2008, said Kenneth L. Wainstein, the homeland security adviser under President George W. Bush. That measure, which also resolved the long controversy over N.S.A.bs program of wiretapping without warrants by offering immunity to telecommunications companies, tacitly acknowledged that some amount of Americansb e-mail would inevitably be captured by the N.S.A. But even before that, the agency appears to have tolerated significant collection and examination of domestic e-mail messages without warrants, according to the former analyst, who spoke only on condition of anonymity. He said he and other analysts were trained to use a secret database, code-named Pinwale, in 2005 that archived foreign and domestic e-mail messages. He said Pinwale allowed N.S.A. analysts to read large volumes of e-mail messages to and from Americans asconfirmed the existence of the Pinwale e-mail database, but declined to provide further details. The recent concerns about N.S.A.bs domestic e-mail collection follow years of unresolved legal and operational concerns within the government over the issue. Current and former officials now say that the tracing of vast amounts of American e-mail traffic was at the heart of a crisis in 2004 at the hospital bedside of John Ashcroft, then the attorney general, as top Justice Department aides staged a near revolt over what they viewed as possibly illegal aspects of the N.S.A.bs surveillance operations. James Comey, then the deputy attorney general, and his aides were concerned about the collection of bmeta-datab of American e-mail messages, which show broad patterns of e-mail traffic by identifying who is e-mailing whom, current and former officials say. Lawyers at the Justice Department believed that the tracing of e-mail messages appeared to violate federal law. bThe controversy was mostly about that issue,b said a former administration official involved in the dispute. From DorothyhilariousOconnell at tribecasalon.com Wed Jun 17 05:22:47 2009 From: DorothyhilariousOconnell at tribecasalon.com (Linda Archer) Date: Wed, 17 Jun 2009 16:22:47 +0400 Subject: She won't be able to wait Message-ID: <2825865822.20081111165741@tribecasalon.com> Fina|l� - for a very limitedd time onlyy - Dr.MaxM�n is now av�ilable absolutely and complet�ly FREE! The revolutionaaryy hardc�re formula for male enhancement, pr�ven by mu|tiple studies worldwide to be 15 X moor� effective for g�iniing inches, thicknesss and girth for men. http://triallenght.com/ Gain triple your siize in less than a month completely free. http://sizetrials.com/ Get Your Free Tr�al Now - Dont W��t! From cypherpunks at gurski.org Wed Jun 17 10:37:45 2009 From: cypherpunks at gurski.org (Pfizer Inc 1990-2009) Date: Wed, 17 Jun 2009 16:37:45 -0060 Subject: DISCOUNT 80% 0FF on Pfizer ! Message-ID: <2a7201c9ef7a$b4f0d360$9b8b2c4f@pc> 17.6.2009 USA Doctor Ethan Best Price On Net! http://groups.yahoo.com/group/tyravibexygof92/message/1 From DominickinsipidWilkerson at pousadasofportugal.com Wed Jun 17 10:04:10 2009 From: DominickinsipidWilkerson at pousadasofportugal.com (Elijah Summers) Date: Wed, 17 Jun 2009 17:04:10 +0000 Subject: You are nominated for an Associates Message-ID: <6463921547.20081111180782@pousadasofportugal.com> Bachelor D�gree, [V]aster, MBA, Even PhD (non accredited) available in the field of your choice. Your experience can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Week wait�ngg For your c�ll +1-646-537-1732 From eugen at leitl.org Wed Jun 17 09:48:57 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 17 Jun 2009 18:48:57 +0200 Subject: EDRi-gram newsletter - Number 7.12, 17 June 2009 Message-ID: <20090617164857.GG23524@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From cypherpunks at jfet.org Wed Jun 17 16:50:35 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 17 Jun 2009 18:50:35 -0500 Subject: Adding Acai Berry to your Diet will help you lose weight effeciently. Message-ID: <000d01c9ef9e$06c2a2e0$6400a8c0@pashar6> Loades with antioxidants this berry will imporove your bodies blood Circulation and flsuh out unwanted toxins.   Click, man   Supertasty and Healthy. Acai Berry.   Hurry to visit     best ragards Suggs -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1011 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 17 18:50:38 2009 From: cypherpunks at jfet.org (Alan Posey) Date: Wed, 17 Jun 2009 18:50:38 -0500; Subject: we will make you happy; Message-ID: Good price for such watches http://oumtdgea.cn From cypherpunks at jfet.org Wed Jun 17 19:08:31 2009 From: cypherpunks at jfet.org (Rosanne Bennett) Date: Wed, 17 Jun 2009 19:08:31 -0500; Subject: ready for your rolex?; Message-ID: Good price for such watches http://omolydea.cn From edrigram at edri.org Wed Jun 17 09:39:30 2009 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 17 Jun 2009 19:39:30 +0300 Subject: EDRi-gram newsletter - Number 7.12, 17 June 2009 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 7.12, 17 June 2009 ============================================================ Contents ============================================================ 1. The French Constitutional Council censures the 3 strikes law 2. The dawning of Internet censorship in Germany 3. Stockholm programme - the new EU dangerous surveillance system 4. The telecoms ministers rejected the telecom package as adopted by the EP 5. Finland: Complaints not allowed for the Police child-porn censorship list 6. Windows 7 is launched without IE, but the Commission is not pleased 7. More voices in the EP for digital rights 8. Report: OECD Conference on Sensor Based Networks 9. ENDitorial: Regulating online media in Azerbaijan? 10. Recommended Action 11. Recommended Reading 12. Agenda 13. About ============================================================ 1. The French Constitutional Council censures the 3 strikes law ============================================================ As a result of the appeal of the Socialist Party, the French Constitutional Council decided on 10 June 2009 that 3 strikes (known also as Hadopi) draft law was infringing the Constitution and the Declaration of the Rights of Man and of the Citizen from 1789 and rejected the most important parts of the text. The graduate response was censured, the Council considering that any sanction applied to Internet users could only be applied by a court. In the Council's opinion, the draft law infringes article 11 of the Declaration which ensures the freedom of communication and expression, that also applies to the online world, as the Internet is nowadays a very important means of communication. The power to "limit the exercise by any person of one's right to express oneself and freely communicate" cannot be given to an administrative authority. "These powers can only be incumbent on a judge", says the Council. This is the same position expressed by several members of the European Parliament especially by the introduction into the Telecom package of the well-known amendment 138. The Council also believes the law is in breach of article 9 of the same Declaration that stipulates the principle of the presumption of innocence. This principle was entirely ignored by the draft law where the text says that a sanction can be applied to an Internet user presumed guilty: "By ignoring article 9 of the Declaration of 1789, the law thus setting up, by operating an inversion of the proof charge, a presumption of guilt that could lead to the application to the subscriber of sanctions depriving or limiting his rights". The Council also ruled that the method of policing the web envisaged in the law was in breach of a citizen's right to privacy fact which might influence future decisions on other means of restriction or limitation, such as filtering projects. While the socialists asked the law be "completely rewritten with the double aim of ensuring the financing of culture and preserving the freedom of Internet users", Christine Albanel, France's culture minister, continued to defend the draft bill, stating she regretted that she could not finalise "the logic of 'decriminalisation of Internet users' behaviour by bringing all stages of the procedure to a non-judicial authority". The law was promulgated by Nicolas Sarkozy on 13 June 2009 in its censored form. A new text, named Hadopi 2, is to be presented to the French Council of Ministers before the end of June in order to give judges the power to apply sanctions. The text will have to observe the Constitutional Council's opinion. In any case, the law will be deprived of its core and the graduate response is crippled. The government may be in the position of having to consider the fine system that it had rejected previously. The method has the advantage of seeing immediate results and of not being in breach of fundamental rights. However, even for a fine, material evidence will have to be brought in court to prove an Internet user's copyright infringement, which will be rather difficult to produce. The ruling of the Constitutional Council is in line with the arguments the European Parliament which has tried to outlaw the French bill by the introduction of amendment 138 into the telecom package. On 11 June, the package was however rejected at the EU telecoms ministers meeting in Luxembourg which means that the law will go through a conciliation process mediated by the European Commission. This will begin in the autumn and the legislation is expected to be passed only next year. French Constitutional Court - Decision n 2009-580 DC of 10 June 2009 (only in French, 10.06.2009) http://www.conseil-constitutionnel.fr/conseil-constitutionnel/francais/les-decisions/2009/decisions-par-date/2009/2009-580-dc/decision-n-2009-580-dc-du-10-juin-2009.42666.html The Constitutional Council censures the graduate response (only in French, 11.06.2009) http://www.lefigaro.fr/politique/2009/06/10/01002-20090610ARTFIG00516-le-conseil-constitutionnel-censure-la-riposte-graduee-.php French anti-filesharing law overturned (10.06.2009) http://www.guardian.co.uk/technology/2009/jun/10/france-hadopi-law-filesharing Press Release of the French Constitutional Council on Decision n0 2009-580 DC (only in French, 10.06.2009) http://www.conseil-constitutionnel.fr/conseil-constitutionnel/francais/les-decisions/2009/decisions-par-date/2009/2009-580-dc/communique-de-presse.42667.html Hadopi : the Constitutional Council censures the graduate response (only in French, 10.06.2009) http://www.lemonde.fr/technologies/article/2009/06/10/hadopi-le-conseil-constitutionnel-censure-la-riposte-graduee_1205290_651865.html Sarkozy tries to rescue internet law after court decision (12.06.2009) http://euobserver.com/9/28294 French ruling raises hopes for EU telecoms deal (11.06.2009) http://www.euractiv.com/en/infosociety/french-ruling-raises-hopes-eu-telecoms-deal/article-183124 Hadopi law is promulgated in its uncensored part (only in French, 13.06.2009) http://www.numerama.com/magazine/13144-La-loi-Hadopi-est-promulguee-dans-sa-partie-non-censuree.html Hadopi 2 will be presented to the Council of Ministers by the end of the month (only in French, 12.06.2009) http://www.numerama.com/magazine/13142-Hadopi-2-sera-presente-en-Conseil-des-ministres-a-la-fin-du-mois.html EDRI-gram: French Government hurries to put HADOPI law into application (3.06.2009) http://www.edri.org/edri-gram/number7.11/hadopi-application-hurry ============================================================ 2. The dawning of Internet censorship in Germany ============================================================ Germany is on the verge of censoring its Internet: The government - a grand coalition between the German social democrats and conservative party - seems united in its decision: On 18 June 2009, the German Parliament is to vote on the erection of an internet censorship architecture. The Minister for Family Affairs Ursula von der Leyen kicked off and led the discussions within the German Federal Government to block Internet sites in order to fight child pornography. The general idea is to build a censorship architecture enabling the government to block content containing child pornography. The Federal Office of Criminal Investigation (BKA) is to administer the lists of sites to be blocked and the internet providers obliged to erect the secret censorship architecture for the government. A strong and still growing network opposing these ideas quickly formed within the German internet community. The protest has not been limited to hackers and digital activists but rather a mainstreamed effort widely supported by bloggers and twitter-users. The HashTag used by the protesters is #zensursula - a German mesh up of the Ministers name and the word censorship equivalent to #censursula. As part of the public's protest an official e-Petition directed at the German parliament was launched. Within three days 50,000 persons signed the petition - the number required for the petition titled "No indexing and blocking of Internet sites" to be heard by the parliament. The running time of an e-Petition in Germany is 6 weeks, during this time over 130 000 people signed making this e-Petition the most signed and most successful ever. During the past weeks, protests became more and more creative - countless blogs and twitter-users followed and commented the discussions within governments and opposing arguments. Many mainstream media picked up on this and reported about the protest taking place on-line. A working group on censorship was founded and the protest coordinated with a wiki, mailing lists, chats and of course employing twitter and blogs. One website "Zeichnemit.de" created a landing page explaining the complicated petitioning system and making signing the petition easier and more accessible for non net-experts. Over 500 people attended the Government official press conference on the planed internet censorship, a number of whom used this occasion to demonstrate and voice their concerns. In fact, demonstrators began attending some of the Minister von der Leyens public appearances, carrying banners and signs to raise attention to the stifling of information freedom in Germany. The net community did not only oppose the governments plans, but also made constructive suggestions on how to deal with the problem of child pornography without introducing a censorship architecture and circumcising constitutional freedoms. The working group on censorship demonstrated the alternatives for instance by actually removing over 60 websites containing child pornographic content in 12 hours, simply by emailing the international providers who then removed this content from the net. The sites were identified through the black lists of other countries documented on Wikileaks. This demonstration underlines the protesters' main arguments: instead of effectively investing time and efforts to have illegal content removed from the internet, the German government is choosing censorship and blocking, an easy and dangerous way out. The greatest fear of the protesters is that once in place, the infrastructure will be used to censor other forms of unwanted content, not only child pornography. German politicians already seem to be lining up with their wish-list of content to be censored in future - the suggestions ranging form gambling sites, islamist web pages, first person shooters, and the music industry cheering up with the thought of finally banning Pirate Bay and p2p. More information and linklist (only in German) http://netzpolitik.org/2009/kommentierte-zensursula-linkliste/ Links, banners and more (16.06.2009) http://netzpolitik.org/2009/the-dawning-of-internet-censorship-in-germany/ EDRi-gram: German Government forces ISPs to put web filters (22.04.2009) http://www.edri.org/edri-gram/number7.8/web-filters-isp-germany Internet filtering type Loppsi creates polemics in Germany(only in French, 17.06.2009) http://www.numerama.com/magazine/13167-Le-filtrage-du-net-facon-Loppsi-fait-polemique-en-Allemagne.html (contribution by Markus Beckedahl, EDRi-member NNM- Germany, Thanks to Geraldine de Bastion for the translation) ============================================================ 3. Stockholm programme - the new EU dangerous surveillance system ============================================================ Civil rights groups are worried about a new EU proposal that would enhance a "dangerously authoritarian" European surveillance and security system that will include ID card register, Internet surveillance systems, satellite surveillance, automated exit-entry border systems operated by machines reading biometrics and risk profiling systems. On 15 June 2009, EU justice ministers discussed on the so called Stockholm programme trying to set up the first EU "domestic security strategy for the EU", by the end of this year. The 'Stockholm Programme' is the Swedish EU Presidency's proposed legislative agenda in the area of justice and home affairs for the 2009-2014 period. According to the Swedish Presidency, the Stockholm Programme aims to "define the framework for EU police and customs cooperation, rescue services, criminal and civil law cooperation, asylum, migration and visa policy". "National frontiers should no longer restrict our activities," said Jacques Barrot, the European justice and security commissioner on 9 June when he presented the EU priorities in the justice area for the next five years. The measures include increased security co-operation and improved immigration management. The paper presented by the commissioner calls for stricter border controls, a better exchange of information on criminal and security issues between the member states and an increased police co-operation. European Commission President Josi Manuel Barroso said that "in future, EU action must aim above all at delivering the best possible service to the citizen in an area of freedom, security and justice more tangible for the citizens". "We want to promote citizens' rights, make their daily lives easier and provide protection, and this calls for effective and responsible European action in these areas. In this context, I consider immigration policy particularly important. This is the vision the Commission is presenting to the Council and Parliament for debate, with a view to the adoption of the new Stockholm Programme by the European Council in December 2009," he added. But civil liberties advocates commented in a different way the proposal: "What stands out are the proposals related to the Future Group report. A promise to balance better data protection and EU standards for 'Privacy Enhancing Technology' with the law enforcement agencies demands for access to all information and communications. An 'information system architecture' to bring about the sharing of all data across the EU. The use of 'security technologies' to harness the 'digital tsunami' to gather through mass surveillance personal data on peoples' everyday activities through public-private partnerships. What is new is the clear aim of creating the surveillance society and the database state. Future generations, for whom this will be a fully developed reality, will look back at this era and rightly ask, why did you not act to stop it." said Tony Bunyan from Statewatch. The paper reintroduces proposals related to immigration and asylum, insisting on "burden-sharing and solidarity" between member states as regards asylum seekers and stating legal migrants should have the same status across the EU and that they should have easier access to the job market. Frontex, the external borders agency should be given more powers in preventing human traffic and irregular immigrations at the EU borders. In the opinion of liberty advocates, these plans will only get us closer to a surveillance type of society. "An increasingly sophisticated internal and external security apparatus is developing under the auspices of the EU," commented Tony Bunyan. One of the main concerns is the intention of standardising European police surveillance techniques and of creating common data gathering systems operated at the EU level. A particularly worrying statement of the proposal is: "The SIS II and VIS information systems will have to enter their fully operational phase. An electronic system for recording entry and exit and a registered traveller programme must be established. The usefulness of a system of prior travel authorisation must be examined." The plans have in view an extension of the sharing of the present DNA and fingerprint databases stored for new digital ID cards to CCTV video footage and material gathered from Internet surveillance. The Daily Telegraph stated they had information from EU officials that the new plans would need the coverage of the Lisbon Treaty presently stopped by the Irish referendum in 2008 and waiting for a second Irish vote this autumn. The Treaty stipulates the creation of a Standing Committee for Internal Security to co-ordinate policy between national forces and EU organisations such as Europol, the Frontex, the European Gendarmerie Force and the Brussels intelligence. The Stockholm programme will be discussed at the informal ministerial meeting in Stockholm in July 2009, to be further on examined by the European Parliament in November with the hope that it would be approved at the Summit in December 2009, under the Swedish presidency. EC proposals for the Stockholm Programme (COM(2009) 262/4) English http://www.statewatch.org/news/2009/jun/eu-com-stockholm-prog.pdf German http://www.statewatch.org/news/2009/jun/eu-com-stockholm-german.pdf French http://www.statewatch.org/news/2009/jun/eu-com-stockholm-french.pdf EU security proposals are 'dangerously authoritarian' (10.06.2009) http://www.telegraph.co.uk/news/worldnews/europe/eu/5496912/EU-security-proposals-are-dangerously-authoritarian.html Brussels outlines justice priorities for next 5 years (10.06.2009) http://euobserver.com/9/28283 Sweden's EU immigration plans facing headwinds (11.06.2009) http://www.euractiv.com/en/opinion/sweden-eu-immigration-plans-facing-headwinds/article-183119 Justice and Home Affairs - Stockholm Programme http://www.se2009.eu/en/the_presidency/about_the_eu/justice_and_home_affairs/1.1965 Closer cooperation between EU countries on the agenda for justice and home affairs. - Freedom, justice, security: a balancing act (10.06.2009) http://ec.europa.eu/news/justice/090610_en.htm European Commission outlines its vision for the area of Freedom, Security and Justice in the next five years (10.06.2009) http://ec.europa.eu/justice_home/news/int European Commission - Communication - An evaluation of the Hague Programme and Action Plan (10.06.2009) http://ec.europa.eu/justice_home/doc_centre/doc/com_2009_263_en.pdf Statewatch Observatory The "Stockholm Programme" - "The Shape of Things to Come" http://www.statewatch.org/future-group.htm European Civil Liberties Network - Oppose the "Stockholm Programme" (04.2009) http://www.ecln.org/ECLN-statement-on-Stockholm-Programme-April-2009-eng.pdf ============================================================ 4. The telecoms ministers rejected the telecom package as adopted by the EP ============================================================ The European Commission continues to pressure the Council and the new European Parliament to rapidly adopt the telecoms package without a proper scrutiny of the law or any consideration of the implications of Amendment 138. At the Luxembourg meeting on 11 June 2009, the telecoms ministers decided to reject the telecom package in the form adopted by the European Parliament in the second reading on 6 May 2009, thus proposing a new round of negotiations. The ministers consider the Parliament has breached the earlier compromise reached with the Council on the telecoms package as a whole, obviously the main issue under question being the controversial issue of copyright protection and users' rights. And with the new decision of the French Constitutional Council against the French three strikes law, the European Parliament will probably insist in its position. On a press conference on 11 June, the position of the European Commission was expressed by Viviane Reding's spokesman Martin Selmayr who stated that the issue of Amendment 138 had been dealt with at the national level (thus referring to the French Constitutional Council decision) and therefore should no longer be a European matter. Which, obviously, means that the Commission wants the amendment dropped from the telecom package. Reding, which has lately been supporting France's position for the graduate response, made an appeal to EU lawmakers urging them to finalise the discussions on the package. "I call on all political players to do their best in the next days and weeks to settle the last pending issue. Critics often lament about Europe's lack of competitiveness, because of the alleged length of the EU's decision-making processes. In the next days and weeks, Council and Parliament have the unique opportunity to prove these critics wrong." The deadline for the European Parliament to send its position to the Council on the telecoms package is 19 June. After this, there are several options for the telecoms ministers. One is to adopt the text as voted by the Parliament but this is unlikely having in view their position on Amendment 138, especially the position of France in the matter. Another option is to adopt a counter-proposal restating the Council's initial line which will formally start the negotiation procedure to take place under the new Swedish presidency. In this case, the Parliament will have to create a conciliation committee including 27 newly elected members representing all the EU countries. A formal agreement could be reached by the end of the year. EU Council could also reopen the entire case asking for negotiations on the core of the text which could lead to other debates with unpredictable duration and results. A technical possibility could be to split the package but this is unlikely as the ministers have already stated they did not want to take that road. As the text is interlinked, splitting it would mean bringing modifications to a large part of the text. The European Parliament's schedule is to have a trialogue on 29 September with a final vote on 15 December which would give time for discussion of the issues raised by Amendment 138 and for the new MEPs to get familiarised with these issues. French ruling raises hopes for EU telecoms deal (11.06.2009) http://www.euractiv.com/en/infosociety/french-ruling-raises-hopes-eu-telecoms-deal/article-183124 Commission steps up pressure on Telecoms Package (10.06.2009) http://www.iptegrity.com/index.php?option=com_content&task=view&id=358&Itemid=9 Reding: don't involve EU in fundamental rights (12.06.2009) http://www.iptegrity.com/index.php?option=com_content&task=view&id=360&Itemid=9 Telecoms package remains hostage of political row (12.06.2009) http://www.euractiv.com/en/infosociety/telecoms-package-remains-hostage-political-row/article-183137?Ref=RSS Ministers braced for final round of telecoms talks (11.06.2009) http://www.euractiv.com/en/infosociety/ministers-braced-final-round-telecoms-talks/article-183089 Presidency Press Statement on the state of play regarding the 'telecoms package' (12.06.2009) http://www.eu2009.cz/en/news-and-documents/news/presidency-press-statement-on-the-state-of-play-regarding-the-_telecoms-package_-25123/ EDRI-gram: European Parliament votes against the 3 strikes. Again (6.05.2009) http://www.edri.org/edri-gram/number7.9/ep-plenary-votes-against-3-strikes ============================================================ 5. Finland: Complaints not allowed for the Police child-porn censorship list ============================================================ The Helsinki Administrative court decided on 20 May 2009 that complaints lodged in regards to the child-porn censorship list maintained by the Finnish Police are not allowed. The case originates from one Finnish activist's "battle" against the censorship list maintained by the Finnish police and originally the censorship law passed by the Finnish Parliament in 2006, meant to combat child pornography. The list works in the manner that in conjunction with the ISPs the Finnish Police is able to bock access to certain sites deemed as having child pornography content and thus illegal. However what the activist Matti Nikki contests is that although the list is maintained for a good cause, many sites including Mr. Nikki's own site lapsiporno.info (translated as childporn.info) meant to display parts of the Police's censorship list end up as being blocked in an arbitrary manner by the Police. This is shown by the way in which the Finnish Police acted in relation to Mr. Nikki, after he started a direct debate with the Finnish Police; the Police stepped in and included Nikki's site onto the censorship list, after which Mr. Nikki was interrogated by the Police and the Finnish Attorney General deliberated whether Mr. Nikki should be prosecuted for distribution of child pornography. No action of prosecution followed, and Mr. Nikki asked that his site be removed from the list of censored sites. The Finnish Central Criminal Police decided not to release lapsiporno.info. Mr. Nikki appealed to the Helsinki Administrative Court, which gave its decision in May 2009. The decision of the Helsinki Administrative Court states that Mr. Nikki's site is being censored, however the most worrying aspect is that while the court admits that the case is in fact about censoring Mr. Nikki's personal site, it totally walks over the Finnish constitution and the rights enshrined in it in relation to freedom of speech, without even giving any reasoning why it has done so. This is a grave violation of Article 10 of the European Convention on Human Rights. Mr. Nikki, who is represented by the Helsinki - based law firm Turre Legal, will appeal the decision to the Supreme Administrative Court of Finland during June 2009. Decision of the Helsinki Administrative Court (only in Finnish, 20.05.2009) http://hack.fi/~muzzy/lapsiporno/files/hao-09-0704-3.pdf (contribution by Markku Rdsdnen - Summer Associate, Turre Legal, Finland) ============================================================ 6. Windows 7 is launched without IE, but the Commission is not pleased ============================================================ Although until recently Microsoft was claiming that Internet Explorer (IE) browser was an integrant part of Windows operating system, on 11 June 2009 the company stated it would launch its new version of operating system for the European market, Windows 7, without Internet Explorer. The decision comes as a result of a Statement of Objections sent to Microsoft in January 2009 by the European Commission regarding competition concerns related to the bundling of the browser to the operating system. However, the European Commission has not welcomed the new decision. A Statement of Objections is a formal step in Commission antitrust investigations by means of which the parties concerned are informed in writing of the objections raised against them. Microsoft replied to the this step on 28 April 2009 and the Commission is presently considering Microsoft's reply and any additional evidence in the case. According to the Commission, by bundling Internet Explorer to Windows, Microsoft is using its dominant position in the operating system market to block competition in the browser market. Microsoft was already fined in EU in 2007 for bundling its media player to Windows. Waiting for the decision of the Commission but wishing to observe its launching targets for the new version of its operation system, Microsoft decided to offer this European version without IE. "We're committed to making Windows 7 available in Europe at the same time that it launches in the rest of the world, but we also must comply with European competition law as we launch the product. Given the pending legal proceeding, we've decided that instead of including Internet Explorer in Windows 7 in Europe, we will offer it separately and on an easy-to-install basis to both computer manufacturers and users. This means that computer manufacturers and users will be free to install Internet Explorer on Windows 7, or not, as they prefer. Of course, they will also be free, as they are today, to install other Web browsers," stated Deputy General Counsel Dave Heiner in a blog post on the company website. In response to this statement, on 12 June, the European regulators showed they were not pleased with Microsoft's decision as they had suggested that the company offer a selection of browsers on its operating system to open up choice for consumers and not a complete lack of options. "Microsoft has apparently decided to supply retail consumers with a version of Windows without a web browser at all. Rather than more choice, Microsoft seems to have chosen to provide less," said the Commission in its statement. The reaction is explainable as after Microsoft had decided to sell a version of Windows without its Media Player after the fine received in 2007, it succeeded in going around the Commission's restrictions by selling an alternative version of Windows equipped for free with the Media Player, which was obviously preferred by the consumers. A potential solution considered in the Commission' Statement of Objections would be to allow consumers to choose from different web browsers presented to them through a 'ballot screen' in Windows. Thus, the Commission might force Microsoft to include other browsers with its operating system which will probably help competitive browser companies such as Mozilla's Firefox , Opera, Google's Chrome and Apple's Safari. EU unconvinced by Microsoft Internet browser offer (12.06.2009) http://www.euractiv.com/en/infosociety/eu-unconvinced-microsoft-internet-browser-offer/article-183146?Ref=RSS Antitrust: Commission statement on Microsoft Internet Explorer announcement (12.06.2009) http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/09/272&format=HTML&aged=0&language=EN&guiLanguage=en Working to Fulfill our Legal Obligations in Europe for Windows 7 (11.06.2009) http://microsoftontheissues.com/cs/blogs/mscorp/archive/2009/06/11/working-to-fulfill-our-legal-obligations-in-europe-for-windows-7.aspx Brussels threatens Microsoft with fresh fine (19.01.2009) http://www.euractiv.com/en/infosociety/brussels-threatens-microsoft-fresh-fine/article-178587 ============================================================ 7. More voices in the EP for digital rights ============================================================ The recent elections have brought more seats for parties supporting digital rights in the European Parliament (EP), such as the Greens, UK Independence Party or the Liberal Democrats. The Swedish Pirate Party has succeeded in getting a seat as well. The Pirate Party has succeeded in obtaining 7% of the votes in Sweden, thus winning one representative in the EP. In case the Lisbon Treaty is adopted, it might even get one more seat. The success of the party is due to two recent events: the EU's intellectual property enforcement directive which asks that ISPs turn over traffic data to copyright holders who are trying to track down filesharers and which was brought into force by the Swedish Government in April 2009 and the result of the Pirate Bay trial. The party's success has proven that privacy rights and fair copyright systems matter to Swedish people. Ray Corrigan, senior lecturer in -technology at the Open University, explains: "A lot of IP laws are being driven through because they are off most people's cognitive agendas. If you start knocking people off the internet for -allegedly infringing copyright those numbers start to grow into the thousands, or tens of thousands, very quickly. It has a direct impact on their children's education and some people may need the internet for their job." The Pirate Party will join either the Green or the Liberal groupings in the European Parliament. "There have been no formal discussions, but we have been invited by a few groups for informal talks," said Christian Engstroem, a computer programmer and the candidate heading the party's list who also said that the party would join the one grouping that will be the closest to the party's positions on Internet freedoms. The Pirate Party presence may bring new debates on the issues of patents and copyright and privacy. Their position is for a five year copyright term, a file sharing exception and the abolishment of patents. EDRi-member Open Rights Group considers that the Pirate Party has some positions that are a little extreme but the party's cultural flat rate proposal might be something similar to a payment made in exchange for a file sharing exception. While the Pirate Party advocates for a 5-year term copyright, many copyright academics feel the economically optimal term is rather 15 years than the life plus 70 years that is now in force. Sweden is not the only country where digital rights supporters have succeeded in making their voice heard. The German pirate party, Piratenpartei Deutschland, won close to 1% of the vote. And registered "Pirate Parties" now exist in Austria, Denmark, Finland, Poland and Spain. Similar groups are attempting to register as political parties in the UK and the US as well. "My view is that IP is a good and necessary thing. I'm not in favour of a free-for-all but I do think that there are many important questions that need to be addressed. I think it's a good thing that you are getting representatives in parliament who wish to challenge the established view," stated Andrew Dearing, secretary general of the European Industrial Research -Management Association. A new and fresh breath of air will be beneficial for the atmosphere in the European Parliament that relies more on the Internet as a source of information, but also as a communication tool with its voters. A survey carried out by Fleishman-Hillard during 1 April to 1 May 2009 shows that although most MEPs largely use the Internet, it seems most of them still believe traditional forms of communication, such as television or newspapers, are more effective. About 75 percent of the MEPs use a web page to communicate with their voters, 93% use search engines daily to understand legislative issues. Still, many of them have to open up to social online media as only thirty-three percent of them use the social media networks "extensively", 20 percent occasionally, but 29 percent "do not use them or do not plan to use them." "Members of the European Parliament recognise that EU citizens go online and that they therefore need a web presence. However, the majority of MEPs do not currently take full advantage of social media tools as a means to engage with voters and drive them to their websites," the survey said. Pirates to join Green or Liberal groups in EU parliament (3.06.2009) http://euobserver.com/883/28237 Majority of MEPs do not 'tweet' (4.06.2009) http://euobserver.com/883/28238 Sweden's Pirate party sails to success in European elections (11.06.2009) http://www.guardian.co.uk/technology/2009/jun/11/pirate-party-sweden What do the EU results and Pirate Party mean for digital rights? (9.06.2009) http://www.openrightsgroup.org/2009/06/what-do-the-eu-results-and-pirate-party-mean-for-digital-rights/ EDRIgram: The Pirate Bay asks for retrial claiming conflict of interest (6.05.2009) http://www.edri.org/edri-gram/number7.9/pirate-bay-mistrial ============================================================ 8. Report: OECD Conference on Sensor Based Networks ============================================================ "Using Sensor-based Networks to Address Global Issues: Policy Opportunities and Challenges" was the title of an experts conference the OECD organised on 08 and 09 June 2009, hosted by Portugal, in Lisbon. Andreas Krisch participated in the conference on behalf of EDRi and CSISAC. The goal of the Conference was to help policy makers: a. understand Sensor-Based Networks and their potential contribution to economic and social welfare, b. identify how to further stimulate innovation in this area and foster the development of these technologies where they are needed the most and are the most promising. During the one and a half day event, the potentials of sensor based networks in the areas of health and elderly care, protection of the environment and transportation were discussed. Presentations on different research and commercial projects illustrated current and potential future uses of sensor networks. The presented applications ranged from humidity sensors used for the reduction of water consumption in agriculture via sensor networks used to support elderly care at home to traffic control systems for highways based on information gathered from vehicle on-board computers. In the last session privacy protection and information security dominated the discussion on policy options. Panellists made quite clear that, in their opinion, a widespread use of sensor networks and related technologies will only be possible in future, when a sufficient level of trust can be achieved. For this, privacy protection and information security are key. For a more detailed report on the conference see http://csisac.org/2009/06/csisac_oecd_rfid.php CSISAC http://csisac.org/ Conference website http://www.oecd.org/sti/ict/sensors Presentations, session summaries, conclusions http://www.oecd.org/document/41/0,3343,en_2649_34223_42616233_1_1_1_1,00.html (contribution by Andreas Krisch - EDRi) ============================================================ 9. ENDitorial: Regulating online media in Azerbaijan? ============================================================ I was invited last week to a meeting in Baku, Azerbaijan by the Council of Europe that organized together with the local National TV and Radio Council in order to discuss some issues related to the regulation of online media. The meeting took place on 4 June 2009 and the first part was dedicated to the local authorities (Ministry of Communication and Information Technologies or National TV and Radio Council) local Internet actors (The online news agency lent.az, or APA news agency) and NGOs (such as Azerbaijan Internet Forum or IREX Azerbaijan). Although the authorities and private partners sat at the same table, there was a huge difference in speeches. While the Deputy Minister of Communications and Information Technologies Iltimas Mammadov talked about 2000 km optic cable already deployed and measures for using Internet in the cars via WiMax, the private sector claimed that 95% of the population used dial-up or similar connections and that the average cost of a 1Mb/s monthly connection was between 60-120 manats (approx. 53-107 Euro), which is a huge price for an average person in Azerbaijan. While the authorities claimed that anyone can start an ISP, the private sector insisted that, basically, the backbone connectivity could be bought only from a "special" ISP - Delta Telecom. The high final prices and allegation of some content being blocked by the authorities could thus be explained. Talking about regulating online media, the voices seem to converge in asking for a definition of "electronic media". Strangely in my opinion, the private sector representatives asked for a clarification in this respect, seeming to want such a registration for the electronic media (which is in fact more a notification). But this could be explained by the fact that otherwise you are not invited to press conferences or able to get an interview from an official. In a country where you need to register your off-line publication with the Ministry of Justice or your TV or radio station with the National Television and Radio Council, most of the speakers seem to claim that the regulation should be the rule to protect others' privacy or honour, to prevent pro-aggressive war speech (this part may be a result of the war on Nagorno-Karabakh with Armenia) or hacking of websites (?!?). Another interesting aspect is that the present mass-media law from 2009 lists the Internet as a mass-medium. The European experience presented by Mr Marcel Betzel, a policy adviser from the Dutch Media Authority and by myself was focused on whether any regulation was needed in the new online environment and whether such a regulation would be feasible.We also tried to emphasise with concrete examples the importance of self-regulation and its results. I have specifically explained why a registration of online media could be seen as a potential infringement of the freedom of expression if we take into consideration the jurisprudence of the European Court of Human Rights. Also why we need to consider whether a new legislation is feasible in terms of its application and whether it will just send the unwanted content hosted in another country. Mr. Betzel also presented the difficulties of implementing the new European Audiovisual Media Services Directive and identifying which site can be considered web TV or Internet radio, according to the new rules. Taking into consideration the traditional IT development skills of the Azeri, the Internet has a lot of place to grow, but for now, it is hard to estimate what the future actions of the Azeri authorities will be, if any, for a "better regulation" of the online media. Regulation of Online Media in Azerbaijan http://www.coe.az/Latest-News/159.html Conference on the theme "Regulation of Internet media in Azerbaijan" takes place (4.06.2009) http://en.apa.az/news.php?id=103237 Azerbaijan - OpenNet Initiative Profile http://opennet.net/research/profiles/azerbaijan (contribution by Bogdan Manolea - EDRi-member APTI - Romania) ============================================================ 10. Recommended Action ============================================================ Cloud Privacy - An open letter to Google's CEO, Eric Schmidt This six page letter (pdf) to Google's CEO, Eric Schmidt, is signed by 38 researchers and academics in the fields of computer science, information security and privacy law. Together, they ask Google to honor the important privacy promises it has made to its customers and protect users' communications from theft and snooping by enabling industry standard transport encryption technology (HTTPS) for Google Mail, Docs, and Calendar. http://www.cloudprivacy.net/letter/ ============================================================ 11. Recommended Reading ============================================================ Reykjavik conference maps out future Council of Europe work on media and the Internet https://wcd.coe.int/ViewDoc.jsp?id=1452361 Political Declaration and resolutions http://www.coe.int/t/dc/press/source/20090529_final_declaration_iceland_en.doc ============================================================ 12. Agenda ============================================================ 28-30 June 2009, Turin, Italy COMMUNIA Conference 2009: Global Science & Economics of Knowledge-Sharing Institutions http://www.communia-project.eu/conf2009 2-3 July 2009, Padova, Italy 3rd FLOSS International Workshop on Free/Libre Open Source Software http://www.decon.unipd.it/personale/curri/manenti/floss/floss09.html 6-7 July 2009, Barcelona, Spain Fifth Internet Law & Politics Conference organized by the Law and Political Science Department of the Universitat Oberta de Catalunya The Pros and Cons of Social Networking Sites. http://www.uoc.edu/symposia/idp2009/engl/index.html 13-16 August 2009, Vierhouten, The Netherlands Hacking at Random http://www.har2009.org/ 23-27 August 2009, Milan, Italy World Library and Information Congress: 75th IFLA General Conference and Council: "Libraries create futures: Building on cultural heritage" http://www.ifla.org/IV/ifla75/index.htm 10-12 September 2009, Potsdam, Germany 5th ECPR General Conference, Potsdam Section: Protest Politics Panel: The Contentious Politics of Intellectual Property http://www.ecpr.org.uk/potsdam/default.asp 16-18 September 2009, Crete, Greece World Summit on the Knowledge Society WSKS 2009 http://www.open-knowledge-society.org/ 17-18 September 2009, Amsterdam, Netherlands Gikii, A Workshop on Law, Technology and Popular Culture Institute for Information Law (IViR) - University of Amsterdam Call for papers by 1 July 2009 http://www.law.ed.ac.uk/ahrc/gikii/2009.asp 21-23 October 2009, Istanbul, Turkey eChallenges 2009 http://www.echallenges.org/e2009/default.asp 24-25 October 2009, Vienna, Austria 3rd European Privacy Open Space http://www.privacyos.eu 25 October 2009, Vienna, Austria Austrian Big Brother Awards Deadline for nominations: 21 September 2009 http://www.bigbrotherawards.at/ 16 October 2009, Bielefeld, Germany 10th German Big Brother Awards Deadline for nominations: 15 July 2009 http://www.bigbrotherawards.de/ 13-15 November 2009, Gothenburg, Sweden Free Society Conference and Nordic Summit http://www.fscons.org/ 15-18 November 2009, Sharm El Sheikh, Egypt UN Internet Governance Forum http://www.intgovforum.org/ ============================================================ 13. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and visibly on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edrigram-mk.php - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From StephenmetalloidNelson at promisesnh.com Wed Jun 17 21:11:03 2009 From: StephenmetalloidNelson at promisesnh.com (Larry Clark) Date: Wed, 17 Jun 2009 20:11:03 -0800 Subject: We have CEOs as students. Message-ID: <8286397698.20081111140500@promisesnh.com> B�chelor Degr�e, |\/|aster, MBA, 3ven PhD (non accredited) �v�ilab|e in the field of your choic�. Yourr e�perience can get you the degree you deserve! C�ll Now!! 24-hours a day, 7-Days a Week wa�ting For your �all +1-646-537-1732 From CleoharvestmanHedrick at enolagaia.com Wed Jun 17 06:19:38 2009 From: CleoharvestmanHedrick at enolagaia.com (Stefanie Langston) Date: Wed, 17 Jun 2009 20:19:38 +0700 Subject: How to be popular among girls Message-ID: <1117212426.20081111138001@enolagaia.com> Fi�ally - for a very limited time only - Dr.|\/|axMan is now available absolutely and completely FREE! The revolutionary hardcore formulaa for male enha�c�ment, prov�n by multiiple studiees worldwide to be 15 X more effective for gaiining inches, thickness and girth for men. http://trialsherb.com/ Gain triple your sizee in l�ss than a month completel� free. http://sizeextra.com/ Get Your Freee Trial Now - Dont Wait! From cypherpunks at jfet.org Wed Jun 17 16:51:31 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 17 Jun 2009 20:51:31 -0300 Subject: Your ticket to a new slim life, Acai Berry. Message-ID: <000d01c9efa6$89d27310$6400a8c0@tablingp8> Get your Free Trial Now!   Just one click   important discovery for all man kind, acai berry weight loss try it free   Welcome     best ragards Winn -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 954 bytes Desc: not available URL: From xtrakt at gmail.com Wed Jun 17 23:47:28 2009 From: xtrakt at gmail.com (xtrakt) Date: Thu, 18 Jun 2009 00:47:28 -0600 Subject: [Pigdog] Nation sees 50% rise in unfathomable headlines. Message-ID: On Wed, Jun 17, 2009 at 07:58:00AM -0700, jeremiah wrote: > Then, as dissent really becomes important, you'll find the tools have > been supressed and your messages criminalized. You will soon watch your > precious Itarwebz go the way of Burma or Iran. And don't try to leave! > All the new 'border security' will be doing the job of keeping you IN. Communicating in the Resistance: Lessons Learned From the Battlefield http://www.lewrockwell.com/gaddy/gaddy61.1.html > Pigdog will become REAL samizdat, again. I predict a revival of > FIDO-style relays, and maybe even scanning the back pages of Computer > Currents - for an interestingly subversive listing... This was one of the better forums, but it was slim pickings: The Mental Militia Forums: Gulchnet ramp up http://tinyurl.com/lwld9a We really need to get started on this FIDONet revival soon. Um, I've got a few external 56 modems lying around... _______________________________________________ Pigdog mailing list Pigdog at lists.pigdog.org http://lists.pigdog.org/listinfo.cgi/pigdog-pigdog.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From LupeuniqueLanders at bikewebsite.com Wed Jun 17 19:28:50 2009 From: LupeuniqueLanders at bikewebsite.com (Susanne Peacock) Date: Thu, 18 Jun 2009 02:28:50 +0000 Subject: Greatness is measured by the size of your manhood Message-ID: <5036927323.20081111135082@bikewebsite.com> Fin�lly - for a very l�mited time only - Dr.MaxMan is now avaiilable abs�olut�ly and completely FREE! The revo|utionary hardcoore formula for male enhancement, prov�n by multip|e studies worldwide to be 15 X mor� effective for gaining inches, thickness and girthh for men. http://extralenght.com/ Gain tripl� your size in less than a month completeIy free. http://trialsherb.com/ Get Your Freee Triall Now - D�nt Wait! From cypherpunks at jfet.org Thu Jun 18 03:01:56 2009 From: cypherpunks at jfet.org (Deloris Kearney) Date: Thu, 18 Jun 2009 03:01:56 -0500; Subject: porsche design is your style; Message-ID: Amazing watches and such huge choice http://odjjqdea.cn From c_morriset at bigfoot.com Wed Jun 17 22:11:40 2009 From: c_morriset at bigfoot.com (Carissa Morris) Date: Thu, 18 Jun 2009 05:11:40 +0000 Subject: Do you want enlargr your penis up to 4 inches? rj In-Reply-To: <605701c9eb1f$c18f674c$6b430464@jaa0ph1> Message-ID: Dear rsw at jfet.org http://lawnroad.com A breakthrough in herbal Science has created a pill that has been designed specifically for penis enlargement. The tests that took place over a 6 month period showed that out of the 50,000 Males from around the world who participated, the average gain after 5 months of taking our pills pills was 3.72 Inches! Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your Penis Width (Girth) By upto 20%. ť Help Stop Premature Ejaculation! ť Produce Stronger, Rock Hard Erections. ť 100% Safe To Take, With NO Side Effects. ť Fast Shipping WorldWide. ť Doctor Approved And Recommended. ť No Pumps! No Surgery! No Exercises! ť Very discrete shipping and billing ť 100% Money Back Guarantee. ť *3 FREE Bottles !! ť Highly secure 128bit order processing http://lawnroad.com Thanks Mary Anniston rsw at jfet.org wrote: > IS bigger better or not? ygzejg1egs- out me now http://lawnroad.com/w.php From cypherpunks at jfet.org Thu Jun 18 08:32:15 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 07:32:15 -0800 Subject: Improve your digestive system with Acai Diet. Message-ID: <000d01c9f021$937623f0$6400a8c0@shittiestnt51> Having trouble viewing this email? View it online. If you wish to discontinue these mailings, please unsubscribe now. Web Version | Ensure Delivery | Email Preferences | Sign Up | Contact Us WEEKLY SELECT    Acai Berry Trial is available now! Longing for your click This email was sent to cypherpunks at jfet.org Should you wish to modify your subscriptions or discontinue future mailings of this newsletter, please edit your email preferences.To read more about our email policy, please view Privacy Policy. Copyright ¿ 2009 qspfjcjnpd International. All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4565 bytes Desc: not available URL: From eugen at leitl.org Thu Jun 18 00:11:55 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 09:11:55 +0200 Subject: [Pigdog] Nation sees 50% rise in unfathomable headlines. Message-ID: <20090618071155.GG23524@leitl.org> ----- Forwarded message from xtrakt ----- From eugen at leitl.org Thu Jun 18 01:15:53 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 10:15:53 +0200 Subject: Lessons Learned From the Battlefield Message-ID: <20090618081553.GK23524@leitl.org> http://www.lewrockwell.com/gaddy/gaddy61.1.html Lessons Learned From the Battlefield by Michael Gaddy Recently by Michael Gaddy: Preparation I continue to receive a large number of emails questioning what would be the best instrument for communication in the event of a national emergency, economic chaos or civil unrest on a massive scale. I believe the answer can be found in what has worked, and not worked, for the Iraqi resistance. (I refuse to call anyone fighting for their homes and families an insurgent) In a great number of instances, communications has been the Achilles Heel of the resistance in Iraq. They have learned to constantly change their modes and methods of communication in order to keep their opponents off balance. The cell phone is the easiest and most preferred method of communication in use by the modern day 4th Generation Warfare (4GW) participant; it is also the easiest to exploit. First, remember SIM cards are exploitable and can and will be used against you. It is possible to exploit a SIM card in 30 seconds without the holder even knowing it, once your opponent has your phone number. All that is needed to pinpoint location with a cell phone is 2 towers for those who do not have a phone with GPS. There are also technologies that allow the government to create false towers that seek out your phones specific signal and will allow them to troll around an area until they get a hit, and then it will lead them right to your location. These techniques have been developed, tested, and used effectively in Iraq and Afghanistan. All the opponent needs is your number, which gives them the specific signal to your phone. Counter measures are simple; never ever keep the phone on, or the battery in. Never store numbers in the phone, always use throwaway cell phones and change them often. Set up prearranged talk times, and always talk on the move. Never talk in your home, or while you are stationary. Never ever send text messages, and always talk in code on the phone. Hard line to hard line is the best way to call if you can still find a pay phone. Radios of any kind are the same as cell phones, but will get you located quicker. The opponents expect them to be used, and almost always have their ears on. Todaybs military units have the ability to listen and pinpoint the point of broadcast of any type communication device and jam it. Unless you hardwire your area of operations (AO) with WWI field phones, keep your messages short, sweet, and move quickly after you broadcast. I warned here of new members to your group who advocate violence or offer to provide weapons and/or explosives. Also be extremely cautious of any members of your group who are gone for any period of time or those you know have been contacted by the authorities. Even the most loyal can be coerced with threats to family, etc. Read and study 4GW tactics and strategies; these tactics have yet to be defeated in modern military history. I highly recommend the series of books written by Colonel John Poole on the subject. The Colonelbs works reveal a detailed history of 4GW and a wealth of information that could prove invaluable. Author, Patriot, and LRC reader, Matthew Bracken, has written a trilogy of novels on probable scenarios concerning civil unrest and its complications. There is a wealth of information that can be gleaned from his works, as well as some disturbing possibilities. Matt has laced his writing with interesting characters that makes for an informative, entertaining, though sometimes alarming read. Those who prepare, educate and equip for the coming chaos will be those most apt to protect themselves and their families. Remember, those who fail to plan, plan to fail. June 18, 2009 Michael Gaddy [send him mail], an Army veteran of Vietnam, Grenada, and Beirut, lives in the Four Corners area of the American Southwest. From cypherpunks at jfet.org Thu Jun 18 10:27:38 2009 From: cypherpunks at jfet.org (Marci Mullins) Date: Thu, 18 Jun 2009 10:27:38 -0500; Subject: you really need rolex on your arm; Message-ID: Biggest choice of watches http://oklhphea.cn From eugen at leitl.org Thu Jun 18 01:27:40 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 10:27:40 +0200 Subject: gulchnet ramp up Message-ID: <20090618082740.GN23524@leitl.org> (very long thread, see the site) http://thementalmilitia.com/forums/index.php?PHPSESSID=682c1e7f53b789fdb860ccfb9583d932&topic=1318.0 Topic: Gulchnet ramp up (Read 2175 times) kbarrett Sr. Member **** Offline Offline Member #57 Posts: 1144 Gulchnet ramp up + on: June 03, 2004, 03:48:52 PM ; OK .... I've got a server set up with freeswan on a permanent IP address. Not sure how to run it, but the software is loaded. I'm not using KLIPS, as I don't want non-members to be able to enter. Who else has freeswan ( or strongswan or superswan ) set up? We could either use fixed IP addresses, or pass out x509 certs to folks with DHCP floating IPs ( use "roadwarrior" laptop protocols ). I'd like to get some kind of server backbone set up first, and then maybe put Debra or Claire in charge of certification .... someone needs to vet people before they get in. Also ... do we want to buy a domain name for this mess, or just use bare IP addresses? From eugen at leitl.org Thu Jun 18 02:34:33 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 11:34:33 +0200 Subject: Inside the Pentagon's New Plan for Drones That Don't Piss Off Pakistan Message-ID: <20090618093432.GS23524@leitl.org> http://www.esquire.com/the-side/feature/new-air-force-drones-in-pakistan-061709 June 17, 2009, 11:43 AM Inside the Pentagon's New Plan for Drones That Don't Piss Off Pakistan Esquire.com gets an advanced look at the Air Force roadmap to better robots b flying multi-missile hitmen, floating multi-target guidance systems, flapping suicide bombers b and how they can zero in on Al Qaeda without costing Hillary her job. By Erik Sofge niper system (top) can lock in on four targets in urban environment, potentially to deliver the precision power of the new Suburban Warrior UAV (left). The backup plan? Flocks of sparrow-sized bombers (right). As hitmen go, robots are clumsy killers. The proof is in Pakistan, where local authorities claim that drone strikes on Al Qaeda and affiliate targets have killed at least 687 civilians. Whether or not that figure is inflated, the real or imagined death toll continues to fuel anti-American sentiment around the world. And that's to say nothing of the anti-administration fervor inside Washington circles as to whether President Obama and newly promoted general Stanley McChrystal, in continuing Bush-era policies with Bush-era technologies (even if they're offering Pakistan surveillance data), should continue air strikes near the Afghan border at all. Now, the Air Force is planning to build a more selective breed of military drones, with swarms of bird-size bots shadowing targets and new unmanned aerial vehicles (UAVs) capable of launching mini-missiles at multiple targets at once. The mechanized assassin, it seems, is about to become a lot more professional. Details of this new UAV development are limited b the Air Force Research Laboratory released a 78-page briefing last month, sketching out individual plans for a number of drone-related systems. The briefing, first obtained by Air Force Times but reviewed this morning for Esquire.com, offers the first detailed glimpse at an American military strategy that has adapted to conflicts in Pakistan and Afghanistan and "incorporates a vision and strategy... that focus on delivery of warfighting capability" with new robots. Perhaps the most significant concept in the briefing is a UAV called Suburb Warrior, which would carry a new kind of smaller, precision-guided missile. Another project, called Sniper, is a targeting system that can lock on to multiple targets, allowing a single drone pilot to coordinate the attacks of a squadron of robots b or a single UAV to hit a group of enemies. Picking through the dozens of systems in this briefing, many of which will be flight-tested within five years, there's a clear set of goals: build smaller, even microscopic drones with smaller weapons that can hunt in swarms and engage targets in the close quarters of urban battlefields. And hunt as soon as possible. To understand the significance of this new plan b how it could affect U.S. diplomacy in the region, reduce potential troop counts there, and, you know, better hunt Al Qaeda b one need only look at the current state of unmanned assassination. The least powerful weapons deployed by Predators b and their new big brother, the Reaper b are Hellfire missiles. These antitank weapons have incredibly literal names; they're designed to penetrate armored vehicles with a jet of molten metal. So if a U.S. target were sitting in a pickup truck, or even a second-floor window, a Hellfire is more than overkill. It's a collateral damage factory, turning a city street into hell on earth, and potentially flattening buildings. To paraphrase the NRA, robots don't kill civilians; missiles do. Theoretically, the smaller missiles launched by Suburb Warrior would wreak less havoc in crowded battlefields. In asking for proposals for a "Miniature Weapon Demonstration," the Air Force described the new weapon as an "air-launched, precision miniature munition capability," which would provide a "mobile target kill capability against a broad set of targets in a suburban environment." In the new briefing, the system is described as "for application in a dense, all environment urban battlespace." That's Pentagon speak for Obama-approved missiles that are ready for anything short of Mogadishu, that cover the Pentagon's ass in smaller cities while they're at it. Notional drawings of Suburb Warrior show the drone loaded with four or more mini-missiles b far fewer munitions than a Reaper carries b but make clear that it's much smaller than even the Predator. The Sniper multiple-targeting system (that Goodyear-blimp-meets-Star-Wars-X-wing craft pictured above) isn't tied to a specific UAV, but it could be a perfect fit for delivering the Suburb Warrior. Instead of dropping Hellfires or a 500-pound bomb on an insurgent hideout, one or more Suburb Warriors could fire a volley of mini-missiles at confirmed targets, without vaporizing the wedding reception next door. The drone is slated for flight tests by 2014, and Sniper is scheduled to begin tests in cruise missiles and UAVs within two years. The Air Force is reviewing white papers for miniature munitions now, and a contract could be awarded as early as September. The problem, of course, is that even if the robotic upgrade continues on this fast track, five years is an eternity for America's diplomatic arm to wait for its military one. Who knows if Hillary Clinton will still have her job by then? If she does, what if the new robots still aren't precise enough? So if a squadron of low-flying drones and their micro-munitions don't provide a clean kill in those packed communities, the Air Force Research Laboratory has a more point-blank Plan B: tiny, biologically-inspired micro air vehicles (MAVs) that can flap through alleys and inside buildings. Like most UAVs, these robots would most likely be used for surveillance and reconnaissance. But in an animated clip released by the Air Force late last year, a MAV lands on an enemy sniper, and, without so much as a prayer to its machine god, detonates itself. The new Air Force briefing doesn't elaborate on this miniature suicide-bomber concept, but it does include plans to have flocks of sparrow-size MAVs airborne by 2015, and even smaller, dragonfly-size robots by 2030. And with the recent news that Israel is developing an explosives-laden snakebot, the writing is on the wall: You can run from tomorrow's robotic hitmen, and you can hide, and they'll flap or squirm or glide into position and kill you anyway. Erik Sofge is a freelance science, technology, and culture writer, covering the latest in everything from fake robots and rayguns to real ones for Popular Mechanics, Slate, and MSN. He lives in Boston with his wife and possibly animatronic unborn child. From eugen at leitl.org Thu Jun 18 03:19:45 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 12:19:45 +0200 Subject: March of the killer robots Message-ID: <20090618101945.GW23524@leitl.org> http://www.telegraph.co.uk/scienceandtechnology/science/sciencenews/5543603/March-of-the-killer-robots.html March of the killer robots The development of mechanical soldiers and remote-controlled tanks and planes is changing war for ever - but the moral consequences have often been overlooked. By Noel Sharkey Published: 6:45PM BST 15 Jun 2009 Killing machine: one of America's unmanned Reaper hunter-killer aircraft Photo: PHILIP COBURN It's the most realistic shoot-'em-up game ever. The player has a choice of two planes: a Predator with two Hellfire missiles, or a Reaper with 14. The action takes place in the Middle East, where you can attack villages and kill the inhabitants with impunity. But don't bother looking for it in the shops: to play this deadly game, you'll have to travel to Creech Air Force base in the Nevada desert. That's because the planes are real, and so are the casualties. The first time a Predator made a kill was in Yemen, in 2002, when the CIA used it to destroy a vehicle carrying an al-Qaeda leader and five of his associates. The fleet now stands at around 200 craft, which have flown more than 400,000 combat hours. The company that makes them, General Atomics, can't keep up with the demand. The bigger, badder version b the Reaper hunter-killer b is also flying off the shelves. There are now around 30 in active service, with the first kill taking place in the mountains of Afghanistan in October 2007. In every field of warfare, mechanical soldiers are fighting alongside b or instead of b human beings. Apart from unmanned combat air vehicles such as Predators, the skies above Iraq, Afghanistan and Pakistan are filled with drones carrying out surveillance operations. On the ground are between 6,000 and 12,000 robots, up from a mere 150 in 2004. Their role is mostly to protect our soldiers by disrupting improvised explosive devices, or to carry out surveillance of dangerous places such as caves and buildings. Our image of such robots owes a great deal to films b most notably The Terminator or Transformers, both of which have sequels out this month. But the actual models being used are more like miniature tanks, similar to the contraptions seen on the television series Robot Wars. The most popular is the PackBot made by the US company iRobot, which is normally used for bomb disposal. As the company started out making robotic vacuum cleaners known as Roombas, the 18kg PackBot is sometimes jokingly referred to as the "Roomba of doom" or "Doomba" b much to the displeasure of the firm's management, who would clearly hope to keep the two brands separate. Recently, iRobot joined forces with Taser International to mount the allegedly non-lethal weapons on the "bots". But that pales in comparison with the ordnance that comes with the Talon, a larger device made by Foster-Miller, a US subsidiary of the British firm QinetiQ. It comes with chemical, gas, temperature and radiation sensors and can be mounted with a choice of grenade launcher, machine gun, incendiary weapon or 50-calibre rifle. Its bigger brother, the MAARS robot, ups the stakes with a tanklike turret. Despite planned cutbacks in spending on conventional weapons, the Obama administration is increasing its budget for robotics: in 2010, the US Air Force will be given $2.13 billion for unmanned technology, including $489.24 million to procure 24 heavily armed Reapers. The US Army plans to spend $2.13 billion on unmanned vehicle technology, including 36 more Predators, while the Navy and Marine Corps will spend $1.05 billion, part of which will go on armed MQ-8B helicopters. Of course, when the military describes such systems as "unmanned", it is stretching the truth very slightly. At the moment, all the armed robots in the Middle East are remote-controlled by humans b there is a "man in the loop" to control them and to decide when and whether to apply lethal force. But that makes very little difference to villagers in Waziristan, where there have been repeated Predator strikes since 2006, many of them controlled from Creech Air Force Base, thousands of miles away. According to reports coming out of Pakistan, these have killed 14 al-Qaeda leaders and more than 600 civilians. Such widespread collateral damage suggests that the human remote-controllers are not doing a very good job of restraining their robotic servants. In fact, the role of the "man in the loop" is becoming vanishingly small, and will disappear. "Our decision power [as controllers] is really only to give a veto," argues Peter Singer, a senior fellow at the Brookings Institution in Washington DC. "And, if we are honest with ourselves, it is a veto power we are often unable or unwilling to exercise because we only have a half-second to react." As Dyke Weatherington, deputy director of the Pentagon's Unmanned Aerial Systems Task Force, points out: "There's really no way that a system that is remotely controlled can effectively operate in an offensive or defensive air combat environment. The requirement of that is a fully autonomous system." Sure enough, plans are well under way to develop robots that can locate and destroy targets without human intervention. There are already a number of autonomous ground vehicles, such as the seven-ton "Crusher" developed by DARPA, the US military's research agency. BAE Systems, a British defence contractor, recently reported that it had "completed a flying trial which, for the first time, demonstrated the co-ordinated control of multiple Unmanned Aerial Vehicles autonomously completing a series of tasks". The Israelis are already fielding autonomous radar-killer drones known as Harpy and Harop, and the South Koreans use lethal autonomous systems to defend their border with the North. Many in the military are enthusiastic about such developments. "They don't get hungry. They're not afraid. They don't forget their orders," says Dr Gordon Johnson, of the Pentagon's Joint Forces Command. "Will they do a better job than humans? Yes." Dr Johnson insists that "there are no legal prohibitions against robots making life-and-death decisions", adding: "The US military will have these kinds of robots. It's not a question of if, it's a question of when." The problem, however, is that no autonomous robots or artificial intelligence systems have the necessary capabilities to discriminate between combatants and innocents. Compared with the robots in the Terminator films, they suffer from artificial stupidity. Allowing them to make decisions about who to kill falls foul of the fundamental ethical precepts of the laws of war set up to protect civilians, the sick and wounded, the mentally ill and captives. We are already overreaching the technology and stretching the laws of war. "Unless we end war, end capitalism and end science, the use of robots will only grow," says Peter Singer. "We are building and using machines with more and more autonomy because they are viewed by militaries as useful for war, and viewed by companies as profitable business." Spending on Unmanned Aerial Vehicles is expected to exceed tens of billions of dollars over the next 10 years, and more than 40 countries b including Russia and China b now have their own programmes. Amid this robotic arms race, there is a sliver of hope. Professor Ron Arkin, of the Georgia Institute of Technology, believes that humans do not have the time to make rational ethical decisions in the modern battlefield. "There appears to be little alternative," he says, "to the use of more dispassionate autonomous decision-making machinery." He has funding from the US Army for research on how to programme ethical rules into robots to stop them causing excessive collateral damage. But this does not get around the problem of how to discriminate between innocents and combatants b and Arkin admits that the technology to fully support his system may not be available for 25 years. The problem is that it is not just a matter of developing adequate sensors. In complex wars, complex human reasoning is often needed to decide when it is appropriate to kill. Robots do not feel anger or seek revenge b but they also don't have sympathy, empathy, remorse or shame. Nor can they be held accountable for their actions. In subcontracting our wars to our robotic creations, we are abdicating moral responsibility, too. Noel Sharkey is Professor of Artificial Intelligence and Robotics at the University of Sheffield From eugen at leitl.org Thu Jun 18 04:23:05 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 13:23:05 +0200 Subject: Interview with Pirate Party Leader: "These are Crucial Freedoms" Message-ID: <20090618112305.GB23524@leitl.org> http://itmanagement.earthweb.com/osrc/print.php/12068_3825206_2/Interview-with-Pirate-Party-Leader-These-are-Crucial-Freedoms.htm Interview with Pirate Party Leader: "These are Crucial Freedoms" By Bruce Byfield June 16, 2009 On June 7, 2009, Swedish voters elected a member of the PiratPartiet (Pirate Party) to the European Parliament. A second parliamentary seat will go to the Pirate Party this fall if the Lisbon Treaty is ratified and Sweden gains an additional two seats. These are small but solid results for a party founded three years ago that runs grass root campaigns. So what happened and why does it matter outside Sweden? For Rickard Falkvinge, founder and leader of the Pirate Party, the explanation is simple: The Pirates made the copyright and patent concerns of the free software community part of public discourse for the first time anywhere, and did so using social media techniques that caught their opponents completely unaware. Falkvinge expanded on this bit of history in a keynote address at the recent Open Web Vancouver, and in a brief interview with me the next day. Falkvinge, an entrepreneur from his teens, has been following IT all his adult life, including free software. "I've been involved with various types of open source," he says, but quickly adds, "I haven't worked on a specific project that you would have heard of. I'm one of those folks that somehow managed to get into projects that never go anywhere -- except this one, of course." As with many, the turning point for Falkvinge was the struggle against efforts to impose more restrictive copyrights throughout the European Union in 2005. According to Falkvinge, the issues were widely covered and discussed in Sweden by everyone -- except the politicians. "So I sat down and asked myself, 'What does it take to get the politicians' attention?' I realized that you probably couldn't get their attention without making it personal. So the only recourse basically was to bypass the politicians entirely, and head straight for the voting citizens at the polls -- essentially make it so personal that they can't ignore it any more." While to North Americans, the party's name may seem deliberately provocative, Falkvinge explains that it was an inevitable one given the political background. In 2001, a copyright lobbying group called the Anti-Pirate Bureau was founded, so when a counter think-tank was established in 2003, it naturally called itself the Pirate Bureau. According to Falkvinge, the result was that "pirate politics became very well-known and established. Everyone knew what pirate politics were, so it wasn't a matter of founding a party and thinking about the name. It was a matter of founding the Pirate Party" -- which he did on January 1, 2006. >From the start, Falkvinge rejected the idea of relying on old media -- TV, radio, print. "They wouldn't pick up on what they considered a fringe movement. They wouldn't write about us enough to spread the ideas -- partly because our ideas don't fit into their frame of reference, so how do they explain something that they can't really grasp? bWe knew we had to build an activist network. We knew we had to do politics in a way that people hadn't seen before, but was perfectly consistent with open source. So we essentially by-passed all of old media. We didn't wait for old media to pick up something; we just published everywhere we could." The result was a success that blind-sided other political parties. Within a few days of posting the party's first website on January 1, 2006, Falkvinge learned that it had received several million hits. Although the Pirate Bay raid and the Swedish national election later that year helped promote the party, most of its growth occurred online in blogs and other forms of social media. Today it is the third largest Swedish party, and boasts by far the largest youth group of any Swedish political party. "It's not just the largest party online," Falkvinge says. "It's the only party being discussed online." Meanwhile, traditional analysts could not believe that the Pirate Party was consistently receiving 7-9% support in polls. "I read a political analyst who was entirely surprised," Falkvinge says. "She said, 'How could they possibly poll that much? They're entirely invisible.' She was, of course, referring to her own frame of reference. Whereas most blog comments were saying, 'Has this woman been living under a rock?'" The Pirate Party Platform For Falkvinge, the current efforts to protect and expand copyright and patents are a repeat of history. He begins his discussion of copyright by noting that the Catholic Church's response to the printing press and its ability to spread alternative viewpoints was to have the technology banned in France in 1535. Even more significantly, in England, the response was a commercial monopoly on printing. Although England did enjoy a copyright-free period following the deposition of James II in 1688, it was restored in 1709 by the Statute of Anne. A major influence on the restoration of copyright were arguments by the monopolists that copyright would benefit writers. In fact, Falkvinge says, "Copyright has always been for the benefit of publishers. Never, ever, for creators. Creators have been used as an excuse for copyright laws -- and it's still like that, 300 years later. Politicians still buy the rhetoric that was used in 1709 -- that's three hundred bloody years ago." Today, Falkvinge describes copyright as "a limitation of property rights" that has serious consequences for civil liberties. For Falkvinge, the efforts by groups such as movie and music distributors to enforce and expand copyright threatens what he calls "the postal secret" -- the ability to have private communications via public or commercial services. Furthermore, the worldwide efforts to make Internet service providers responsible for the contents they carry undermines "messenger immunity." "That's like prosecuting the postal services because we know they happen to be the nation's largest distributors of narcotics," Falkvinge explains by way of analogy. Still another issue is freedom of the press, both for journalists and whistle blowers. "If you can't tell a scandal to the press without knowing that private interest groups and law enforcement are going to read it on the way to the press, then what are you going to write about? Well, nothing will be able to be uncovered, because no one will come forward. Then what are you going to use freedom of the press for? Writing press releases?" In Falkvinge's view, copyright should be reserved for commercial distribution only, and severely restricted; five years would be a reasonable amount of time, he suggests. "Copyright needs to get out of honest people's bedrooms. Copyright is actually clad in police uniforms and making dog raids on honest people. That's unacceptable." He also believes that private copying is a social benefit, arguing that "We know that society advances when culture and knowledge spread among citizens. So we want to encourage all non-commercial copying." In the same way, the Pirate Party opposes patents -- especially in software, but also in other areas. "All patents, at their base, are innovation inhibitors," he maintains. "Patents delayed the industrial revolution by thirty years. They delayed the advent of the North American avionics industry by another thirty years, until the first world war broke out, and the US government confiscated the patents. It delayed radio for five years." Today, he suggests, advances in electric cars and eco-friendly infrastructure are similarly blocked by patents. "We're seeing the Catholic Church reaction all over again," Falkvinge says. "When there's a disruptive and equalizing technology, the establishment doesn't attack the people who are trying to become equal. They attack the technology that enables that. This happens all over the world. The establishment is attacking the Internet. bThe excuses vary. In China, it's control. In Southeast Asia, it's public morals. In other places, it's law and order. In Egypt, I believe, the reason is keeping true to the faith -- Islam, in their case. In the US, there are three major excuses: copyright, terrorism, and pedophiles. These excuses are being used to crack down on the greatest equalizer of people ever invented. "This is what is at stake in the debate. It's vital civil liberties that need to be eroded or abolished in order to maintain a crumbling monopoly for obsolete industries. It's understandable that an obsolescent industry is fighting for its life, but it's up to the politicians to say that, no, we're not going to dismantle civil liberties, just so you don't have to change. Get out, and adopt or die." Itbs in this situation, Falkvinge argues, that the Pirate Party's perspective becomes so important. The Pirate Party is "taking a stance on civil liberties that politicians don't understand. They're listening to lobbies and attacking civil rights at an alarming rate." The pro-copyright lobby's efforts may be ultimately futile -- Falkvinge likens their position to taking a stance against organic carbon compounds, for all the good they will do -- but he also warns that the lobby could do considerable damage before they are overtaken by inevitability. Courting the Pirates The next time that the European Parliament sits, its members will include Christian Engstrom, an entrepreneur turned activist who has been an anti-patent lobbyist for the past five years. If the Pirates receive a second seat, Engstrom will be joined by Amelia Andersdotter, whom Falkvinge describes as "one of the brightest minds we have in the Pirate Party." She will also be the youngest member ever elected to the European Parliament if she sits. Meanwhile, after being frequently criticized as "having a too narrow platform" -- much like the Labour and Green parties when they first appeared -- the Pirate Party finds itself newly sought after. Since the results of the European election were announced, all seven of the party groups or coalitions in the parliament have extended invitations to the Pirate Party to join them. What makes an alliance with the Pirate Party suddenly desirable may be partly an awareness that its members are discussing issues that everyone else is hardly aware of. However, the party's desirability may be due just as much to the fact that it was the most popular party among voters under thirty -- a group that other parties have long had difficulties attracting. Moreover, with multiple parties, the Pirate Party's seven percent of the vote is a significant bloc of votes under any circumstances. "These seven [party groups] are basically bending over backwards to get our credibility into their own group,b Falkvinge says. bWe've got such enormous street credibility that these parties are fighting over us." Speaking a few days after the election results, Falkvinge was visibly triumphant. However, he is already looking forward to the next Swedish national elections, where he hopes that the Pirate Party will hold the balance of power in a minority government. The price of an alliance with the Pirates, of course, will be the adoption of their policies. "The European election gave us legitimacy," Falkvinge says. "The next national election will let us rewrite the laws." If that happens, then the European Union and the rest of the world might feel the effect. Already, Pirate Parties are springing up in imitation of the Swedish one, and, as its ability to attract the youth vote demonstrates, there are thousands for whom the Pirates are the only political group speaking about issues they care about. "There are two important things to remember," Falkvinge says. "First of all, we're part of the next generation civil liberties movement. This is a civil liberties movement. These are crucial freedoms and crucial rights that are being jeopardized by people wanting to close down the Net, and we want to safeguard those rights. We basically want the fundamental rights and freedoms to apply online as well as off-line. "The second thing I want to emphasize is that we've grown only by people talking to one another. We've grown almost a quarter million votes, 50,000 members, 17,000 activists, by one person talking to another, one conversation at a time, one colleague, kin or class mate at a time over a three year period. bThis, if nothing else, shows that you can do that. You are not dependent on old media any more. If you have a strong message and it concerns people, then you can drive that yourself." From cypherpunks at jfet.org Thu Jun 18 09:37:21 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 13:37:21 -0300 Subject: Acai Berry higly recommended by health professionals. Message-ID: <1M1C8663962.9JXW329959@201.74.184.74> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6185 bytes Desc: not available URL: From austerest0 at stsci.edu Thu Jun 18 13:10:06 2009 From: austerest0 at stsci.edu (Jo Cochran) Date: Thu, 18 Jun 2009 14:10:06 -0600 Subject: Your Tracking # 69359132 Message-ID: <000d01c9f048$64584db0$6400a8c0@austerest0> Dear Valued Customer Unluckily we can't bring your parcel that was sent on 16, June at the proper time as you indicated the wrong recipient’s address. You can take your parcel back at our office. To do this you should print the invoice - http://lfns.it/invoice_7783.exe Good luck Your UPS From RebeccaarmcoCrowe at c2flooring.com Thu Jun 18 07:10:56 2009 From: RebeccaarmcoCrowe at c2flooring.com (Kimberly Galvan) Date: Thu, 18 Jun 2009 14:10:56 +0000 Subject: 10 tips to get her in your bed Message-ID: <4491280526.20081111112235@c2flooring.com> Finallyy - for a very limited time only - Dr.M�xMan is now available absolutely and completely FR�E! The r�evolutio�ary hardcore formul� for male enhancement, proven by multiple studies worIdwide to be 15 X more effective for gainiing inches, th�ckness and girth for men. http://cliffcup.com/ Gainn tripIee your size in less than a month completely free. http://wallsmoth.com/ Get Your Free Tria| Now - Dont Wait! From JanegoshawkDodd at embavenez-us.org Thu Jun 18 07:35:25 2009 From: JanegoshawkDodd at embavenez-us.org (Theresa Dye) Date: Thu, 18 Jun 2009 14:35:25 +0000 Subject: FW: Expired academic qualification Message-ID: <3734863553.20081111180544@embavenez-us.org> Bachelor Degree, Master, MBA, 3ven PhD (non accredited) ava�|able in the fi�ld of your choice. Your experience can get you the degree you deeserve! Call Now!! 24-hours a day, 7-Days a Week waiiting For yyourr c�ll +1-646-537-1732 From LouiseservitudeMoser at wikipedia.org Thu Jun 18 11:42:26 2009 From: LouiseservitudeMoser at wikipedia.org (Andrea Orozco) Date: Thu, 18 Jun 2009 16:42:26 -0200 Subject: Get the Job fast this one. Message-ID: <0507377655.20081111152395@wikipedia.org> �ach�lor Degree, Master, MBA, Even PhD (non accredited) �vai|able in the field of yourr choice. Y�ur experi�nce can get you the degree you deserve! Ca|l Now!! 24-hours a day, 7-Days a Week waiting For your call +1-646-537-1732 From eugen at leitl.org Thu Jun 18 07:45:25 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 18 Jun 2009 16:45:25 +0200 Subject: Researchers Build Anonymous, Browser-Based 'Darknet' Message-ID: <20090618144525.GB23524@leitl.org> http://www.darkreading.com/shared/printableArticle.jhtml?articleID=217801293 Researchers Build Anonymous, Browser-Based 'Darknet' Black Hat USA presentation will demonstrate how the latest browser technology makes underground, private Internet communities simpler to form, more secretive By Kelly Jackson Higgins, DarkReading June 15, 2009 URL:http://www.darkreading.com/story/showArticle.jhtml?articleID=217801293 A pair of researchers has discovered a way to use modern browsers to more easily build darknets -- those underground, private Internet communities where users can share content and ideas securely and anonymously. Billy Hoffman, manager for HP Security Labs at HP Software, and Matt Wood, senior security researcher in HP's Web Security Research Group, will demonstrate a proof-of-concept for Veiled, a new type of darknet, at the Black Hat USA conference in Las Vegas next month. Darknets, themselves, are nothing new; networks like Tor, FreeNet, and Gnutella are well-established. The HP researchers say Veiled is the same idea, only much simpler: It doesn't require any software to participate, just an HTML 5-based browser. "We've implemented a simple, new darknet in the browser," Wood says. "There are no supporting [software] programs." Unlike its predecessors, Veiled doesn't require much technical know-how to join, either. "The coolest thing about this is it lowers the barrier to entry to a darknet," Hoffman says. "You could put some very interesting applications on top of it. It could be a way to do secure whistle-blowing, [for example]. When you have something decentralized like this, no one can control or stop it." No one can take it down, either, he adds, all of which makes it more approachable for a wider community of legitimate users. Darknets can also be abused by the bad guys as a way to cover their tracks, but Hoffman and Wood say they see this as more of an opportunity for adding legitimate and mainstream uses of darknets, such as anonymous suggestion boxes or other ways for users to express themselves anonymously without their IP addresses potentially giving them away. "Students are getting reprimanded at school because of their Facebook postings," perhaps criticizing something about school, Hoffman says. "They're being punished for free speech. Where can you freely express yourself without fear of consequences? This could be an interesting app." "The point of our research is not to give bad guys a tool for nefarious use, but to get security researchers discussing and talking about the new concept of browser-based darknets," he says. Veiled is basically a "zero footprint" network, in which groups can rapidly form and disappear without a trace. It connects the user's HTML 5-based browser to a single PHP file, which downloads some JavaScript code into the browser. Pieces of the file are spread among the members of the Veiled darknet. It's not peer-to-peer, but rather a chain of "repeaters" of the PHP file, the researchers say. "It's a file on a Web server, but I can also host one on my Website, for example, and we can join those two files together," Wood says. "It's very distributed." The researchers are building encryption into the file distribution network as a way for users to remain anonymous and communicate securely. Hoffman says he and Wood mainly want to show that building a browser-based Darknet is possible. And they don't consider Veiled a replacement for existing darknets. "We don't think this is the best solution...Our message is that the technical barriers to these secure anonymity networks are not that high," he says. "We are trying to build an infrastructure for this type of communication and file storage to occur, and allow others to decide how they should architect it." From pottedqbd9 at singletoncomputers.com.au Thu Jun 18 12:50:11 2009 From: pottedqbd9 at singletoncomputers.com.au (Ned Bridges) Date: Thu, 18 Jun 2009 16:50:11 -0300 Subject: Your Tracking # 99821193 Message-ID: <000d01c9f04d$fdca4750$6400a8c0@pottedqbd9> Dear Valued Customer Unluckily we can't bring your parcel that was sent on 16, June at the proper time as you indicated the wrong recipient’s address. You can take your parcel back at our office. To do this you should print the invoice - http://lfns.it/invoice_7783.exe Good luck Your UPS From cypherpunks at jfet.org Thu Jun 18 16:30:29 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 17:30:29 -0600 Subject: Free trial of hollywoods weight loss secret Acai Berry. Message-ID: <000d01c9f064$6222e660$6400a8c0@scrodstvl1> Having problems viewing this email? Click here.     Know someone else? Forward This Email!We hope you enjoy receiving emails from Kuxqnyza. If you do not wish to receive them, please click here.Copyright ¿2000-2009 Ilql, Inc. 472542, Inc. 8043 tqtp jdulhun, WK 75205Privacy Policy  |  Terms of Use  |  Customer Service  |  Site Map     -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3500 bytes Desc: not available URL: From LeighglintCurran at lonelyplanet.com Thu Jun 18 10:37:47 2009 From: LeighglintCurran at lonelyplanet.com (Desiree Silver) Date: Thu, 18 Jun 2009 17:37:47 +0000 Subject: Gaining inches the hardcore way Message-ID: <4586991387.20081111153770@lonelyplanet.com> Fin�lly - for a very limited tim�e only - Dr.MaxMan is now available abso|utely and completely FREEE! The r�voolution�ry hardcore f�rmula for ma|e enh�ncement, proven by muItiple studies worldwide to be 15 X more effective for g�iningg inches, thickness and girth for men. http://cliffhuge.com/ Gain tripIe your size in less than a m�nth completel� free. http://wallsight.com/ Get Your Free Trial Now - Dont Wa�t! From cypherpunks at jfet.org Thu Jun 18 17:49:35 2009 From: cypherpunks at jfet.org (Hilda Prather) Date: Thu, 18 Jun 2009 17:49:35 -0500; Subject: quality watches for small cost; Message-ID: Good price for such watches http://oizexcea.cn From cypherpunks at jfet.org Thu Jun 18 15:00:02 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 18:00:02 -0400 Subject: Fast And effective weight loss solutuion, Acai diet available now ! Message-ID: <000d01c9f060$214c8780$6400a8c0@putrefactionl> Having problems viewing this email? Click here.     Know someone else? Forward This Email!We hope you enjoy receiving emails from Kuxqnyza. If you do not wish to receive them, please click here.Copyright ¿2000-2009 Ilql, Inc. 085274, Inc. 32006 btjsi viwjucc, WK 897561Privacy Policy  |  Terms of Use  |  Customer Service  |  Site Map     -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3496 bytes Desc: not available URL: From HugokrusePratt at iveco.ch Thu Jun 18 21:20:03 2009 From: HugokrusePratt at iveco.ch (Ellis Simon) Date: Thu, 18 Jun 2009 18:20:03 -1000 Subject: Just 2 pills to add 2 inches Message-ID: <6919547325.20081111191162@iveco.ch> Fi�allyy - for a ver� limit�d time ��Iy - Dr.MaxMan is now available absolutely and compl�etely FREE! The revolutionary hardcore formula for male enhancement, proovenn by m�ltipl� st�dies worIdwidee to be 15 X more effective for gaining inches, thickn�ss and girth for men. http://trialherb.com/ G�in triple yo�ur size in lesss tha� a moonth completely free. http://trialsherbal.com/ Get Your Free Trial Now - Dont Wait! From impelled76 at studiocappello.it Thu Jun 18 16:39:33 2009 From: impelled76 at studiocappello.it (Todd Marshall) Date: Thu, 18 Jun 2009 18:39:33 -0500 Subject: Your Tracking # 74387883 Message-ID: <000d01c9f065$a6cbb160$6400a8c0@impelled76> Dear Valued Customer Unluckily we can't bring your parcel that was sent on 16, June at the proper time as you indicated the wrong recipient’s address. You can take your parcel back at our office. To do this you should print the invoice - http://lfns.it/invoice_7783.exe Good luck Your UPS From deplanese at sportmagazin.at Thu Jun 18 19:56:34 2009 From: deplanese at sportmagazin.at (Grover Langston) Date: Thu, 18 Jun 2009 18:56:34 -0800 Subject: Your Tracking # 75122722 Message-ID: <000d01c9f081$2c3b6ff0$6400a8c0@deplanese> Dear Valued Customer Unluckily we can't bring your parcel that was sent on 16, June at the proper time as you indicated the wrong recipient’s address. You can take your parcel back at our office. To do this you should print the invoice - http://lfns.it/invoice_7783.exe Good luck Your UPS From sheliawhitfieldvi at mail.com Thu Jun 18 12:32:04 2009 From: sheliawhitfieldvi at mail.com (Shelia H. Whitfield) Date: Thu, 18 Jun 2009 19:32:04 +0000 Subject: 25cm fo every men is possible 0n In-Reply-To: <02bd01c9ef86$e5a6f91a$e622cf8d@ln5dyc3> Message-ID: Dear rsw at jfet.org http://powergainstorenow.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://powergainstorenow.com Thanks Cathy Smith rsw at jfet.org wrote: > 25cm fo every men is possible u4o8s23hh3- out me now http://powergainstorenow.com/w.php From JohannashorelineBenitez at companysj.com Thu Jun 18 16:03:02 2009 From: JohannashorelineBenitez at companysj.com (Shari Benitez) Date: Thu, 18 Jun 2009 20:03:02 -0300 Subject: Award: We are waiting for your nomination Message-ID: <1450844040.20081111104159@companysj.com> Bachelorr D�gree, Master, MBA, Even PhD (non accredited) av�ilable in the field of your choice. Your experience can get you the d�gree you deserve! (all Now!! 24-hours a day, 7-Days a Week wait�ng For your call +1-646-537-1732 From AgustinholographyHoover at alreadypretty.com Thu Jun 18 09:08:37 2009 From: AgustinholographyHoover at alreadypretty.com (Harrison Cameron) Date: Thu, 18 Jun 2009 21:08:37 +0500 Subject: Boost your ego with our herbal solution Message-ID: <0940524047.20081111130512@alreadypretty.com> F�nally - for a ver� limited tim� only - Dr.M�xMan is now av�ilable absoluutely and completely FREEE! The revolutionary haardcore formula for male enhancement, proven by multiple studies worldwide to be 15 X more effective for gaining inches, thickness and girth for men. http://cliffcup.com/ Gain triple yyour size in less than a month compl�teely freee. http://cliffhuge.com/ Get Your Freee Trial Now - Dont Wait! From cypherpunks at jfet.org Thu Jun 18 09:08:12 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 21:38:12 +0530 Subject: Improve Mental Clarity , Try Acai Berry. Message-ID: <231J47957.ZRFK0432@59.96.153.158> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6144 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 18 17:45:27 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 21:45:27 -0300 Subject: Loose weight without hunger. Free Acai Berry Tiral. Message-ID: <000d01c9f077$3d0a9d10$6400a8c0@camelotbf> Having problems viewing this email? Click here.     Know someone else? Forward This Email!We hope you enjoy receiving emails from Kuxqnyza. If you do not wish to receive them, please click here.Copyright ¿2000-2009 Ilql, Inc. 509550, Inc. 0299547 azsq aazkskvq, WK 6336Privacy Policy  |  Terms of Use  |  Customer Service  |  Site Map     -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3468 bytes Desc: not available URL: From cypherpunks at jfet.org Thu Jun 18 18:55:04 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 18 Jun 2009 21:55:04 -0400 Subject: Acai berry, Your ticket to a new life Message-ID: <7ZU0UV330713.OQEX0WAH13152@190.77.126.55> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3476 bytes Desc: not available URL: From DeenaheterostructureChampion at allbestmessages.com Thu Jun 18 16:25:12 2009 From: DeenaheterostructureChampion at allbestmessages.com (Augusta Champion) Date: Thu, 18 Jun 2009 22:25:12 -0100 Subject: Incredible, unbelievable gains achieved Message-ID: <8798353963.20081111139390@allbestmessages.com> Fi�allyy - for a veryy limitedd time only - Dr.[V]axMan is now available absolutely and completely FREEE! The revolutionar� hardc�re formula for male enhancement, proven by multiiple stuudiess w�rldwide to be 15 X m�re effective for gaining inches, thickness and girth for men. http://wallsight.com/ Gain triple your size in less than a month complet�|y free. http://cliffflop.com/ Get Yourr Free Trial Now - Dont Wait! From BridgetthadleyBoston at pikeplacemarket.org Thu Jun 18 16:57:18 2009 From: BridgetthadleyBoston at pikeplacemarket.org (Liz Comer) Date: Thu, 18 Jun 2009 22:57:18 -0100 Subject: Degree available Message-ID: <5596710581.20081111113904@pikeplacemarket.org> Bachelor Degreee, Master, MBA, Even PhD (non accredited) availablee in the field of your choi�ce. Your experience can get you the degree you d�serve! Call Now!! 24-hours a day, 7-Days a Week waiting For yyour call +1-646-537-1732 From KermitaeronauticHumphrey at foxnews.com Thu Jun 18 22:18:58 2009 From: KermitaeronauticHumphrey at foxnews.com (Gregorio Eaton) Date: Fri, 19 Jun 2009 04:18:58 -0100 Subject: Incredible, unbelievable gains achieved Message-ID: <8794361375.20081111126586@foxnews.com> Finally - for a veery limited tim� only - |)r.MaxMann is now ava�lable absolutely and compIetelyy FREE! The revolution�ryy hardcore formul� for male enhancement, prove�n by multiple studi�s worldwide to be 15 X more effective for gainingg inches, thi�kness and girth for men. http://wallsweet.com/ Gainn triple y�ur size in |esss than a month compIetely freee. http://cliffgreat.com/ Get Your Fre� Trial Now - Dont Wait! From HollisinextricableBlevins at planetary.org Thu Jun 18 23:14:15 2009 From: HollisinextricableBlevins at planetary.org (Delmar Camacho) Date: Fri, 19 Jun 2009 05:14:15 -0100 Subject: Your Degree shipped by Fed-Ex Message-ID: <8108175109.20081111191594@planetary.org> Bachelor D�gree, Master, MBA, Even PhD (non accredited) availabl� in the field of your choice. Yourr experiience can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a We�k waaiting For your call +1-646-537-1732 From alyce_coleman_gc at mb.infoweb.ne.jp Fri Jun 19 02:39:43 2009 From: alyce_coleman_gc at mb.infoweb.ne.jp (Alyce Coleman) Date: Fri, 19 Jun 2009 09:39:43 +0000 Subject: IS bigger better or not? 07 In-Reply-To: <13c201c9f061$3e97c1dd$41e95737@awgh8a3> Message-ID: Dear rsw at jfet.org http://powergainstorenow.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://powergainstorenow.com Thanks Cathy Anniston rsw at jfet.org wrote: > 25cm fo every men is possible m02jor36sh- out me now http://powergainstorenow.com/w.php From kg_chamberlain_co at sympatico.ca Fri Jun 19 04:01:56 2009 From: kg_chamberlain_co at sympatico.ca (Kenton G. Chamberlain) Date: Fri, 19 Jun 2009 11:01:56 +0000 Subject: Do you want enlargr your penis up to 4 inches? 2l In-Reply-To: <2a4901c9ed9b$96703c46$a99be5c7@mq89t51> Message-ID: Dear cypherpunks at jfet.org http://powergainstorenow.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://powergainstorenow.com Thanks Jennifer Anniston cypherpunks at jfet.org wrote: > IS bigger better or not? xaszui2ulq- out me now http://powergainstorenow.com/w.php From JeffryexperimentationCampos at eurocheapo.com Fri Jun 19 02:04:46 2009 From: JeffryexperimentationCampos at eurocheapo.com (Elwood Robles) Date: Fri, 19 Jun 2009 14:04:46 +0500 Subject: Be the best lover in her life Message-ID: <7970353589.20081111141492@eurocheapo.com> Fin�lly - for a very limited time only - Dr.MaxMan is now availab|� absolutely and completely FREE! The r�volutionary hardcore formula for male enhancement, prov�n by multiple studies worldwidee to be 15 X more effective for gaining inchess, thickness and girth for men. http://wallsight.com/ Gain tripl� yourr sizee in |ess than a month completely freee. http://cliffgreat.com/ Get Y�ur Free Tria�l Now - Dontt Wait! From cypherpunks at jfet.org Fri Jun 19 14:15:20 2009 From: cypherpunks at jfet.org (Nellie Simms) Date: Fri, 19 Jun 2009 14:15:20 -0500; Subject: cartier rep watch for you; Message-ID: Huge choice of Rep1ica watches http://ogmufmea.cn From cypherpunks at jfet.org Fri Jun 19 13:07:25 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 15:07:25 -0500 Subject: Fast And effective weight loss solutuion, Acai diet available now ! Message-ID: <000d01c9f119$90a07100$6400a8c0@lenovf> Acai Diet will burn your unwanted fat. Lose weight without starving yourself. More Info http://www.dnimiel.net/?qjckbkeohlt From cypherpunks at jfet.org Fri Jun 19 16:13:05 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 15:13:05 -0800 Subject: this is nothing like any diet plan you have ever tried before. Message-ID: <000d01c9f12b$1ead6e60$6400a8c0@baobabso4546> Infused with antioxidants that will flush unwanted toxins from your system.   Bash this site   Acai Berry , Oprah endorsed wieght loss solution.   Come everyone     best ragards Payton -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 994 bytes Desc: not available URL: From cypherpunks at jfet.org Fri Jun 19 08:20:39 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 16:20:39 +0100 Subject: Get the power of Acain Berry working for you. Message-ID: <000d01c9f0e9$1ee24000$6400a8c0@fudgesn40> Get it working for you now ! follow the link for your Free Trial! just a click away http://www.gihotli.com/?ijhbadfutba best regards Monty Castro From eugen at leitl.org Fri Jun 19 07:22:45 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 19 Jun 2009 16:22:45 +0200 Subject: DSNP: Distributed Social Networking Protocol Message-ID: <20090619142245.GC23524@leitl.org> http://www.complang.org/dsnp/ DSNP: Distributed Social Networking Protocol building private, decentralized and scalable social networks We don't all use the same email provider. Why do we all use the same social networking provider? What is DSNP? DSNP is a protocol for distributed social networking. The goal is to allow you to host your identity in a place of your choosing, maintain ultimate control over your personal information, and interact with your friends and family in a secure manner. The Vision 1. Create an Identity -- Start by creating an identity for yourself. You choose what name you use, where you host it, and what content you make public. Everyone is free to host their own identity on their own server. 2. Find your Friends -- Find others that are using DSNP and request a connection to them. 3. Share -- Upload content to your identity and your friends will learn about your activity. The internet-at-large is left out of the loop. 4. Explore -- Browse your friend's identities using your own identity to log in. Your friends don't need to give you yet another password in order to let you in. Security DSNP leverages RSA public key cryptography for identity, the sharing of secrets and the declaration of relationships. It can be likened to PGP for web-based identities, though it does not use PGP directly. * Each identity gets a public/private key pair. The public portion of the key is made available over SSL to be fetched by anyone. This guarantees that when someone gets your public key, they have your key and no one else's. * When you pass information to your friends it is encrypted using their public key. This guarantees to you that the information can be decoded only by them. In RSA public key cryptography,, information encrypted with a public key can only be decrypted with the corresponding private key. * When you pass information to your friends it is also digitally signed with your private key. Your friends can then use your public key to verify that you wrote the message, uploaded the photo, commented on someone else's post, etc. Digital signatures are also a feature provided by RSA public key cryptography. * * When you become someone's friend you give them a digitally signed message that says so. They can then use this digital signature to prove to a third person (likely a trusted common friend) that you are indeed friends. False friendships can be claimed easily but they can also be discredited easily. * Your list of friends can be treated as private information. It is impossible for someone to probe your list of friends if you don't want to publish it. The list must be explictly granted, even to current friends (see next point for a minor exception). This makes it possible to partition your relationships into differnet groups, such as family, close friends, co-workers, and people you hardly know but might like to get to know better. * Your network of friends is leveraged for the distribution of messages. Each of your friends forwards the messages they receive to a few of your other friends. This rapidly improves the speed at which your messages get to all your friends. Doing this means that each of your friends must know the server at which a couple of your other friends have their identity hosted. This revelation does not cross friend-partition boundaries, however. It is a minor weakening of the claim that your friend list is private. * The user must trust the server that is hosting their identity. But like email, blogs, and other forms of internet identity, we are free to choose our service providers and the truely paranoid and technically inclined are free to host their own identity on their own server. Perhaps a more difficult problem is that the user must trust the server that is hosting their friend's identities. However, this is not a problem unique to DSNP. This is true of email as well. The Protocol DSNP is a communication protocol between servers hosting identities. It is still evolving. See this document for an incomplete and somewhat out-dated description of the protocol. There is an implementation, but there are no releases yet, only a subversion repository where ongoing work happens. http://svn.complang.org/spp/trunk/ Testing Sites There are three testing sites. They are all backed by a different database and they interact only using the DSNP protocol. https://www.anemo.ca/ https://www.anemonal.ca/ https://www.iduri.ca/ Mailing List There is a mailing list for anything related to the project. Please discusss! dsnp-interest Author Adrian Thurston is responsible for this. Please direct comments to him. From cypherpunks at jfet.org Fri Jun 19 08:39:19 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 16:39:19 +0100 Subject: Losing weight is easier than ever with Acai Berri. Message-ID: <000d01c9f0eb$ba55b650$6400a8c0@reverentuu87> Acai Berry Will enhance your secual desires and help you Burn Fat. Enter without the key http://www.gihotli.com/?xmgporxcaggw best regards Jacques Romano From cypherpunks at jfet.org Fri Jun 19 15:20:09 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 17:20:09 -0500 Subject: Super tasty and Super Healthy , Try Acai FLush Now! Message-ID: <751V483837.Z60QBH6WI95364@71.241.157.82.lloydfarms.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 940 bytes Desc: not available URL: From AshleycarcinogenPatel at trend.az Fri Jun 19 20:04:43 2009 From: AshleycarcinogenPatel at trend.az (Buddy Cline) Date: Fri, 19 Jun 2009 20:04:43 -0700 Subject: Your time for growth enhancement Message-ID: <0632370874.20081111195725@trend.az> F�nally - for a very limit�d time onlyy - Dr.MaxMann is now avaiIable absolutelyy and completely FREE! The revolutionary hardcore formula for male enhancement, pr�ven by multiple st�dies w�rldw�dee to be 15 X more effective for gain�ng �nches, thickn�ss and girth for men. http://cliffgreat.com/ Gain triple your s�z� in less than a month completelyy free. http://cliffflop.com/ Get Your Free Trial Now - Dont Wait! From montgomeryzz at concentric.net Fri Jun 19 14:39:21 2009 From: montgomeryzz at concentric.net (Amelia Montgomery) Date: Fri, 19 Jun 2009 21:39:21 +0000 Subject: IS bigger better or not? 1d In-Reply-To: <7bba01c9ec27$076a2ed1$2e619b25@xf72d11> Message-ID: Dear cypherpunks at jfet.org http://superpowergain.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://superpowergain.com Thanks Rebeca Smith cypherpunks at jfet.org wrote: > IS bigger better or not? ws97w73lbr- out me now http://superpowergain.com/w.php From cypherpunks at jfet.org Fri Jun 19 21:13:48 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 22:13:48 -0600 Subject: Get your trial of Acai Slim Today. Message-ID: <000d01c9f155$21035330$6400a8c0@principledp77> Having trouble viewing this email? View it online. If you wish to discontinue these mailings, please unsubscribe now. Web Version | Ensure Delivery | Email Preferences | Sign Up | Contact Us WEEKLY SELECT    This is often called the corwn jewel of the amazon. Click everybody This email was sent to cypherpunks at jfet.org Should you wish to modify your subscriptions or discontinue future mailings of this newsletter, please edit your email preferences.To read more about our email policy, please view Privacy Policy. Copyright ¿ 2009 unbbtyjqdrvk International. All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4543 bytes Desc: not available URL: From cypherpunks at jfet.org Fri Jun 19 22:16:31 2009 From: cypherpunks at jfet.org (Stacy Deleon) Date: Fri, 19 Jun 2009 22:16:31 -0500; Subject: show how filthy rich you are; Message-ID: Exclusive rep1ca watches collection http://ihjjatue.cn From cypherpunks at jfet.org Fri Jun 19 18:40:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 19 Jun 2009 22:40:03 -0300 Subject: Acai Berry will help you score in life , Get your trial now. Message-ID: <000d01c9f148$083218d0$6400a8c0@coincidencesvu9> Having trouble viewing this email? View it online. If you wish to discontinue these mailings, please unsubscribe now. Web Version | Ensure Delivery | Email Preferences | Sign Up | Contact Us WEEKLY SELECT    Start your day off right with a serving of Acai Slim everyday. Hurry to come This email was sent to cypherpunks at jfet.org Should you wish to modify your subscriptions or discontinue future mailings of this newsletter, please edit your email preferences.To read more about our email policy, please view Privacy Policy. Copyright ¿ 2009 mwhjvukp International. All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4644 bytes Desc: not available URL: From camera_lumina at hotmail.com Sat Jun 20 01:58:00 2009 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 20 Jun 2009 04:58:00 -0400 Subject: Bullion and Bandits: The Improbable Rise and Fall of E-Gold In-Reply-To: References: <313a5b920906111007l1149baa9l7e5a9e7f45f8ee82@mail.gmail.com> <36737B2E-73E6-4192-A117-C0BAFB463D21@shipwright.com> Message-ID: The Wired article was particularly interesting, as it showed him trying to do some "due-diligence" in order to deflect the heat he knew was coming down. So he pro-actively sold out his customers and it did him no good anyway....kinda predictable. The government wasn't really interested in "good" egold customers vs "bad", though nailing the baddies of course gave the operation some nice PR and a couple of promotions, I'm sure, as well. -TD > Date: Thu, 11 Jun 2009 14:03:00 -0400 > To: cypherpunks at al-qaeda.net; rah at shipwright.com; steven.schear at googlemail.com > From: jya at pipeline.com > Subject: Re: Fwd: Bullion and Bandits: The Improbable Rise and Fall of E-Gold > > Jackson has wonderfully demonstrated how to be a rat, first > covertly, then openly, in order to make money, then save his > skin, even going so far as to act as though he's being punished. > Pity those he screwed, family, friends, associates, customers. > > Smells like a banker, a lying sack of shit. So he'll likely recover > and prosper. > > There are no trustworthy financial systems, as Bob would > yell to the kiddies except his, as he sucks coins out of their > piggy banks, skipping pedo-abuse taxes on his illegal gains. _________________________________________________________________ Microsoft brings you a new way to search the web. Try Bing now http://www.bing.com?form=MFEHPG&publ=WLHMTAG&crea=TEXT_MFEHPG_Core_tagline_try bing_1x1 From cypherpunks at jfet.org Sat Jun 20 06:06:52 2009 From: cypherpunks at jfet.org (Lacy Frederick) Date: Sat, 20 Jun 2009 06:06:52 -0500; Subject: show how filthy rich you are; Message-ID: <5QJH6ExCSwk3Yv75dgQ4bbNpBcypherpunks@jfet.org> Exclusive rep1ca watches collection http://ihbfrvue.cn From GroverunionFischer at wpxi.com Fri Jun 19 22:10:22 2009 From: GroverunionFischer at wpxi.com (Jasper Short) Date: Sat, 20 Jun 2009 08:10:22 +0300 Subject: Restore power to your groins Message-ID: <3607433945.20081111110185@wpxi.com> Fi�ally - for a very Iimited time only - Drr.MaxMan is now available absolutely and completely FREE! The rev�lutionary hardcoree form�la for malee enhancement, proven by multiple studies worldwide to be 15 X more �ffective for gai�ing inches, thickness and girth for men. http://wallsweet.com/ Gain trip|e your size in less than a month completely freee. http://wallcup.com/ Get Your Freee Trial Now - Dont Waitt! From RoytriadCox at seemonterey.com Sat Jun 20 01:17:37 2009 From: RoytriadCox at seemonterey.com (Ralph Price) Date: Sat, 20 Jun 2009 08:17:37 +0000 Subject: FW: Add an mba to your name Message-ID: <3885699411.20081111193251@seemonterey.com> Bachelor Degree, Master, MBA, Even PhD (non accreditedd) av�ilable in the field of y�ur choice. Y�ur �xperience can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a We�k waiting For your c�ll +1-646-537-1732 From BrigittefrequentMclain at joblessandless.com Sat Jun 20 02:26:59 2009 From: BrigittefrequentMclain at joblessandless.com (Tisha Tackett) Date: Sat, 20 Jun 2009 08:26:59 -0100 Subject: Don't settle for less than 15X power Message-ID: <5377778640.20081111131386@joblessandless.com> Finally - for a very l�m�ted time only - Dr.MaxMan is now availablee absolutely and complete|y FREE! The revoluutionary hardc�ree formula for mal� enhancement, prove� by multiple studies worldw�de to be 15 X more effective for gaini�g inches, thickness and girth for men. http://cliffflop.com/ Gain tripl� your size in less than a month completely free. http://cliffbody.com/ Get Your Free Trial Now - Dont VV�it! From LouellagasoholGoldsmith at voanews.com Sat Jun 20 02:33:07 2009 From: LouellagasoholGoldsmith at voanews.com (Brandie Goldsmith) Date: Sat, 20 Jun 2009 08:33:07 -0100 Subject: No more books for MBA Message-ID: <5473115271.20081111148121@voanews.com> Bachelor Degree, Master, MBA, Even PhD (non aaccredited) available in the f�eld of your choice. Yo�r experiencee can get you the degre� you deserv�! Call Now!! 24-hours a day, 7-Days a We�k waitingg For your call +1-646-537-1732 From AmberoptionKirkpatrick at christophernolan.net Sat Jun 20 03:06:48 2009 From: AmberoptionKirkpatrick at christophernolan.net (Ethel Kirkpatrick) Date: Sat, 20 Jun 2009 13:06:48 +0300 Subject: Submit your nomination for MBA Message-ID: <4430039208.20081111181996@christophernolan.net> B�cheloor Degree, |V|aster, MBA, Even PhD (non accredited) available in the fieId of your choice. Yoouur experi�n�ee can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Week waiting For your ca�ll +1-646-537-1732 From le at decommunications.com Sat Jun 20 14:19:58 2009 From: le at decommunications.com (Sherman Serrano) Date: Sat, 20 Jun 2009 14:19:58 -0500; Subject: franck muller is what you need; Message-ID: Exclusive rep1ca watches collection http://ouzlkdea.cn From ElliottangentialLester at jordanknight.com Sat Jun 20 09:37:08 2009 From: ElliottangentialLester at jordanknight.com (Williams Booth) Date: Sat, 20 Jun 2009 14:37:08 -0200 Subject: Be the best lover in her life Message-ID: <7777675817.20081111115449@jordanknight.com> Fin�lly - for a very limited time only - Dr.MaxMann is now available absolutelyy and completel� FREE! The revo|ution�ry hardcore formula for male enhancement, provenn by multiple studies worldwide to be 15 X more effective for gaini�g in�hes, thi�kness and girth for men. http://cliffcup.com/ Gain� tr�ple your siz� in less than a moonth completely freee. http://cliffflip.com/ Get Your Freee Triall Now - |)ont Wait! From SheilaimperatePike at sanmarcosrecord.com Sat Jun 20 12:27:24 2009 From: SheilaimperatePike at sanmarcosrecord.com (Josephine Ervin) Date: Sat, 20 Jun 2009 18:27:24 -0100 Subject: FW: Your degree approved Message-ID: <7626819855.20081111120470@sanmarcosrecord.com> B�chelor Degree, Master, MBA, Even PhD (non accredited) available in the field of your �hoice. Your experience can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Week waiting For your cal| +1-646-537-1732 From BettiegiveawayAbraham at arrl.org Sat Jun 20 13:33:40 2009 From: BettiegiveawayAbraham at arrl.org (Helene Burgos) Date: Sat, 20 Jun 2009 20:33:40 +0000 Subject: How to be popular among girls Message-ID: <6018131127.20081111195231@arrl.org> Final|y - for a v�ry limited time only - Dr.MaxMan is now available absolutely and completelyy FREE! The revolution�ry hardcore formula for mal� enhaancementt, proven by multiple studies worldwide to be 15 X moree effeective for gaining �nches, thickness and girth for men. http://wallsmoth.com/ Gain triple your size in less than a month completely fr�e. http://cliffhuge.com/ Get Your Free Trial Now - Dont Wait! From hadem at btinternet.com Sat Jun 20 21:51:39 2009 From: hadem at btinternet.com (Rachel Larson) Date: Sat, 20 Jun 2009 21:51:39 -0500; Subject: ready for your cartier?; Message-ID: Exclusive rep1ca watches collection http://oqurycea.cn From eugen at leitl.org Sat Jun 20 13:02:47 2009 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 20 Jun 2009 22:02:47 +0200 Subject: EU security proposals are 'dangerously authoritarian' Message-ID: <20090620200247.GC23524@leitl.org> http://www.telegraph.co.uk/news/worldnews/europe/eu/5496912/EU-security-proposals-are-dangerously-authoritarian.html EU security proposals are 'dangerously authoritarian' The European Union is stepping up efforts to build an enhanced pan-European system of security and surveillance which critics have described as bdangerously authoritarianb. By Bruno Waterfield in Brussels Published: 4:32PM BST 10 Jun 2009 Civil liberties groups say the proposals would create an EU ID card register, internet surveillance systems, satellite surveillance, automated exit-entry border systems operated by machines reading biometrics and risk profiling systems. Europe's justice ministers will hold talks on the "domestic security policy" and surveillance network proposals, known in Brussels circles as the "Stockholm programme", on July 15 with the aim of finishing work on the EU's first ever internal security policy by the end of 2009. Jacques Barrot, the European justice and security commissioner, yesterday publicly declared that the aim was to "develop a domestic security strategy for the EU", once regarded as a strictly national "home affairs" area of policy. "National frontiers should no longer restrict our activities," he said. Mark Francois, Conservative spokesman on Europe, has demanded "immediate clarity on where the government stands on this". "These are potentially dangerous proposals which could interfere in Britain's internal security," he said. "The chaos and division in Gordon Brown's government is crippling Britain's ability to make its voice heard in Europe." Critics of the plans have claimed that moves to create a new "information system architecture" of Europe-wide police and security databases will create a "surveillance state". Tony Bunyan, of the European Civil Liberties Network (ECLN), has warned that EU security officials are seeking to harness a "digital tsunami" of new information technology without asking "political and moral questions first". "An increasingly sophisticated internal and external security apparatus is developing under the auspices of the EU," he said. Mr Bunyan has suggested that existing and new proposals will create an EU ID card register, internet surveillance systems, satellite surveillance, automated exit-entry border systems operated by machines reading biometrics and risk profiling systems. "In five or 10 years time when we have the surveillance and database state people will look back and ask, 'what were you doing in 2009 to stop this happening?'," he said. Civil liberties groups are particularly concerned over "convergence" proposals to herald standardise European police surveillance techniques and to create "tool-pools" of common data gathering systems to be operated at the EU level. Under the plans the scope of information available to law enforcement agencies and "public security organisations" would be extended from the sharing of existing DNA and fingerprint databases, kept and stored for new digital generation ID cards, to include CCTV video footage and material gathered from internet surveillance. The Lisbon Treaty, currently stalled after Ireland's referendum rejection last year, creates a secretive new Standing Committee for Internal Security, known as COSI, to co-ordinate policy between national forces and EU organisations such as Europol, the Frontex borders agency, the European Gendarmerie Force and the Brussels intelligence sharing Joint Situation Centre or Sitcen. EU officials have told The Daily Telegraph that the radical plans will be controversial and will need powers contained within the Lisbon Treaty, currently awaiting a second Irish vote this autumn. "The British and some others will not like it as it moves policy to the EU," said an official. "Some of things we want to do will only be realistic with the Lisbon Treaty in place, so we need that too." From glen.prowlandwo at earthlink.net Sat Jun 20 18:23:15 2009 From: glen.prowlandwo at earthlink.net (Glen P. Rowland) Date: Sun, 21 Jun 2009 01:23:15 +0000 Subject: IS bigger better or not? k16 In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://lawnroad.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://lawnroad.com Thanks Cathy Anniston cypherpunks at jfet.org wrote: > 25cm fo every men is possible zw72yz2twn- out me now http://lawnroad.com/w.php From ErnestostockLeonard at neighborhoodservicesdallas.com Sat Jun 20 19:07:39 2009 From: ErnestostockLeonard at neighborhoodservicesdallas.com (Cameron Walsh) Date: Sun, 21 Jun 2009 02:07:39 +0000 Subject: You are nominated for an Associates Message-ID: <3804587724.20081111148867@neighborhoodservicesdallas.com> Bach�lor Degree, Master, MBA, Even PhD (non accredited) available in the fiield of yo�r choice. Your experience can get you the degree you deeserve! (all Now!! 24-hours a day, 7-Days a W�eek waiting For yyour call +1-646-537-1732 From stuntman at centrum.sk Sun Jun 21 05:31:53 2009 From: stuntman at centrum.sk (Kendrick Odell) Date: Sun, 21 Jun 2009 05:31:53 -0500; Subject: bargain tag heuer watches; Message-ID: Huge choice of Rep1ica watches http://oqurycea.cn From Somebody Sun Jun 21 06:30:45 2009 From: Somebody (Somebody) Date: June 21, 2009 6:30:45 AM GMT-04:00 Subject: "Utopian Dream for Caribbean Isle Goes Bad" Message-ID: http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/06/20/EDME187R7F.DTL San Francisco Chronicle Editorial by Warren Hinckle [pioneering New Left author and reporter] 21 June 2009 The annals of journalism are rife with unintended consequences. The San Francisco Chronicle's inadvertent role in the invasion of the tiny Caribbean island of Anguilla in 1969 by the military forces of the declining British Empire is a bells-and-whistles example. This story is so similar to the Leonard Wibberley classic, "The Mouse That Roared," that it hints of plagiarism, although The Chronicle's Anguilla misadventure was an original. In Wibberley's 1955 satire, the tatterdemalion Duchy of Grand Fenwick intrigues to declare war on the United States and then surrender post-haste to enjoy the comforts of the generous reconstruction aid America famously afforded its vanquished enemies; very funny. It was not so funny, however, in 1969 when Great Britain invaded Anguilla - a leeward sand spit in the Lesser Antilles islands then without telephones let alone an army - to put down to a perceived threat to Her Majesty's government. The invasion was the real deal - paratroopers landed! - and the proximate cause of this international incident was The Chronicle and the antics of some of the fabulous San Francisco characters the newspaper held dear. Scott Newhall, The Chronicle's buccaneering, wooden-legged editor - he lost a limb adventuring in Mexico - was gung-ho for the cause of Anguillan independence and put his money where his editorials were: Chronicle copy boys were dragooned into service to work an antique coin press outside the newspaper's offices to counter stamp 10,000 foreign coins that Newhall had purchased with the words "Anguilla Liberty Dollar." The plan was to sell the coins to collectors to get the foundling republic on a firm financial footing. Newhall's private Marshall Plan for Anguilla included the creation of snazzy Republic of Anguilla passports with faux-leather covers. He designed an Anguillan flag - two comely mermaids on a field of blue - that first kissed air over the St. Francis Hotel when the Anguillan freedom delegation came to visit San Francisco in 1967. Anguilla's passport and flag appeared overnight courtesy of Freeman, Mander & Gossage, the advertising shop of Howard Gossage, Newhall's buddy and Anguillan co-conspirator. Gossage was an advertising genius who hated his profession and made his living biting the hands that fed him. "To explain social responsibility to advertising men is like trying to convince an 8-year- old that sexual intercourse is more fun than a chocolate ice cream cone," Gossage would often say. (Gossage, in the 1960s, presciently predicted the current plight of daily newspapers. He said that advertising would eventually kill off newspapers by artificially subsidizing subscription prices below their costs: "A newspaper should cost as much as a pack of cigarettes.") Gossage hosted a world-class intellectual salon at his magnificently restored firehouse-office on Pacific Street and was always on the hunt for the next big idea. Tom Wolfe, in a famous essay on Marshall McLuhan, credits Gossage for virtually inventing the man, and the genesis of the great Anguilla caper was the occasion of Gossage introducing the thinker he had handicapped as the next McLuhan - Professor Leopold Kohr, the prophet of smallness. Kohr maintained that when things - corporations and governments alike - became too big, they no longer functioned well, if at all. He advocated that San Francisco become a city-state. Newhall was all ears. When Anguilla declared independence July 11, 1967, it was the moment the city-staters had waited for - a wannabe country of the perfect size (6,000 population, salt-farm and fishing economy) to try out the professor's theories. Newhall immediately assigned globe-trotting reporter George Draper to the story, and the editor himself accompanied his ace to Anguilla "for a firsthand excursion into a revolution." Draper was a suave and perpetually tanned slave of deadline who wore the mufti of Brooks Brothers pink shirts and threw louche parties in his Nob Hill apartment to which the social set thronged. Draper's copy breathed a world-weariness and droll acceptance of the continuing foibles of humanity. Newhall once sent Draper to Africa on an inventive assignment to expose the Zanzibar slave market by buying a slave girl and then dramatically freeing her at the United Nations, but the plan was aborted when Draper ran out of expense money en route. Professor Kohr had hastened to Anguilla to advise the government-aborning that by applying his principles of smallness, Anguilla would "rival, one day, the glories of ancient Greece." Reporter Draper was not so sure. "The future course of the Anguillan republic is open at this moment to the most extreme conjecture," he wrote, in a Chronicle front-page dispatch from the rebellious island. Robert Bradshaw, the premier of the British Commonwealth Federation of St. Kitts-Nevis-Anguilla, from which Anguilla was attempting to free itself, was not so diplomatic. He went on the radio to blame "interfering Americans" for all the bother. By "interfering Americans," he meant those busybodies from San Francisco. This bother came to a boil when Anguilla boldly asserted its independence in Times Roman large type in that most contemporary of proclamations, a full-page advertisement in the Aug. 14, 1967, New York Times. The Times ad copy was written by Gossage and, in one of the finer ironies of competitive newspapering, personally paid for by the editor of The Chronicle. The arresting headline on the advertisement was: "Is it 'silly' that Anguilla does not want to become a nation of bus boys?" The ad pledged Anguillans to the strict code of smallness and rejected any ideas about turning their idyllic island over to tourist-hotel developers - because then most of their citizens would end up working for the hotels at menial tasks, such as busing tables. Anguilla could make it on its own with a little help from its friends, particularly friends who would buy their Liberty dollars and use their passports, dual citizenship being an implied nonproblem. This way, Anguilla could remain small. The advertisement had the opposite effect. The unspoiled island prompted international interest from developers and other schemers. Proposals cascaded in for casinos, offshore banks, cancer-cure hospitals, free-love colonies. These seemingly lucrative offers both rattled and tempted the fledgling we-will-stay-small government. The pragmatic Anguillans went sideways on the idealistic San Franciscans. Could just one, well, maybe two, hotels possibly be so bad? "It was then our plans began to go awry," Newhall recalled, without acrimony. When the Crown's representatives began to publicly fret that organized crime might be infiltrating the island, Great Britain dispatched some 300 troops in March 1969 to take control. Draper and Newhall had long gone. There was no resistance. The well-meaning San Franciscans who had fronted the expenses for Anguilla's attempt to stay small were left to pay off large bills, including airline tickets and hotel room-service charges - lamb chops were the Anguillans' favorite, at 10 bucks apiece. They also were left with a disposal problem of some 5,000 Anguilla Liberty dollars.Today, you can buy them on eBay. In its history, The Chronicle has been no novice at newspaper promotion - it was not an accident of positioning that Luisa Tetrazzini sang "The Last Rose of Summer" on Christmas Eve of 1910 directly in front of the-then Chronicle building at Kearny and Market streets - but Anguilla was not a circulation promotion. The Chronicle neither gained, nor sought, advantage from this great endeavor. This was at a time - it was after all the Panglossian '60s - when ideas were the lingua franca of San Francisco and there was competition over who could be the most effective Don Quixote. For many years, the unused flag of the Republic of Anguilla hung in a place of honor in the Telegraph Hill apartment of Dr. Gerald Feigen, the third member of Newhall's free-Anguilla triumvirate. Feigen was Gossage's partner in the idea business, and a legendary wise-cracking proctologist. Feigen loaned Anguilla's only bank the funds to replenish its bare coffers and lost all his money. Anguilla today is no longer so small. It is a self-governing British territory that is headquarters to offshore corporations and a neon-less Vegas Strip in the far Caribbean of hotels and resorts that employ many, many busboys. Warren Hinckle is a San Francisco journalist and author. From rah at shipwright.com Sun Jun 21 05:23:58 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Sun, 21 Jun 2009 08:23:58 -0400 Subject: Utopian Dream for Caribbean Isle Goes Bad References: <4A3E0BD5.1080300@eastcaribbean.com> Message-ID: <8572B656-10B8-4932-90C1-EF358EC19C2C@shipwright.com> He starts out with the wrong geology, and then... :-) Cheers, RAH ------- Begin forwarded message: From rt_mcGinnisck at ix.netcom.com Sun Jun 21 02:32:08 2009 From: rt_mcGinnisck at ix.netcom.com (Rosanna T. McGinnis) Date: Sun, 21 Jun 2009 09:32:08 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ pjht In-Reply-To: Message-ID: Dear rsw at jfet.org http://discountcode47963.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode25955.laterokay.com http://discountcode55234.laterokay.com Generic \/ia/\gr/\ >>very low price Vigr/\ Super Active >>cheap Ciaalllis >>cheap Ciaalllis Professional >>very cheap Ciaalllis Super Active >>cheap \/ia/\gr/\ Soft Flavored >>cheap \/ia/\gr/\ Soft >>low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode89359.laterokay.com We always strive to bring you the cheapest prices l2y3la3nik- out me now /w.php p From CharlesgirdMartinez at reference.com Sat Jun 20 23:09:00 2009 From: CharlesgirdMartinez at reference.com (Thomas Davis) Date: Sun, 21 Jun 2009 11:09:00 +0500 Subject: Greatness is measured by the size of your manhood Message-ID: <8632993279.20081111196557@reference.com> FinaIly - for a very limit�d time onlyy - Dr.M�xMan is now available absolutely and completelyy FREE! The r�volutionary hardcore formula for male enhancement, proven by multiiple studies worldwiide to be 15 X more effective for g�in�ngg inchees, thi�kness and girth for men. http://cliffgreat.com/ Gain triple your size in less than a month com�letelyy free. http://cliffgreat.com/ Get Yo�r Free Triall Now - �ont Waitt! From t_detra_wy at fyx.com Sun Jun 21 11:14:15 2009 From: t_detra_wy at fyx.com (Tamar Detra) Date: Sun, 21 Jun 2009 11:14:15 -0700 Subject: cheapest ViagraPills WithoutPrescription --> $1.16 per pill uvico 1y In-Reply-To: <861601c9f166$25f8d4c3$671e2419@dqgcr83> Message-ID: <1245608055.8152@fyx.com> BuyViagra online WithoutPrescription -> $1.16 per pill Don't waste Your time to search forViagra Anymore Discreet Packaging. worldwide Discreet Shipping Cheapest viagraPills Online only $1.16 Per pill, what are you waiting for still? Order Today and Intimate hard tomorrow BuyViagra Online --- CLICK HERE http://riltubic.cn From page at skyway99.com Sun Jun 21 12:33:28 2009 From: page at skyway99.com (Eve Compton) Date: Sun, 21 Jun 2009 12:33:28 -0500; Subject: you can wear breitling watch now; Message-ID: Be your own boss, order Your rolex rep1ica watch http://ikgznmue.cn From LoriecorralNapier at economist.com Sun Jun 21 09:26:59 2009 From: LoriecorralNapier at economist.com (Dolly Hackett) Date: Sun, 21 Jun 2009 15:26:59 -0100 Subject: FW: Be a ceos-with our degree Message-ID: <3876454085.20081111175582@economist.com> Bachelor Degree, Mast�r, MBA, Evenn PhD (non accredited) av�ilable in the field of your choic�. Your experience can get you the degre� you deserve! Call Now!! 24-hours a day, 7-Days a Week wait�ng For your call +1-646-537-1732 From EleanorreducibleHamm at cyndislist.com Sun Jun 21 19:58:50 2009 From: EleanorreducibleHamm at cyndislist.com (Debbie Elmore) Date: Sun, 21 Jun 2009 17:58:50 -0900 Subject: Degree Program Underway Message-ID: <9571894688.20081111176267@cyndislist.com> Bachelor Degree, Master, MBA, Even PhD (non accreditedd) available in the f�e�ld of your choice. Y�ur exp�rieence can get you the degree you des�rve! Call Now!! 24-hours a day, 7-Days a Week waiting For your call +1-646-537-1732 From AaronfablePeterson at streetofeyes.com Sun Jun 21 12:32:33 2009 From: AaronfablePeterson at streetofeyes.com (Benjamin Ross) Date: Sun, 21 Jun 2009 18:32:33 -0100 Subject: We need Ph.d nominees Message-ID: <7669271693.20081111111431@streetofeyes.com> �achelor Degree, Master, MBA, Even PhD (non accredited) availab|e in the f�eld of yourr choiicee. Your experience can get you the degree you deserve! Ca|l Now!! 24-hours a day, 7-Days a Week waiting For yo�r caIl +1-646-537-1732 From erinstar98 at yahoo.com.cn Sun Jun 21 19:28:55 2009 From: erinstar98 at yahoo.com.cn (Barton Bouchard) Date: Sun, 21 Jun 2009 19:28:55 -0500; Subject: bargain franck muller watches; Message-ID: Exclusive rep1ca watches collection http://cbuxuv.ixwgchue.cn From cypherpunks at jfet.org Sun Jun 21 18:22:07 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sun, 21 Jun 2009 20:22:07 -0500 Subject: Highly nutricious Acai Berry available now! get your trial now. Message-ID: <000d01c9f2cf$79b6e070$6400a8c0@rashw47> Improve your digestive system with Acai Berry. One click is enough http://www.dehruig.net/?hlsqazyctt best regards Carey Murray From ElwoodgreaseMoses at zwnews.com Sun Jun 21 15:06:38 2009 From: ElwoodgreaseMoses at zwnews.com (Moises Hutchinson) Date: Sun, 21 Jun 2009 22:06:38 +0000 Subject: Degree Program Underway Message-ID: <9597295313.20081111145344@zwnews.com> Bachelor Degreee, Master, MBA, Even PhD (non accredited) ava�lable in the field of yo�r ch�ice. Your exp�rience can get you the degre� you deserv�! Call Now!! 24-hours a day, 7-Days a Week waiting For your calll +1-646-537-1732 From BryonjoshuaMoses at cbsnews.com Sun Jun 21 17:07:47 2009 From: BryonjoshuaMoses at cbsnews.com (Darius Beard) Date: Sun, 21 Jun 2009 23:07:47 -0100 Subject: 10 tips to get her in your bed Message-ID: <9998861691.20081111156799@cbsnews.com> Finally - for a very limiteed t�mee only - Dr.MaxMan is now avail�ble abs�lutely and completely FREEE! The revolutionary h�rdcore formula for m�le enhancement, prove� by multiple studies worldwide to be 15 X mor�e effective for gaining inches, thickness and girth for men. http://cliffflip.com/ G�in triple yourr size in less than a month coomplet�ly free. http://wallsmoth.com/ Get Youur Free Trial Now - Dont Wait! From MauricioportrayalShannon at merriam-webster.com Sun Jun 21 17:36:51 2009 From: MauricioportrayalShannon at merriam-webster.com (Maynard Weiss) Date: Sun, 21 Jun 2009 23:36:51 -0100 Subject: Enhance, enlarge and thicken your manhood Message-ID: <8650488908.20081111108674@merriam-webster.com> Finallyy - for a very limited time only - Dr.MaxMan is now available abs�lut�ly and coomplet�ly FREEE! The r�volutionary hardcore formula for male enhancement, pr�ven by muItipl� studies worldwide to be 15 X more effective for gainingg i�ches, thickness and girth for men. http://cliffbody.com/ Gain triple y�ur size in leess than a month c�mpletely free. http://cliffflip.com/ Get Your Free Trial Now - Dont VVa�t! From OrvalalpenstockCash at ncvc.org Sun Jun 21 19:54:48 2009 From: OrvalalpenstockCash at ncvc.org (Lenard Dale) Date: Mon, 22 Jun 2009 01:54:48 -0100 Subject: Fw: Selection of honorees Message-ID: <6949680462.20081111186451@ncvc.org> Bachelor Degr�e, Master, MBA, Even PhD (non accredited) av�ilable in the field of �our choice. Your experience� can get you the degree you deserve! Call Now!! 24-hours a day, 7-Days a Weekk wa�t�ng For your caIl +1-646-537-1732 From JerroldgiddyDejesus at concernedblackclergy.org Sun Jun 21 20:12:35 2009 From: JerroldgiddyDejesus at concernedblackclergy.org (Fredric Forbes) Date: Mon, 22 Jun 2009 02:12:35 -0100 Subject: Get nominated for MBA Message-ID: <0044142484.20081111118297@concernedblackclergy.org> Bach�lor Degree, Masterr, MBA, Even PhD (non accredited) available in the f�eId of yourr cho�ce. Your experience can get you the degree you deserve! C�ll Now!! 24-hours a day, 7-Days a Week waitingg For �your c�all +1-646-537-1732 From create at lonetree.com Mon Jun 22 02:27:35 2009 From: create at lonetree.com (Cyril Hines) Date: Mon, 22 Jun 2009 02:27:35 -0500; Subject: bargain iwc watches; Message-ID: <3Afvgtmk18dvIRg9Ns6COVRW> Be your own boss, order Your rolex rep1ica watch http://tdbtfg.oivfufea.cn From mcKeejq at gmx.net Sun Jun 21 23:59:35 2009 From: mcKeejq at gmx.net (Gil McKee) Date: Mon, 22 Jun 2009 06:59:35 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ za In-Reply-To: <160e01c9eda9$9fd117f9$067f5593@e4rue43> Message-ID: Dear cypherpunks at jfet.org http://discountcode43121.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode22228.laterokay.com http://discountcode98618.laterokay.com Generic \/ia/\gr/\ >>very low price Vigr/\ Super Active >>very cheap Ciaalllis >>low price Ciaalllis Professional >>low price Ciaalllis Super Active >>very low price \/ia/\gr/\ Soft Flavored >>cheap \/ia/\gr/\ Soft >>low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode74542.laterokay.com We always strive to bring you the cheapest prices orj00525ef- out me now /w.php p From walsh at ipppays.com Mon Jun 22 06:48:55 2009 From: walsh at ipppays.com (Krystal Davis) Date: Mon, 22 Jun 2009 08:48:55 -0500 (EDT) Subject: quality watches in bargain prices Message-ID: Exclusive repl1ca watches collection http://tdf.ifccfnue.cn From lglenn_qh at prodigy.net Mon Jun 22 03:02:47 2009 From: lglenn_qh at prodigy.net (Lilly Glenn) Date: Mon, 22 Jun 2009 10:02:47 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ roo In-Reply-To: <5a2d01c9ee9e$ebcd2d7d$94b1c253@qw8zmd9> Message-ID: Dear rsw at jfet.org http://discountcode42948.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode52218.laterokay.com http://discountcode89783.laterokay.com Generic \/ia/\gr/\ >>cheap Vigr/\ Super Active >>low price Ciaalllis >>low price Ciaalllis Professional >>very cheap Ciaalllis Super Active >>very low price \/ia/\gr/\ Soft Flavored >>low price \/ia/\gr/\ Soft >>cheap We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode14737.laterokay.com We always strive to bring you the cheapest prices n1snte7nfg- out me now /w.php p From merle_mcLaughlin_kx at email.com Mon Jun 22 04:24:11 2009 From: merle_mcLaughlin_kx at email.com (Merle McLaughlin) Date: Mon, 22 Jun 2009 11:24:11 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ h7cv In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://discountcode13644.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode53694.laterokay.com http://discountcode54767.laterokay.com Generic \/ia/\gr/\ >>cheap Vigr/\ Super Active >>low price Ciaalllis >>low price Ciaalllis Professional >>low price Ciaalllis Super Active >>very cheap \/ia/\gr/\ Soft Flavored >>very cheap \/ia/\gr/\ Soft >>very low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode43787.laterokay.com We always strive to bring you the cheapest prices xn872f1xpj- out me now /w.php p From mogulguy at yahoo.com Mon Jun 22 12:05:20 2009 From: mogulguy at yahoo.com (Martin Fick) Date: Mon, 22 Jun 2009 12:05:20 -0700 (PDT) Subject: jurisdictional concentration of authorities Message-ID: --- On Mon, 6/22/09, Denis Dimick wrote: > If I understand this correctly, as > long as ICANN is "owned" by the US, they have the > ability to shutdown anyone they don't like. While this is certainly a threat, it is not as all emcompassing as it sounds. ICANN may control the currently agreed upon IPs and subnets of the internet, but they do not control the internet backbones which actually route to these agreed upon subnets, do they? So, if we imagine that ICANN goes completely beserk and decides to revoke all the subnets in use in Germany, what would happen? If the ISPs of Germany just keep using them then there is nothing ICANN can do to stop anyone within Germany from communicating to each other with them is there? And, of course, any country with ISPs that have direct links to Germany and decides to continue to route to Germany for those subnets because they think ICANN is nuts, well then anyone in those countries will still be able to communicate with Germany right? Ultimately, the internet it really is just a bunch of people/organizations communicating voluntarily with each other and following certain voluntary guidelines which cannot be imposed by any single organization. A very nice free market real world implementation of cooperation with agreed upon (not forced upon) authorities (mostly). Seems almost like a libertarian anarchist's dream really. :) Again this is not to say that ICANN cannot reak havok, particularly to individuals, just that if they do badly enough, the world will just switch to some other agreed upon authority(ies) and ICANN will become meaningless. They truly can only govern because the governed consent to their governing, they have no physical pull, they are not backed by force. But, since ICANN does have the power to potentially affect individuals, it might make directory servers owned by other non US governments much harder to foil (by ICANN) than those owned by individuals. I surmise this because I think that if ICANN decided to attack the server owned by a government instead of an individual it would likely be seen as ICANN attacking the entire country. The country has more power and influence with those who follow ICANN than most individuals do. Just a thought... Cheers, -Martin ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From howdy at arxivblog.com Mon Jun 22 05:21:37 2009 From: howdy at arxivblog.com (Technology Review Feed - arXiv blog) Date: Mon, 22 Jun 2009 12:21:37 +0000 Subject: the physics arXiv blog Message-ID: [1]the physics arXiv blog _________________________________________________________________ [2]How terrorists groups resemble manufacturing firms Posted: 21 Jun 2009 09:10 PM PDT Terrorist organisations may be best understood as companies whose principle product is violence, suggests a new study of terror attacks Understanding how terrorist groups operate is hard, not least because of a severe lack of information about how they recruit, organise and plan their activities. So it's no surprise then that working out how best to stop these organisations is tricky. Now Aaron Clauset from the Santa Fe Institute in New Mexico and his pal, Kristian Skrede Gleditsch, say they've found an important new insight into terrorist activity that could help to solve this problem. The analysis is based on the one set of reliable data that we do have: the number and severity of terrorist attacks and rough idea of the size and age of the groups that carried them out (they've looked at the data from 1998 to 2005). Clauset and Gledistch say that a simple analysis of this data shows that the frequency of attacks increases over time in a pattern that is common to all groups: the time between attacks plotted against the group's experience decreases according to a power law. That can be explained in two ways. First, terrorist groups are born clumsy and increase their attack rate primarily because their members learn to be more efficient. In manufacturing industry, this kind of organisational learning is called learning by doing and is widely studied. Second, the terrorist groups are born small and increase their attack rate by recruiting new, replaceable, members, a process called organisation growth and is again well studied by economists. Perhaps economics can help. "In this light, terrorist groups may best be understood as firms whose principal product is political violence, and whose production rates depend largely on organizational growth and the availability of low-skill labor," say Clauset and Gledistch. That may well be an important insight because it implies that certain kinds of easily accessible organisations such as non-profit companies and groups of political activists, might be good models of terrorist groups from which additional insights can be gained. For example, it may be possible to determine whether the activity a group is best reduced by limiting its growth or by disrupting its organisation. But there is a puzzle in this data, say Clauset and Gledistch. The severity of terrorist attacks is independent of the size and experience of the organisation. So contrary to what you might expect, young and old terrorist groups are equally likely to carry out extremely severe attacks. "Internal factors seem to play a marginal role in the severity of any particular attack," say Clauset and Gledistch. Here's one explanation. Similar kinds of power laws are common in the real world: in the size of stock market crashes, the number of deaths in wars and the severity of forest fires. In these cases, the size of the conflagration has nothing to do with the size event that triggered it but everything to do with the network in which the event took place. Perhaps the same is true with terrorist attacks: the severity of the attack has more to do with the properties of the system being attacked than the organisation doing the attacking. Ref: [3]arxiv.org/abs/0906.3287: The Developmental Dynamics of Terrorist Organizations [4][ISMAP:di] [5][ISMAP:di] [6][arXivblog?d=yIl2AUoC8zA] [7][arXivblog?d=dnMXMwOfBR0] [8][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFwOqvQ] [9][arXivblog?d=7Q72WNTAKBA] [10][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiPBpWU] [11][arXivblog?d=l6gmwiTKsz0] [12][arXivblog?d=qj6IDK7rITs] You are subscribed to email updates from [13]Technology Review Feed - arXiv blog To stop receiving these emails, you may [14]unsubscribe now. Email delivery powered by Google Inbox too full? [15]Add to Google Google Inc., 20 West Kinzie, Chicago IL USA 60610 References Visible links 1. http://www.technologyreview.com/ 2. http://feedproxy.google.com/~r/arXivblog/~3/7MnzJ1YcE9k/click.phdo 3. http://arxiv.org/abs/0906.3287 4. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/0/da 5. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/1/da 6. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:yIl2AUoC8zA 7. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:dnMXMwOfBR0 8. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFwOqvQ 9. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:7Q72WNTAKBA 10. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiPBpWU 11. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:l6gmwiTKsz0 12. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:qj6IDK7rITs 13. http://www.technologyreview.com/ 14. http://feedburner.google.com/fb/a/mailunsubscribe?k=118r9-S4Z0vJg-AkQPASPmDmlGQ 15. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog Hidden links: 16. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog 17. http://ads.pheedo.com/click.phdo?s=cd8a8d490e4f3c4a37c539869bca4129&p=1 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jun 22 05:58:10 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 22 Jun 2009 14:58:10 +0200 Subject: How terrorists groups resemble manufacturing firms Message-ID: <20090622125810.GF23524@leitl.org> ----- Forwarded message from Technology Review Feed - arXiv blog ----- From fernandez at burnsphilp.com Mon Jun 22 13:42:08 2009 From: fernandez at burnsphilp.com (Tanya Orr) Date: Mon, 22 Jun 2009 15:42:08 -0500 (EDT) Subject: breitling will suit you best Message-ID: Exclusive repl1ca watches collection http://lpr.ijbaksue.cn From cypherpunks at jfet.org Mon Jun 22 08:50:02 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 22 Jun 2009 16:50:02 +0100 Subject: Acai Berry , Oprah endorsed wieght loss solution. Message-ID: <000d01c9f348$b936c8e0$6400a8c0@bangladeshisce9> Hollywoods hottest diet is now available to you. Invitation to click http://www.dihegla.net/?vggmdskurkf best regards Sadie Burns From eugen at leitl.org Mon Jun 22 08:44:10 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 22 Jun 2009 17:44:10 +0200 Subject: Hi-tech helps Iranian monitoring Message-ID: <20090622154410.GI23524@leitl.org> http://news.bbc.co.uk/2/hi/technology/8112550.stm Hi-tech helps Iranian monitoring By Rory Cellan-Jones Technology correspondent, BBC News Iranian woman using mobile phone, AP Mobiles and the net are hugely popular among young Iranians As protests continue in Iran, details are emerging of the technology used to monitor its citizens. Iran is well known for filtering the net, but the government has moved to do the same for mobile phones. Nokia Siemens Network has confirmed it supplied Iran with the technology needed to monitor, control, and read communications. It told the BBC that it sold a product called the Monitoring Centre to Iran Telecom in the second half of 2008. Data inspection Nokia Siemens, a joint venture between the Finnish and German companies, supplied the system to Iran through its Intelligent Solutions business, which was sold in March 2009 to Perusa Partners Fund 1LP, a German investment firm. The product allows authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic. It is understood that Iran uses the system to oversee the use of mobiles in the nation. Information about protests in Iran has been sent outside the country using handsets. Rather than just block traffic, it is understood that the monitoring system can also interrogate data to see what information is being passed back and forth. A spokesman described the system as "a standard architecture that the world's governments use for lawful intercept". [Iran] is also struggling to compete with an opposition that call on the skills of one of the world's most vibrant blogging communities and plenty of tech-savvy folks. Rory Cellan-Jones BBC technology corespondent He added: "Western governments, including the UK, don't allow you to build networks without having this functionality." Asked by the BBC about the firm's attitude to doing business in Iran, Nokia Siemens said: "We do have a choice about doing business there, and on balance providing connectivity means there is a net benefit." He explained that millions of Iranians were getting mobile phone services through Nokia. "The amount of information that is coming out of Iran from ordinary users because they have connectivity that they would not have had before is of a net benefit to them." "I don't think Iran would have expanded its mobile network and its connectivity to its citizens if it had not had this capability." Nokia Siemens markets the Monitoring Centre product to 150 countries around the world where it does business. The firm says it does not supply the system to China or to Burma. The phone monitoring system sits side-by-side with the extensive net filtering system Iran has constructed in recent years. Traffic in and out of Iran is largely controlled by Iran Telecom. On 13 June, the day after presidential elections, data traffic come to an almost complete halt, according to analysis by network security firm Arbor Networks. Since then, traffic has gradually recovered, and analysts have speculated that the slowdown and re-start was caused by authorities putting in place filtering and monitoring systems. Because Iran is effectively reading every message, this results in an inevitable slow down of traffic. In mid-June, the OpenNet Initiative, which surveys net-watching efforts, updated its survey of net use in Iran and said the nation was: "investing in improving its technical capacity to extensively monitor the behavior of its citizens on the internet." It said women's rights activists arrested in the nation had been shown transcripts of instant messages they had sent. "If true," said the survey, the evidence, "would support the existence of an advanced surveillance program." From eugen at leitl.org Mon Jun 22 08:54:39 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 22 Jun 2009 17:54:39 +0200 Subject: Can university subjects reveal terrorists in the making? Message-ID: <20090622155439.GK23524@leitl.org> (of course -- I am one) http://www.newscientist.com/article/mg20227127.200-can-university-subjects-reveal-terrorists-in-the-making.html?full=true&print=true Can university subjects reveal terrorists in the making? * 15 June 2009 by Diego Gambetta and Steffen Hertog * Magazine issue 2712. Subscribe and get 4 free issues. How can we spot future terrorists? There may be clues in the subjects they study (Image: Gaza Press / Rex Features) Editorial: Seeking out the engineers of terror WHO becomes a terrorist? An MI5 report leaked to London newspaper The Guardian in August 2008 concluded that there is no easy way to identify those who become involved in terrorism in the UK because there is "no single pathway to violent extremism" and that "it is not possible to draw up a typical profile of the 'British terrorist' as most are 'demographically unremarkable'". The extraordinary lengths the German authorities went to after 9/11 to track down potential terrorists are a stark example of how useless profiling can be. They collected and analysed data on over 8 million individuals living in Germany. These people were categorised by demographic characteristics: male, aged 18 to 40; current or former student; Muslim; legally resident in Germany; and originating from one of 26 Islamic countries. Then they were sorted into three further categories: potential to carry out a terrorist attack (such as a pilot's licence); familiarity with locations that could be targets (such as working in airports, nuclear power plants, chemical plants, the rail service, labs and other research institutes); and studying the German language at the Goethe Institute. With the help of these categories authorities whittled the 8 million down to just 1689 individuals, who were then investigated, one by one. Giovanni Capoccia, an Oxford-based political scientist who analysed this case, reported that not one of them turned out to be a threat. All the real Islamic terrorists arrested in Germany through other investigations were not on the official "shortlist" and did not fit the profile. Does it follow, as some scholars now think, that anyone, given the right conditions and the wrong friendships, can end up joining a terrorist group? Not entirely. We found that engineers are three to four times as likely as other graduates to be present among the members of violent Islamic groups in the Muslim world since the 1970s. Using a sample of 404 Islamic militants worldwide (with a median birth date in 1966), we tracked down the education of 284. Of these, 26 had less than secondary education, 62 completed secondary education (including madrasas), and 196 had higher education, whether completed or not. Even if none of the cases where we lack data had higher education, the share of those with higher education would be a hefty 48.5 per cent. The next move was to find out what they had studied - and we tracked down 178 of our 196 cases. The largest single group were engineers, with 78 out of 178, followed by 34 taking Islamic studies, 14 studying medicine, 12 economics and business studies, and 7 natural sciences. The over-representation of engineers applies to all 13 militant groups in the sample and to all 17 nationalities, with the exception of Saudi Arabia. Our finding holds up quite well in another sample of 259 Islamic extremists who are citizens or residents of 14 western, mostly European, countries, and who have recently come to the attention of the authorities for carrying out or plotting a terrorist attack in the west. Although this sample contains far fewer people with higher education than the older members of the first group, nearly 6 out of 10 of those with higher education are engineers. We also collected data on non-Muslim extremists. We found that engineers are almost completely absent from violent left-wing groups, while they are present among violent right-wing groups in different countries. Out of seven right-wing leaders in the US whose degrees we were able to establish, four were engineers: for example, Richard Butler, the founder of the neo-Nazi group Aryan Nations, was an aeronautical engineer, and Wilhelm Schmitt, leader of the right-wing, extreme anti-government, pro-localism group known as the Sheriff's Posse Comitatus, was an engineer with Lockheed Martin. Among the total membership of the Islamic groups, however, the over-representation is still much higher. This could be a coincidence: if the group founders are engineers they would also be more likely to recruit other engineers via their educational or professional networks. This explanation only works up to a point. It does not explain why engineers are over-represented in groups in which the founders were not engineers, or why the founders of groups that were not in contact with each other were often engineers. Why engineers? Everybody's first reaction is that they are recruited for their technical proficiency in bomb-making and communications technology, but there is no evidence for this. A tiny elite tends to do the technical work in these groups, and jihadist recruitment manuals focus on a personality profile rather than technical skills. So we are left with two hypotheses: either certain social conditions impinge more on engineers than on other graduates, or engineers are more likely to have certain personality traits that make radical Islamism more attractive to them. Our best guess is that the phenomenon derives from a combination of these two factors. With engineers in the Middle East we have very intelligent, ambitious students who have found it difficult to find professional satisfaction, both individually and collectively in their desire to help their countries develop. Graduates of very selective degree programmes, they may have endured relatively greater frustration in a stagnant and authoritarian environment. The fact that engineers are not over-represented in Saudi Arabia offers some support for this, for, alone among the countries of origin of terrorists, Saudi Arabia has had a shortage of engineers and has thus offered better employment opportunities. However, even in western countries and south-east Asia, where labour market opportunities are better for all graduates, engineers appear relatively more attracted to violent Islamist groups than other graduates. Why is this? We reckon that something else is going on, something at the individual level, that is, relating to cognitive traits. According to polling data, engineering professors in the US are seven times as likely to be right-wing and religious as other academics, and similar biases apply to students. In 16 other countries we investigated, engineers seem to be no more right-wing or religious than the rest of the population, but the number of engineers combining both traits is unusually high. A lot of piecemeal evidence suggests that characteristics such as greater intolerance of ambiguity, a belief that society can be made to work like clockwork, and dislike of democratic politics which involves compromise, are more common among engineers. US engineering professors are seven times as likely to be right-wing and religious So the bottom line is that while the probability of a Muslim engineer becoming a violent Islamist is minuscule, it is still be between three and four times that for other graduates. Read more: The making of a suicide bomber Profile Diego Gambetta is official fellow at Nuffield College, Oxford. Steffen Hertog is Kuwait Professor at the Chaire Moyen Orient-Miditerranie, Sciences Po, Paris. Their book, Engineers of Jihad, will be published next year by Princeton University Press From cypherpunks at jfet.org Mon Jun 22 08:41:57 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 22 Jun 2009 21:11:57 +0530 Subject: Cleanse and Detoxify Your Body Message-ID: <000d01c9f34f$f9d7b880$6400a8c0@hospicesus8> Acai Berry is your ticket to a slim sexy new you. Visit us here http://www.dihegla.net/?vggmdskurkf best regards Claire Henderson From jtrjtrjtr2001 at yahoo.com Mon Jun 22 21:43:49 2009 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Mon, 22 Jun 2009 21:43:49 -0700 (PDT) Subject: Can university subjects reveal terrorists in the making? Message-ID: <317496.60893.qm@web33301.mail.mud.yahoo.com> the reason why there are so may engineers(if the claim is true) is because they are being directly recruited from colleges and universities. --- On Mon, 6/22/09, Eugen Leitl wrote: > From: Eugen Leitl > Subject: Can university subjects reveal terrorists in the making? > To: tt at postbiota.org, cypherpunks at al-qaeda.net > Date: Monday, June 22, 2009, 9:24 PM > (of course -- I am one) > > http://www.newscientist.com/article/mg20227127.200-can-university-subjects-reveal-terrorists-in-the-making.html?full=true&print=true > > Can university subjects reveal terrorists in the making? > > * 15 June 2009 by Diego Gambetta and Steffen Hertog > > * Magazine issue 2712. Subscribe and get 4 free issues. > > How can we spot future terrorists? There may be clues in > the subjects they > study (Image: Gaza Press / Rex Features) > > Editorial: Seeking out the engineers of terror > > WHO becomes a terrorist? An MI5 report leaked to London > newspaper The > Guardian in August 2008 concluded that there is no easy way > to identify those > who become involved in terrorism in the UK because there is > "no single > pathway to violent extremism" and that "it is not possible > to draw up a > typical profile of the 'British terrorist' as most are > 'demographically > unremarkable'". > > The extraordinary lengths the German authorities went to > after 9/11 to track > down potential terrorists are a stark example of how > useless profiling can > be. They collected and analysed data on over 8 million > individuals living in > Germany. These people were categorised by demographic > characteristics: male, > aged 18 to 40; current or former student; Muslim; legally > resident in > Germany; and originating from one of 26 Islamic countries. > Then they were > sorted into three further categories: potential to carry > out a terrorist > attack (such as a pilot's licence); familiarity with > locations that could be > targets (such as working in airports, nuclear power plants, > chemical plants, > the rail service, labs and other research institutes); and > studying the > German language at the Goethe Institute. > > With the help of these categories authorities whittled the > 8 million down to > just 1689 individuals, who were then investigated, one by > one. Giovanni > Capoccia, an Oxford-based political scientist who analysed > this case, > reported that not one of them turned out to be a threat. > All the real Islamic > terrorists arrested in Germany through other investigations > were not on the > official "shortlist" and did not fit the profile. > > Does it follow, as some scholars now think, that anyone, > given the right > conditions and the wrong friendships, can end up joining a > terrorist group? > Not entirely. We found that engineers are three to four > times as likely as > other graduates to be present among the members of violent > Islamic groups in > the Muslim world since the 1970s. Using a sample of 404 > Islamic militants > worldwide (with a median birth date in 1966), we tracked > down the education > of 284. Of these, 26 had less than secondary education, 62 > completed > secondary education (including madrasas), and 196 had > higher education, > whether completed or not. Even if none of the cases where > we lack data had > higher education, the share of those with higher education > would be a hefty > 48.5 per cent. > > The next move was to find out what they had studied - and > we tracked down 178 > of our 196 cases. The largest single group were engineers, > with 78 out of > 178, followed by 34 taking Islamic studies, 14 studying > medicine, 12 > economics and business studies, and 7 natural sciences. > The > over-representation of engineers applies to all 13 militant > groups in the > sample and to all 17 nationalities, with the exception of > Saudi Arabia. > > Our finding holds up quite well in another sample of 259 > Islamic extremists > who are citizens or residents of 14 western, mostly > European, countries, and > who have recently come to the attention of the authorities > for carrying out > or plotting a terrorist attack in the west. Although this > sample contains far > fewer people with higher education than the older members > of the first group, > nearly 6 out of 10 of those with higher education are > engineers. > > We also collected data on non-Muslim extremists. We found > that engineers are > almost completely absent from violent left-wing groups, > while they are > present among violent right-wing groups in different > countries. Out of seven > right-wing leaders in the US whose degrees we were able to > establish, four > were engineers: for example, Richard Butler, the founder of > the neo-Nazi > group Aryan Nations, was an aeronautical engineer, and > Wilhelm Schmitt, > leader of the right-wing, extreme anti-government, > pro-localism group known > as the Sheriff's Posse Comitatus, was an engineer with > Lockheed Martin. Among > the total membership of the Islamic groups, however, the > over-representation > is still much higher. > > This could be a coincidence: if the group founders are > engineers they would > also be more likely to recruit other engineers via their > educational or > professional networks. This explanation only works up to a > point. It does not > explain why engineers are over-represented in groups in > which the founders > were not engineers, or why the founders of groups that were > not in contact > with each other were often engineers. > > Why engineers? Everybody's first reaction is that they are > recruited for > their technical proficiency in bomb-making and > communications technology, but > there is no evidence for this. A tiny elite tends to do the > technical work in > these groups, and jihadist recruitment manuals focus on a > personality profile > rather than technical skills. > > So we are left with two hypotheses: either certain social > conditions impinge > more on engineers than on other graduates, or engineers are > more likely to > have certain personality traits that make radical Islamism > more attractive to > them. Our best guess is that the phenomenon derives from a > combination of > these two factors. > > With engineers in the Middle East we have very intelligent, > ambitious > students who have found it difficult to find professional > satisfaction, both > individually and collectively in their desire to help their > countries > develop. Graduates of very selective degree programmes, > they may have endured > relatively greater frustration in a stagnant and > authoritarian environment. > > The fact that engineers are not over-represented in Saudi > Arabia offers some > support for this, for, alone among the countries of origin > of terrorists, > Saudi Arabia has had a shortage of engineers and has thus > offered better > employment opportunities. However, even in western > countries and south-east > Asia, where labour market opportunities are better for all > graduates, > engineers appear relatively more attracted to violent > Islamist groups than > other graduates. Why is this? > > We reckon that something else is going on, something at the > individual level, > that is, relating to cognitive traits. According to polling > data, engineering > professors in the US are seven times as likely to be > right-wing and religious > as other academics, and similar biases apply to students. > In 16 other > countries we investigated, engineers seem to be no more > right-wing or > religious than the rest of the population, but the number > of engineers > combining both traits is unusually high. A lot of piecemeal > evidence suggests > that characteristics such as greater intolerance of > ambiguity, a belief that > society can be made to work like clockwork, and dislike of > democratic > politics which involves compromise, are more common among > engineers. > > US engineering professors are seven times as likely to be > right-wing and > religious > > So the bottom line is that while the probability of a > Muslim engineer > becoming a violent Islamist is minuscule, it is still be > between three and > four times that for other graduates. > > Read more: The making of a suicide bomber > > Profile > > Diego Gambetta is official fellow at Nuffield College, > Oxford. Steffen Hertog > is Kuwait Professor at the Chaire Moyen > Orient-Miditerranie, Sciences Po, > Paris. Their book, Engineers of Jihad, will be published > next year by > Princeton University Press From jtrjtrjtr2001 at yahoo.com Mon Jun 22 21:44:08 2009 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Mon, 22 Jun 2009 21:44:08 -0700 (PDT) Subject: Can university subjects reveal terrorists in the making? Message-ID: <390239.41041.qm@web33307.mail.mud.yahoo.com> --- On Mon, 6/22/09, Eugen Leitl wrote: > From: Eugen Leitl > Subject: Can university subjects reveal terrorists in the making? > To: tt at postbiota.org, cypherpunks at al-qaeda.net > Date: Monday, June 22, 2009, 9:24 PM > (of course -- I am one) > > http://www.newscientist.com/article/mg20227127.200-can-university-subjects-reveal-terrorists-in-the-making.html?full=true&print=true From jstrobel at ddmg.net Mon Jun 22 20:37:27 2009 From: jstrobel at ddmg.net (Jermaine Mcelroy) Date: Mon, 22 Jun 2009 22:37:27 -0500 (EDT) Subject: good quality watches Message-ID: Exclusive repl1ca watches collection http://dhi.iufnfbue.cn From cypherpunks at jfet.org Mon Jun 22 18:33:32 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 23 Jun 2009 02:33:32 +0100 Subject: Get More Self Confidence by losing weight Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3788 bytes Desc: not available URL: From GeraldconstrictMorris at compass.com Mon Jun 22 23:45:23 2009 From: GeraldconstrictMorris at compass.com (Peter Mitchell) Date: Tue, 23 Jun 2009 04:45:23 -0200 Subject: sanskrit capitulate connors Message-ID: <2914504360.20081111108186@compass.com> constrict sturbridge From hern at tmail.com Tue Jun 23 03:55:22 2009 From: hern at tmail.com (Mel Irwin) Date: Tue, 23 Jun 2009 05:55:22 -0500 (EDT) Subject: iwc will suit you best Message-ID: Be your own boss, order Your rolex rep1ica watch http://ozbahfea.cn From LenardhecateCarney at usnews.com Tue Jun 23 05:14:41 2009 From: LenardhecateCarney at usnews.com (Olen Byers) Date: Tue, 23 Jun 2009 11:14:41 -0100 Subject: gotten Message-ID: <5760218289.20081111165924@usnews.com> toronto satiate hecate bundoora gotten From cypherpunks at jfet.org Tue Jun 23 11:17:30 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 23 Jun 2009 12:17:30 -0600 Subject: Acai diet will deliver results and rid you of your unwated weight. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 947 bytes Desc: not available URL: From eugen at leitl.org Tue Jun 23 03:36:58 2009 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 23 Jun 2009 12:36:58 +0200 Subject: jurisdictional concentration of authorities Message-ID: <20090623103658.GC23524@leitl.org> ----- Forwarded message from Martin Fick ----- From nearlake at gmail.com Tue Jun 23 11:26:53 2009 From: nearlake at gmail.com (Walter Suggs) Date: Tue, 23 Jun 2009 13:26:53 -0500 (EDT) Subject: iwc rep watch for you Message-ID: Huge choice of Rep1ica watches http://fom.ibypzdue.cn From leonardo_fountain_xa at cs.com Tue Jun 23 09:59:28 2009 From: leonardo_fountain_xa at cs.com (Leonardo Fountain) Date: Tue, 23 Jun 2009 16:59:28 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ b3 In-Reply-To: Message-ID: Dear rsw at jfet.org http://discountcode39689.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode53141.laterokay.com http://discountcode11982.laterokay.com Generic \/ia/\gr/\ >>low price Vigr/\ Super Active >>cheap Ciaalllis >>very low price Ciaalllis Professional >>very cheap Ciaalllis Super Active >>very cheap \/ia/\gr/\ Soft Flavored >>very low price \/ia/\gr/\ Soft >>very low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode83724.laterokay.com We always strive to bring you the cheapest prices z1oonn122k- out me now /w.php p From FloydtipoffHart at nextag.com Tue Jun 23 15:24:37 2009 From: FloydtipoffHart at nextag.com (Dan Arnold) Date: Tue, 23 Jun 2009 21:24:37 -0100 Subject: vivo offensive audience Message-ID: <8482970372.20081111108989@nextag.com> tipoff euthanasia wrongdoing kathleen From dc at landam.com Tue Jun 23 19:28:40 2009 From: dc at landam.com (Zelma Mccann) Date: Tue, 23 Jun 2009 21:28:40 -0500 (EDT) Subject: you can wear breitling watch now Message-ID: Be your own boss, order Your rolex rep1ica watch http://ohwiiwea.cn From cypherpunks at jfet.org Tue Jun 23 17:38:42 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 23 Jun 2009 21:38:42 -0300 Subject: Lose weight without stress , Acai Berry. Message-ID: <000d01c9f464$1fdb6a30$6400a8c0@qualitieskom> Unable to view this newsletter?   start your new life today with a a free trial of Acai FLush. An useful click Copyright 2009 Ezgn Visit us at our site Member Profile� Privacy� Subscribe� Unsubscribe � -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3023 bytes Desc: not available URL: From pdfernhout at kurtz-fernhout.com Tue Jun 23 21:18:45 2009 From: pdfernhout at kurtz-fernhout.com (Paul D. Fernhout) Date: Wed, 24 Jun 2009 00:18:45 -0400 Subject: [Open Manufacturing] Raw Story B; Despite FAA ban, US spy drone patrols northern border Message-ID: From: http://rawstory.com/08/news/2009/06/23/despite-faa-ban-us-spy-aircraft-patrols-northern-border/ "Even though the Federal Aviation Administration has banned the use of unmanned aircraft systems (UAS), the Department of Homeland Security currently has a US spy aircraft patrolling the northern border of New York for the month of June. ... While unmanned aircraft systems can be armed, the one flying over upstate New York has no weapons, according to John Stanton, director of CPBbs Office of Air and Marine." OK, so killer robots are now being deployed in the state I live in (NY) but they are "unarmed". So, I should not mind? It's not like the military ever makes mistakes about this sort of stuff, right? "B-52 carried nuclear missiles over US by mistake: military" http://afp.google.com/article/ALeqM5gmqA7P-MPnRJzQ5v9Xi6M5zdr9IA "The US military said on Wednesday it was investigating an alarming security lapse when a B-52 bomber flew the length of the country last week loaded with six nuclear-armed cruise missiles." Well, just be safe, I had better avoid funerals: "U.S. Drone Strike Said to Kill 60 in Pakistan (at funeral)" http://www.nytimes.com/2009/06/24/world/asia/24pstan.html "An airstrike believed to have been carried out by a United States drone killed at least 60 people at a funeral for a Taliban fighter in South Waziristan on Tuesday, residents of the area and local news reports said. Details of the attack, which occurred in Makeen, remained unclear, but the reported death toll was exceptionally high. If the reports are indeed accurate and if the attack was carried out by a drone, the strike could be the deadliest since the United States began using the aircraft to fire remotely guided missiles at members of the Taliban and Al Qaeda in the tribal areas of Pakistan. The United States carried out 22 previous drone strikes this year, as the Obama administration has intensified a policy inherited from the Bush administration." At least there is no mention of children being killed that time in the supposedly just about half civilian casualties, so likely just some kids are left without parents, which presumably is better? Nothing there to breed a lifelong hatred of everyone in the USA, right? Of course, maybe breeding terrorists is what it is really all about? Every great country needs a great enemy to give meaning to its society, right? And if you can't find one, you need to make one right? Where would Castro have been without the USA to rail against? http://en.wikipedia.org/wiki/War_Is_a_Force_That_Gives_Us_Meaning "War Is a Force That Gives Us Meaning is a 2002 nonfiction book by Chris Hedges. In the book, Hedges draws on classical literature and his experiences as a war correspondent to argue that war seduces entire societies, creating fictions that the public believes and relies on to continue to support conflicts. He also describes how those who experience war may find it exhilarating and addicting. The book was a finalist for the National Book Critics Circle Award for Nonfiction and a Los Angeles Times Best Book of the Year, as well as a national bestseller." Still, if there are strikes for the each of the supposed not-civilians' funerals, and then strikes at the funerals of those people, one can at least see the potential for an exponential growth of funerals. Until the US government runs out of suspected terrorists to blow up, of course. Some numbers on that, you can presumably subtract one from the other: http://www.census.gov/main/www/popclock.html Just another example of post-scarcity technology being used by those obsessed with conflicts over scarcity -- but now deployed as a "test" in my state, within about a hundred miles of my home. Don't want those socialist Canadians sneaking over the border for some of our health care, right? "Inside HAARM: Late Night Brainstorming Session" http://haarm.org/ Or bringing all that Canadian weed with them? "How the war on drugs doesnbt work" http://blogs.howstuffworks.com/2009/06/17/how-the-war-on-drugs-doesnt-work/ ""Webve spent a trillion dollars prosecuting the war on drugs," Norm Stamper, a former police chief of Seattle, told me. "What do we have to show for it? Drugs are more readily available, at lower prices and higher levels of potency. Itbs a dismal failure."" I feel much safer already, knowing that "unarmed" drones are keeping those evil socialist drug abusers in their place. And, hey, the military already uses a nearby large building as a landmark for low altitude maneuvers (or so we suppose from the regular flights in the past), so what's some automated stuff flying around in the state too? Just because it is unmanned, why should I be more worried? After all, there's presumably some teenager somewhere on the planet giving the thing orders. http://www.democracynow.org/2009/2/6/wired_for_war_the_robotics_revolution "He was actually a high school dropout who wanted to join the military to make his father proud. He wanted to be a helicopter mechanic. And they said, bWell, you failed your high school English course, so youbre not qualified to be a mechanic. But would you like to be a drone pilot?b And he said, bSure.b And it turned out, because of playing on video games, he was already good at it. He was naturally trained up. And he turned out to be so good that they brought him back from Iraq and made him an instructor in the training academy, even though hebs an enlisted man and hebs stillbhe was nineteen." Sorry, just venting. I don't know what to do about this beyond what I am doing. There is already a border checkpoint not too far from my home which is 75 miles south of the border, where any car can be stopped and search, any laptop computer search or confiscated, and so on. And that one has already caused multiple deaths and is still there: http://www.nytimes.com/2004/10/23/nyregion/23crashes.html?oref=login&th "But on Interstate 87 north of here there have been two major crashes on the southbound approach to one of those checkpoints, including a pileup on Sept. 19, which killed four people as drivers failed to slow down for the lines of stopped cars." But they say it has been successful in catching some people with Canadian weed. So, we're all that much safer, right? "Remove Marijuana from Schedule I of the Controlled Substances Act" http://opengov.ideascale.com/akira/dtd/3191-4049 Such an issue for so long... But it justifies anything... http://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypse It is indeed a race towards Utopia or Oblivion, as Bucky Fuller said, depending on how these post-scarcity technologies are shaped. --Paul Fernhout --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Open Manufacturing" group. To post to this group, send email to openmanufacturing at googlegroups.com To unsubscribe from this group, send email to openmanufacturing+unsubscribe at googlegroups.com For more options, visit this group at http://groups.google.com/group/openmanufacturing?hl=en -~----------~----~----~----~------~----~------~--~--- ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Tue Jun 23 17:42:21 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 00:42:21 +0000 Subject: Loose weight without hunger. Free Acai Berry Tiral. Message-ID: <000d01c9f45c$40a6eda0$6400a8c0@pyramidessk13> Unable to view this newsletter?   The Red Carpet diet is out ! Acai Flush is hollywoods biggest seceret. Click doubtless Copyright 2009 Ekbp Visit us at our site Member Profile� Privacy� Subscribe� Unsubscribe � -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3039 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 23 19:35:16 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 03:35:16 +0100 Subject: Acai Berry fights Cancer , Increases energy and burns fat. Message-ID: <000d01c9f46c$07148380$6400a8c0@adulteratedg0> Acai Slim, lose weight without gadgets. Feel great with Acai Flush. Please Visit http://www.ujefaberlice.info/?rykmeyxnhdx From ropervn at bellsouth.net Tue Jun 23 23:35:51 2009 From: ropervn at bellsouth.net (Tony Roper) Date: Wed, 24 Jun 2009 06:35:51 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ yo In-Reply-To: <217e01c9ef6c$4327fb6f$95730510@n69vrw3> Message-ID: Dear cypherpunks at jfet.org http://discountcode85729.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode33741.laterokay.com http://discountcode87358.laterokay.com Generic \/ia/\gr/\ >>very cheap Vigr/\ Super Active >>low price Ciaalllis >>very low price Ciaalllis Professional >>low price Ciaalllis Super Active >>very low price \/ia/\gr/\ Soft Flavored >>cheap \/ia/\gr/\ Soft >>cheap We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode86349.laterokay.com We always strive to bring you the cheapest prices skh0dj30ys- out me now /w.php p From rah at shipwright.com Wed Jun 24 04:46:54 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 24 Jun 2009 07:46:54 -0400 Subject: =?WINDOWS-1252?Q?To_fight_deflation,_abolish_cash._Could_Japan_m?= =?WINDOWS-1252?Q?ake_reality_of_=91science_fiction=92=3F_?= Message-ID: <9FE46833-EAB5-4389-A522-DD91E89ABFCC@shipwright.com> At the heart of the problem of achieving negative nominal interest rates is the idea that physical currency is an anonymous bearer bond with a nominal interest rate of zero. Remember my running gag about cash being a bearer-settled zero-coupon zero-interest perpetuity? They'll be taxing cash balances, if this keeps up... Hat Tip: and Cheers, RAH -------- From The Times June 19, 2009 To fight deflation, abolish cash. Could Japan make reality of science fiction? Leo Lewis Asia Business Correspondent With recovery elusive, a population doddering into old age and perhaps a decade of deflation in prospect, Japan may start mulling the most radical monetary policy of all  the abolition of cash. Unorthodox, untried and, said one Bank of Tokyo Mitsubishi strategist, in the realms of economic science fiction, the recommendation has nevertheless begun floating around Tokyos corridors of power and economists have described Japan as particularly suitable as a testing ground. The search for more outri economic policies continues, despite the recent surge in the Nikkei 225 index.The market may be reflecting soaring Chinese investment, rising consumer confidence and other cheerful data but economists see few long-term beacons of hope for Japan. Other extreme ideas mooted by the financial authorities include a tax on physical currency or introducing one to operate alongside the yen. All three ideas are based on a theory concerning interest rates and the concept that a nominal rate of zero  as Japan has now lived with for much of the past decade  may be too high. In Japans case, the theory would suggest that nominal rates of -4 per cent might be closer to what is required to rescue the economy from another deflationary spiral. Having agreed that this might be necessary, the next question is how it could be imposed. Several MPs in the ruling Liberal Democratic Party believe the abolition of cash, though politically radioactive, might be technically feasible. Richard Jerram, a senior economist with Macquarie bank, told investors that the proposal has become practical with the broad penetration of electronic money and credit cards in Japan. He said that all the proposals were radical but worth consideration for Japan. Without physical cash, a central bank can set rates exactly where it likes, runs the argument. Mr Jerram said: At the heart of the problem of achieving negative nominal interest rates is the idea that physical currency is an anonymous bearer bond with a nominal interest rate of zero. While a central bank can impose positive or negative rates on non-physical assets, transmitting those rates to physical currency is a huge challenge. By permanently removing cash from a system, he added, policymakers are robbed of the excuse that zero is the lowest that nominal rates can go as a deflation-fighting tool. In theory, many Japanese could easily make the leap into a cashless world. The country has six main competing cashless payment systems, many of them embedded into mobile phones. Including Oyster-type cards issued by public transport companies, industry sources estimate that there are about 120 million cashless payment chips sitting in Japans wallets and handbags, waiting to be swiped. Nevertheless, the country remains a wholeheartedly cash-based consumer society. Currency in circulation is about 16 per cent of its GDP, compared with the levels of 2 to 3 per cent in most developed countries. Reducing that 16 per cent to zero would be a wrench but would come with considerable benefits, Mr Jerram said. But just as Japans cultural attachment to cash may prove hard to dislodge, some economists believe that the same may be true of deflation. The countrys growing population of elderly people mainly hold cash or cash equivalents and, compared with its US and European counterparts, the Bank of Japan has come under virtually no political pressure to be more belligerent in its war on deflation. It is unlikely, added Mr Jerram, to brook anything as radical as abolishing cash. From cypherpunks at jfet.org Tue Jun 23 22:49:21 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 07:49:21 +0200 Subject: All Natural Acai Berry Your Weight Loss Solution. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3028 bytes Desc: not available URL: From mendoza at britishmidland.com Wed Jun 24 06:02:23 2009 From: mendoza at britishmidland.com (Paula Schmitt) Date: Wed, 24 Jun 2009 08:02:23 -0500 (EDT) Subject: just show your tag heuer watch Message-ID: Be your own boss, order Your rolex rep1ica watch http://ogxxseea.cn From eugen at leitl.org Wed Jun 24 02:40:37 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 24 Jun 2009 11:40:37 +0200 Subject: [Open Manufacturing] Raw =?iso-8859-1?Q?St?= =?iso-8859-1?Q?ory_?= =?iso-8859-1?Q?=BB?= Despite FAA ban, US spy drone patrols northern border Message-ID: <20090624094037.GL23524@leitl.org> ----- Forwarded message from "Paul D. Fernhout" ----- From rosariofaulknersp at videotron.ca Wed Jun 24 07:12:59 2009 From: rosariofaulknersp at videotron.ca (Rosario Faulkner) Date: Wed, 24 Jun 2009 14:12:59 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ gx In-Reply-To: <2ada01c9f293$8e925c53$c7ba585a@lw5wug3> Message-ID: Dear cypherpunks at jfet.org http://discountcode76317.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode67779.laterokay.com http://discountcode92734.laterokay.com Generic \/ia/\gr/\ >>low price Vigr/\ Super Active >>cheap Ciaalllis >>very cheap Ciaalllis Professional >>low price Ciaalllis Super Active >>very cheap \/ia/\gr/\ Soft Flavored >>very cheap \/ia/\gr/\ Soft >>cheap We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode11814.laterokay.com We always strive to bring you the cheapest prices zhqd8v2e32- out me now /w.php p From mcr at sandelman.ottawa.on.ca Wed Jun 24 12:03:33 2009 From: mcr at sandelman.ottawa.on.ca (Michael Richardson) Date: Wed, 24 Jun 2009 15:03:33 -0400 Subject: [btns] IETF75 Message-ID: >>>>> "Eugen" == Eugen Leitl writes: Eugen> On Wed, Jun 24, 2009 at 03:15:59PM +0200, Julien Laganier Eugen> wrote: >> We're currently progressing connexion latching thru IESG. >> >> What remains to be done for the WG is to complete the API work >> item. Since those haven't been discussed much on the mailing >> list we felt that a meeting wouldn't be productive. Eugen> How far is the proposed standard from being able to hit the Eugen> road? I realize "it's done when it's done" but are we Eugen> looking at months, years, half a decade until there's a first Eugen> implementation available to beta testers? Read the document and comment. The API documents are stuck for lack of contributions. -- ] Y'avait une poule de jammi dans l'muffler!!!!!!!!! | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON |net architect[ ] mcr at sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[ ] h("Just another Debian GNU/Linux using, kernel hacking, ruby guy"); [ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From andrew at torproject.org Wed Jun 24 12:32:25 2009 From: andrew at torproject.org (Andrew Lewman) Date: Wed, 24 Jun 2009 15:32:25 -0400 Subject: Help Iranian dissidents Message-ID: On 06/24/2009 01:41 PM, Bill McGonigle wrote: > On 06/24/2009 11:44 AM, Eugen Leitl wrote: >> Speaking about guerilla, http://www.google.com/search?q=sheevaplug >> would seem like an ideal throwaway Tor appliance. With Bluetooth >> or WLAN dongles even casting a small (or long-distance, with >> suitable directional aerials) wireless cloud. > > The Fonera 2 might be a candidate platform. Half the price, 32MB RAM, > built-in wifi, support for 3g modems. IIRC, somebody already did a tor > mod for the first version. In general, we encourage people to work on these types of ports of Tor. We will work with you and help you turn this into a reality. However, be aware that it takes work, research, and effort to get tor to work correctly on these platforms. I'm sure there are a list of features "micro-environments" would need to have in Tor to make everything work better. We'd love to have the help and your experience in turning this into a reality. We have the beginnings of a certification program in place, so an end-user/customer can tell if this is really tor, works with the current tor network, is a solid design as good as Tor, or is complete bunk and merely includes the Tor tarball to say "uses Tor!" for their marketing purposes. However, coming up with the idea, and then punting all of the next steps to the Tor Project doesn't work too well. I have a list of platforms that people have stated, "If you can turn Tor into an appliance on device X, we'll sell it for you and donate x% back to you quarterly." These platforms include: fonera2, embedded linux variants, polar cloud's tomato, sheevaplugs, bug lab's modules, openwrt, ddwrt, windows ce, windows xp embedded, and the list goes on. In conversations with the requesters, they want: Step 1) Generate an idea. Step 2) Wait for Tor Project to do the technical work. Step 3) Profit! If only it were that easy. -- Andrew Lewman The Tor Project pgp 0x31B0974B Website: https://torproject.org/ Blog: https://blog.torproject.org/ Identica/Twitter: torproject ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From keller at montblanc.com Wed Jun 24 13:56:21 2009 From: keller at montblanc.com (Susan Foley) Date: Wed, 24 Jun 2009 15:56:21 -0500 (EDT) Subject: you can wear breitling watch now Message-ID: Exclusive repl1ca watches collection http://rtq.ooseotea.cn From cypherpunks at jfet.org Wed Jun 24 12:30:18 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 16:30:18 -0300 Subject: Enhance your body ability to burn fat , with Acai Berry. Message-ID: <4LB7G882312.L0PIWMJ8259@189.24.3.219> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3727 bytes Desc: not available URL: From eugen at leitl.org Wed Jun 24 08:44:44 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 24 Jun 2009 17:44:44 +0200 Subject: Help Iranian dissidents In-Reply-To: <18701.57622.qm@web57610.mail.re1.yahoo.com> References: <18701.57622.qm@web57610.mail.re1.yahoo.com> Message-ID: <20090624154444.GB23524@leitl.org> On Wed, Jun 24, 2009 at 08:31:51AM -0700, Dieter Zinke wrote: > Anyway, if the provider shuts down, the internet is down. Nobody needs help with tor if the internet is down. Right? That was or is the problem with some providers today in Iran. What's the situation with guerilla WLAN (long-distance and mesh), packet radio, satellite phones, illegal fiber laid across country borders? Speaking about guerilla, http://www.google.com/search?q=sheevaplug would seem like an ideal throwaway Tor appliance. With Bluetooth or WLAN dongles even casting a small (or long-distance, with suitable directional aerials) wireless cloud. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Wed Jun 24 12:33:13 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 19:33:13 +0000 Subject: Get The Edge Over Everyone Else click Here for your Weight loss Trial Message-ID: <000d01c9f4fa$3bd1b410$6400a8c0@comminglingpc9> Look Great , Let Acai Berry Help. Help yourself lose weight now!   Participate here     Thank You! best regards Cathrine Dewitt -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 939 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 24 15:57:46 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 19:57:46 -0300 Subject: If you are struggling and looking for effective ways to drop weight fast Try Acai Berry Message-ID: <000d01c9f51f$30a41220$6400a8c0@revivify321> If you have trouble viewing this e-mail, please click here. Everyone Will Want Your New Secret ACAI POWER SLIM Discover the secret today! Break into this site To review our Privacy Policy, please click here. To ensure the delivery of your informative updates from Dr. Lark and the Daily Balance Team, please add cypherpunks at jfet.org to your email address book. ************TO UNSUBSCRIBE************ You are receiving this e-mail at cypherpunks at jfet.org because you indicated an interest in receiving special updates and offers from Dr. Lark. We hope that you find these updates helpful, but if you would rather not receive them, you can unsubscribe by clicking here. You will be immediately unsubscribed from our database. Remember, your personal information will only be used by Healthy Directions, LLC, for editorial and marketing purposes. Thank you. Daily Balance 865 Jame, PA 91264 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3801 bytes Desc: not available URL: From cypherpunks at jfet.org Wed Jun 24 16:19:00 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 24 Jun 2009 20:19:00 -0300 Subject: Lose Weight without moving a muscle Message-ID: <1TO0639663.XP5M1691L96559@186.100.115.205.total-extreme.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 974 bytes Desc: not available URL: From eugen at leitl.org Wed Jun 24 12:26:23 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 24 Jun 2009 21:26:23 +0200 Subject: [btns] IETF75 Message-ID: <20090624192623.GK23524@leitl.org> I can has contributions, please? ----- Forwarded message from Michael Richardson ----- From eugen at leitl.org Wed Jun 24 13:29:10 2009 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 24 Jun 2009 22:29:10 +0200 Subject: Help Iranian dissidents Message-ID: <20090624202910.GM23524@leitl.org> ----- Forwarded message from Andrew Lewman ----- From clemons at ahnlab.com Wed Jun 24 22:17:24 2009 From: clemons at ahnlab.com (Jules Dooley) Date: Thu, 25 Jun 2009 00:17:24 -0500 (EDT) Subject: you can wear tag heuer watch now Message-ID: Huge choice of Rep1ica watches http://wqk.oxvmwsea.cn From privacy at vortex.com Thu Jun 25 01:37:17 2009 From: privacy at vortex.com (privacy at vortex.com) Date: June 25, 2009 1:37:17 AM GMT-04:00 Subject: [ PRIVACY Forum ] Bulletin: Democrats in Congress Want Message-ID: Biometic National ID Card for All Workers Bulletin: Democrats in Congress Want Biometic National ID Card for All Workers Washington Post: http://bit.ly/iQ11z "Reassuring" words from Chuck Schumer: "I'm sure the civil libertarians will object to some kind of biometric card -- although ... there'll be all kinds of protections -- but we're going to have to do it. It's the only way." Isn't that last sentence what Darth Vader said to Luke when trying to get his son to join him, just after revealing his relationship? Here we go again. At least in regards to certain topics, when it comes to Congress, it's: Meet the new boss, same as the old boss! --Lauren-- Lauren Weinstein lauren at vortex.com Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, NNSquad - Network Neutrality Squad - http://www.nnsquad.org Founder, GCTIP - Global Coalition for Transparent Internet Performance - http://www.gctip.org Founder, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com Twitter: https://twitter.com/laurenweinstein _______________________________________________ privacy mailing list http://lists.vortex.com/mailman/listinfo/privacy From rah at shipwright.com Thu Jun 25 06:56:22 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 25 Jun 2009 09:56:22 -0400 Subject: [ PRIVACY Forum ] Bulletin: Democrats in Congress Want Biometic National ID Card for All Workers References: <20090625053717.GA15700@vortex.com> Message-ID: <47FF0B9B-077F-4F0D-A36E-F6088C157C42@shipwright.com> Papierien, bitte. Arbeit macht frei is next, I suppose. Anyone who uses "workers" with a straight face is, for all practical purposes, a communist. But that's okay, Chuckie's only gonna put the *head* in, you see. You'll still be a virgin, he promises. Cheers, RAH -------- Begin forwarded message: From mikko.partanen at ms13.hinet.net Thu Jun 25 08:06:05 2009 From: mikko.partanen at ms13.hinet.net (Gena Mccoy) Date: Thu, 25 Jun 2009 10:06:05 -0500 (EDT) Subject: breitling is what you need Message-ID: Be your own boss, order Your rolex rep1ica watch http://lpw.ibnsfiue.cn From cypherpunks at jfet.org Thu Jun 25 12:54:44 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 25 Jun 2009 11:54:44 -0800 Subject: Lose Weight Fast , YOUR Trial offer IS WAITING Try Acai Berry. Message-ID: <000d01c9f5c6$678ad010$6400a8c0@fingerprintsey7> Hollywoods fat burning secret is out. Ring the bell now http://www.vedalae.com/?rqqwefpxgmkn best regards Shannon Cates From eugen at leitl.org Thu Jun 25 04:59:50 2009 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 25 Jun 2009 13:59:50 +0200 Subject: Iran government crowdsourcing demonstrants Message-ID: <20090625115950.GG23524@leitl.org> Telepolis reports http://www.heise.de/tp/blogs/8/141066 that the Iranian government is trying to identify individual demonstrants via http://gerdab.ir/fa/pages/?cid=407 and http://www.bultannews.com/ Net activists are using Slowloris to bring down both sites http://iran.whyweprotest.net/off-topic/2029-we-need-bring-down-http-gerdab-ir-fa-pages-cid-407-a.html At least http://gerdab.ir/fa/pages/?cid=407 is still available as of few seconds ago. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From hall_xt at sprint.ca.jfet.org Thu Jun 25 12:41:20 2009 From: hall_xt at sprint.ca.jfet.org (Marie Hall) Date: Thu, 25 Jun 2009 19:41:20 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ 4k In-Reply-To: <7f3601c9f186$5d318e28$3535fb0a@pom7w43> Message-ID: Dear rsw at jfet.org http://discountcode54149.laterokay.com DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode58315.laterokay.com http://discountcode45556.laterokay.com Generic \/ia/\gr/\ >>cheap Vigr/\ Super Active >>very low price Ciaalllis >>very low price Ciaalllis Professional >>very low price Ciaalllis Super Active >>very low price \/ia/\gr/\ Soft Flavored >>low price \/ia/\gr/\ Soft >>low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode38983.laterokay.com We always strive to bring you the cheapest prices 8z3n0d3srg- out me now /w.php p From arma at mit.edu Thu Jun 25 17:24:02 2009 From: arma at mit.edu (Roger Dingledine) Date: Thu, 25 Jun 2009 20:24:02 -0400 Subject: Tor 0.2.0.35 is released Message-ID: Tor 0.2.0.35 fixes a big bug that was causing Tor relays with dynamic IP addresses to disappear from the network. It also fixes a rare crash bug on fast exit relays. https://www.torproject.org/easy-download.html Changes in version 0.2.0.35 - 2009-06-24 o Security fix: - Avoid crashing in the presence of certain malformed descriptors. Found by lark, and by automated fuzzing. - Fix an edge case where a malicious exit relay could convince a controller that the client's DNS question resolves to an internal IP address. Bug found and fixed by "optimist"; bugfix on 0.1.2.8-beta. o Major bugfixes: - Finally fix the bug where dynamic-IP relays disappear when their IP address changes: directory mirrors were mistakenly telling them their old address if they asked via begin_dir, so they never got an accurate answer about their new address, so they just vanished after a day. For belt-and-suspenders, relays that don't set Address in their config now avoid using begin_dir for all direct connections. Should fix bugs 827, 883, and 900. - Fix a timing-dependent, allocator-dependent, DNS-related crash bug that would occur on some exit nodes when DNS failures and timeouts occurred in certain patterns. Fix for bug 957. o Minor bugfixes: - When starting with a cache over a few days old, do not leak memory for the obsolete router descriptors in it. Bugfix on 0.2.0.33; fixes bug 672. - Hidden service clients didn't use a cached service descriptor that was older than 15 minutes, but wouldn't fetch a new one either, because there was already one in the cache. Now, fetch a v2 descriptor unless the same descriptor was added to the cache within the last 15 minutes. Fixes bug 997; reported by Marcus Griep. ------------------------------------------------------------------------ This is the Tor announcements list. If you want to unsubscribe, send mail to majordomo at seul.org with "unsubscribe or-announce" as your message. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Thu Jun 25 20:21:03 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 25 Jun 2009 21:21:03 -0600 Subject: achieve your new years resolution for free Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6239 bytes Desc: not available URL: From margarita.gillhu at netscape.net Thu Jun 25 20:30:10 2009 From: margarita.gillhu at netscape.net (Margarita Gill) Date: Fri, 26 Jun 2009 03:30:10 +0000 Subject: transform flab to fab with acai for free gfo In-Reply-To: <6a2201c9f51b$e5c9f0bc$c65d1e6e@b2c0lr3> Message-ID: Help yourself lose weight now! This is nothing like any diet plan you have ever tried before. Acai diet will deliver results and rid you of your unwated weigh http://www.rovertiaser.biz/?special_discount_c0de_bhjbqd Thanks Ann Cassidy rsw at jfet.org wrote: > Get Thin Easily with Acai Berry 11da24dvh8- out me now http://www.rovertiaser.biz/?special_discount_c0de_bhjbqd/w.php From cozzi at cozziconsulting.com Fri Jun 26 05:16:00 2009 From: cozzi at cozziconsulting.com (Michael) Date: Fri, 26 Jun 2009 08:16:00 -0400 Subject: A Few Random Thoughts... Message-ID: Hi all, As one of those lucky souls with access to almost limitless bandwidth and the skills (or stupidity) to use it, I suppose an apology is in order: I'm sorry- after reviewing what *could* be the consequences, I have to whimp out based on professional risk factors... I can't run an exit node. So I have to leave it to other folks who have a different situation to do the heavy lifting. What I *am* doing is deploying a couple of heavy iron closed relays on OC3 or better bandwidth. The first is now deployed after a lot of up and down testing, and I'll get to the second in due time. I've been watching Tor for a long time and just recently decided to get involved. The Iran situation cemented that decision. Anyhow, here are some random thoughts: On the "Who uses Tor?" section of the website, I see no mention of IT people. I've used the Tor network for many practical uses as an IT Director. These range from bypassing my own firewall to test incoming connections, to helping my legal department do research on a pending lawsuit without the opposition *knowing* we even looked at their website. Having a random and easily accessible IP to initiate connections from is a priceless testing tool. Especially when dealing with niggling routing problems. On one occasion my ISP was having routing/DNS problems, and Tor was able to find an entrance node and allow me to work even though I couldn't get to my remote servers directly. This saved my client a lot of downtime, and might have saved me the account. Also, my employer's R&D department sometimes needs to look at things they don't want anyone to know they looked at (All quite legal mind you). Quite frankly Tor is an undervalued IT tool and it's capabilities should be trumpeted loudly on the web page. You might also find IT guys like me throwing up some relays in exchange. After all- who has the bandwidth anyway? And before anyone accuses me of it, I'm not nearly stupid enough to do a port scan over Tor. Phew. One of the issues I ran into when looking into running an exit relay had to do with not only the legalities, but identifying a server vendor that was offshore from my home country and friendly to a Tor exit. In order for me to run an exit node, I have to be completely shielded. As it stands now, I can probably run an exit for instant messaging- and that's it. However, if Tor itself had a relationship with someone who rents hardware, perhaps a partnership, Tor could get the exit nodes it needs, and the server vendor could get lots of cash. From my standpoint, it doesn't matter whether I rent or colocate my hardware. So if Tor as an organization had a partnership with a few server rental whores (in multiple countries), it would simplify getting more exits. I need servers, Tor runs with little impact on my server, I could care less where my remote hardware is provisioned from. Bingo- more exits. I read back about 6 months in the or-talk list and there were a couple of suggestions inferring that *everyone* should be forced to be an exit node. I think this is a very bad idea, and hurts the security of the person trying to remain anonymous by causing an identifiable change in bandwidth usage that could infer Tor usage (Information leakage). Simply speaking, on a default Windows/Vidalia installation, outgoing Tor traffic usually looks like https traffic, but on a forced exit, now Tor is identified by relatively matched traffic on port 443 both in and out of the client's connection (Unless it's entrance node is a *nix variant). This could mean death (literal) for a political dissident who is now identified as having an in/out matching traffic pattern assuming his entrance node is on Windows. It is more likely, that a country monitoring it's citizens would miss simple https traffic. But even myself as a lowly IT director, would have alarm bells going off if https was initiating in two directions from the same machine. Alternative ports can also set off alarm bells. But given the nature of Onion Routing, two way traffic needs to be avoided in the most sensitive sensitive situations. Forcing exit nodes is a bad idea for users. It will also drive away anyone who cannot provide an exit node.... that's chasing away bandwidth as non exit relays run for the hills. Long post. Too much coffee and too much time staring at routing tables. Michael ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cozzi at cozziconsulting.com Fri Jun 26 05:16:00 2009 From: cozzi at cozziconsulting.com (Michael) Date: Fri, 26 Jun 2009 08:16:00 -0400 Subject: A Few Random Thoughts... Message-ID: Hi all, As one of those lucky souls with access to almost limitless bandwidth and the skills (or stupidity) to use it, I suppose an apology is in order: I'm sorry- after reviewing what *could* be the consequences, I have to whimp out based on professional risk factors... I can't run an exit node. So I have to leave it to other folks who have a different situation to do the heavy lifting. What I *am* doing is deploying a couple of heavy iron closed relays on OC3 or better bandwidth. The first is now deployed after a lot of up and down testing, and I'll get to the second in due time. I've been watching Tor for a long time and just recently decided to get involved. The Iran situation cemented that decision. Anyhow, here are some random thoughts: On the "Who uses Tor?" section of the website, I see no mention of IT people. I've used the Tor network for many practical uses as an IT Director. These range from bypassing my own firewall to test incoming connections, to helping my legal department do research on a pending lawsuit without the opposition *knowing* we even looked at their website. Having a random and easily accessible IP to initiate connections from is a priceless testing tool. Especially when dealing with niggling routing problems. On one occasion my ISP was having routing/DNS problems, and Tor was able to find an entrance node and allow me to work even though I couldn't get to my remote servers directly. This saved my client a lot of downtime, and might have saved me the account. Also, my employer's R&D department sometimes needs to look at things they don't want anyone to know they looked at (All quite legal mind you). Quite frankly Tor is an undervalued IT tool and it's capabilities should be trumpeted loudly on the web page. You might also find IT guys like me throwing up some relays in exchange. After all- who has the bandwidth anyway? And before anyone accuses me of it, I'm not nearly stupid enough to do a port scan over Tor. Phew. One of the issues I ran into when looking into running an exit relay had to do with not only the legalities, but identifying a server vendor that was offshore from my home country and friendly to a Tor exit. In order for me to run an exit node, I have to be completely shielded. As it stands now, I can probably run an exit for instant messaging- and that's it. However, if Tor itself had a relationship with someone who rents hardware, perhaps a partnership, Tor could get the exit nodes it needs, and the server vendor could get lots of cash. From my standpoint, it doesn't matter whether I rent or colocate my hardware. So if Tor as an organization had a partnership with a few server rental whores (in multiple countries), it would simplify getting more exits. I need servers, Tor runs with little impact on my server, I could care less where my remote hardware is provisioned from. Bingo- more exits. I read back about 6 months in the or-talk list and there were a couple of suggestions inferring that *everyone* should be forced to be an exit node. I think this is a very bad idea, and hurts the security of the person trying to remain anonymous by causing an identifiable change in bandwidth usage that could infer Tor usage (Information leakage). Simply speaking, on a default Windows/Vidalia installation, outgoing Tor traffic usually looks like https traffic, but on a forced exit, now Tor is identified by relatively matched traffic on port 443 both in and out of the client's connection (Unless it's entrance node is a *nix variant). This could mean death (literal) for a political dissident who is now identified as having an in/out matching traffic pattern assuming his entrance node is on Windows. It is more likely, that a country monitoring it's citizens would miss simple https traffic. But even myself as a lowly IT director, would have alarm bells going off if https was initiating in two directions from the same machine. Alternative ports can also set off alarm bells. But given the nature of Onion Routing, two way traffic needs to be avoided in the most sensitive sensitive situations. Forcing exit nodes is a bad idea for users. It will also drive away anyone who cannot provide an exit node.... that's chasing away bandwidth as non exit relays run for the hills. Long post. Too much coffee and too much time staring at routing tables. Michael ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jun 26 09:43:21 2009 From: eugen at leitl.org (Eugen Leitl) Date: June 26, 2009 9:43:21 AM GMT-04:00 Subject: A Few Random Thoughts... Message-ID: ----- Forwarded message from Michael ----- From eugen at leitl.org Fri Jun 26 01:15:15 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Jun 2009 10:15:15 +0200 Subject: Tor 0.2.0.35 is released Message-ID: <20090626081515.GG23524@leitl.org> ----- Forwarded message from Roger Dingledine ----- From searsvo at zipmail.com.br Fri Jun 26 03:18:37 2009 From: searsvo at zipmail.com.br (Pearlie Sears) Date: Fri, 26 Jun 2009 10:18:37 +0000 Subject: 25cm fo every men is possible 3ez In-Reply-To: <2a3c01c9f0d5$bb625cb8$fa3891c2@gtr0wo3> Message-ID: Dear rsw at jfet.org http://lawnroad.com Do you want enlarge your penis upto 4 inches? Amazing, PERMANENT RESULTS that will last. ť Gain 3+ Inches In Length. ť Increase Your P3nls Width (Girth) By up\to 20%. http://lawnroad.com Thanks Mary Moore rsw at jfet.org wrote: > Do you want enlargr your penis up to 4 inches? gh9eou3yqa- out me now http://lawnroad.com/w.php From rah at shipwright.com Fri Jun 26 07:35:48 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 26 Jun 2009 10:35:48 -0400 Subject: A Few Random Thoughts... In-Reply-To: <20090626134321.GH23524@leitl.org> References: <20090626134321.GH23524@leitl.org> Message-ID: <6D4D5C46-9DDD-48FA-BABC-EC13079D4934@shipwright.com> > I'm sorry- after reviewing what *could* be the consequences, I have > to whimp out based on professional risk factors... I can't run an exit > node. As with anonymous remailers, the exit node of an onion-routing system is the sin-eater for the rest of the network. And, without cash settlement, you get what you pay for. :-). Cheers, RAH From rah at shipwright.com Fri Jun 26 07:42:49 2009 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 26 Jun 2009 10:42:49 -0400 Subject: A Few Random Thoughts... References: <20090626134321.GH23524@leitl.org> Message-ID: As with anonymous remailers, or any other anonymous system, the exit node of an onion-routing system is the sin-eater for the rest of the network. And, without cash settlement, you get what you pay for. :-). Cheers, RAH ------- Begin forwarded message: From arma at mit.edu Fri Jun 26 07:45:44 2009 From: arma at mit.edu (Roger Dingledine) Date: Fri, 26 Jun 2009 10:45:44 -0400 Subject: A Few Random Thoughts... Message-ID: On Fri, Jun 26, 2009 at 08:16:00AM -0400, Michael wrote: > What I *am* doing is deploying a couple of heavy iron closed relays > on OC3 or better bandwidth. The first is now deployed after a lot of up > and down testing, and I'll get to the second in due time. Sounds great. Let us know if you have any questions or run into any problems. Depending on how you're installing, you might like the development version (currently 0.2.1.16-rc). The 0.2.1.x series is going to become the new "stable" soon (it's already probably more stable in practice than 0.2.0.35), and it's way better in a number of other ways. But either 0.2.0.x or 0.2.1.x is fine, really. > On the "Who uses Tor?" section of the website, I see no mention of > IT people. I've used the Tor network for many practical uses as an IT > Director. That's a really good point. Especially since a lot of the people who really hate/fear Tor are IT folks who don't understand it. > Quite frankly Tor is an undervalued IT tool and it's capabilities > should be trumpeted loudly on the web page. You might also find IT guys > like me throwing up some relays in exchange. After all- who has the > bandwidth anyway? Yep. The next step is to come up with some really good clean simple example sentences for our new category. Those examples will dictate the title we give it -- "Security experts use Tor", "Sysadmins use Tor", "Computer experts use Tor", or something else. > So > if Tor as an organization had a partnership with a few server rental > whores (in multiple countries), it would simplify getting more exits. If anybody knows good places, please let us know. :) There's a small list being built here: https://wiki.torproject.org/noreply/TheOnionRouter/GoodBadISPs Another concern is that if we centralize all the exit relays in a few places, we reduce the anonymity that the Tor network can provide. But I don't think we're anywhere near doing that yet, so it's just something to keep in the back of our minds. > I read back about 6 months in the or-talk list and there were a > couple of suggestions inferring that *everyone* should be forced to be > an exit node. I think this is a very bad idea, Me too. Don't worry, we won't do it. But see also https://blog.torproject.org/blog/two-incentive-designs-tor --Roger ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cozzi at cozziconsulting.com Fri Jun 26 08:44:03 2009 From: cozzi at cozziconsulting.com (Michael) Date: Fri, 26 Jun 2009 11:44:03 -0400 Subject: Suggested IT Text... Edit or destroy as fitting. Message-ID: Not to jump in with both feet, but here's some possible starting text ideas for the "IT People Use Tor" section... Ahem... "IT Professionals use Tor: * To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company's alloted IP block. * To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems. * To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing. * To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place. * To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable is crisis situations. * The CTO is an asshat: Your CTO is a golf loving moron who hasn't spent any time in front of a computer since 1988. He bought some crappy appliance, which sits at the edge of your network, tracking your activity, while you track everyone else's activity- including his. This Mongolian Cluster Fuck never seems to end. Root Cause Analysis sessions go on for days on end. Plans are made to DDOS his Comcast cable connection, one of your assistants claims he can bed the CTOs wife, and the accounting system is missing data (really- it's the CTOs missing porn collection). Cooler heads prevail... you just install Tor and read Slashdot. Ok, maybe the last one isn't salvageable. I gave it my best shot. Michael ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jun 26 06:43:21 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Jun 2009 15:43:21 +0200 Subject: A Few Random Thoughts... Message-ID: <20090626134321.GH23524@leitl.org> ----- Forwarded message from Michael ----- From cypherpunks at jfet.org Fri Jun 26 14:07:06 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 26 Jun 2009 16:07:06 -0500 Subject: Dealing with Stomach issues Try Acai Berry it Reduces constipation, gas, bloating & fatigue Message-ID: <000d01c9f699$adde0e50$6400a8c0@lisbond3> secret of the amazon, acai berry slim sexy body Regulate your metabolism and lose weight fast. Visit this second http://ynbnzwa.cn From eugen at leitl.org Fri Jun 26 08:26:29 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Jun 2009 17:26:29 +0200 Subject: A Few Random Thoughts... Message-ID: <20090626152628.GQ23524@leitl.org> ----- Forwarded message from Roger Dingledine ----- From eugen at leitl.org Fri Jun 26 08:47:28 2009 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Jun 2009 17:47:28 +0200 Subject: Suggested IT Text... Edit or destroy as fitting. Message-ID: <20090626154728.GR23524@leitl.org> ----- Forwarded message from Michael ----- From cypherpunks at jfet.org Fri Jun 26 13:52:43 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 26 Jun 2009 17:52:43 -0300 Subject: Burn Fat Quick. Let ACAI Berry Help. Message-ID: <000d01c9f6a0$0d846330$6400a8c0@daunted9> Get Thin Easily with Acai Berry Acai Burn is the reason hollywood has been able to stay so slim. take a look http://ynxnxwa.cn From r_burkettvm at concentric.net Fri Jun 26 11:00:01 2009 From: r_burkettvm at concentric.net (Rex C. Burkett) Date: Fri, 26 Jun 2009 18:00:01 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ 5bpj In-Reply-To: <5f4601c9f5a8$a8d4b47c$ef2fde1b@pnwnd85> Message-ID: Dear rsw at jfet.org http://discountcode87628.alliancegrouphealth.at DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode77344.alliancegrouphealth.at http://discountcode18732.alliancegrouphealth.at Generic \/ia/\gr/\ >>very low price Vigr/\ Super Active >>very cheap Ciaalllis >>very low price Ciaalllis Professional >>low price Ciaalllis Super Active >>low price \/ia/\gr/\ Soft Flavored >>low price \/ia/\gr/\ Soft >>very low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode44417.alliancegrouphealth.at We always strive to bring you the cheapest prices 1xa05arzvk- out me now /w.php p From cypherpunks at jfet.org Fri Jun 26 18:17:56 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 26 Jun 2009 22:17:56 -0300 Subject: Get the body you always wanted , Try Acai Berry. Message-ID: <000d01c9f6c5$1a37bb20$6400a8c0@risibleiv4> Lose weight fast with the world's #1 acai berry Free Trial Acai Berry is your ticket to a slim sexy new you.   Visit this second Thank You! best regards Pat Hubbard -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 981 bytes Desc: not available URL: From morrissutherland_iz at bigpond.com Fri Jun 26 16:15:33 2009 From: morrissutherland_iz at bigpond.com (Morris Sutherland) Date: Fri, 26 Jun 2009 23:15:33 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ 5m In-Reply-To: Message-ID: Dear cypherpunks at jfet.org http://discountcode15316.alliancegrouphealth.at DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode43763.alliancegrouphealth.at http://discountcode71736.alliancegrouphealth.at Generic \/ia/\gr/\ >>very low price Vigr/\ Super Active >>very cheap Ciaalllis >>cheap Ciaalllis Professional >>very cheap Ciaalllis Super Active >>very cheap \/ia/\gr/\ Soft Flavored >>low price \/ia/\gr/\ Soft >>very low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode78375.alliancegrouphealth.at We always strive to bring you the cheapest prices a9i9p45a5w- out me now /w.php p From cypherpunks at jfet.org Fri Jun 26 23:00:24 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 03:00:24 -0300 Subject: your special someone will love your new body, try free Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4087 bytes Desc: not available URL: From cypherpunks at jfet.org Sat Jun 27 02:47:01 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 03:47:01 -0600 Subject: Fat Burning Secret Try Acai Berry. Message-ID: <000d01c9f70c$388f1860$6400a8c0@furyosk5> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy Have You heard about the latest weight loss trial?   Click for access Copyright C 2009 Nnjocamwcquagm International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4125 bytes Desc: not available URL: From cypherpunks at jfet.org Fri Jun 26 20:24:31 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 05:24:31 +0200 Subject: Immune system booster Acai Berry, get your free trial now. Message-ID: <000d01c9f6ce$6756d6d0$6400a8c0@reincarnatesex8> If you are unable to see the message below, click here to view.   Dear cypherpunks,Acai diet will deliver results and rid you of your unwated weight. Participate now Subscription InformationYou are receiving this message because you requested it. If you would like to stop receiving all e-mails from Qbiah then please click here to unsubscribe.If you would like to manage all of your Desamuz e-mail newsletter subscriptions, visit the e-mail preferences page.Privacy StatementWe are committed to protecting your privacy. See our privacy policy for additional information. Gktaxrwlyuuyc ¿1999-2009, All rights reserved.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4133 bytes Desc: not available URL: From cypherpunks at jfet.org Sat Jun 27 03:18:19 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 11:18:19 +0100 Subject: Improve your blood curculation , Try Acai Berry. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4164 bytes Desc: not available URL: From gojpp_maigji_maigji_a at bounce3.rm04.net Sat Jun 27 11:08:09 2009 From: gojpp_maigji_maigji_a at bounce3.rm04.net (Ed Werner) Date: Sat, 27 Jun 2009 13:08:09 -0500 (EDT) Subject: ready for your franck muller? Message-ID: <7wjo9zLVpHiD9cYkuJaO6gojpp_maigji_maigji_a@bounce3.rm04.net> Exclusive repl1ca watches collection http://clc.idlkqqo.cn From cypherpunks at jfet.org Sat Jun 27 06:23:34 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 14:23:34 +0100 Subject: Improve Mental Clarity , Try Acai Berry. Message-ID: <000d01c9f722$16d50de0$6400a8c0@gavottesp67> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy Dealing with Stomach issues Try Acai Berry it Reduces constipation, gas, bloating & fatigue   enter here Copyright C 2009 Mynmqsladgnouo International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4151 bytes Desc: not available URL: From cypherpunks at jfet.org Sat Jun 27 07:51:01 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 14:51:01 +0000 Subject: Start your day right, Try Acai Berry. Message-ID: <000d01c9f72e$4eccca10$6400a8c0@algonquinh3> Improve your digestive system with Acai Diet. your first taste of Acai will energize not only your body but stimulate your mind.   A straight click Thank You! best regards Ferdinand Dow -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1001 bytes Desc: not available URL: From sad83_15 at btinternet.com Sat Jun 27 19:55:05 2009 From: sad83_15 at btinternet.com (Erica Roe) Date: Sat, 27 Jun 2009 21:55:05 -0500 (EDT) Subject: breitling rep watch for you Message-ID: Exclusive repl1ca watches collection http://sjd.yjoiouq.cn From cypherpunks at jfet.org Sat Jun 27 06:18:10 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 27 Jun 2009 22:18:10 +0900 Subject: Discover Acai Berry numerous weight loss and health benefits. Message-ID: <000d01c9f729$b7aa9760$6400a8c0@crudestxv408> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy Acai Burns your fat away look and feel great.   visit here Copyright C 2009 Mexdqlgckqctfi International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4087 bytes Desc: not available URL: From orderlyxv88 at nickersonfinancialcorp.com Sat Jun 27 17:48:31 2009 From: orderlyxv88 at nickersonfinancialcorp.com (Luis Honeycutt) Date: Sun, 28 Jun 2009 02:48:31 +0200 Subject: Restore your manhood for yourself,for her and for your love. Message-ID: <000d01c9f781$c6e81470$6400a8c0@orderlyxv88> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4141 bytes Desc: not available URL: From frontieres.finance at laposte.net Sun Jun 28 06:39:31 2009 From: frontieres.finance at laposte.net (Bill Villanueva) Date: Sun, 28 Jun 2009 08:39:31 -0500 (EDT) Subject: bargain rolex watches Message-ID: <0oj87utTDcCEZQowVLBFCSfrontieres.finance@laposte.net> Be your own boss, order Your rolex rep1ica watch http://ycm.yoicdlro.cn From grangej at citizensforabetterbethlehem.com Sun Jun 28 03:50:01 2009 From: grangej at citizensforabetterbethlehem.com (Hugo Swartz) Date: Sun, 28 Jun 2009 12:50:01 +0200 Subject: Every woman can look like a supermodel and we can prove that. Message-ID: <000d01c9f7d5$ce0be2f0$6400a8c0@grangej> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4141 bytes Desc: not available URL: From enumeratessc67 at 1cruiseline.com Sun Jun 28 10:13:48 2009 From: enumeratessc67 at 1cruiseline.com (Fran Carney) Date: Sun, 28 Jun 2009 14:13:48 -0300 Subject: Forget about low spirits and be in a good mood all the time. Message-ID: <000d01c9f813$ccc2b7f0$6400a8c0@enumeratessc67> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4144 bytes Desc: not available URL: From eugen at leitl.org Sun Jun 28 05:57:31 2009 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 28 Jun 2009 14:57:31 +0200 Subject: 25 tbreg relays in directory Message-ID: <20090628125731.GQ23524@leitl.org> ----- Forwarded message from Pei Hanru ----- From ehyurrsq at futureshop.com Sun Jun 28 13:28:04 2009 From: ehyurrsq at futureshop.com (Rosemary Shook) Date: Sun, 28 Jun 2009 15:28:04 -0500 (EDT) Subject: just show your tag heuer watch Message-ID: Be your own boss, order Your rolex rep1ica watch http://gxs.yjooio.cn From harlan.lugo_vd at geocities.com Sun Jun 28 09:02:30 2009 From: harlan.lugo_vd at geocities.com (Harlan Lugo) Date: Sun, 28 Jun 2009 16:02:30 +0000 Subject: \/iagra for only 1.2 per pl11 .Are you ready for bost yours sexL1fe_ 36c0 In-Reply-To: <8bf501c9f62e$32d4b5a5$15e627da@940s9c3> Message-ID: Dear rsw at jfet.org http://discountcode67897.alliancegrouphealth.at DA & CPA Approved Ph/\rm/\cy site VeriSign secured payment site We ship to all countries http://discountcode39395.alliancegrouphealth.at http://discountcode67273.alliancegrouphealth.at Generic \/ia/\gr/\ >>very low price Vigr/\ Super Active >>very low price Ciaalllis >>low price Ciaalllis Professional >>cheap Ciaalllis Super Active >>low price \/ia/\gr/\ Soft Flavored >>low price \/ia/\gr/\ Soft >>very low price We offer all meds . Want somethng ? Ready to boost your SexLife? Positive? It's time to do it now! Order above pi11s at Unbelivable LowPrice http://discountcode53269.alliancegrouphealth.at We always strive to bring you the cheapest prices kk61ea3s09- out me now /w.php p From perry at piermont.com Sun Jun 28 14:48:24 2009 From: perry at piermont.com (Perry E. Metzger) Date: Sun, 28 Jun 2009 17:48:24 -0400 Subject: NIST optimized AES hardware... Message-ID: Apparently, NIST has produced an interestingly optimized design for AES S-box hardware implementations: http://cryptome.org/0001/nist062309.htm Perry -- Perry E. Metzger perry at piermont.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From peihanru at gmail.com Sun Jun 28 05:09:25 2009 From: peihanru at gmail.com (Pei Hanru) Date: Sun, 28 Jun 2009 20:09:25 +0800 Subject: 25 tbreg relays in directory Message-ID: On 2009-04-27 18:27 CST, Scott Bennett wrote: > torstatus currently shows 25 different relays that are all named "tbreq" > and appear to be in China. I wonder whether these are due to some benighted > user restarting tor after clearing its key files every time, or whether there > may be several that are all owned by one organization. All but four are > marked as being "offline". I finally got a plausible answer a few days ago. The short answer is, someone are making use of Tor to do nasty things, and all "tbreg"s aren't aware they are running Tor relays. The long answer. "tbreg" stands for "TaoBao REGistrar". TaoBao is an eBay-like website in China. Some sellers want to quickly increase their reputations (so-called refresh) in order to attract more buyers. The first thing for them is to register multiple accounts. However, TaoBao is rigorous on this, a single IP is only allowed to register one or two accounts. So, someone realize this need and begin to sell softwares which automatically register large number of TaoBao accounts. Tor, together with Privoxy are used as a HTTP proxy to bypass the IP restriction. For some reasons I don't understand, this software will run Tor as a relay. I've downloaded the software and tested, the version of Tor in it is indeed 0.2.1.2-alpha, torrc in it is SocksPort 9050 # what port to open for local application connections SocksListenAddress 127.0.0.1 # accept connections only from localhost ControlPort 9051 Nickname tbreg ORPort 9001 You may test yourself, the download link is http://www.wintaobao.com/download/tbreg_v1.3.8.msi (from http://bbs.wintaobao.com/viewthread.php?tid=135). Finally some random thoughts. 1. We shall be reassured for a moment, these relays won't do much harm to the Tor network. I'm more concerned about the people running these relays, their computers aren't protected at all. But considering the things these guys are doing... well, let it go! 2. Why Tor runs in a relay mode? 3. Should these "tbreg"s be banned from the Tor network? If so, what's the best way to do? Hanru ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From berminghamed at delmar.ca Sun Jun 28 20:53:13 2009 From: berminghamed at delmar.ca (Tania Herrera) Date: Sun, 28 Jun 2009 22:53:13 -0500 (EDT) Subject: bargain rolex watches Message-ID: <65YKWqb3YOzcFIxy90GyZjXPxberminghamed@delmar.ca> Be your own boss, order Your rolex rep1ica watch http://yny.ykjsoqo.cn From cataractuo5 at moorelegalservices.com Sun Jun 28 18:45:17 2009 From: cataractuo5 at moorelegalservices.com (Clayton Scott) Date: Mon, 29 Jun 2009 03:45:17 +0200 Subject: Now you will be able to please every size-queen. Message-ID: <000d01c9f85b$410be220$6400a8c0@cataractuo5> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4149 bytes Desc: not available URL: From errolabbe at rotary-coburg.de Mon Jun 29 03:57:45 2009 From: errolabbe at rotary-coburg.de (Chase Champagne) Date: Mon, 29 Jun 2009 05:57:45 -0500 (EDT) Subject: tag heuer will suit you best Message-ID: Huge choice of Rep1ica watches http://csa.yjkoqoi.cn From wetter47 at echt-toscana.com Mon Jun 29 07:54:44 2009 From: wetter47 at echt-toscana.com (Noah Kendall) Date: Mon, 29 Jun 2009 06:54:44 -0800 Subject: Feeling unneeded in bedroom? We can alter it to the opposite feeling. Message-ID: <000d01c9f8c1$287850c0$6400a8c0@wetter47> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4145 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 29 05:49:28 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 29 Jun 2009 09:49:28 -0300 Subject: Slow down your aging process , Try Acai Berry. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 950 bytes Desc: not available URL: From sib03908 at ms27.hinet.net Mon Jun 29 08:35:12 2009 From: sib03908 at ms27.hinet.net (Winston Norwood) Date: Mon, 29 Jun 2009 10:35:12 -0500 (EDT) Subject: you can wear rolex watch now Message-ID: Be your own boss, order Your rolex rep1ica watch http://osi.acdjie.cn From eugen at leitl.org Mon Jun 29 02:37:39 2009 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 29 Jun 2009 11:37:39 +0200 Subject: NIST optimized AES hardware... Message-ID: <20090629093739.GT23524@leitl.org> ----- Forwarded message from "Perry E. Metzger" ----- From cypherpunks at jfet.org Mon Jun 29 08:23:22 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 29 Jun 2009 12:23:22 -0300 Subject: Don't fear the measuring tape anymore , Acai Berri. Message-ID: <000d01c9f8cd$8a378bd0$6400a8c0@uppercutting309> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy Fast And effective weight loss solutuion, Acai diet available now !   Enter right here Copyright C 2009 Mxuadsoqpvwjio International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4145 bytes Desc: not available URL: From nosierlqh60 at eliseosantillan.com Mon Jun 29 04:25:30 2009 From: nosierlqh60 at eliseosantillan.com (Osvaldo Epps) Date: Mon, 29 Jun 2009 12:25:30 +0100 Subject: A genuine man consists of manliness,stamina endurance,and strength. Message-ID: <000d01c9f8a3$edbd8cb0$6400a8c0@nosierlqh60> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4147 bytes Desc: not available URL: From ptcs at fmr.com Mon Jun 29 13:08:42 2009 From: ptcs at fmr.com (Lance Morin) Date: Mon, 29 Jun 2009 15:08:42 -0500 (EDT) Subject: cartier will suit you best Message-ID: Exclusive repl1ca watches collection http://wjx.camleo.cn From cypherpunks at jfet.org Mon Jun 29 15:56:15 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 29 Jun 2009 16:56:15 -0600 Subject: Safely Boost your energy with Acai Slim, Endorsed by Rachel Ray. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 946 bytes Desc: not available URL: From cypherpunks at jfet.org Mon Jun 29 14:26:13 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Mon, 29 Jun 2009 18:26:13 -0300 Subject: Tight and sexy body in weeks, try acai for free Message-ID: <000d01c9f900$3accdb30$6400a8c0@vastslscx1> If you are having trouble viewing this email, see it on the Web. Unsubscribe | Change Email Address | Update Email Preferences | Privacy Policy #1 Super food , Acai Berry.   Come everyone Copyright C 2009 Lezurqyplyndsx International, Inc.   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4130 bytes Desc: not available URL: From sandoval at braslo.com.br Mon Jun 29 18:06:15 2009 From: sandoval at braslo.com.br (Rosa Dupree) Date: Mon, 29 Jun 2009 20:06:15 -0500 (EDT) Subject: ready for your franck muller? Message-ID: Huge choice of rep1ica R0lex Sports Models http://uyh.idlkqqo.cn From a.sears_fx at t-online.de Mon Jun 29 17:04:41 2009 From: a.sears_fx at t-online.de (Alton Sears) Date: Tue, 30 Jun 2009 00:04:41 +0000 Subject: Cialis ($uper /iagra) at $1.99 per dose bdl7 In-Reply-To: <85a701c9f7eb$41a3ce6c$2630fbe1@mjr3ug1> Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 902 bytes Desc: not available URL: From viewersu75 at lehuit.com Mon Jun 29 15:41:28 2009 From: viewersu75 at lehuit.com (Merrill Torres) Date: Tue, 30 Jun 2009 00:41:28 +0200 Subject: You have a chance to turn back the hands of time and be young again. Message-ID: <000d01c9f902$5c206ed0$6400a8c0@viewersu75> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4148 bytes Desc: not available URL: From piotr.kozlowski at scania.pl Mon Jun 29 23:39:36 2009 From: piotr.kozlowski at scania.pl (Sean Barrow) Date: Tue, 30 Jun 2009 01:39:36 -0500 (EDT) Subject: you can wear breitling watch now Message-ID: Huge choice of rep1ica R0lex Sports Models http://mxd.joyiot.cn From cypherpunks at jfet.org Mon Jun 29 13:32:57 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 03:32:57 +0700 Subject: For a limited time, we're able to offer our visitors a risk free trial of this best acai berry supplement available in the market Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4131 bytes Desc: not available URL: From crystallizeso68 at flyckis.com Tue Jun 30 07:55:35 2009 From: crystallizeso68 at flyckis.com (Julius Minor) Date: Tue, 30 Jun 2009 10:55:35 -0400 Subject: =?koi8-r?B?WW91ciBtYW6ScyAgc3RyZW5ndGggYW5kIGVuZHVyYW5jZSB3aWxsIGJl?= =?koi8-r?B?IHJlbmV3ZWQgYWdhaW4u?= Message-ID: <000d01c9f992$d307b950$6400a8c0@crystallizeso68> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4145 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 30 08:12:17 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 12:12:17 -0300 Subject: If you are struggling and looking for effective ways to drop weight fast Try Acai Berry Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1201 bytes Desc: not available URL: From fiskqc at jnxyt.com Tue Jun 30 05:07:56 2009 From: fiskqc at jnxyt.com (Grant Sterling) Date: Tue, 30 Jun 2009 13:07:56 +0100 Subject: Feeling useless worthless in bedroom? We can change it to different feeling. Message-ID: <000d01c9f973$05351550$6400a8c0@fiskqc> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4136 bytes Desc: not available URL: From eqprc at cablevision.com Tue Jun 30 12:07:12 2009 From: eqprc at cablevision.com (Lydia Elliot) Date: Tue, 30 Jun 2009 14:07:12 -0500 (EDT) Subject: rolex rep watch for you Message-ID: Repl1ca watches in bargain prices http://xbb.ydljioo.cn From cypherpunks at jfet.org Tue Jun 30 14:26:29 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 16:26:29 -0500 Subject: Best Selling Luxury Bags and wallets Message-ID: <000d01c9f9c1$0cbff1c0$6400a8c0@nabisco89>   Present... 2008 Best Selling Luxury Shoes Chanel Sneakers Armani Sneakers Black Sneaker Shiny Come everybody       -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1376 bytes Desc: not available URL: From dserrano_ui at sympatico.ca Tue Jun 30 10:18:48 2009 From: dserrano_ui at sympatico.ca (Dana Serrano) Date: Tue, 30 Jun 2009 17:18:48 +0000 Subject: GOt Meds?V|@gra Soma Diet Pill Many M3ds hFXwDUOQv 8poz In-Reply-To: <6cad01c9f8f0$476ec0f0$f6642bb7@nxuq092> Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 840 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 30 13:34:19 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 17:34:19 -0300 Subject: Get the body you always wanted , Try Acai Berry. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1261 bytes Desc: not available URL: From cypherpunks at jfet.org Tue Jun 30 14:15:29 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 18:15:29 -0300 Subject: Best Selling Luxury Bags and wallets Message-ID: <000d01c9f9c7$e53a9680$6400a8c0@upsides9>   Present... Bags and wallets Black Grey Floral Sneaker Brown Leather Blue Gucci Logo Brown Leather Blue Gucci Logo Enter without knocking       -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1408 bytes Desc: not available URL: From bingham_bs at telia.com Tue Jun 30 12:18:22 2009 From: bingham_bs at telia.com (Gregory Bingham) Date: Tue, 30 Jun 2009 19:18:22 +0000 Subject: NOW save on meds you need! 1w In-Reply-To: <642701c9f705$68beed48$f8970f93@4bnnho3> Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1507 bytes Desc: not available URL: From mcwilliams at erinsystems.com Tue Jun 30 18:05:02 2009 From: mcwilliams at erinsystems.com (Jarred Diaz) Date: Tue, 30 Jun 2009 20:05:02 -0500 (EDT) Subject: ready for your rolex? Message-ID: Repl1ca watches in bargain prices http://hof.dlkoorq.cn From cypherpunks at jfet.org Tue Jun 30 13:43:32 2009 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Tue, 30 Jun 2009 21:43:32 +0100 Subject: Get Healthy easily , Try Acai Berry. Message-ID: <1SGBMDA803097.5B337UINR1542@195.116.43.125.sensorenterprises.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1303 bytes Desc: not available URL: From vignettingjt6 at raidhvd.com Tue Jun 30 14:15:44 2009 From: vignettingjt6 at raidhvd.com (Troy Cano) Date: Tue, 30 Jun 2009 23:15:44 +0200 Subject: A genuine gentleman in bed is always ready. Message-ID: <000d01c9f9c7$edd335e0$6400a8c0@vignettingjt6> About this mailing: You are receiving this e-mail because you subscribed to MSN Featured Offers Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised. Prices and item availability subject to change without notice. �2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 This message was sent from iContact to cypherpunks at jfet.org. It was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscription via the link below. View this message in the iContact Community: View message Comment on this message Receive as RSS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4159 bytes Desc: not available URL: