From lreed at west.cscwc.pima.edu Wed Jul 1 00:58:35 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Wed, 1 Jul 1998 00:58:35 -0700 (PDT) Subject: http://bureau42.ml.org Message-ID: <009C8814.0F703E40.5@west.cscwc.pima.edu> I have been getting a lot of requests from people who want to know how to get more of the manuscripts of the 'True Story of the InterNet' series which is sometimes spammed to the CypherPunks Disturbed Male LISP through my account by some inconsiderate psycho who has no respect for Bob, who asks only that he be given 'space' NOT 'SPACE ALIENS' you stupid fucks!!! try http://bureau42.ml.org Please quit bothering me (except for Attila-I like my sex 'rough', whereas the Author seems toli like hisorher sex 'ruff, ruff'). Linda Lou Reed "If you meet the Author on the road, KILL HIM!!!" From dave at bureau42.ml.org Wed Jul 1 03:16:25 1998 From: dave at bureau42.ml.org (David E. Smith) Date: Wed, 1 Jul 1998 03:16:25 -0700 (PDT) Subject: http://bureau42.base.org In-Reply-To: <009C8814.0F703E40.5@west.cscwc.pima.edu> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 On Wed, 1 Jul 1998, Linda Reed--PCC West Campus CSC wrote: > I have been getting a lot of requests from people who want to > know how to get more of the manuscripts of the 'True Story of > the InterNet' series which is sometimes spammed to the CypherPunks > Disturbed Male LISP through my account by some inconsiderate psycho > who has no respect for Bob, who asks only that he be given 'space' ... > try http://bureau42.ml.org For the love of God, please, don't. That goes over my phone line. Use http://bureau42.base.org/ instead. ...dave -----BEGIN PGP SIGNATURE----- Version: GNUPG v0.3.0 (GNU/Linux) Comment: This is an alpha version! iQEeBAEUAwAGBQI1mgotAAoJEJKCwqQDooIFjcED/R4EPP0jKh3LMJdIm1orYc308Dvl+31v 1nd1poiv+OD2jCNjcSk/CcKnG1+S2WWrMFnhdyGn9MyAzSX44N/v7eota8yNmtrld0JZG91J F+cwkrdZ524qj7HHllerOnitQ2GRef92/3f+Iql6KJkE7gCj0A5cokqgKSiJvIn3Kt85A/0Y WfnvLEyLtmZXT2f/wILQ638r+oHMQ/hZeRxlYxXTpWB4kcqF9xu4NmgPdkjVpAPTf4mwah76 4p4DeBAeBiJbaDoaHbIvioPU7MHipxu1TVq3vocgBXfvEDSMvdNHcQ9eR9WUVe8f1R0yubeB q9/E7Hr2tuCxj9BlT51tLdeuQQ== =Q8mn -----END PGP SIGNATURE----- From lreed at west.cscwc.pima.edu Wed Jul 1 04:04:35 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Wed, 1 Jul 1998 04:04:35 -0700 (PDT) Subject: Anarchy Is Our Only Hope... - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C882E.0B003B20.1@west.cscwc.pima.edu> ~NOTE: If this article is digitally signed, then it is not guaranteed by the Electronic Forgery Foundation to be Genuine FUD. The Electronic Forgery Foundation, as a matter of policy, accepts no responsibility for digitally signed manuscripts which may actually be MainStream News Articles containing factually accurate and officially verifiable lies. Bienfait Nutly News "ANARCH IS OUR ONL HOPE" Christmas Special ***************** by King Author and the Dark&Stormy Knights of the Magic RoundTable [College Station Nudist Colony]IT WAS A STARK NAKED AND COLLEGE dormy night... [Prudential Annex, Alcatraz]JIM BELL STRUGGLED TO HOLD BACK THE small bead of sweat that was beginning to form on his brow as he feigned indifference while the Warden reviewed his application to form a prison swim team... [Oklahoma City]amADbOMBERtObEnAMEDlATER CREPT UNDER THE FENCE surrounding the former site of the Murrah Federal Building. As he placed the explosive charges at strategic points among the rubble, he couldn't shake the feeling that government spin- doctors were already preparing to issue a statement clarifying that BATF agents were absent from the site at the time of the explosion as a result of having moved to new offices, while the innocent children, air-lifted to the sight shortly before the tragic act of terrorism, were part of an educational tour that had been scheduled months previously. He shook off his fears, reminding himself that Louis Freeh, Janet Reno and Michael Fortier had planned everything down to the last detail... [Austin, Texas]THE BARMAID AT THE HEB CENTRAL MARKET CAFE WAS certain that she had seen all of those attending the alleged Austin CypherPunks Physical Meeting in a variety of local theatrical productions over the years. It didn't make sense. Why would someone hire a rag-tag group of actors to impersonate members of an anarchistic, crypto- privacy InterNet mailing list? And who was the strange character from the Bay Area who occassionally attended the meetings? She remembered seeing him at Stanford during the visit of the SexCriminal and his MainSqueeze to convince their daughter, Chelsea, that dating a man who was stalking her father with a Stihl chainsaw could have negative political reprecussions, and that she didn't need that fucking psycho's reassurances as to her sexuality, since daddy also thought she had a great ass, and was not just saying that because she was his daughter. Stanford wasn't the first time she had seen the Bay Area visitor to the CypherPunks meetings. She had also seen him leaving the Texas Book Depository in Dallas, shortly after... Anarchy is our only hope... Lone gunmen and unabombers are Dog's way of telling us, as we stare at a meaningless election ballot, that we could have had a V-8, pretending that we were drinking the blood of a single innocent child we had slaughtered in an act of random violence with an M-16, or in the bombing of TWA-800, or any one of a variety of mind-numbing reminders that we, as well as the cargo on our flight, are just numbers, that can be erased with the stroke of a pen, or a flash of light and a loud bang... Anarchy is our only hope... Face it, the System isn't working... We need to Democratize murder, once again putting it in the hands of the common people. People with wooden or stone clubs; people with Saturday Night Specials; people with knives in kitchen drawers, directly behind the freezer door that their fat, lazy spouse is staring into, wondering which gallon of ice-cream to eat first; people with access to both the drug-cabinet and the maternity ward, who realize that the solution to child-crime is stopping it at its very source... The process of natural selection, which decrees that only the strong AND lucky survive, has been derailed by social and government interference that leads to genocidal policies which mark our fellow humans for deletion on the basis of race, religious and/or ethnic background, political beliefs, ownership of land which has oil or mineral reserves underneath it, use and development of strong crypto, ad infinitum... It used to be that those with strong survival instincts, finding themselves short of funds, could beat up and/or murder a Jew, pulling out their gold fillings in order to make it to their next paycheck. Once government got involved, the average Joe and Jane couldn't hope to compete with the streamlined merger of thousands of ignorant thugs into a single giant bully. It was a step backward for the JesusKillers, as well, since they had a fighting chance against the more ignorant members of the light-skinned races, who didn't realize that it didn't really help for them to hide in dark alleys, as well as members of the dark-skinned races who couldn't resist smiling in the dark when a potential victim approached. Once ethnic discrimination was declared to be a function of government, there was no need for Official Thieves Thugs And Murderers to hide in dark alleys, since they could herd their victims into railway cattle-cars by use of official government brochures promoting Auschwitz as a Health Spa with state of the art shower systems guaranteeing not only hygenic cleansing, but also eugenic cleansing. Those who enquired as to the meaning of 'eugenic cleansing' were told that it would become clear upon their arrival... Anarchy is our only hope... A passage in a work by one of the true literary genius' of the InterNet (whose name I can't remember, but the work was titled, "InfoWar") pointed out a period during which violent crime was rapidly decreasing at the same time that public perception of the rate of violent crime was reaching an all-time high. A parallel poll, commissioned by the People Against Humanity division of the Synics Cociety, revealed that not a single person taking part in the other poll believed themself to be an ignorant, societally programmed moron, incapable of anything beyond sucking up whatever slop MainDream News Farces chose to throw into the public media troughs for consumption by those who believe that the High Cost Of Rational Thought is an unbearable burden that will leave them too poor to add the 24-Hour Drooling And Slobbering Channel to their cable package. Anthropologists specializing in the rise of civilized society have discovered that a solitary recluse living alone in the wild, will, upon drooling and slobbering on HimOrHerSelf, instinctively realize that, if they continue to do so, then the chance of their ever developing the ability to walk upright becomes radically diminished. At the same time, modern research indicates that if test subjects from current society are exposed to pictures of Michael Jordan drooling on his shoes, that manufacturers can add a hundred dollars to the price of their sneakers by adding artificial saliva-stains to them. Anarchy is our only hope... ************************************************************* WE ARE INTERRUPTING THIS PREVIOUSL SCHEDULED BROADCAST TO BEING OU AN IMPORTANT NEWS FLASH The Author, undoubtedly affected by solar flaring reflecting off of the early evening moon, suddenly realized why Leslie Stahl seemed so nervous during last night's '60 Minutes' piece on InterNet FUD, titled, 'The Rumor Mill.' It was not, as he originally suspected, Ms. Stahl psychically picking up on his efforts to peek up her skirt, and was, in fact, not the Scent of a Woman, but the Scent of Fear... Fear that Jane and Joe Sheeple, empowered by InterNet Search Engines capable of catering to their true desires, instead of attempting to mold their desires to fit the hidden agendas of Stahl's CBS controllers, might actually choose to access J. Orlin Grabbe's 'World's 50 Greatest Conspiracies' website, and compare his 'information' with the 'information' provided by '60 Minutes'. Fear that a generation of people who had grown up believing Walter Cronkite when he ended his news casts with "That's the way it is...", would suddenly begin wondering why Wally never told them that Jack Kennedy, their beloved President, was screwing the living shit out of Marilyn Monroe, ending his news cast by making a circle with the forefinger and thumb of his left hand, poking his right index finger back and forth through the circle, and saying, "That's the way it is..." Fear that Marilyn Manson, whining on Public Radio about 'The Rumor Mill' on the InterNet spreading 'lies' and 'disinformation' about HisOrHer tour, would be recognized by those paying attention as being strikingly similar to Ms. Stahl's whining on '60 Minutes' about the 'lies' and 'disinformation' being spread by people who had different beliefs about Reality and Truth than those that she held. Fear that vague hints about "Junk," "Regulation" and "Online Policemen" were not strong enough to truly get her point across, while indulging in violent screaming calling for hanging J. Orlin Grabbe by his hairy balls for disagreeing with her WorldView would only confirm viewer suspicions that she was in the same league, although on a different team, as Marilyn Manson, who believed that some kind of "censorship" was needed, to prevent the ChoirBoys at Ms. Stahl's church from spreading Christian Right lies about HisOrHer tour on the InterNet, while waiting their turn to insert their young, hard, throbbing cocks into a member of the congregation who was a regular correspondent on a major television news magazine show. Fear that the Author, currently working on the development of a forged Leslie Stahl's HomePage, had a 50-50 chance of correctly guessing whether or not she was wearing panties... ************************************************************** WE NOW RETURN OU TO THE REGULARL SCHEDULED BROADCAST ************************************************************** NO WE DONT... ************************************************************** Someone drinking Dirty Mothers wrote the stuff above, last night. Maybe it was me...maybe it wasn't...I woke up with a headache. Regardless, reading today's posts to the CypherPunks list, it soon became apparent that my clever ruse, pretending to be intellectually superior to the other list members, worked! The real purpose of my egoistical diatribe was to ferret out the list members not truly deserving of being on the same list as the rest of us, who are using 11% of our potential brainpower. I knew that the Pretenders to our elitist level of being, being insecure, insecure enough to avoid repeating repeating their words, would accuse *me* of being insecure. Sure enough, the Pretender was exposed, and now we *all* know that the Pretender on the list, whom we are all superior to, is... Nobody! In retrospect, we were fools not to realize it long ago. All of the signs were there... The self-effaceing alias, 'Nobody'. The inability to reflect a CypherPunks Consistent Net Persona. Always posting from different accounts: Juno, Replay, HugeCajones, CypherPunks, Dev.Null... The propensity for taking wildly varying stances on the same issue. Overcompensating for HisOrHer lack of self-worth by always demanding credit for HisOrHer posts, and never posting Anonymously... I was surprised that the rest of the list members never figured it out. I guess I'm smarter than the rest of you... ************************************************************** OK, *NOW* WE RETURN OU TO THE REGULARL SCHEDULED BROADCAST--*REALL*-I *MEAN* IT THIS TIME!!! ************************************************************** ACTUALL, I FORGOT WHAT I WAS TALKING ABOUT, SO I THINK I'LL JUST TR TO EXPLAIN A CONCEPT I WAS THINKING ABOUT ESTERDA, BUT NEGLECTED TO ADDRESS: ANARCH IS OUR ONL HOPE... ************************************************************** Uhhh... I hate to appear to be a fucking idiot, incapable of sustaining a logical train of thought, but I just reached the PointOfEnlightenment that comes around 4 a.m., when one is out of beer and beginning to sober up, and looks at the orange sitting on their desk and sees...an orange! Not the cosmically meaningful macrocosm/microcosm orange that seems to hold the key to the secrets of the universe when one is high on acid. Not the orange with a bit of green-stuff starting to show on its surface when you look at it at the end of another long, hard day at the Salt Mine, whereupon you chastise yourself for letting it go bad before eating it, because your tired, acheing bones remind you that you are living in a cold, hard world. No, it is the orange that both the pragmatist and the mystic see at 4 a.m., about an hour after the last beer is gone, and the liquor store doesn't open for another few hours. The *real* orange... Anyway, 'Anarchy Is Our Only Hope...' is one of those Deep Truths (TM) that are important to attempt to explain to the unenlightened, who quit doing acid in '72, and now have regular jobs. But, Fuck It (TM)! SPACE ALIENS HIDE M DRUGS!!! was always intended to be my autobiography, but somebody else started it (although I'm not complaining, because the FUD generated helped to cover my ass on the original TruthMonger SoftTarget Tour) and I think I have the right to be a little self-indulgent (like it's the first time...right!) and put off finishing the Bienfait Nutly News "ANARCH IS OUR ONL HOPE!" Chrismas Special for a day or so. So I think I'll sink into one of my undermedicated, ill- advised rants about my personal issues, history and problems which only remotely relate to the goals and purposes behind the creation of the CypherPunks list. Unless you have a lot of idle time on your hands, you might just want to go ahead and delete the next chapter of SAHMD, since it will undoubtedly be a semi-coherent, rambling diatribe with little relevance to your life and/or your interests. On the other hand, given my present state of mind, and the fact that I just found a warm beer in the back of my truck, the next chapter may well turn out to be one of those classic works of literature that can only be produced by someone who finds themself in the Desolate Place, an hour after they have finished the LastBeerInTheWholeWorld (like Job), and then is reborn, resurrected, refurbished by the discovery that, not only is there a God AND a Dog, but there is also another beer... Smoke 'em if you got 'em... From stuffed at stuffed.net Wed Jul 1 09:44:44 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Wed, 1 Jul 1998 09:44:44 -0700 (PDT) Subject: Daily News Wed Jul 1 '98 Message-ID: <19980701142321.2253.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 267 bytes Desc: not available URL: From CTIA_Daily_News at um2.unitymail.com Wed Jul 1 09:53:57 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 1 Jul 1998 09:53:57 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 1, 1998 Message-ID: <199807011650.LAA31630@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. ============================================= From jackson at usenix.ORG Wed Jul 1 10:12:10 1998 From: jackson at usenix.ORG (Jackson Dodd) Date: Wed, 1 Jul 1998 10:12:10 -0700 (PDT) Subject: 1998 USENIX Annual Technical Conference - Call for Papers Message-ID: <199807011714.KAA16480@usenix.ORG> USENIX 1999 Annual Technical Conference June 7-11, 1999 Monterey Conference Center Monterey, California, USA For the full call for submissions, see http://www.usenix.org/events/usenix99 Papers due: December 2, 1998 Author notification: January 20, 1999 Camera-ready final papers due: April 27, 1999 Registration materials available: March, 1999 The 1999 USENIX Technical Conference Program Committee seeks original and innovative papers about the applications, architecture, implementation, and performance of modern computing systems. As at all USENIX conferences, papers that analyze problem areas and draw important conclusions from practical experience are especially welcome. Some particularly interesting application topics are: Availability Distributed caching and replication Embedded systems Extensible operating systems File systems and storage systems Interoperability of heterogeneous systems Mobile code Mobile computing Multimedia New algorithms and applications Personal digital assistants Quality of service Reliability Security and privacy Ubiquitous computing and messaging Web technologies TUTORIALS We are also accepting proposals for tutorials. USENIX's well-respected tutorial program offers intensive, immediately practical tutorials on topics essential to the use, development, and administration of advanced computing systems. Skilled instructors, who are hands-on experts in their topic areas, present both introductory and advanced tutorials covering topics such as: System and network administration Java and Perl topics High availability, scalability, and reliability Programming tools and program development Portability and interoperability System and network security Client-server application design and development Sendmail, DNS, and other networking issues GUI technologies and builders WWW and CGI technologies Performance monitoring and tuning Freely distributable software INVITED TALKS The Invited Talks coordinators welcome suggestions for topics and requests proposals for particular talks. In your proposal state the main focus, include a brief outline, and be sure to emphasize why your topic is of general interest to our community. Please submit via email to ITusenix at usenix.org. For the full call for submissions, see http://www.usenix.org/events/usenix99 ==================================================================== USENIX is the Advanced Computing Systems Association. Since 1975, USENIX has brought together the community of engineers, system administrators, and technicians working on the cutting edge of the computing world. For more information about USENIX: 1. URL: http://www.usenix.org 2. Email to office at usenix.org 3. Fax: 510.548.5738 4. Phone: 510.528.8649 From billp at nmol.com Wed Jul 1 14:10:18 1998 From: billp at nmol.com (bill payne) Date: Wed, 1 Jul 1998 14:10:18 -0700 (PDT) Subject: Warning to court clerk Message-ID: <359AA4DA.CCD@nmol.com> Wednesday 7/1/98 2:59 PM John Young I will fax the two sheets from the clerk to you later this afternoon. Morales and I will try to meet on his way home from work to get his signature. http://www.jya.com/sec062998.htm http://www.jya.com/whp063098.htm will likely cause MUCH MORE UNPLEASANTNESS .. for clerks and judges. Let's hope this matter is promptly settled before it gets WORSE. Later bill From schneier at counterpane.com Wed Jul 1 15:49:58 1998 From: schneier at counterpane.com (Bruce Schneier) Date: Wed, 1 Jul 1998 15:49:58 -0700 (PDT) Subject: Security Newsletter from Bruce Schneier Message-ID: <199807012249.RAA08149@mixer.visi.com> I've just started a crypto newsletter: CRYPTO-GRAM is a free monthly email newsletter on cryptography from Bruce Schneier (author of Applied Cryptography, inventor of Blowfish, general crypto pundit and occasional crypto curmudgeon). You can subscribe to CRYPTO-GRAM: on the WWW, at http://www.counterpane.com/crypto-gram.html by sending e-mail to crypto-gram-subscribe at chaparraltree.com In the May issue: The Secret Story of Non-Secret Encryption. The story behind the British claim that they invented public-key cryptography first. Advanced Encryption Standard. How the government is replacing DES. In the June issue: Side Channel Attacks. What's the big idea behind the recent press announcements about breaking smart cards by analyzing the power line? Risks of Key Recovery, Key Escrow, etc. Why implementing a FBI-style key recovery scheme will do more to hurt national security than simply letting people communicate. Other regular features include: News. Links to the interesting crypto stories. War Stories. There are security lessons to learn from all over, not just from computer geeks. Resources. Summaries of the good Web resources on privacy, security, and encryption. We understand and respect your right to privacy. You are receiving this email only because you have demonstrated an interest in the areas of privacy, security and encryption. You should also know that we would not sell, rent or share our mailing list should you decide to subscribe. Our goal is to maintain and develop a relationship of integrity and trust with our subscribers. The members of this list are not for sale. Period. If you have any questions, don't hesitate to contact me. Otherwise, I hope you'll take a moment to subscribe to CRYPTO-GRAM at: http://www.counterpane.com/crypto-gram.html or mailto:crypto-gram-subscribe at chaparraltree.com Regards, Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590 http://www.counterpane.com From lreed at west.cscwc.pima.edu Wed Jul 1 16:07:22 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Wed, 1 Jul 1998 16:07:22 -0700 (PDT) Subject: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C8893.06B8B280.5@west.cscwc.pima.edu> Statist Change - SPACE ALIENS HIDE M DRUGS!!! ______________________________________________ "The more you make change, the more your balance books remain the same." ~ Chevy Change Founder - Saturday Night Live Change Manhatten Bank "Statist Change In The SidePocket - ou Can Bank On It." Delbert McClinton, a paid media informant for a shell of the former Time Bandits, the Nutly Noose, sent me a private email, the contents of which which ethics and propriety forbid me to disclose, although it can be PartyPhrased as, "So why the fuck do you keep sending your goddamn SPAM to the CypherPunks list, you illiterate, drunken asshole?!?!?" The Real (TM) Answer #436-C.2: "Because I'm a CypherPunk, ShitForBrains!!!...!!!" "I don't care what they say about me, as long as they spell my name wrong." ~ Declan McCaulkin Former OldSpiceBoy who recently cut a solo album, "ArmGlue" Declan McCullagh (ever notice that I only get his name right when I'm insulting him?), who used to be an unread, but lightly respected journalist for the Netly News (it is better to remain unread and thought a Tool, than to get a byline and remove all doubt) sold the soles of his shoes to pay the piper, only to discover that his Controllers at Time Magazine, a subsiduary of a fidicuary corporation, Slime, Inc., wholly owned by the MainStream Enquirer (Gyrating Minds Want To Be Snowed) had already paid the 'fiddler', and thus got to NameThatTune, since they were astute enough to realize that the 'original' quote was, "Those who learn from the mistakes of the past, can profitably repeat them." So now Declan, currently only a part-time employee of the CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich- SecretlyControlsTheWholeWorldToBeNamedLater) as a result of being fired as a Cuspected CypherPunks Cpy, but rehired on a consultancy basis to be a Shadow of his former self... Damn...lost my train of thought, again. I guess that's why they don't pay me the BigBucks... Anyway, if Declan had been one of the original coconspirators (sometimes spelled with a hyphen) in the Secret Plot Against The CypherPunks List, instead of a JohnnyComeLately trying to jump on the bandwagon, after believing Jim Bell when he told Declan how great prison food is, he would be aware that a chapter of a previous 'True Story Of The InterNet' manuscript pointed out that a member of an elite group of dribblers who wore green bibs with numbers on them, the CelticPunks, Kevin McHale (if that is his *real* name...), said of a fellow CelticPunks member, Danny Angst, "Sure, he's actually a slobberer, but he's *our* slobberer!" This quote was used to illustrate my point that the late Dr. Dimitri Vulis, KOTM, an IgnorantInsaneInconsiderateIgnoble Asshole, was a 'CypherPunks' IgnorantInsaneInconsiderateIgnoble Asshole (TM). PissAnt Dale Thorn was a 'CypherPunks' PissAnt. Cocksucker John Gilmore was a 'CypherPunks Cock Cucker' (not to be confused with the Criminal Cocksucker of Canada). Statist GuberMint Chill, Kent Crispin, was a 'CypherSpooks' Statist DoubleMint Chill, and a secret member of the Circle of Eunuchs. The veteran elitists on the list accused me of being a elitist neophyte who was bitter over not having received a CecretSypherPunksDecoderRing (TM), but none of this really has anything to do with the point I am trying to make... "When Outlaws are outlawed, only Outlaws will be outlaws." ~ An Inlaw of Billy the Kid (aka-BadBillyG, BadBillyC, Bill Frantz, Bill Stewart, William Geiger III, Bill C. May, etc.) (Anyone complaining about the foregoing not making any sense is obviously hanging around with David Byrne because he is rich and famous, and not because they truly love and understand his music.) Why I Am Spamming The CypherPunks List #A-497-2.3: I am the TruthMonger. The dedication of my life to becoming one with the MadDog- InPossessionOfTheLastFalseSmile resulted in my being forcefully unbriscrived from the Jack Nicholson Fan Club Mailing List, because "THE CAN'T *HANDLE* THE TRUTH!" In loneliness and depravation, I decided to sribvive to the Suicide Mailing List, but it turned out to be just a corporate- sponsored pimple on the butt of the InterNet, created as a means to feature the Nike 'Just Do It' logo. (Besides, there was only one other member on Suicide Mailing List, and she only sent a single post, a suicide note, helping me to realize that she had really belonged on the list, while I was just a rubbernecker. I then subscribed to the AIDS Support List, but was kicked off when they discovered that I didn't have AIDS, and was just there to try and meet women. On advice of legal counsel, and Jerry Falwell, I will refrain from describing my experiences on the Christian Pre-Teen Mailing List, since charges are still pending. Why did I subscribe to the CypherPunks Mailing List? It was the last one...I had been kicked off of all the others. I thought that this time, I might be accepted for who I really pretend to be, since I believed that the other list members would be delighted to know that I had 'broken PGP,' although I couldn't provide any proof of it, at the time. Also, I had just completed work on a totally unbreakable encryption system, although I was hesitant to share details with others, in fear that someone might figure out how it worked, thus compromising the total security it provided. When the rest of the list suckbikers attacked me in fits of RayCharlesRage, I realized that they, like myself, suffered from Tourette Syndrome, and were not just pretending to, like Andrew Dice Clay. I suddenly realized that encryption was a science that had come about as a result of hundreds of years of misdiagnosis of Dyslexia and Attention Deficit Disorder (not to be confused with Federal Deficit Disorder, which causes politicians peering into taxpayer pockets to see a Bottomless Pit). I realized that these people were sick motherfuckers... I was home... If ou Can't Kill The List ou Love, Kill The One ou're On: I have never been fond of the CypherPunks Mailing List, or its subscribers. The list and list members are a constant reminder that I am a mental misfit and a social outcast, chased by the torch-bearing angry mob of decent, law-abiding NetiZensComeLately back to the CypherPunks Cecret Castle, cleverly disguised as a Mailing List. It is indeed a great irony that I, a pretentious interloper on the list, was ultimately responsible for single-handedly rescuing the CypherPunks list from death and oblivion. I know what you're thinking: "Drop the crack pipe, and slowly back away from the keyboard..." But it's True (TM), I swear to Dog. I'm not claiming to be some kind of Hero, or to be Dustin Hoffman, or anything, since it came about quite by accident. At the time of the Legendary CypherPunks Censorship Crisis (not to be confused with the CypherPunks Moderation Experiment), I did everything I could to forment dissent, cause fractious fractal fractures between the list members, shooting and pissing at everyone and everything in sight, even myself, suffering several serious foot-wounds in the process. It was only later, when it became obvious that the CypherPunks list was going to survive, and prosper, and that, in fact, a beautiful Toad had been transformed, by the KissOfDeath, into a plethora of ugly PrincesAndPrincesses, that I realized that the CypherPunks Censorship Crisis had been an attempt to destroy the list, by making it just another bland, everyday imitation of PoliticallyCorrectMasturbation that would make our mothers proud of us, as long as we didn't stain the sheets too badly. In retrospect I realized that I had inadvertently saved the list from a Zombie-like future as just another sidestreet on the Information Highway by using my posts to promote and glorify violent anarchy against reason, common sense, and everything that my mother and father taught me in the hope of saving me from being a bad influence on myself, little realizing that I was actually epitomizing what the CypherPunks Disturbed Male LISP was really about. I realize that I am enclosing myself in an aura of grandoise self-importance once again, since most of the list subscribers fell into the same knee-jerk reactions as I did, even the ones who were calling the loudest for censorship, but doing so by shitting and pissing on the OfficiallyPerceivedTroubleMakers on the list, so, in actual fact, one might surmise that the CypherPunks Mailing List was not so much 'saved' by anyone, as merely confirming itself to be an IndestructibleEntity that would survive as long as their was a single individual on the face of the earth who continued to respond to a perfectly reasonable and valid statement with, "Oh yeah? Sez who?", or a pair of bickering children screaming, "Did so!/Did not!/Did so!/Did not!" Still, I think I deserve a CypherPunksSecretDecoderRing... "Question Anonymity!" ~ Janet Renal Department of Blow Jobs "Why not? Are you 'gay', or something?" [I am going to take a BeerBreak, and give you a chance to check the archives, in order to confirm that the next chapter of SAHMD, which deals with the concepts underlying the formation of the Army of Dog, was first mentioned on the CypherPunks list by Tim C. May, who really did invent everything, including the Wheel (doing it in his sleep), making the rest of us just dirt under his CypherPunks Elitist Feet (TM).] From 8tIBa9867 at thegrid.net Wed Jul 1 21:53:02 1998 From: 8tIBa9867 at thegrid.net (8tIBa9867 at thegrid.net) Date: Wed, 1 Jul 1998 21:53:02 -0700 (PDT) Subject: THE BEST ADULT WEBMASTER PRODUCTS Message-ID: <199807020452.VAA08105@toad.com> UPDATED! DUE TO POPULAR DEMAND WE HAVE A NEW EMAIL ADDRESS FOR YOU TO SEND REQUESTS AND A TELEPHONE NUMBER! (818) 881-2679 THE FIVE HOTTEST ADULT WEBMASTER PRODUCTS PREVIOUSLY OFFERED ONLY NOW TO SELECT SITES CAN NOW BE YOURS AT AFFORDABLE PRICES! BETTER ACT NOW OR YOU LOSE OUT! THE FIRST 20 SITES CAN GET THESE GREAT PRODUCTS: 1. PornholioVision: Over 2000 10 minute Straight Clips, with Full screen option and 3 fps on a 28.8 modem. Includes a search engine and full descriptions of all clips. 2. GayholioVision: Same as Pornholio, except all Gay clips, and descriptions! 3. Voyeur Vision: Over 50 Hidden Camera's with full color cameras inside toilets, looking up at the girls pussy!! also we have gyno cams inside doctors offices, and mall cams inside changing rooms. 4. Cyberfold: A full site dedicated to one model each and every month. Contains over 300 images, 1 hour of video clips, and interactive sections where you tell the girl where you tell the girl what to do with the toys and where to put them. Each month has a different theme, and totally awesome graphics. You can download them yourself, or we can serve them for you. You get 6 issues for the price of 1 this month!!! 5. Guyberfold: Same as Cyber fold but with a Gay film star each month. (this product is designed by gay producers for gay members!!! If you are interested in these hot products, send an email to pornholiodave at youwonthis.com Any problems sending mail, call me at (818) 881-2679 during business hours Pacific Time (California) and tell me what products you would like to see. Tell me your url (http://??) of your website too, please FREE SAMPLES AND FREE TRIALS FOR QUALIFIED ADULT WEBMASTERS. You have seen our products all over the web, and now it's time to get them for yourself. Dave This list has been filtered with the list at http://remove-list.com (a free service to remove your email address permanently from mailings like this). Please excuse the intrusion for this important correspondence. From aqwsc1a at cpckor.com.tw Wed Jul 1 23:55:23 1998 From: aqwsc1a at cpckor.com.tw (aqwsc1a at cpckor.com.tw) Date: Wed, 1 Jul 1998 23:55:23 -0700 (PDT) Subject: Email 57 Million People for $99 Message-ID: <199807013333AAA37317@post.cpckor.com.tw> ��������� 57 MILLION EMAIL ADDRESSES FOR ONLY $99 ������ � You want to make some money? I can put you in touch with over 50 million people at virtually no cost. Can you make one cent from each of theses names? If you can you have a profit of over $500,000.00 ����� That's right, I have 57 Million� Fresh� email addresses that I will sell for only $99. These are all fresh addresses that include almost every person on the Internet today,� with no duplications. They are all sorted and ready to be mailed.� That is the best deal anywhere today !� Imagine selling a product for only $5 and getting� only a 1/10% response.�� That's� $2,850,000� in your pocket !!! Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works !� I will even tell you how to mail them with easy to follow step-by-step instructions I include with every order.� These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD.� This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** THE BRONZE MARKETING SETUP 57,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** THE SILVER MARKETING SETUP 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. $ 139.00 **************************************** THE GOLD MARKETING SETUP VIRTUALLY EVERYTHING!! 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. ������������ AND Over 500 different Business Reports now being sold on the Internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell� information products. AND ...... .. a collection of the 100 best money making adds currently floating around on the Internet. $ 189 **************************************** THE PLATINUM MARKETING SETUP FOR THOSE READY TO "OWN THE NET" 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. ������������ AND Over 500 different Business Reports now being sold on the Internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell� information products. AND ...... .. a collection of the 100 best money making adds currently floating around on the Internet. AND ...... FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!! This is the Number 1 most powerful mass mailing software in the world today. There is nothing that can compare for speed, reliability, performance, and the ability to use "stealth" functions. This is the package that will allow you to use the net as your own personal "money tree" at will!!! $ 379 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! � 1) WE ACCEPT:� AMERICAN EXPRESS OR ��� ������������������������������ VISA <> MASTERCARD ���� TYPE OF CARD� AMX / VISA / MC??_______________ ����� EXPIRATION DATE�� ___________________________ ���� NAME ON CREDIT CARD________________________ ���� CREDIT CARD #________________________________ ���� BILLING ADDRESS ____________________________ ���� CITY_________________________________________ ��� STATE________________ZIP_____________________ �� PHONE INCLUDE AREA CODE___________________ �� ��� EMAIL ADDRESS______________________________ ������� WE WILL BILL selected amount to your account plus the following shipping costs ������� SHIPPING� COST OF 3.85 FIRST CLASS MAIL ������� SHIPPING COST OF� 15.00� 24 HOUR EXPRESS MAIL /� FEDERAL EXPRESS ������� SALES TAX� added to AR residents � >>> Send correct amount in cash, check or money order to: � >>> FIRE POWER!! � >>> 1320 N. "B" St., Suite 112-24 � >>> Fort Smith, AR� 72901 �� 2) Send the same above requested credit card information to above address. �� �� 3) Call phone # 530-876-4293.� This is a 24 hour phone number to place a CREDIT CARD order. FIRE POWER! is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights res From jya at pipeline.com Thu Jul 2 04:26:04 1998 From: jya at pipeline.com (John Young) Date: Thu, 2 Jul 1998 04:26:04 -0700 (PDT) Subject: IE Frees Crypto Message-ID: <199807021125.HAA06437@camel7.mindspring.com> Source: http://go2.guardian.co.uk/paper.html Thanks to IB The Guardian Online, Microfile, July 2, 1998 ANNOUNCING the most liberal national policy yet on the encoding of data sent over the Internet, the Irish government last week showed it has every intention of being an international centre for electronic commerce. Ireland listened to its many resident technology companies, rather than bowing to pressure from the US, which wants access to encrypted messages. Ireland places no restrictions on the use, import or export of encryption products. Individuals can choose to offer a plain text version of the encrypted document or hand over a key, if a search warrant is proffered. The document was released to coincide with the Irish visit of President Clinton�s Internet tsar, senior trade advisor Ira Magaziner, who hinted that his views on encryption diverge from those of his boss. "Within the next year, there�ll be such an availability of high-level encryption that the market will take over," he said. ----- Leads on getting this paper would be appreciated. From declan at well.com Thu Jul 2 07:11:16 1998 From: declan at well.com (Declan McCullagh) Date: Thu, 2 Jul 1998 07:11:16 -0700 (PDT) Subject: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!! In-Reply-To: <009C8893.06B8B280.5@west.cscwc.pima.edu> Message-ID: This is one of the better rants I've read in a while. You left out my Trilateral connection, though. -Declan > So now Declan, currently only a part-time employee of the > CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich- > SecretlyControlsTheWholeWorldToBeNamedLater) as a result of > being fired as a Cuspected CypherPunks Cpy, but rehired on > a consultancy basis to be a Shadow of his former self... From mok-kong.shen at stud.uni-muenchen.de Thu Jul 2 08:58:30 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Thu, 2 Jul 1998 08:58:30 -0700 (PDT) Subject: IE Frees Crypto In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com> Message-ID: <359BAE16.58832781@stud.uni-muenchen.de> John Young wrote: > > Source: http://go2.guardian.co.uk/paper.html > > The Guardian Online, Microfile, July 2, 1998 > > access to encrypted messages. Ireland places no > restrictions on the use, import or export of encryption > products. Individuals can choose to offer a plain text > version of the encrypted document or hand over a key, > if a search warrant is proffered. The document was I have a language problem. Does this mean that the authority depends on the honesty of the individual who hands over a plain text saying that it corresponds to the ciphertext or else how is the intent of the authority to obtain the true plain text to be achieved? M. K. Shen From CTIA_Daily_News at um2.unitymail.com Thu Jul 2 11:04:21 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 2 Jul 1998 11:04:21 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 2, 1998 Message-ID: <199807021753.MAA07657@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. ============================================= From jmcc at hackwatch.com Thu Jul 2 11:14:38 1998 From: jmcc at hackwatch.com (John McCormac) Date: Thu, 2 Jul 1998 11:14:38 -0700 (PDT) Subject: IE Frees Crypto In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com> Message-ID: <359BCD11.30DEF3CD@hackwatch.com> Mok-Kong Shen wrote: > > John Young wrote: > > > > Source: http://go2.guardian.co.uk/paper.html The Guardian article is probably not as good as the real thing :-) and so I've quoted excerpts from it here. The full document is on: http://www.irlgov.ie/tec/html/signat.htm (John, it would be better to quote the actual document on your page as the Guardian article is only a limited view.) Ira Magaziner was in negotiation with the Irish government over this and some meetings were held in secret. I am still trying to get all the facts on this one. � Users shall have the right to access strong and secure encryption to ensure the confidentiality, security and reliability of stored data and electronic communications. � Users shall have the right to choose any cryptographic method. � The production, import and use of encryption technologies in Ireland shall not be subject to any regulatory controls other than obligations relating to lawful access. � The export of cryptographic products is to continue to be regulated in accordance with the relevant EU Regulations and Decisions and Irish national legislation which reflect the Wassenaar Arrangement on Export Controls for Dual-Use Goods and Technologies and Conventional Arms. This one is worrying as the gobshites in the EC are capable of really banjaxing the situation. Since EU Directives are law when they are published, they could well cause a bit of legal conflict. Under EU legislation, at least one of my books could be banned. � In order to enable lawful access to encrypted data, legislation will be enacted to oblige users of encryption products to release, in response to a lawful authorisation, either plaintext which verifiably relates to the encrypted data in question or the keys or algorithms necessary to retrieve the plaintext. Appropriate sanctions will be put in place in respect of failure to comply. This seems to be carefully considered in that the user could be asked to prove the encrypted document contains the encrypted form of the plaintext. But the most important thing is that a search warrant would be required to force the user to give up the plaintext or the key. Surprisingly it could be interpreted so that the user only has to prove the link rather than giving up his or her key. 2. Electronic Signatures � Legislation will be enacted to facilitate the use of electronic signatures through the establishment of a framework for the authorisation of bodies to act as nationally accredited Certification Authorities. This is unusual - could this mean that each Irish citizen would have their own Cert/sig? Everyone who works in Ireland or avails of any state services seems to have an RSI number (just like the SS number in the US). They introduced mag strip cards for unemployment benefits a few years ago. I am currently working on an article about this proposal on crypto and will post it when I finish it. Regards...jmcc -- ******************************************** John McCormac * Hack Watch News jmcc at hackwatch.com * 22 Viewmount, Voice: +353-51-873640 * Waterford, BBS&Fax: +353-51-850143 * Ireland http://www.hackwatch.com/~kooltek ******************************************** -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+ ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3 YXRjaC5jb20= =sTfy -----END PGP PUBLIC KEY BLOCK----- From jya at pipeline.com Thu Jul 2 15:29:31 1998 From: jya at pipeline.com (John Young) Date: Thu, 2 Jul 1998 15:29:31 -0700 (PDT) Subject: Code Wizard Frank Rowlett Dies Message-ID: <199807022229.SAA20296@camel8.mindspring.com> Frank Rowlett, a founder of NSA's National Cryptologic School, has died at 90. The New York Times has an obituary on the "code wizard" today: http://jya.com/nsa-rowlett.htm Rowlett was one of three earliest recruits of William Friedman, head of the the US Army Signal Intelligence Service, a 1930s forerunner of NSA's "massive cryptologic system today" (Kahn). After a long career in Army cryptology Rowlett served with the CIA and was special assistant to the DIRNSA at the end of his service in the 1960s. He is credited with helping to break the Japanese RED and PURPLE codes, efforts unlerlying the Allies World War II MAGIC cryptanalysis system. He was also an inventor, following work of others, of the SIGABA machine, the US Army's version of Hebern's cipher device, and held other cryptologic patents. David Kahn has tart remarks in The Codebreakers about how Friedman, and to a lesser extent, Rowlett, got national awards for work done by others, through "well-situated friends, picayune mechanical differences, and a great but totally irrelevant record." (page 392) From free at church.com Thu Jul 2 16:40:52 1998 From: free at church.com (free at church.com) Date: Thu, 2 Jul 1998 16:40:52 -0700 (PDT) Subject: GIVING AWAY $432,000 ... For FREE ! Message-ID: <199807022340.QAA04430@toad.com> Hello **Note this is not a bulk email. This is sent out to only serious non-profit/profit organizations interested in what we have to offer. My name is Sharon Haley. I am a representative for The INDIANA JONES Corporation. We have created a program that will allow your family, business, church or organization, an opportunity to receive THOUSANDS of dollars Each and EVERY MONTH by simply signing up as a customer to try our service. For FREE... Indiana Jones has joined the 600 Billion dollar Telecommunications Industry. And We will donate up to 8% of our profits to YOU. You could receive $10,000....$100,000....$400,000 Dollars or more EACH and EVERY MONTH If you have a large organization, you could use our program as a Fundraiser to generate Tens of thousands of Dollars or as much as Six Million Dollars ($6,000,000.00) to support your group or research programs for Cancer, Aids, and other good causes. You can also sign-up your business and use this money to support all the events and organizations that you sponsor throughout the year; such as corporate conventions, little league groups, girl scouts, boy scouts and even your local community... the list goes on. We are reuniting families all across the country by donating money to help them get their dreams back, spend more time with their love ones and support their children's education. Many are already using our program to generate funds for their family reunion occasions, anniversaries, weddings and even more... = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Learn How your Family, Business, Church / Organization can receive thousands of dollars month-after-month, year-after-year. There is ABSOLUTELY NO INVESTMENT COST TO YOU. Free...CONTINUOUS REVENUE in 30 days. Visit our website: http://www.indianajonescorp.com/html/unidial-free.html The Indiana Jones Corporation Midwest Corporate Headquarters Portage, Indiana 46368 phone (219) 764-2515 fax (219) 763-2692 From ericm at lne.com Thu Jul 2 16:46:11 1998 From: ericm at lne.com (Eric Murray) Date: Thu, 2 Jul 1998 16:46:11 -0700 (PDT) Subject: IE Frees Crypto In-Reply-To: <359BCD11.30DEF3CD@hackwatch.com> Message-ID: <199807022345.QAA07915@slack.lne.com> John McCormac writes: [about Irish crypto legislation] > > � In order to enable lawful access to encrypted data, legislation will > be enacted to oblige users of encryption products to release, in > response to a lawful authorisation, either plaintext which verifiably > relates to the encrypted data in question or the keys or algorithms > necessary to retrieve the plaintext. Appropriate sanctions will be put > in place in respect of failure to comply. > > > This seems to be carefully considered in that the user could be asked to > prove the encrypted document contains the encrypted form of the > plaintext. But the most important thing is that a search warrant would > be required to force the user to give up the plaintext or the key. It says "lawful authorisation" not "search warrant". That means that sometime later they can go back and pass another law that says that "lawful authorisation" for forcing one to reveal one's plaintext or keys is something much less stringent than a search warrant. Most proposed US crypto regulations have similar weasel-words. -- Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com (email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5 From mmotyka at lsil.com Thu Jul 2 16:59:31 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Thu, 2 Jul 1998 16:59:31 -0700 (PDT) Subject: Finally... a One-Time-Pad implementation that works!!! Message-ID: <359C1F2B.5DF4@lsil.com> Hmmm...good thing we don't step in it... -- .............................. . Michael Motyka . . LSI Logic Corporation . . 5050 Hopyard Rd. Suite 300 . . Pleasanton, CA 94588 . . . . mmotyka at lsil.com . . Voice 925.730.8801 . . FAX 925.730.8700 :) . .............................. From jmcc at hackwatch.com Thu Jul 2 17:04:24 1998 From: jmcc at hackwatch.com (John McCormac) Date: Thu, 2 Jul 1998 17:04:24 -0700 (PDT) Subject: IE Frees Crypto In-Reply-To: <199807022345.QAA07915@slack.lne.com> Message-ID: <359C200A.C113F0BA@hackwatch.com> Eric Murray wrote: > > John McCormac writes: > > [about Irish crypto legislation] > > > > > � In order to enable lawful access to encrypted data, legislation > will > > be enacted to oblige users of encryption products to release, in > > response to a lawful authorisation, either plaintext which > verifiably > > relates to the encrypted data in question or the keys or algorithms > > necessary to retrieve the plaintext. Appropriate sanctions will be > put > > in place in respect of failure to comply. > > > > > > This seems to be carefully considered in that the user could be > asked to > > prove the encrypted document contains the encrypted form of the > > plaintext. But the most important thing is that a search warrant > would > > be required to force the user to give up the plaintext or the key. > > It says "lawful authorisation" not "search warrant". > > That means that sometime later they can go back and > pass another law that says that "lawful authorisation" for > forcing one to reveal one's plaintext or keys is something > much less stringent than a search warrant. > Most proposed US crypto regulations have similar weasel-words. Yep Eric, I think that most people have jumped the gun here on this one. These are not the actual regulations. They are only part of a framework proposal so the eventual legislation could be lightyears removed from these principles. (In fact given that most of the discussions between Ira Magaziner and the Irish government were carried out in secret, I think that the eventual legislation will be riddled with loopholes. Guess we may have become the 51st state and we didn't even know. :-) ) The problem is that most of the journos who wrote about it are relatively clueless on the crypto aspect of things. There was some input from Electronic Frontier Ireland (Irish version of EFF) on the principles so that is a good thing. Regards...jmcc -- ******************************************** John McCormac * Hack Watch News jmcc at hackwatch.com * 22 Viewmount, Voice: +353-51-873640 * Waterford, BBS&Fax: +353-51-850143 * Ireland http://www.hackwatch.com/~kooltek ******************************************** -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+ ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3 YXRjaC5jb20= =sTfy -----END PGP PUBLIC KEY BLOCK----- From lreed at west.cscwc.pima.edu Thu Jul 2 18:20:39 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Thu, 2 Jul 1998 18:20:39 -0700 (PDT) Subject: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C896E.CFA3F8E0.5@west.cscwc.pima.edu> Army of Dog - SPACE ALIENS HIDE M DRUGS!!! ___________________________________________ Bienfait Nutly News "ANARCH IS OUR ONL HOPE" Christmas Special ***************** by King Author and the Dark&Stormy Knights of the Magic RoundTable A Personal Note From An Army of Dog Prisoner Of War: To: remailer-operators at dev.null From: DaltonGang at Dev.Null Since my meatspace body is currently hanging on a federal meathook, my consistent meatspace identity is currently available for those who wish to rent it. Given the high value of the BadReputationCapital currently connected to my consistent meatspace identity, I don't feel I am remiss in requiring both a small monetary remittance to: James Bell #26906086 Federal Detention Center P.O. Box 68976 Seattle WA 98168 as well as Executive Editor credits on any InterNet website or email account that uses my consistent meatspace persona to send threatening letters to goverment agencies, officials and employees, to run Assassination Politics Bots, or to engage in activities which violate the conditions of my parole, including, it seems...breathing. James Dalton Bell "They also serve, who only bend over and wait." -----Pretty Monitored Privacy Public Cell Key----- OuCh#$!tHAthuRts*&^nOOooOnotSAnd!!!OKwhO'SNexT???? -------------------------------------------------- Questionable Quotes #37: "If the Army of God can kill so many people from the Missionary Position, where the risk of transmitting AIDS is comparitively low, then the Army of Dog should be that much more effective, working Doggie Style..." ~The Unknown CypherPunk (aka TCM) CypherPunks Cult of One Bay Area Addition The recent phenomena of the Army of Dog, which has had a long history of never before existing, is rumored by many to be a splinter group of the Circle Of Eunuchs, which had come into existence as a result of an announcement on December 7, 1989, by Bubba Rom Dos, that the existence such a group would be extremely dangerous to those involved, and that everyone assembled should immediately disband and have no further contact with one another. The Circle of Eunuchs, a wholly owned subsiduary of the Magic Circle, headquartered nowhere, has managed to keep their heads, as well as avoid being drawn and quartered, by never really existing. Although consisting of 3-member Gorilla Cells whose manner and method of their use of bananas is totally up to the individuals involved, based on their personal ethics and morals, none of the members can ever really be certain that the CoE actually exists, although it is pretty hard to deny the existence of the bananas, if you have made the mistake of choosing your fellow CoE Gorilla Cell members randomly from ads in the free magazines widely available in San Franciso. The Army of Dog operates much along the same lines, with the major difference being that more of the members choose to act alone, in solitary Cult of One units, with the more moderate members generally requiring reading glasses, while the more radical members eventually go blind. Seasoned warriors, they refuse to ask for pity or sympathy, having only themselves to blame, 'cause momma tried... Questionable Quotes #896: "ou don't have to have a bottle of Mercetan to know which way Janet Reno is blowing." ~JDB BellWeatherMen Cult of One Seattle AboveGround Cell Army of Dog recruits, going one step further than the Army of God members who have so successfully avoided being hunted down like dogs by LEA's around the country, perform many of their nefarious activities on behalf of causes that they have little or no connection to, little or no interest in, and do not necessarily believe in. For example, an Army of Dog Virtual Warrior who is very passionate in their feeling regarding the demonization and persecution of Kevin MitNikita, but who thinks that Jerome Dalton Bell is an asshole who got what he had coming to him, would naturally gravitate toward performing subversive actions which violated the conditions of Bell's parole. (If that AoD Warrior was a minor, they might even be bold enough to join with other minors in small Saskatchewan towns, acting in concert with NineInchNails, knowing they would not have to worry about being tried as an adult, since they could prove that their uncle, the Author, was not even an adult.) On the other hand, a CypherPunks Army of Dog Virtual Warrior, who feels indebted to Jim Bell for the blow jobs while awaiting trial (even though he *did* have to hold a knife to Jim's throat, since Jim was playing 'hard to get'), would perform their subversive activities on behalf of the UnaBomber, who they thought was a fucking lunatic who was better off locked up. (For instance, they might perform a variety of low-key meatspace crimes, such as setting the Dumbarton bridge on fire, just before the UnaBomber's trial, and then notify the President by email that they were ready to step in and take the UnaBomber's place if he was executed. Natually, they would do this from a hacked account...) Questionable Quotes #486: "Give them Flack, John." ~Bob Church of the SubGenius Cult of One Davis-Monathan Division Many Army of Dog recruits are LEA's and paid government informants who tried to infiltrate the AoD, but who got a little carried away and eventually ended up performing some act of meatspace violence so atrocious that they had to quickly find a scapegoat such as Timoth McVeigh, to take the fall. (Although the agent code-named Defcon McCullagh Chainsaw claims he was just there to cover the bombing, in a free-lance assignment for the Oklahoma Nutly News, he has thus far failed to adequately explain submitting a receipt for breakfast with the BATF shortly before the explosion, or why the BATF would be having champagne and caviar for breakfast, saying only, "Eggs is eggs...") Questionable Quotes #8: "I never minded about the little things." ~Bridget Fonda The Author's Secret Lover Cult of One Although both Army of Dog Virtual Warriors and MeatSpace Warriors are quick to point out that sex after plugging a strangers parking meter, or setting off the fire alarm at the local school via modem, is phenomenal, they also point out that it doesn't hurt to have a co-conspirator (sometimes spelled without the hyphen). One Army of Bitch WarriorGoddess, speaking about her long-time relationship with an AoD programmer, said, "Although he starts with a relatively small value of 'c', he always increments it, and sometimes puts it through what seems to be an endless loop." (For the non-computer oriented, that loosely translates as, "He may not touch bottom, but he sure raises hell with the sides.") Questionable Quote #1: "Bite them all, and let the Veteranarian sort them out." ~Rabid WarMongrelBat Marisupial Cult of One If ou Can't Erase The Hard Drive Of The One ou Hate, Erase The Hard Drive Of The One ou're With: 'The Book of Big Mischief' (not to be confused with a much better work, with a similar name), advises that any Army of Dog member who plans to throw a serious, possibly traceable Hex/Screw into the Back(Door) of a government, corporate, religious or social entity/system via the tools of their own workplace, should take great pains to make certain that their office space contains: 1. American Flag 2. Apple Pie (preferrably baked by your mother) 3. Bible (*not* the New Age Aquarian version) 4. "I Love MicroSoft" Stickers 5. Pictures of the President AND Newt Gingrich 6. A Timothy McVeigh Dartboard 7. A Shrink-Wrapped Copy Of CyberNanny 8. An unfinished, hand-written letter to Louis Freeh, stating that you suspect your supervisor of being an anti-government radical. 9. Bail Money Questionable Quote #2-A: "A little Byte goes a long way, particularly if you don't let go." ~Baby TruthMonger Army of Bitch Questionable Quote #2-B: "Something small is going to happen...but it's going to happen a lot of times...July 5, 1998, 07:09" ~The Arthur Army of Dog / Cult of Nun One For ou, One For Me...Two For ou, One, Two For Me: Craperate and Goobermint BeanCounters *do* mind about the little things, but these things are unlikely to come to their attention if the DataEntryOperator and/or the Auditor are Army of Dog recruits. A multitude of mistaken credits to your own account is fraud. A multitude of fraudulent credits to the account of a charitable or subversive organization to which you have no connection is a mistake. If ou Don't Unnerstan Nuthin Else, Understand This: Joe Montana was a Dan Fouts with a front line. General Eisenhower was a General Lee with a front line. Winston Churchill was a Neville Chamberlain with a back door. Censorship Czars aren't afraid of quarterbacks, generals and leaders. They are afraid of men and women in trenches, behind data-entry screens, and people with flashlights, peering into the dark and hidden places. The Enemies of Freedom of Speech are not afraid of someone yelling "Fire" in a crowded theater--that is a StrawDog they use to prevent someone yelling "Fire" before their agents are clear of the Reichstag, or the Murrah Federal Building. Friends of the Destroyer can whack a King, a Kennedy, or a KonspiratorToBeNamedLater, but they can't whack out things they can't see--like concepts, ideals, values and free thought--but they are trying... If the Voices of Kings, Kennedys and Konspirators are not reaching the far walls of the ElectroMagnetic Curtain, and echoing throughout the Tao of CyberSpace, then the Friends of the Destroyer, the Enemies of Freedom, will prevail. The Voice of the Tao Whispers... The Voice of Infinity Thunders... The Voice of Censorship is Silent... The Voice of Freedom is ou! The Most Dangerous Person On Television: ou...the viewer. The Most Dangerous Person On The InterNet: ou...the participant. Anarchy Is Our Only Hope... Army of Dog Prisoners of War: Tim Bell Jim McVeigh Nelson Ghandi Mahatma Mandella Avery Body Elsie Mittnick Human Gus-Peter Free Army of Dog Warriors: Us...except for you and me The rEvolution isn't tomorrow...that will be too late. The rEvolution wasn't yesterday...the battle lines have moved. The rEvolution Is NOW! Questionable Quote #709: "Close ranks, every man for himself!" ~Chief CypherPunks SpokesPerson Army of DoGod, Cult of Nun Anarchy Is Our Only Hope...Together, We Can Make It Happen From hippyman at alltel.net Thu Jul 2 20:38:32 1998 From: hippyman at alltel.net (hippyman) Date: Thu, 2 Jul 1998 20:38:32 -0700 (PDT) Subject: Between A Rat And A Hard Place In-Reply-To: <009C8971.590B87E0.3@west.cscwc.pima.edu> Message-ID: <199807030338.WAA28893@client.alltel.net> At 08:40 PM 7/2/98 , Linda Reed--PCC West Campus CSC wrote: >X-URL: mailto:cypherpunks at cyberpass.net >X-Mailer: Lynx, Version 2-4-2 > > >What are the implications of tossing a moltov cocktail >through the window of banks that require those cashing >checks to be treated like common criminals, being >fingerprinted and having their picture taken, with a >number attached to it? > >What are the implications of a Cult Of One legal system >that pronounces those guilty of treating the individual >as a criminal to be sentenced to a punch in the schnozz? > >What are the implications of refusing to provide a >fingerprint sample, but offering to provide a sperm >sample on the face of the check, in full view of >all the customers who can act as witnesses? > >What are the implications of asking the bank teller >if she minds undoing the first couple of buttons on >her blouse, if you are having a little trouble >supplying the sample? > >If you think _I_ am crazy, then you should have seen >the lunatic in my bank today who acted like a criminal >in order to get them to cash his check, by giving them >a fingerprint--HAA!HAA!HAA! >It used to be that you had to act _honest_ in order to >get a check cashed. > >TroubleMakerMonger Is this bitch just a fucking republican or plain crazy? hippyman ICQ: 11517383 PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A From blkjck at gate.net Thu Jul 2 20:39:35 1998 From: blkjck at gate.net (blkjck at gate.net) Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT) Subject: Win At Blackjack Message-ID: <> "This is a one time mailing, if you are not interested, simply hit 'delete'." Win at Blackjack Fed up at losing your hard earned money in a casino? Fed up with the loser's drive home? Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance? Well learn how to play the game! Give yourself a fighting chance... I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method. Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck! Send $21 and your mailing address to : (Free Shipping): J.R.Nyman 8401 South Wood Circle Apt #13 Fort Myers, FL 33919 Thank you for your time.... From blkjck at gate.net Thu Jul 2 20:39:35 1998 From: blkjck at gate.net (blkjck at gate.net) Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT) Subject: Win At Blackjack Message-ID: <> "This is a one time mailing, if you are not interested, simply hit 'delete'." Win at Blackjack Fed up at losing your hard earned money in a casino? Fed up with the loser's drive home? Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance? Well learn how to play the game! Give yourself a fighting chance... I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method. Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck! Send $21 and your mailing address to : (Free Shipping): J.R.Nyman 8401 South Wood Circle Apt #13 Fort Myers, FL 33919 Thank you for your time.... From nobody at remailer.ch Thu Jul 2 21:22:40 1998 From: nobody at remailer.ch (Anonymous) Date: Thu, 2 Jul 1998 21:22:40 -0700 (PDT) Subject: jeopardize law enforcement and national security objectives Message-ID: <19980703044220.28128.qmail@hades.rpini.com> SKIPJACK Review Interim Report The SKIPJACK Algorithm Ernest F. Brickell, Sandia National Laboratories Dorothy E. Denning, Georgetown University Stephen T. Kent, BBN Communications Corporation David P. Maher, AT&T Walter Tuchman, Amperif Corporation July 28, 1993 (Copyright � 1993) _________________________________________________________________ Executive Summary The objective of the SKIPJACK review was to provide a mechanism whereby persons outside the government could evaluate the strength of the classified encryption algorithm used in the escrowed encryption devices and publicly report their findings. Because SKIPJACK is but one component of a large, complex system, and because the security of communications encrypted with SKIPJACK depends on the security of the system as a whole, the review was extended to encompass other components of the system. The purpose of this Interim Report is to report on our evaluation of the SKIPJACK algorithm. A later Final Report will address the broader system issues. [...] We examined the internal structure of SKIPJACK to determine its susceptibility to differential cryptanalysis. We concluded it was not possible to perform an attack based on differential cryptanalysis in less time than with exhaustive search. [...] SKIPJACK algorithm is classified SECRET NOT RELEASABLE TO FOREIGN NATIONALS. This classification reflects the high quality of the algorithm, i.e., it incorporates design techniques that are representative of algorithms used to protect classified information. Disclosure of the algorithm would permit analysis that could result in discovery of these classified design techniques, and this would be detrimental to national security. However, while full exposure of the internal details of SKIPJACK would jeopardize law enforcement and national security objectives, it would not jeopardize the security of encrypted communications. This is because a shortcut attack is not feasible even with full knowledge of the algorithm. Indeed, our analysis of the susceptibility of SKIPJACK to a brute force or shortcut attack was based on the assumption that the algorithm was known. Conclusion 3: While the internal structure of SKIPJACK must be classified in order to protect law enforcement and national security objectives, the strength of SKIPJACK against a cryptanalytic attack does not depend on the secrecy of the algorithm. From nobody at replay.com Fri Jul 3 00:35:17 1998 From: nobody at replay.com (Anonymous) Date: Fri, 3 Jul 1998 00:35:17 -0700 (PDT) Subject: Beginning of process of decrypting net-nanny files (fwd) Message-ID: <199807030736.JAA07229@basement.replay.com> Article 425292 of alt.religion.scientology: Newsgroups: alt.religion.scientology Subject: Beginning of process of decrypting net-nanny files Date: Thu, 02 Jul 1998 00:28:03 -0700 Lines: 100 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit There are three files with the netnanny, called d32l.dll, n32l.dll, and p32l.dll. These are not really dlls, but are almost certainly the database of words and phrases that the netnanny is interested in. If you look at these files, there is a total of 1037 lines, each of which has from 10 or so to 60 or so characters. It turns out (see below) that two characters in the data file almost certainly map to 1 character of the plaintext, so the phrases are 5 to 30 characters long. 1037 phrases of 5 to 30 characters seems about right. If you look closely at the text, you'll see that they letters alternate between the ranges of 32-63 and 96-127 (decimal). That is, a line begins "1{7}.f#f". The 1, 7, ., and # are all in the range 32-63, and the {, }, f, and f are in the range 96-127. Each of these letters, then, can take one of 32 values, or five bits. If you combine these, you find that there are only 512 combinations used of the pairs of letters, instead of the expected 1024 (=2^10). It turns out that if you construct a 10 bit word with the first 5 bits from the first character and the second 5 from the second character, then you find that the middle two bits are always either both 0 or both 1. So, there are 512 possibilities. These 512 numbers are fairly uniformly distributed, so this is not a simple substitution cipher. Interestingly, though, again, using the above construction of a 10 bit number from the two five bit pairs, you find that the high order bits change very slowly if at all from character to character. This is the beginning of d32l.dll (fair use quotation of two lines from the file) 1101110001 1100110100 1100110011 0011001110 0011110000 0001110101 0010000000 0010000001 0010001111 0011001010 0001000100 0001001101 0000001110 0010000101 0000001000 0111110101 0110110111 0110001111 0111111110 0110000101 0110111110 0110110010 0101110110 0101000010 0101111000 0110001110 0100001110 0100111011 1011000001 1011111000 1011111000 1001110010 1010000111 1010110111 1010001000 1000111000 1011001111 1011111101 1010001011 1010111001 1101000111 1101110101 1100000011 1100110001 1100111111 1111001101 1111111011 1110001001 Note that the middle two bits are always the same, and the high order bits seem to be changing slowly, but slowly upwards. My guess is that some value is being added to the plaintext character, and this value is incremented every plaintext character. Further, perhaps, there is a exclusive or being performed. In any case, I hope that this gets other people moving in the right direction. Suggested words to look for, that seem to have tweaked the nanny, are xenu hemet zinjifar helena kobrin mark ingber grady ward mirele rnewman wollersheim andreas heldal-lund operation clambake "gilman hot springs" motherfucker cocksucker From hippyman at alltel.net Fri Jul 3 00:36:47 1998 From: hippyman at alltel.net (hippyman) Date: Fri, 3 Jul 1998 00:36:47 -0700 (PDT) Subject: #cypherpunks is happening In-Reply-To: Message-ID: <199807030736.CAA12730@client.alltel.net> At 12:02 AM 7/3/98 , you wrote: >On efnet. Nope, it's usually pretty boring. Been there many times when I'm on irc, nothing happening. BUT, if you show up - I can make it interesting!! Logins and passes to play with! Catch me in there. hippyman ICQ: 11517383 PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A From Mia.Westerholm at DataFellows.com Fri Jul 3 05:01:52 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Fri, 3 Jul 1998 05:01:52 -0700 (PDT) Subject: Data Fellows Secures the World's Largest Computer Demo Event Message-ID: <3.0.2.32.19980703131632.00a4a9c0@smtp.DataFellows.com> For immediate release 3 July 1998 Data Fellows Secures the World's Largest Computer Demo Event Assembly '98 Sponsored by F-Secure Data Security Products Data Fellows, one of the world�s leading data security development companies, is proud to support Assembly '98, the world's largest computer demo event. Data Fellows will also maintain data security during the happening. Assembly is an annual computer multimedia event, celebrated in Helsinki, Finland. It gathers amateurs and professionals from all over the world to meet other demo experts and compete in the art of demo making. A demo binds thrilling graphics and animations with massive sound effects to form a multimedia presentation of computer programming. Assembly '98 will be held during 7th - 9th of August 1998 and is expecting 3000 visitors. Prizes worth more than $25,000 USD will be awarded. The F-Secure Anti-Virus product will be used to protect the main file servers of Assembly '98 against viruses. Copies of the product will also be distributed to all participants. The F-Secure Network Encryption products will be used to protect the network traffic of the ad-hoc Assembly network - which is hooked live to the Internet. "Protecting a happening like Assembly is certainly a challenge", comments Data Fellows' Manager of Anti-Virus Research, Mr. Mikko Hypp�nen. "However, we've been co-operating with Assembly organizers all along since 1993, and I'm sure of yet another success." "We do realise that the stereotype of a demo coder and the stereotype of a virus writer are pretty close to each other - both are often male teenagers who are experts with low-level programming." Continues Hypp�nen. "That's why we want to promote a happening like Assembly, which shows these young people a way to use their programming talents in a safe and productive way." More information about Assembly '98 at http://www.assembly.org About Data Fellows Data Fellows is the world's leading data security development company with offices in San Jose, California, and Espoo, Finland. Its innovative, award winning F-Secure product range consists of a unique combination of strong encryption and revolutionary anti-virus software. Data Fellows has a support, training and distribution network covering over 80 countries around the world. Data Fellows is privately held. The annual growth in net sales has been close to 100% since the company was founded in 1988. Data Fellows belongs to an elite group of companies that have a triple-A credit rating from Dun&Bradstreet. For further information, please contact USA: Data Fellows Inc. Tel. (408) 938 6700 Fax. (408) 938 6701 Europe: Data Fellows Ltd. Tel. +358 9 859 900 Fax. +358 9 8599 0599 Also, visit the Data Fellows web site at http://www.DataFellows.com/ ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From nobody at remailer.ch Fri Jul 3 07:40:21 1998 From: nobody at remailer.ch (Anonymous) Date: Fri, 3 Jul 1998 07:40:21 -0700 (PDT) Subject: Lotus Notes signature / encryption Message-ID: <19980703150004.1789.qmail@hades.rpini.com> Hi list members: Could someone kindly tell me about the drawbacks of the Lotus Notes signature / encryption system (export version)? Cheers. From one4evil at juno.com Fri Jul 3 07:52:58 1998 From: one4evil at juno.com (Nalus Optic) Date: Fri, 3 Jul 1998 07:52:58 -0700 (PDT) Subject: Linda Reed--PCC West Campus CSC : Re: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <19980703.104911.10094.0.one4evil@juno.com> I was asked to forward this message to the Cypherpunks list by Linda Reed...Who sent it to me as a responce to one of my e-mails...I know that by doing so, I risk being kicked, stomped, beated siverly amongst the neck and shoulders, and even flamed...But I think so many of us are not looking at the true messages involved in these 'spams'. Reed is makeing several REALLY good points...Given, Reed does rant a bit...And some of what is writen is just so much bullshit...But all of it, taken in context, is Truth (TM)... Let me make a suggestion to Reed and all others involved...There is a time and place for everything...The time for rEvolution, as Reed puts it, is _NOW!_ However, Cypherpunks is not the place...So does anyone know of any good e-lists that would love to get the ALIANS posts? Maybe your five minute's of thought on a way to help Reed will make everyone happy, Vs the hours some of us are spending complaining about the damn thing. D ___________________________________________________________________ ---Begin Forward Message--- The Geezinslaw Brothers, from Austin, TX, had a song called, "If You Think I'm Crazy Now, You Should Have Seen Me When I Was A Kid." I envy today's youngsters, who have the opportunity to participate in a Virtual Revolution that is every bit as serious, and will have consequences just as great as, any so-called World War that has ever been fought in the history of human evolutionary development. I envy them because they have, if they seize the opportunity, a chance to engage in rEvolutionary acts of Virtual anarchy, derring-do, war & violence which will not threaten the lives of those whose only crime is to be in the wrong place at the wrong time, physically, but will threaten only those whose crime is to be in their own mindspace, at the right time for them to be there, but refusing to allow others the same right. I do not pass judgement on Timothy McVeigh, any more than I pass judgement on Che Guerva, Louis Riel, Leonard Pelltier, or Ho Chi Min. They did what they had to do, and they used what they thought was the best judgment and tools of their day. Anyone who claims to judge a moral differnce between them and those they opposed is a fucking BeanCounter, and should be in line behind the lawyers when the firing squads line up. I wish that Timothy McVeigh could have done what he did within the confines of Digital Reality, on the InterNet, perhaps blowing a hole in the ElectroMagnetic Curtain that would allow the children to survive, but also allow them to glimpse what was on the other side of the wall, so that it could not be denied once the hole was closed. That was not to be... [KFor all of the sincere intent underlying my TruthSPAMing and RealityBlathering, I find myself at a loss to truly describe what I see as the importance of those entering the Digital/Global/Interactive Age that is being born to realize that *they* will be the ones who either allow the dinosaurs of the past to usurp the current rEvolution of human development, or to act as the Founding Fathers ojf a Global/Digital Democracy, recognizing that the dinosaurs are wearing red, marching in straight lines, and cussing out the shit-disturbers as cowards for hiding behind Digital Trees known as Remailers. The Great Myth is that there isn't enough to go around. Enough *what*? Money? - There's as much as we agree there is... Time? - I spent a good part of the day sitting on my ass... Love? - I love Janet Reno and Louis Free. They're great targets... Cadillacs? - Any President who proposed to block communism in southeast Asia would have been laughed out of office. It turns out that it would have saved us money and invigorated the auto industry. Cadillacs? - Any President who proposed to block communism in southeast Asia by buying everyone a Cadillac would have been laughed out of office. It turns out that it would have saved the US money and invigorated the auto industry. Freedom & Privacy? - Like Cadillacs, there is as much as we are willing to pay for. We are not going to be able to have it, however, until we are ready to make the giant leap of faith it takes to trust that $30,000 is better spent in promoting Freedom & Privacy, than buying another toilet seat for the Censorship CCoommiittee executive restroom. If there is enough BullShit to go around, then, according to the Eternal Laws of the Tao, there is enough Reality to go around, as well. Those who recognize the Reality that I profess as the TruthMonger might get the impression that I am attempting to hoard the Truth, because their isn't enough to go around. Nothing could be further from the Truth (TM)... I'm willing to share... As a matter of fact, I could use some of yours, since I'm starting to run a bit low, as a result of begining to believe my own press when others indicate that I am something special, because they agree with me, and thus I run the risk of becoming a Spokesperson For Consensus, franchising the TruthMonger persona, and speaking the EasyTruths in order to capture the mass-market when, in reality, I could retire quite comfortably from the income I receive from having Truth (TM) trademarked, since everyone who speaks the Truth (TM) currently has to send me a nickle, or I'll sue their sorry ass... One more beer, and I'll be losing it...so NoMoreMrNiceGuy... The Cold Hard Truth: Truth, Freedom, Privacy, Love, ad infinitum...all have a Cost! The LIE: That which we have an inherent Right to, should be Free! The Reality: Virtual/Conceptual/Idealistic Reality have a physical cost, but they also have spiritual earning power. Humans are both physical and spiritual beings... It 'costs' you $1.00 not to knock someone over the head with a rock when they are standing beside you at a bus stop with a dollar in your hand. Your soul appreciates $1.00 if you refrain from doing so... The choice is yours, and yours, alone. (Although my personal *opinion* as to the ethics/morality of your decision might vary depending on whether or not *I* am the person standing next to you at the bus stop.) I don't know how many soul-credits it cost Tim McVeigh to bomb the Murrah Federal Building, and I don't know how many soul-credits he earned for waking up government employees to the fact that their actions have consequences, as well. That is between Tim McVeigh and his Accountant. There is a Cost to telling the truth, to taking a stand, to refusing to be be oppressed/repressed in Virtual Reality. I have had my possessions confiscated and criminal charges filed against me as a result of speaking what I consider to be the truth, within the confines of CyberSpace. Freely speaking my mind has led to physical retribution against me. I can vouch for the fact that Freedom of Speech has a Cost. I am willing to pay that Cost... I am more than happy to pay whatever price it requires to be the TruthMonger, because that what is important to me. I'm not doing anyone any favors...I am doing what I feel it is my role to do. My definition of a Hero, is a person who does what they can, who fulfills the role that they have the capacity to fulfill. A man who charges a hill, and dies in the process, is a Hero if he does it because he looks around him and sees that it is his role, his time, his destiny. A man who charges a hill, and lives in the process, because of the expectations of others, is a fool. I have seen Heroes who charged the hill because they looked around them and saw Warriors who had families waiting for them, while they had none. I have seen Heroes who charged the hill when they knew it would likely result in their families waiting in vain for their return, because they knew that their actions would result in a dozen families not having to grieve the loss of a loved one. I don't expect todays CyberWarriors to get their asses shot off for thumbing their noses at authority--that is foolish. However, if you're sitting at your desk at the HeadQuarters of the Great Oppressor, and HeOrShe walks in, hands you the latest model of DeathRay, asking your opinio, and you decide to do something very, very foolish...I'll understand. All I'm saying is that Values, Concepts, Ideals, Ethics, all have a cost. Whatever you can contribute in the physical realm to help cover that cost is 100% deductible in the esoteric realm. Andy Warhol prophecied that everyone would receive their fifteen-minutes of Fame, in *his* future. TruthMonger's Prophecy is that, in HisOrHer future, everyone will get a shot at the Great Oppressor. Use it, or lose it... Love, Toto *********************** p.s. - I am currently writing on an early Sperry computer which has 128K of RAM, and can barely run WordPerfect 4.1, and then having to transfer it to Windows 3.0, to clean it up, before sending it to a hacked Unix account and transferring it via a VAX system to its destination. Thus I cannot cc: this without fucking it up, and I would appreciate it if you could send it to cypherpunks at toad.com so that I could download it tomorrow. p.p.s. - I have had a long, hard life, in which I have done some stupid things, some evil things, and some mindless things, but I've also done some things that are beyond fucking belief. Overall, life has been incredible, but I look upon the coming generation with envy, because there is a transition coming that--LOVEorHate/WARorPEACE/WINorLOSE--will give each and every particpant in the experience a chance to exit this mortal plane with a smile, and the words, "It's been Real (TM)." --------- End forwarded message ---------- _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From jya at pipeline.com Fri Jul 3 08:02:49 1998 From: jya at pipeline.com (John Young) Date: Fri, 3 Jul 1998 08:02:49 -0700 (PDT) Subject: FBI Tesla Files In-Reply-To: <199807030022.TAA10819@einstein.ssz.com> Message-ID: Jim, Maybe you know that the FBI offers about 256 pages of docouments related to Nikola Tesla on its FOIA Web site: HTTP://www.fbi.gov/foipa/hisfigs.htm#tesla They are in two large PDF files of 4.8MB and 5.8MB. In case you've not seen them here's a brief: None of the papers are by Tesla himself, and most relate to various inquiries about Tesla's "missing papers," based on O'Neil's book claim that the FBI confiscated Tesla's papers and effects shortly after his death. The FBI claims that it was the Alien Property Office which had Tesla's effects and that the FBI had not been involved. Several focus on Tesla's famous "Death Ray" of the 1940s, with requests for access to the scientific papers on it, or warn of its possible use by foreign enemies. To most the FBI sends a standard disavowal. However, one is of interest: a Feb 1981 inquiry by the Defense Department which stated in a then-classified paragraph: "(C) We believe that certain of Tesla's papers may contain basic principles which would be of considerable value to ongoing research within the DoD." The FBI answers that it never had Tesla's papers but reports that a review of those at the Alien Property Office by an MIT scientific team found that none of the papers contained significant scientific information of national security interest. Yet, the FBI goes on, the Alien Property Office told the FBI in the 1950s that in the only recorded visit to the Tesla archive in January 1943 (shortly after Tesla's death) an unidentified "Federal authority" microfilmed numerous papers, film whose whereabouts the FBI knows nothing. There's a bit more about electronic research at Wright Paterson AFB. And a DoD thank you letter on behalf of Dr. S. L. Zeiburg, Deputy Undersecretary (Strategic and Space Systems). A once-secret 1983 series investigated a claim that Margaret Cheney's biography of Tesla, "Tesla: Man Out of Time," points to national security threats based on allegations of Soviet development of his experiments using papers possibly obtained through his nephew, Sava Kosanovic, a high Yugoslav official. Many pages of Cheney's book marked at threatening passages on the "missing papers" are in the file. From stuffed at stuffed.net Fri Jul 3 08:45:03 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Fri, 3 Jul 1998 08:45:03 -0700 (PDT) Subject: Daily News Thu Jul 2 '98 Message-ID: <19980703111406.19186.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 268 bytes Desc: not available URL: From lharrison at dueprocess.com Fri Jul 3 14:02:20 1998 From: lharrison at dueprocess.com (Lynne L. Harrison) Date: Fri, 3 Jul 1998 14:02:20 -0700 (PDT) Subject: DOT and SSN's Message-ID: <3.0.5.32.19980703170726.007e9170@pop.mhv.net> The Government Has Our Numbers by Lori Patel 4:00am 3.Jul.98.PDT Your banker has it. Your employer has it. Your insurer, the IRS, and, frankly, you can't remember who else has it. So what difference does it make if the US Department of Transportation joins the crowd asking to see your Social Security number? Recently, the department published its intention to require all states to verify Social Security numbers before issuing or renewing drivers' licenses. Depending on who one asks, the significance of this decision can swell or shrink like a top-notch special effect. "Fear of crime and terrorism has caused us to let down our guard against excessive intrusion into the lives of the law abiding. The ease of minor borrowing and the transformation of shopping into recreation has addicted us to credit cards," wrote New York Times columnist William Safire. "Taken together, the fear and the ease make a map of our lives available to cops, crazies, and con men alike." . . . http://www.wired.com/news/news/email/other/politics/story/13441.html From 61w34v at ibm.net Fri Jul 3 16:27:54 1998 From: 61w34v at ibm.net (--Bull*sEye_) Date: Fri, 3 Jul 1998 16:27:54 -0700 (PDT) Subject: No Subject Message-ID: <19943672.886214@relay.comanche.denmark.eu> Authenticated sender is <61w34v at ibm.net> Subject: __Bull*s-Eye-Targeting-Software Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit EMAIL MARKETING WORKS!! Bull's Eye Gold is the PREMIER email address collection tool. This program allows you to develop TARGETED lists of email addresses. Doctors, florists, MLM, biz opp,...you can collect anything...you are only limited by your imagination! You can even collect email addresses for specific states, cities, and even countries! All you need is your web browser and this program. Our software utilizes the latest in search technology called "spidering". By simply feeding the spider program a starting website it will collect for hours. The spider will go from website to targeted website providing you with thousands upon thousands of fresh TARGETED email addresses. When you are done collecting, the spider removes duplicates and saves the email list in a ready to send format. No longer is it necessary to send millions of ads to get a handful of responses...SEND LESS...EARN MORE!!! A terrific aspect of the Bull's Eye software is that there is no difficult set up involved and no special technical mumbo-jumbo to learn. All you need to know is how to search for your targeted market in one of the many search engines and let the spider do the rest! Not familiar with the search engines? No problem, we provide you with a list of all the top search engines. Just surf to the location of a search engine on your browser then search for the market you wish to reach...it's that easy! For instance if you were looking for email addresses of Doctors in New York all you would do is: 1) Do a search using your favorite search engine by typing in the words doctor(s) and New York 2) Copy the URL (one or more)...that's the stuff after the http://... for instance it might look like http://www.yahoo.com/?doctor(s)/?New+York 3) Press the START button THAT's IT!!! The Bull's Eye spider will go to all the websites that are linked, automatically extracting the email addresses you want. The spider is passive too! That means you can let it run all day or all night while you are working on important things or just having fun on your computer. There is no need to keep a constant watch on it, just feed it your target market and give it praise when it delivers thousands of email addresses at the end of the day! Features of the Bull's Eye Software: * Does TARGETED searches of websites collecting the email addresses you want! * Collects Email addresses by City, State, even specific Countries * Runs Automatically...simply enter the Starting information, press The Start Button, and it does the rest * Filters out duplicates * Keeps track of URLs already visited * Can run 24 hours per day, 7 days per week * Fast and Easy List Management * Also has built in filtering options...you can put in words that it "Must" have while searching,...you can even put in criteria that it "Must NOT Have"...giving you added flexibility * Also imports email addresses from any kind of files (text files, binary files, database files) * List editor handles Multiple files to work on many lists simultaneously * Has a Black-Book feature... avoid sending emails to people who do not want to receive it * Built-in Mail program...send email directly on the internet with just a click of your mouse * Personalized Emails...if the email address has the user's name when it is collected,..you can send Personalized emails!!! * Sort by Location, Server, User Name, Contact Name * Advanced Operations: � Email address lists export in many different formats (HTML, Comma delimited, text file) � Advanced editing...Transfer, Copy, Addition, Delete, Crop, Move to Top/Bottom � Operations between lists...Union, Subtraction, Comparison * Program is Passive,...meaning you can run other programs at the same time CALL FOR MORE INFORMATION 213-969-4930 CALL FOR MORE INFORMATION 213-969-4930 ORDERING INFORMATION Customer Name Company Name Address City State Zip Phone Fax Email Address ______ BULL'S EYE SOFTWARE $259.00 Includes Software, Instructions, Technical Support ______ Shipping & Handling (2-3 Day Fedex) $10.00 (Fedex Overnite) $20.00 ______ TOTAL (CA Residents add applicable sales tax) *All orders are for Win 95 and Win NT *****CREDIT CARDS ACCEPTED***** MASTERCARD VISA AMEX PLEASE CALL 213-969-4930 to process your order 9am-5pm Pacific Time Checks or Money Orders send to: WorldTouch Network Inc. 5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036 Please note: Allow 5 business days for all checks to clear before order is shipped. *If you would like your email address removed, please write us at the above address. From twaweb at inet2.twa.com Fri Jul 3 18:05:27 1998 From: twaweb at inet2.twa.com (Trans World Specials) Date: Fri, 3 Jul 1998 18:05:27 -0700 (PDT) Subject: Trans World Specials Fare Sales Message-ID: <19980703202326.12254.qmail@inet2.twa.com> SUPER MILEAGE OFFER Take Advantage of TWA's New Website As a frequent traveler, you're constantly on the go. So we've made it easy to access your Aviators portfolio information via the Internet. Just point your web browser at the all-new TWA website(http://www.twa.com), select "Frequent Traveler Information", and provide your Aviators portfolio number when prompted. You can check your portfolio balance, verify mileage credit, and more. To celebrate our new website, when you use Trans World Access, TWA's online booking system, to book and travel on or before December 31, 1998, you'll earn bonus miles for your round-trip flights. With each round-trip flight, you'll earn an even bigger bonus - up to 15,000 miles in all! 1st Flight - 1,000 miles 2nd Flight - 2,000 miles 3rd Flight - 4,000 miles 4th Flight - 8,000 miles And these bonuses are in addition to all other mileage - actual miles flown, privilege-level bonus and class-of- service bonus. The new TWA website. It's quick, convenient and rewarding. See for yourself at http://www.twa.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ * HOW TO SUBSCRIBE http://www.twa.com/odpairs/ Your email address will not be distributed or sold to any company or organization which is not an Aviators program partner. For information about the Aviators program and its member benefits see our program overview at: http://www.twa.com/frq_trav_info/ft_aviators_prog.html * HOW TO UNSUBSCRIBE Reply to this message and place the word REMOVE in the Subject line. We will promptly remove you from the database. From vjb at gil.com.au Fri Jul 3 19:50:49 1998 From: vjb at gil.com.au (Global Web Builders) Date: Fri, 3 Jul 1998 19:50:49 -0700 (PDT) Subject: One Nation web site temporarily off-line Message-ID: <1.5.4.32.19980704020846.0072baac@mail.ipswich.gil.com.au> Dear One Nation supporter in NSW You will note from my email that I am not using the normal gwb at gwb.com.au address. Last night at about 6.30pm Optus "pulled the plug" on my Internet Service Provider (Pronet) who I have NOW been informed are facing financial difficulties. (I only found out today after making enquiries as to why I could not access my ISP.) This has caused all contact with the "gwb" web sites (which includes One Nation) to be cut off. If you try to contact them you will come up with a "DNS error". I am currently relocating the web site and will be seeking a new ISP who can offer One Nation "the best deal". This will take some time, perhaps a few days, and in the mean time I apologise for any inconvenience. As soon as the One Nation website is up and running I will advise you. Please note that the Internet address will remain the same as it was. In the meantime be assured that One Nation being "off air" is not related to any conspiracy, lack of support from our part or any other misinformation that might be fed to you through the media. As always GWB stands 100% behind Pauline Hanson and her competent team. GWB Scott Balson From mts2 at volg15.mmtel.msk.su Fri Jul 3 22:18:46 1998 From: mts2 at volg15.mmtel.msk.su (mts2 at volg15.mmtel.msk.su) Date: Fri, 3 Jul 1998 22:18:46 -0700 (PDT) Subject: YOUR CLASSIFIED - AD / 333 NEWSPAPERS !!!!!!!!! Message-ID: <199807040527.OAA01790@axp3400.kyungpook.ac.kr> YOUR AD IN 333 NEWSPAPERS !!!!!!!!!! *********************************************** Seven years ago, I learned how to place my Classified Ad in several hundred newspapers, with just one telephone call. And, my cost was $0.51 per newspaper. The total circulation was well over 1.5 Million. I could reach just about any market, anywhere in this country. Since then, my small mail-order company has exploded. And, I use this same time tested and true method week after week. I would like to share this powerful information and show you how to save hundreds, even thousands of dollars on advertising that works. The average cost of a classified ad in a newspaper is about $15.00 to $20.00 dollars. Multiply that by 333 and your total cost is well over $6,000.00 Dollars. By using our amazing method, your total cost is only $170.00. Not to mention the time and money you save by placing one call, instead of 333 long distance calls. You can limit your promotion to a Single State or place your ad in Several States around the country, all with just one phone call. You can reach One Million Readers on the East-Cost today and a Million on the West-Coast tomorrow. It's that simple !!!! Your cost for this priceless information, is only $17.00 !!! You will make that back on your first promotion. WE are so confident that this type of advertising will boost your profits, we will guarantee your satisfaction with our Money Back Guarantee !! So, you have nothing to lose. Now, order our amazing classified ad method today !!!!!! PRINT ORDER FORM Ship To: ************************** ********* NAME____________________________________________ ADDRESS________________________________________ CITY______________________________________________ STATE__________________ ZIP_____________________ E-MAIL__________________________________ Don't Delay, ORDER TODAY!!!!!!! ********************************************************************** Mail Payment $17.00 CASH, money order, or check TO: ******************** INFORMATION, Ltd. P. O. Box 515019 St. Louis, MO 63151-5019 U.S.A. WE will ship your complete KIT directly to you !!!! ************************************************************** OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00 ************************************************************** Thank you for your kind attention, and have a nice day !!! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Admin Internet Services This message is not intended for residents in the State of Washington, screening of addresses has been done to the best of our technical ability. If you are a Washington resident or otherwise wish to be removed from this list, go to global remove site if you want your address removed from future mailing. http://209.84.246.162/remove.htm This Global Communication has been sent to you by: PAVILION INTERNATIONAL SERVICES Offices: London, Paris, Berlin, Hong Kong From may42 at cosimo.die.unifi.it Sat Jul 4 03:05:44 1998 From: may42 at cosimo.die.unifi.it (may42 at cosimo.die.unifi.it) Date: Sat, 4 Jul 1998 03:05:44 -0700 (PDT) Subject: No Subject Message-ID: <19980704832AAA28582@127.23.8.238> 100% ALL TEEN ADULT WEB SITE FREE ACCESS FOR THE NEXT WEEK ONLY !!! http://209.84.246.106/amateur/ CHECK IT OUT TODAY!!!! � From puudio96 at prodigy.com Sat Jul 4 04:35:24 1998 From: puudio96 at prodigy.com (puudio96 at prodigy.com) Date: Sat, 4 Jul 1998 04:35:24 -0700 (PDT) Subject: Earn a NO COST Pentium 266 Computer!! EVERYONE Approved!! Message-ID: <199807044322XAA19326@power.interserver.com.ar> What are YOUR answers to these questions?? Afraid your credit wouldn't allow you to get the computer you want? Have you been wanting a new computer, but were wondering if you can afford it? Do you want to learn more about: ** The Internet ** Your Computer ** Building your own web sites for personal or business use and then selling them for a profit? . but don't want to pay for those costly courses? If you answered YES to one or more of these questions, then this is the opportunity for YOU !! Not only can you indulge yourself with a new computer (regardless of your credit history) and provide yourself with ongoing, online education, you can also earn money doing so!! Sound interesting??? HIT REPLY and ask for more info!!! on this INCREDIBLE opportunity!!!! Or Send Email To goodidea at dreamer.net Everyone is accepted regardless of credit - even people who have filed bankruptcy! Some specific Information on the computer itself... Your "COMPUTER MANIA" package SHIPS WITH: NOW EVEN MORE UPGRADES Microsoft Office 97 Professional (Pre-installed, licensed version, CD Rom Disk Included!!!) 266 MHZ Pentium Processor- Upgraded (from 200 MMX) on All Shipments!!! 64 Meg SD-Ram, 10ns (Upgraded to SD Ram) 4.3 Gig IDE HD - Upgraded (from 2.1 Gig) on All Shipments!!! (4.0+ Gig available after preloaded software) 56k Flex - Fax Modem 24X IDE CD Rom 4 Mb 64 bit SVGA Video (Upgraded from 2 Meg) 16 Bit 3d Stereo Sound (Upgraded to 3D) 80 Watt Amplified Speakers / Headphones / Microphone 512 L2 Cache w/ TX Pro Motherboard 15" SVGA Color Monitor, 1024x768 .28dp Mini Tower Case (Upgraded - Sturdy) 3.5 Floppy Drive Keyboard and Mouse Windows 95 + 70 Software Titles Technical support provided by 1-800 #, by Computer Support Line. ALSO INCLUDES: NEC 1000 printer: 300x300 dpi Single Cartridge Prints B&W and Color Parallel Port Interface WHAT ARE YOU WAITING FOR ? EVERYONE IS APPROVED !! HIT REPLY AND ASK FOR MORE INFO!!! Or send email to goodidea at dream From your_success at global.com Sat Jul 4 05:48:01 1998 From: your_success at global.com (your_success at global.com) Date: Sat, 4 Jul 1998 05:48:01 -0700 (PDT) Subject: FINAL NOTICE! Message-ID: <199807041247.FAA11090@toad.com> This is your WAKE-UP call... ...INTRODUCING "THE BREAKFAST CLUB" A ONE-TIME $39 PURCHASE CAN CONCEIVABLY EARN OVER $100,000 ANNUALLY FOR ANYONE WHO WILL WORK THIS PROGRAM! DID I SAY WORK? HA! ...LET'S CHECK IT OUT!!! What you are holding in your hand is perhaps the most exciting networking opportunity to come down the pike, EVER! There are numerous reasons why this is so, but lets first look at the most obvious.... ... 30 BOXES OF CEREAL FOR $39,00........ The vehicle for this outstanding bargain is a coupon book with 30 vouchers, each good for a box of your favorite Name Brand cereal delivered to your door with no shipping charges. That translates into the lowest price for Brand Name Cereal on the planet! Period!! Couple this with a networking opportunity using the most advanced compensation plan in the industry, namely a 3 X 5 forced matrix with double matching bonus, and it's a can't miss!!!! Here are some other reasons that even for non-networkers spell BIG BUCKS! 1) A $39 one time purchase, one of the lowest in the industry. 2) Product recognition! A product almost everyone in the country is already using, and paying too much for. 3) Mass appeal. Networkers have been searching for years to find a product that would appeal to the masses. Breakfast cereal is as good as it gets! Our own local study showed 65 interested people out of 80 interviews! Many signed up on the spot!!! 4) Finally a product in MLM that offers real savings! The average box of cereal costs over $3 in the store, with many topping the $4 mark. Do the math. With our deal, the price for any cereal delivered to your door is $1.62. Yes, that's right, one dollar and sixty-two cents!! WELL, THERE IT IS... ...I CAN ONLY SAY THAT THIS ONE IS GOING TO GO INTO HYPER-DRiVE IN A BIG HURRY, SO YOU BETTER GET YOUR TICKET AND HANG ON!!! SIGN UP BELOW! ********************************************************* "THE BREAKFAST CLUB" 7267 AIRPORT ROAD BATH, PA 18014 WHAT IS THE "BREAKFAST CLUB"? "The Breakfast Club" is a network marketing company combining a substantial savings on a commodity which, almost all Americans use, with the income potential of network marketing! This commodity is the Breakfast Cereals which we are all familiar with, PRODUCT: The current product is a "Name Brand" cereal coupon book. This coupon book offers "BIG" savings on your favorite cereals. Almost any cereal, delivered to your door with no shipping charge to you, for the low price of $1.62 (this price includes the cost of the coupon and the cost of the postage to send the order, blank for redemption) EVEN CEREAL THAT COSTS OVER $4.00 IN THE GROCERY STORE CAN BE DELIVERED TO YOUR DOOR FOR $1.62 The coupon book contains 30 coupons, each good for a box of name brand cereal. What this means is that this is a guaranteed value of up to $120.00 for the cost of only $39 to you! HOW DO I TAKE ADVANTAGE OF THIS OPPORTUNITY? The answer is simple, as is the entire concept of this program. Just fill in the application / order form and send it with the proper payment to the address above. We will ship your coupon book to you within a few days, and you can send for your first box of cereal. WHAT IS THE COMPENSATION PLAN? Again, the answer is simple. The compensation plan is a 3 x 5 forced matrix, with a double matching bonus feature, The matching bonus is earned when you personally sponsor 3 people, and the double matching feature kicks in when your second level is completed, not necessarily personally sponsored. This means that you would have 12 total people on these two levels in your organization. You would then match the matrix checks, of the three people whom you personally sponsored, and the matrix checks of those who they personally sponsored. There is $1 on each level of the matrix which means that a complete matrix has a potential payout of $363, which is the total number of people. Therefore, the matching bonus feature gives you 3 more matrix payouts, or an additional $1,089 when your personally sponsored people complete their matrix. The double match bonus will give you any number of additional matching checks, based entirely on the number of people that your personally sponsored people sponsor. Note: You match only the matrix payout of your sponsored and their sponsored. You never match a matching bonus! The potential with this plan is awesome. If you follow this scenario you will see that the more people whom you sponsor, and whom they sponsor, will give you matching check after check, with almost no limit if you continue to sponsor. This program could literally pay out over $100,000 on only a $39 purchase. "THE BREAKFAST CLUB" TERMS AND CONDITIONS 1) The price for the coupon book is $39.00. The coupon books are numbered and registered, and tracking goes into effect at first redemption. 2) The accepted form of payment will be by money order only. No personal checks, no credit cards. All payments sent other than money order will be returned. 3) The compensation plan is a 3 x 5 forced matrix, there will be no placement. The computer will fill automatically left to right, based on personal sponsorship. This will allow for significant spillover. 4) This program will be basically a mail-order program. There will be no customer service by phone. Any questions which you may have which are not answered by this document you may address to the Company by mail or by fax. We will respond in the same manner. 5) Since there is no placement, a genealogy report will only be important when you receive a check. You will automatically receive one when a check is cut for you. 6) "The Breakfast Club' will calculate revenue share weekly, and pay weekly. The week shall run from Monday through Saturday, and the revenue share will be calculated on Monday for the previous week's activity.The check will be cut and mailed by Wednesday every week. 7) A check will not be printed until the accrued revenue share is at least $12.00. There will be a charge of $2.00 assessed for each check. This will defray the cost of the check, bank charges, and the cost of the genealogy which will be sent with each check. Therefore, on accrued revenue of $12.00, after the charge, the check will be $10.00. This charge will remain at $2.00 as long as the genealogy is only one page. As your organization grows, the charge will be .50 for each additional page. 8) You will receive complete instructions on how to use the program, and how to order your cereal with your kit. 9) Our refund policy is very simple. We have a revenue share program, so money earned is not commission but profit sharing. This means that if you wish to leave the program at any time within 90 days, the following rules apply: a) The coupon book must be in salable condion, with NO coupons missing. b) The book registration fee and shipping is NOT refundable, totaling $9.00. Refunds will be $30.00 only. c) If you have been paid any revenue share money, that will be deducted also. If you have been paid more money than the cost of the book(s), there will be no refund. d) After 90 days, there is no refund. 10) There will be company sponsored conference calls. Times and phone numbers will be announced when you receive your kit. I 1) You must sign and return this "Terms and Conditions' document with your application/order form. 12) I have read and fully understand the terms and condtions of "The Breakfast Club." SIGNED____________________________ DATE________________ ******************************************************* "THE BREAKFAST CLUB" "CEREAL FOR LESS" ORDER FORM 7267 AIRPORT ROAD BATH PA 18014 FAX 610 837-1589 NAME:_________________________________________________ PHONE #_______________________________________________ STREET________________________________________________ CITY_____________________ STATE_______ ZIP____________ YOUR SS#__________________ (needed for ID#-cannot issue checks without it) SPONSORS NAME: Front Desk Marketing SPONSORS ID#: 11151 WE ACCEPT MONEY ORDERS ONLY OTHER FORMS OF PAYMENT WILL BE RETURNED PLEASE INDICATE QUANTITY OF BOOKS ORDERED BELOW. (please refer to rules and regulations.) REMIT AS FOLLOWS: QTY _____ NAME BRAND CEREAL COUPON BOOK(S) @$39.00 EACH (includes S&H & book registration fee) TOTAL AMOUNT OF MONEY OPDER $_________ IMPORTANT: MONEY ORDERS SHOULD BE MADE PAYABLE TO: THE BREAKFAST CLUB BRIEF LIST OF CEREAL BRANDS OFFERED: GENERAL MILLS, KELLOGG'S, POST, QUAKER OATS, AND RALSTON COMPLETE LISTS WILL BE INCLUDED WITH YOUR CERTIFICATE ORDER -------------------------------------------------------- REMEMBER 3 CERTIFICATE BOOKS ARE THE MAXIMUM NUMBER OF BOOKS FROM WHICH YOU CAN BE ACTIVELY REDEEMING CERTIFICATES AT ANY ONE TIME. ------------------------------------------------------ THERE ARE 75 CEREALS TO CHOOSE FROM PLUS YOU MAY WRITE IN A SELECTION NOT LISTED AND THE REDEMPTION CENTER WILL TRY TO ACCOMODATE YOUR REQUEST. INCOME OPPORTUNITY OFFER REMINDER DON'T FORGET, TO SHARE THIS OPPORTUNITY WITH OTHERS AND RECEIVE AN ON-GOING INCOME FROM THEIR PURCHASES YOU MUST INCLUDE YOUR SOCIAL SECURITY NUMBER ABOVE. PLEASE REMEMBER, WE ACCEPT MONEY ORDERS ONLY AND YOU MUST SEND IN BOTH FORMS: 1. ORDER FORM WITH YOUR $39.OO MONEY ORDER 2. A �SIGNED� TERMS AND CONDITIONS FORM MOST COMMONLY ASKED QUESTIONS ABOUT "THE BREAKFAST CLUB" Q. How can anyone deliver breakfast Cereal to your door for this price? ($1.62) A. The cereal is merely a vehicle for advertising. With the cost of direct mail advertising skyrocketing, and the readerslip relatively low for what is considered by most to be junk mail, this method of lost leader marketing is extremely desirable. Because people are waiting for their cereal, and they will be looking for their next order blank, the readership of the piggy-back advertising in the box is very high. Due to this fact, advertisers are willing to pay handsomely for this type of direct mail program. Q. Is that why I can only use one coupon at a time, and must wait for my cereal to arrive before I can order again? A. Yes. The advertising would do little good for anyone, nor could the cost of the loss leader be amortized if too much of the advertisers material should go to the same address in too short a time. Q. Wasn't this program tried before, like around two years ago? What happened to it then? A- Yes, it was tied in late 1995 into early 1996. The firm that was behind the concept did not anticipate the overwhelming response which they received. Coupled with the fact that they did not have the advertising dollars in place that they represented, collapse was inevitable. Q. Why is it any different now? A. The Company that is running this campaign is fully aware of the importance of keeping up with the demand. So much so, in fact, they have already put the data processing in place to scan the coupons into the system instead of waiting until they are overwhelmed. Also, and more importantly, they have the contracts in place from many advertisers to offset the cost of delivering the cereal. In other words, they have enough advertising dollars to cover the cost of every delivery. Q. What about the network marketing part of this program? Does "The Breakfast Club" have control, or will there be competition? A- Not only does "'The Breakfast Club" have an exclusive network marketing contract, but we will be collaborating with The Majestic Group, owners of the cereal book, on future books. There is a very bright future ahead for our distributors. Q. Why is there no telephone customer service provided by "The Breakfast Club" for its distributors? A. It boils down to one word, COST! This is not a high ticket, and until other products are ready to offer to the distributor base, we must control the expense of operation. This is not a complicated business, and most questions can be answered by this document. However, we anticipate that there could be questions that we can not answer to a distributors satisfaction here, so we will answer questions either by fax, mail or on a live conference call which will be conducted one hour each day, Monday through Friday. The number and time for this call is at the end of this document. Q. The compensation plan is a 3 x 5 forced matrix with a "double matching bonus" feature. What is a double matching bonus and how does it work? A. Double matching bonus simply means that you match the matrix checks earned by the people whom you sponsor personally, and those who they sponsor as well. This, of course, depends on your reaching the criteria which determine whether or not you will earn matching and double matching bonus. Q. What is the criteria to earn matching and double matching bonus, and how does it fit into the marketing plan? A. The criteria for matching and double matching bonus is really very easy to understand, and not difficult to attain. In fact, the entire marketing plan is so simple you could explain it on a napkin in a restaurant. Here it is in a nutshell...... you sign up and purchase a coupon book for Name Brand Cereal. You personally sponsor 3 who do the same and you qualify for matching bonus. Fill your second level, a total of 9 more people, whether or not they are your personally sponsored, and you now qualify for double matching bonus. Just by signing up and making your first purchase of a coupon book for $39, you are entitled to a revenue share of $1 per level, for each of 5 levels of purchasers just like yourself A 3 x 5 matrix has the potential when full to hold 363 customers, which will pay $363. Now here is where the fun starts. For every person whom you personally sponsor into the program you will match every revenue share check which they are paid, provided that you sponsor a total of 2 distributors personally. That means that if they fill their matrix, you will earn an additional check of $363. Here is the best part! If your personally sponsored distributor goes out and sponsors any number of other people, providing you meet the criteria for double match, you will be paid a revenue share equal to whatever they are paid, even if it is 5, 10, 50 or 100 people. This means that you can make many times the value of a full matrix in this program by sponsoring only 1 person who goes out and sponsors ma! ny!! Do the math. Awesome! Q. When will checks be issued? A. We will caculate weekly, and pay revenue share weekly. The week will begin on Monday, and end on Friday. Checks will be cut and mailed by Wednesday every week. Q. Why is there a charge for issuing checks? A. Again the answer is COST. Because of the sheer number of checks which we anticipate sending out, we must make allowance for this expense. Remember, this is a low cost program with a relatively high revenue share potential. Consequently we will only send checks when they have calculated to be at least $12. After deducting the $2 check charge, we would be sending a net of $10. Also, since there will be a genealogy sent with every check, this charge will help cover it as well. Note: the charge will remain $2 as long as the genealogy is only one page. It will be an additional .50 for every page after the first. Q. Are we required to sign and send in the "Terms and Conditions" document? A. Yes, The terms and conditions of our program will be upheld, and it is important that you agree to them in writing or your application will not be accepted. Note: the newer application has a disclaimer which states that you have read and agree to the terms and conditions. This will allow someone to fax an application to a third party before they send in the actual signed document to the Company. Q. What about our identification number for sponsoring purposes? A. We will use your Social Security Number as your temporary ID# A new number will be issued to you and sent with your book. Our program can identify you either with your temporary number or your company issued number, so you can sponsor even before you actually receive your new number, LOOK FOR YOUR ID# ON YOUR ADDRESS LABEL AND ON YOUR WELCOME LETTER. 1) No applications will be accepted without the signed terms and conditions document, unless a new form is used and the disclaimer is signed. 2) No applications will be accepted if all the information is not present to allow proper entry into the computer system. Any applications received with incomplete information will be returned to sender. We are not mind readers nor are we omniscient. Also, applications which are illegible will be returned. We will not guess what is written on them. 3) Since there is no placement in this program there will be no orphan file created by placement problems. However, there could be occasions when someone sends in an application expecting their sponsor to do likewise, but he or she does not. We will hold the appplication for 5 business days, and if the sponsor application does not materialize, we will return the orphan application back to the sender. 4) Another situation which could sometimes happen is mail being lost. Here again, if the sponsor application does not arrive within 5 business days, we will be forced to return the orphan application. 5) We will always attempt to answer all questions in a timely and diligent fashion. However, we anticipate rapid growth and understand that there will be times when we cannot. We encourage you to get on the conference calls, or turn to your upline whenever you need information that you carmot get from the Company. 6) We will absolutely not tolerate any misrepresentation of our products or our program from any distributor. This will be grounds for immediate termination and loss of any revenue share. 7) Whenever we are about to release a new product into the matrix, we will notify everyone at least a month before. This notification will be as an announcement in your check envelope, with your cereal delivery, or as a fax on demand document. 8) Revenue share will only be paid on a product if you yourself own it. In other words, as we release different products into the matrix, if you do not own that product, you will not earn revenue share on it from downfine purchases. Remember, it is not a requirement to own all our products, but it will be your decision as to whether or not you wish to earn additional revenue share based on the new products, 9) You may note that on your genealogy reports, persons whom you sponsored yourself may show up as being sponsored by someone else. That is not a mistake in the program! In order for the computer to place people in the matrix, it must assign sponsorship. This does not take sponsorship away from you, but is merely the way in which the computer builds the matrix. When this occurs, you now become the enroller, which keeps the credit for personal sponsorship with you, where it belongs. GOOD LUCK AND SEE YOU AT THE TOP! From lreed at west.cscwc.pima.edu Sat Jul 4 06:34:50 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 4 Jul 1998 06:34:50 -0700 (PDT) Subject: CypherPunks CensorShip Crisis II - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C8A9E.8996F560.3@west.cscwc.pima.edu> Beyond The Valley Of The Planet Of The Return Of The Son Of The Uncle Of The Mother Of All Censorship Crisies II SPACE ALIENS HIDE M DRUGS!!! _____________________________ * To: cypherpunks at toad.com * Subject: Linda Reed--PCC West Campus CSC : Re: Army of Dog SPACE ALIENS HIDE M DRUGS!!! * From: one4evil at juno.com (Nalus Optic) * Date: Fri, 3 Jul 1998 10:49:09 -0700 * Sender: owner-cypherpunks at Algebra.COM I was asked to forward this message to the Cypherpunks list by Linda Reed...Who sent it to me as a responce to one of my e-mails...I know that by doing so, I risk being kicked, stomped, beated siverly amongst the neck and shoulders, and even flamed...But I think so many of us are not looking at the true messages involved in these 'spams'. Reed is makeing several REALL good points...Given, Reed does rant a bit...And some of what is writen is just so much bullshit...But all of it, taken in context, is Truth (TM)... Let me make a suggestion to Reed and all others involved...There is a time and place for everything...The time for rEvolution, as Reed puts it, is _NOW!_ However, Cypherpunks is not the place...So does anyone know of any good e-lists that would love to get the ALIANS posts? Maybe your five minute's of thought on a way to help Reed will make everyone happy, Vs the hours some of us are spending complaining about the damn thing. [Gnat From The Author: As the Author, We personally believe that should forcefully unsubscibe itself from the CypherPunks Distributed Node Mailing Lists, since it is the website which the Author is currently using to read the list posts. As well, We feel that Linda Reed should take steps to block her email account from being sent to any site on the InterNet, as it is being used, with or without her consent, to generate UCE/SPAM. In addition, We feel that all CypherPunks Distributed Node Mailing List members should forcefully unsubscribe themselves from the lists, as spammers, since it is enevitable that there is someone on the list who considers their posts irrelevant, off-topic, or SPAM, at one point or another. In the future, the Author would be happy to provide a filtered version of the CypherPunks Distributed Node Mailing List which would be distributed freely to all CypherPunks whose non-union dues are currently paid up to date. The filtered version would contain complete copies of all posts routed through the current CypherPunks Distributed Mailing List Nodes, without any deletions or censorship, in accordance with CypherPunks Goals and Traditions. For a slight extra fee, the Authors would also be happy to provide special, Enhanced Editions of the CypherPunks Filtered Mailing List: 1. ASCII Art Edition: Containing classic reprints of Timmy C. Mayonnaise ASCII-Art SPAMS, complete with Forged Digital Signatures of Dr. Dimitri Vulis, KOTM, along with a Certificate of Genuine Authenticity Digitally Signed with the Electronic Forgery Foundation's Pretty Lousy Privacy Key. 2. Censorship Crisis II Edition: Offers the convenience of recreating the original posts for and against censorship of the CypherPunks list, substiuting the names, email addresses and digital signatures of current list members, saving list members hours of rehashing old issues, while maintaining the emotionally volatile atmosphere regarding an argument that is logically ridiculous to argue about in the first place, given the nature of the CypherPunks list. !!!PLUS!!! As An Added Bonus: (At No Extra Charge!) * A complete pro-censorship and anti-censorship thread dealing specifically with the SPAMing of SAHMD chapters to the CypherPunks list, with each post written and autographed the the Author HimOrHerSelf! * A Classic Collection of past posts by both legendary and long-forgotten CypherPunks, quoting and misquoting the "Doomed to Learn From the Mistakes of the Past" (or whatever) quote.(A 5MB package, by itself, alone!) * A Superb Collection of Lame-AND/OR-Offensive Posts categorized under such headings as UNSCRIBIBVE, LAME, RACIST, CHILDISH, 'I BROKE PGP!', 'NEW UNBREAKABLE ENCRPTION ALGORERHTHM', , RE: , STUPID, AOL, 'I THINK WE SHOULD ALL SEND TEN COPIES OF THIS POST BACK TO DIMITRI', and one of the all-time favorites of many Veteran Elitist CypherPunks List Members, 'TEST'. 3. Pre-Checked Archive Edition: Each post is marked with a special flag to indicate whether or not the post is duplicative of a subject discussed, or a point made by, Tim C. May at some time in the history of the CypherPunks list, as well as a flag indicating whether or not the post agrees with Mr. May's past theories and views, so that they can be efficiently deleted in order not to waste the reader's time with BadInformation, one way or the other. Those pre-dating their orders for an Enhanced Edition of the Author's Filtered CypherPunks Mailing List to December 7, 1989, or forging Tim C. May's digital signature to their order, will receive copies of Nalus Optic's coming post to list, whining about how HisOrHer original post *NEVER* called for censorship, Tim C. May's future reply that this is obviously the work of that asshole, Toto, again, Robert Hettinga's future post that he *loves* this list, another post from Tim C. May, obviously forged by Toto, saying that he can't find his shoes *or* his goddamn dentures, and a variety of future posts from various list members stating: "Just ignore him." "Don't you people have delete keys?" "Happy Fourth of July!" "I'm putting Toto back in my KillFile!" "I never took him out of mine, I just read his posts by accident when I read all of the posts in my KillFile, to make sure I'm not deleting anything important." "" "Have a good Labor Day!" "Unscrrvive" "Unrivcribe cypherpunks " "Unsvribe cypherpunks" "Uncribive cypherpunks" "Unsrivribe " "Merry Chrismas Everybody!" "Take me off this goddamn list!" "TAKE ME OFF THIS LIST! I MEAN IT!!!" "Happpy Holidays and a Happy New ear" "Please take me off this list, ok? Please, somebody?" "OK OU ASHOLES! IM GOING TO KEEP THIS UP UNTIL OU..." DISCLAIMER: The Author is in no way implying that those who do not wish to take advantage of this tremendous offer are not free to just contine their involvement in the Cypherpunks list and use methods of subscribing and posting pretty much the same as they did before deleting this offer without reading it. However, HeOrShe reserves the right to bill all who receive this offer the full amount of the CypherPunks current non-union dues, if this offer is not returned to the CypherPunks mailing list they received it from, in it's original condition, with full message headers, within thirty minutes or less of its original posting.] From billp at nmol.com Sat Jul 4 12:58:21 1998 From: billp at nmol.com (bill payne) Date: Sat, 4 Jul 1998 12:58:21 -0700 (PDT) Subject: NSA , FBI, and Sandia labs - and stolen weapons Message-ID: <359E887A.6EDB@nmol.com> Saturday 7/4/98 1:20 PM Laszlo Baranyi I read http://www.qainfo.se/~lb/crypto_ag.htm I will look in my files for a paper published in the Association of Computing Machinery authored by G. J. Simmons on the COVERT CHANNEL. Then e-mail you an exact reference. Information FORCED on me by Sandian James Gosler funded by NSA was about the COVERT CHANNEL. Similar to what I read at http://www.aci.net/kalliste/ricono.htm Gosler made the point to us that the 'black hats' could spike a device, either through hardware or software. A 'white hat' group could not discover how the covert channel worked [was spiked]. Gosler later wanted to assign me to an NSA project. I refused. I would not sign the required papers - which effectively makes the signer give up their civil rights. See http://www.qainfo.se/~lb/crypto_ag.htm RIGGING THE GAME" Baltimore Sun, December 10, 1995. This article can be ordered on-line http://www.sunspot.net/archive/search/ for details what NSA requires employees to sign. Sandia reassigned me to break electronic locks for the FBI. http://www.fbi.gov/ and http://www.fbi.gov/fo/nyfo/nytwa.htm I attach results, which the FBI blieves is SECRET/NSI, on how to counterfeit Wiegand wire access credentials funded by the FBI. Perhaps the following quotation and reference might be valuable to you. Spy agencies are also dabbling in hacker warfare. The National Security Agency, along with top-secret intelligence units in the Army, Air Force, has been researching ways to infect enemy computer systems with particularly virulent strains of software viruses that already plague home and office computers. Another type of virus, the logic bomb, would remain dormant in an enemy system until a predetermined time, when it would come to life and begin eating data. Such bombs could attack, for example, a nation's air-defense system or central bank. The CIA has a clandestine program that would insert booby-trapped computer chips into weapons systems that a foreign arms manufacturer might ship to a potentially hostile country - a technique called "chipping". In another program, the agency is looking at how independent contractors hired by arms makers to write software for weapons systems could be bribed to slip in viruses. "You get into the arms manufacturer's supply network, take the stuff off-line briefly, insert the bug, the let it go to the country," explained a CIA source who specializes in information technology. "When the weapons system goes into a hostile situation, everything about it seems to work, but the warhead doesn't explode." weapons may be even more exotic than computer viruses. Los Alamos National Laboratory in New Mexico has developed a suitcase-sized device that generates a high-powered electromagnetic pulse. Commandos could sneak into a foreign capitol, place the EMP suitcase next to a bank and set it off. The resulting pulse would burn out all electronic components in the building. ... [TIME, August 21, 1995, by Douglas Waller] The US was super-concerned when stinger missiles, AFTER THE US GAVE THEM TO THE AFGHANIS, that the stingers might be used against the US. So the idea is to spike weapons so that the US remains in ELECTRONIC CONTROL - if physical control is lost. There are, of course, hazards in powering-up a stolen foreign weapon. My wife Patty [Implementing Basics : How Basics Work William H. and Patricia Payne / Published 1982 http://www.amazon.com]and I were in Zurich in April 1997. I spoke to Hans Buehler on the phone from the airpont. Buehler gave me ideas on how to get my case settled TOO. I JUST WANT MY MONEY AND OUT OF THIS MESS! http://www.jya.com/sec062998.htm Best. And I look forward to reading more about what you discover. bill http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html Coauthor Lewis in the above is one of my former MS and PhD students in computer science. http://www.friction-free-economy.com/ Counterfeiting Wiegand Wire Access Credentials Bill Payne October 16,1996 Abstract Wiegand wire access credentials are easy and inexpensive to counterfeit. Access Control & Security Systems Integration magazine, October 1996 [http://www/securitysolutions.com] published the article, Wiegand technology stands the test of time by PAUL J. BODELL, page 12 Many card and reader manufacturers offer Wiegand (pronounced wee-gand) output. However, only three companies in the world make Wiegand readers. Sensor Engineering of Hamden Conn., holds the patent for Wiegand, and Sensor has licensed Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, Germany, to manufacture Wiegand cards and readers. ... A Wiegand output reader is not the same thing as a Wiegand reader, and it is important to understand the differences. In brief, Wiegand reader use the Wiegand effect to translate card information around the patented Wiegand effect in which a segment of a specially treated wire generates an electronic pulse when subjected to a specific magnetic field. If the pulse is generated when the wire is near a pick-up coil, the pulse can be detected by a circuit. Lining up several rows of wires and passing them by a cold would generate a series of pulses. Lining up two rows of wires - calling on row "zero bits" and the other "one bits" - and passing them by two different coils would generate two series of pulses, or data bits. These data bits can then be interpreted as binary data and used to control other devices. If you seal the coils in a rugged housing with properly placed magnets, and LED and some simple circuitry, you have a Wiegand reader. Carefully laminate the special wires in vinyl, and artwork, and hot-stamp a number on the vinyl, and you have a Wiegand card. IN THE BEGINNING Wiegand was first to introduce to the access control market in the late 1970s. It was immediately successful because it filled the need for durable, secure card and reader technology. Embedded in the cards, Wiegand wires cannot be altered or duplicated. ... Bodell's Last statement is incorrect. Tasks for EASILY counterfeiting Wiegand wire cards are 1 Locate the wires inside the card to read the 0s and 1s. 2 Build an ACCEPTABLE copy of the card. Bodell's clear explanation of the working of a Wiegand card can be visualized zero row | | | one row | | binary 0 1 0 0 1 representation Solutions to Task 1 A X-ray the card B MAGNI VIEW FILM, Mylar film reads magnetic fields ... Edmunds Scientific Company, catalog 16N1, page 205, C33,447 $11.75 is placed over the top of the Wiegand card. COW MAGNET, Cow magnetics allow farmers to trap metal in the stomachs of their cows. Edmunds, page 204, C31,101 $10.75 is placed under the card. Location of the wires is easily seen on the green film. Mark the position of the wires with a pen. Next chop the card vertically using a shear into about 80/1000s paper-match-sized strips. Don't worry about cutting a wire or two. Note that a 0 has the pen mark to the top. A 1 has the pen mark at the bottom. Take a business card and layout the "paper match"-like strips to counterfeit the card number desired. Don't worry about spacing. Wiegand output is self-clocking! Tape the "paper-match - like" strips to the business card. Only the FUNCTION of the card needs to be reproduced! History Breaking electronic locks was done as "work for others" at Sandia National Laboratories beginning in 1992 funded by the Federal Bureau of Investigation/Engineering Research Facility, Quantico, VA. The FBI opined that this work was SECRET/NATIONAL SECURITY INFORMATION. Details of the consequences of this work are covered in Fired Worker File Lawsuit Against Sandia Specialist Says He Balked When Lab Sought Electronic Picklock Software, Albuquer Journal, Sunday April 25, 1993 State-sanctioned paranoia, EE Times, January 22, 1996 One man's battle, EE Times, March 22, 1994 Damn the torpedoes, EE Times, June 6, 1994 Protecting properly classified info, EE Times, April 11, 1994 DOE to scrutinize fairness in old whistle-blower cases, Albuquerque Tribune, Nov 7 1995 DOE boss accelerates whistle-blower protection, Albuquerque Tribune, March 27, 1996 DOE doesn't plan to compensate 'old' whistle-blowers with money, Albuquerque Tribune September 27, 199 From stuffed at stuffed.net Sat Jul 4 19:52:34 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sat, 4 Jul 1998 19:52:34 -0700 (PDT) Subject: Daily News Fri 3 Jul '98 Message-ID: <19980705021020.20755.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 268 bytes Desc: not available URL: From stuffed at stuffed.net Sat Jul 4 23:49:38 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sat, 4 Jul 1998 23:49:38 -0700 (PDT) Subject: Daily News Sat Jul 4 '98 Message-ID: <19980705043205.15645.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 268 bytes Desc: not available URL: From mgraffam at mhv.net Sun Jul 5 05:51:13 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Sun, 5 Jul 1998 05:51:13 -0700 (PDT) Subject: corvette/BXA Message-ID: For all those watching the watchers, BXA recently changed their configuration. corvette.bxa.doc.gov is now known as jade.bxa.doc.gov. The IP addresses are different, but look at the configuration.. looks like they just swapped two machines: $ ftp corvette.bxa.doc.gov Connected to corvette.bxa.doc.gov. 220-Proxy first requires authentication 220 jade FTP proxy (Version 2.0) ready. Name (corvette.bxa.doc.gov:anonymous): $ ftp jade.bxa.doc.gov Connected to jade.bxa.doc.gov. 220-Proxy first requires authentication 220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready. Name (jade.bxa.doc.gov:anonymous): Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "..the isle is full of noises, sounds and sweet airs that give delight and hurt not. Sometimes a thousand twangling instruments will hum about mine ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest" From rj5d at geocities.com Sun Jul 5 06:13:00 1998 From: rj5d at geocities.com (rj5d at geocities.com) Date: Sun, 5 Jul 1998 06:13:00 -0700 (PDT) Subject: Llama al exterior a mitad de precio Message-ID: <13579305_69336672> 05/07/1998 You can read de same message in Spanish at the bottom Ud. puede leer el mismo mensaje en Castellano donde finaliza en ingles. LLamadas al exterior hasta 80% m�s baratas y gratis a los 0800 ======================================================================== This FREE software as opposed to the other products, allows the user to call a normal telephone anywhere in the world realizing fantastic savings. ======================================================================== You call toll free numbers in the United States or Canada from anywhere in the world, free. This software is the newest technological breakthrough in telecommunications that makes possible long distance calls from your computer to any telephone in the world. We are the representatives of a software that is worldwide leader and uses the most advanced Internet telephony system available today by a long shot. Most communications applications over the Internet, allow voice and even video transmittal, require that both the originator and the recipient of the call have fast, multimedia-ready computers, connected to the Internet at the same time and running the same communications software. Products like Net Meeting and Internet Phone are very sophisticated, but are not telephony applications. You can call anywhere in the world by means of a multimedia computer and a Dial-up Internet service. The call is initiated from your computer after you connect to your Internet Service Provider (ISP) and is then transmitted through the web into a telephony central switch in the US. The switch instantly and automatically completes the call via the US public telephony network and through it reaches its final destination. The result is a real-time call, uninterrupted and full-duplex. What are the benefits? It reduces the cost of long distance calls by as much as 95% or even 100% when dialing into a toll-free (1-800 or 1-888) number in the US and Canada. For more information please refer to our home page at: http://members.tripod.com/~rksistemas and http://www.visitweb.com/rksistemas Rates are completely independent from the country of origin of the call. In fact, all calls originate in reality from the US, signifying that World Wide users will actually call the world using US rates, currently the most competitive in the world. Any telephone in the world may be called via a computer and a modem. This renders PC to PC technologies useless since they require both users to be connected to the Internet, have multimedia computers, the same software running and meet in the same place at the same time. Visit us and download free the software at: http://members.tripod.com/~rksistemas and http://www.visitweb.com/rksistemas or send your mail for questions to rksis at geocities.com Thanks ===================================================== SPANISH VERSION - SPANISH VERSION - SPANISH VERSION - ===================================================== LLamadas al exterior hasta 80% m�s baratas y gratis a los 0800 �Como funciona ?��� usalo y ahorr� � El destinatario no tiene que estar usando su PC sino que llam�s directo a su tel�fono. Cualquier usuario de Internet, con una computadora multimedia, puede iniciar llamadas desde su PC a cualquier tel�fono del mundo pero con tarifas que son incre�bles. � Esto no es la charla por voz en Internet. No hay que ponerse de acuerdo ni nada,� disc�s con la PC y listo, as� de f�cil suena el tel�fono de quien est�s llamando. ------------------------------------------------------- ADEM�S LLAM�S GRATIS A TODOS LOS 0800 DE EE.UU Y CANAD� ------------------------------------------------------- Baj�te el software gratuitamente, prob�lo y ya que est�s consult� todos los servicios que ofrecemos http://members.tripod.com/~rksistemas y de http://www.visitweb.com/rksistemas Podes tener "privacidad en tus llamadas",� porque a donde sea que llames, en nuestro pa�s s�lo queda registrada la llamada local a tu proveedor de Internet, y la llamada se origina desde EE.UU. a la tarifa m�s competitiva del mercado. La tecnolog�a de este software incorpora los m�s recientes avances t�cnicos en materia de comunicaciones. Para realizar una comunicaci�n a cualquier lugar del mundo, te conect�s a tu proveedor de Internet y mediante el software (que lo podes bajar gratuitamente�de nuestra Web) te conect�s a un servidor en Nueva Jersey y este, de manera autom�tica e instant�nea entrega la llamada a la red p�blica de tel�fonos de los Estados Unidos. El destinatario no necesita tener una conexi�n a un proveedor de Internet Para vos es tan simple que disc�s en la pantalla usando el software y se llega al destino final, el tel�fono marcado. El resultado es una llamada en tiempo real, full-d�plex (doble v�a: hablo y escucho a la vez) entre dos personas. Debido a que la se�al es enviada por el Internet en el primer tramo del trayecto, hasta llegar a la central, las tarifas se vuelven�independientes del pa�s de origen.� Consult� los productos y servicios que ofrecemos y bajate el soft gratuitamente y probalo desde http://members.tripod.com/~rksistemas y de http://www.visitweb.com/rksistemas Por consultas: e-mail: rksis at geocities.com Gracias. From stuffed at stuffed.net Sun Jul 5 18:08:51 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sun, 5 Jul 1998 18:08:51 -0700 (PDT) Subject: Daily News Sun Jul 5 '98 Message-ID: <19980706000211.443.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 268 bytes Desc: not available URL: From Yours at HCHY.Now.com Sun Jul 5 18:10:28 1998 From: Yours at HCHY.Now.com (Freedom) Date: Sun, 5 Jul 1998 18:10:28 -0700 (PDT) Subject: Freedom Is Not Free! -PBKF Message-ID: <199807060110.SAA03549@toad.com> FREEDOM REQUIRES MONEY!! I know what you are thinking "Another one of those Scams!" Well guess what? You're Wrong! Have you ever invested in the stock market, gone into business for yourself, made a friendly wager on a game or played the lottery. I think that most of us have gambled on one thing or another. This is so easy! This is truly the easiest and most effective way of making money I've ever seen! YOU HAVE SO LITTLE TO LOSE AND SO MUCH TO GAIN! Please print this and read it carefully. You'll be glade you did! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This is a , LOW-COST,PHENOMENON. PRINT this letter, read the directions, THEN GET STARTED TODAY! You are about to embark on the most profitable and unique program you may ever see. Many times over, it has demonstrated and proven its ability to generate large amounts of CASH. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail and go to the bank! This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter, and your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly... 100% OF THE TIME! Thousands of people have used this program to: Raise capital to start their own business Pay off debts Buy homes, cars, etc., Even retire! This is your chance, so read on and get started today! --------------------------------------------------------- ------------------------- OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM ---------------------------------------------------------------------- ------ ------ Basically, this is what we do: We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (via your computer). The products in this program are a series of four business and financial reports costing $5.00 each. Each order you receive via "snail mail" will include: $5.00 cash The name and number of the report they are ordering The e-mail address where you will e-mail them the report they ordered. To fill each order, you simply e-mail the product to the buyer. The $5.00 is yours! This is the EASIEST electronic multi-level marketing business anywhere! FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE BENEFITS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the person whose name appears on the list next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF ANY MAIL PROBLEMS! When you place your order, make sure you order each of the four reports. You will need all four reports so that you can save them on your computer and resell them. Within a few days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. 2. IMPORTANT�DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than is instructed below in steps "a" through "f" or you will lose out on the majority of your profits. Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. ( I talked to a friend last month who has also done this program. He said he had tried "playing" with it to change the results. Bad idea.... he never got as much money as he did with the UN-altered version. Remember, it's a proven method! a. Look below for the listing of available reports. b. After you've ordered the four reports, take this advertisement and remove the name and address under REPORT #4. This person has made it through the cycle and is no doubt counting their 50 grand! c. Move the name and address under REPORT #3 down to REPORT #4. d. Move the name and address under REPORT #2 down to REPORT #3. e. Move the name and address under REPORT #1 down to REPORT #2. f. Insert your name/address in the REPORT #1 position. Please make sure you copy every name and address ACCURATELY! 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the INTERNET! Advertising on the 'Net is very, very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is e-mail lists. You can buy these lists for under $20/2,000 addresses or you can pay someone a minimal charge to take care of it for you. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! ------------------------------------------ AVAILABLE REPORTS: ------------------------------------------ *** Order Each REPORT by NUMBER and NAME *** Notes: - ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT CHECKS NOT ACCEPTED ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL Make sure the cash is concealed by wrapping it in at least two sheets of paper On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and � your name & postal address. PLACE YOUR ORDER FOR THESE REPORTS NOW: _______________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: MS 3919 BETHEL BLVD. HOUSTON, TEXAS 77092 _________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI- LEVEL SALES" ORDER REPORT #2 FROM: JD 311 SOUTH STATE RD. 301 BLUFFTON, INDIANA 46714 _____________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: GS 3939 S. HARRISON STREET FORT WAYNE, INDIANA 46807-2417 _____________________________________________________________________ > REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: SAM P.O. BOX 13492 CHESAPEAKE,VA 23325-0492 _____________________________________________________________ HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$: Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on you're first level. (Placing a lot of FREE ads on the Internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level�your 10 members with $5............................................$50 2nd level--10 members from those 10 ($5 x 100).....................$500 3rd level--10 members from those 100 ($5 x 1,000)............$5,000 4th level--10 members from those 1,000 ($5 x 10,000)...$50,000 THIS TOTALS: $55,550 Remember friends, this assumes that the people who participate only recruits 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT! Your cost to participate in this is practically nothing (surely you can afford $20). You obviously already have an Internet connection and e-mail is FREE! REPORT#3 shows you the most productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors even work on trade! About 50,000 new people get online every month! ******* TIPS FOR SUCCESS******* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. Be patient and persistent with this program. If you follow the instructions exactly, your results WILL be SUCCESSFUL! ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! ******* YOUR SUCCESS GUIDELINES******* Follow these guidelines to guarantee your success: If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! ******* T E S T I M O N I A L S ******* This program DOES work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS!!! Paul Johnson, Raleigh, NC The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program... 11 months passed then it came...I didn't delete this one!...I made more than $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM! NOW IS THE TIME FOR YOUR TURN! DECISIVE ACTION YIELDS POWERFUL RESULTS !! DO IT TODAY AND YOU WILL SEE!! From awzoie at ixleic.com Sun Jul 5 19:46:13 1998 From: awzoie at ixleic.com (awzoie at ixleic.com) Date: Sun, 5 Jul 1998 19:46:13 -0700 (PDT) Subject: YOUR INDEPENDENCE DAY ARRIVES IN 90 DAYS!! Message-ID: <199807060241.AA20526@althea.ucs.uwplatt.edu> Are you interested in making a substantial part-time income working from the comfort of your home on your computer, never having to speak to anyone? What if I told you this business only required one hour or less of your time each day? And if you knew that you could secure your financial independence in the next 3-6 months, would you be interested? I THOUGHT SO! Listen to this... If you have seen the chain letters that abound on the internet, you might think this is just another one of them. Well, surprise! It is NOTHING like them! This program incorporates powerful marketing concepts that will make you HUGE amounts of money using an information product that is actually useful, unlike useless "reports" that are promoted in chain letter scams. If making up to $100,000 or more in the next 6 months interests you, read on... "I'm Buying The Home of Our Dreams With CASH From The Proceeds I Received After Reading This Email!" Hello! My name is Marilyn Potter; I'm a 32 year-old wife, mother of two and a part-time medical transcriptionist. Normally I delete all "junk" email immediately when I receive it and use my email account primarily for my business that I do at home. I received a similar email numerous times over the past 2 years and deleted it every time. I again received this email four months ago and since it had a catchy title I finally read it. The concept was so compelling that I finally said, "OK, I give in. I'll give this a try. Investing $40 is something I can afford and the chance to make some serious money would certainly not hurt either!" I mailed four $10 bills right away and after receiving all four chapters of the informative "CREDIT SECRETS REVEALED" book, I paid a friend of mine a small sum of money to email my ad to 20,000 people. The person who sent me the first chapter of the book also sent me a message that showed me how to market this valuable information with my computer for free. I was hardly prepared for the results! For the past 90 days I have received more money than I have made in the past 5 years combined. The cash continues to roll in and at times I have to pick up my mail from the window at the post office because it won't fit in the medium-sized post office box I rented! And the cash just continues to flood my mailbox! My husband Jeff and I have been saving every penny over the past 7 years to purchase a new home for our family with a large downpayment. Well, we now have enough money to purchase the home of our dreams with CASH! We are also going to spend a MONTH in Hawaii to celebrate! I owe it all to this incredible program that I finally decided to try after deleting it so many times. I promise you, if you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did. You don't need to be a whiz at the computer, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank. Take the time to read this so you'll understand how easy it is. If I can do this, so can you! Don't Delay, Start Living Your Dreams TODAY!! Marilyn Potter The following is a copy of the e-mail I read: ******************************************************** THIS IS THE VERY LATEST AND MOST PROFITABLE MONEY-MAKING PHENOMENON YOU WILL EVER SEE. Do NOT mistaken this for the many chain letter SCAMS that you may have seen lately. This program offers VERY VALUABLE information in addition to the chance to make more money than you have ever seen before! Read this email carefully and then print it out for reference. Follow the simple directions and get started TODAY! With this new program, your financial dreams can come true. Are you sick of living paycheck to paycheck? Would you like to be able to go on vacation wherever and whenever you like? Does getting up on Monday morning without the stress of running off to work to a job that you dislike make you want to hear more about this business? Your dreams CAN come true but you MUST take action in order for your life to change. This COMPLETELY LEGITIMATE, LOW COST business can put you in the driver's seat financially for life. Don't waste another minute living your life for other people. Start TODAY living it for you and your family. What's even better, this business NEVER requires you to talk to or come in contact with anyone and allows you to work from the privacy of your own home. No more deadlines to meet! No more worrying if your boss will still like you and keep you on his payroll for another month. All you need to do is to go to the post office and pick up your money every day and then take it to the bank! THAT'S IT!! No hard work and you can feel good because you are providing VALUABLE information that EVERYONE NEEDS!! This business is automatic and keeps money rolling in even if you are not working at it. What could be better? It is so simple to start and doesn't require you to train anyone. This initial email does all of that for you! When followed correctly, this electronic, multilevel marketing program works perfectly... 100% OF THE TIME! Thousands of people have used this program to: Buy houses for CASH Pay off DEBT Put large downpayments on new homes Finance existing businesses Pay for education Raise capital to start new businesses Pay cash for new cars MUCH, MUCH MORE!! You must be interested by now, or you wouldn't have read this far! Now is your chance to discover financial freedom like you have never had before! Keep on reading, you will not be sorry. OVERVIEW OF THIS AMAZING PROGRAM: Here is how it works: We sell the book "CREDIT SECRETS REVEALED" via email to thousands of customers for a one-time total cost of $40. Here is what makes this so exciting! The book is divided into 4 chapters which are sold individually. By purchasing the book and adding your name to the list, your name will move from the top to the bottom automatically and as it does the MONEY you make will increase exponentially. As with all multilevel businesses, we build our business by recruiting new partners and selling our product. Every state in the U.S. allows you to recruit new multilevel business online (via your computer). Here is the difference between this exciting program and "chain letter" scams. We market a book that contains VERY USEFUL information that EVERYBODY needs, not some useless report. When you order this book (which retails for $72.95), you will find how: * To find the LOWEST credit card rates * To manage your finances using credit cards to your advantage. * To obtain MULTIPLE credit cards * To consolidate your debt * To obtain credit if you are financially challenged * To get rich using other people's money * To avoid the pitfalls of credit card usage * To contact banks offering the best loan deals today * To obtain business loans * To find credit card companies offering matching airline miles * To be successful when applying for credit and how to get the highest possible limit. Each order you receive via "snail mail" will include: 1) $10.00 CASH 2) The name and number of the chapter they are ordering 3) The e-mail address where you will e-mail them the chapter they ordered. To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $10.00 is yours! This is the EASIEST electronic multilevel marketing business anywhere! READ THE FOLLOWING CAREFULLY AND THEN REAP THE HUGE REWARDS! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 chapters shown on the list below (you can't sell the book if you don't order all 4 chapters). * For each chapter, send $10.00 CASH, the NAME & NUMBER OF THE CHAPTER YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the person whose name appears on the list next to the chapter. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF ANY MAIL PROBLEMS! * When you place your order, make sure you order each of the four chapters. You will need all four so that you will have the entire book to sell. * Within a few days you will receive, via e-mail, each of the four chapters. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. MAKE SURE TO PRINT THEM AS WELL IN CASE OF PROBLEMS! 2. IMPORTANT-- DO NOT alter the names of the people who are listed next to each chapter, or their sequence on the list, in any way other than is instructed below in steps "a" through "f" or you WILL LOSE OUT on the majority of your profits! Once you understand the way this works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will NOT work. a. Look below for the listing of chapters. b. After you've ordered the four chapters, take this advertisement and remove the name and address under chapter #4. This person has made it through the cycle and is no doubt counting their $100,000! c. Move the name and address under CHAPTER #3 down to CHAPTER #4. d. Move the name and address under CHAPTER #2 down to CHAPTER #3. e. Move the name and address under CHAPTER #1 down to CHAPTER #2. f. Insert your name/address in the CHAPTER #1 position. Please make sure you copy every name and address ACCURATELY! 3. Take this entire letter, including the modified list of names, and save it on your computer. Make NO changes to the instruction portion of this letter. PRINT OUT THE LETTER AS WELL! 4. Now you're ready to start an advertising campaign on the INTERNET! Advertising on the 'Net is very, very inexpensive, and there are HUNDREDS of FREE places to advertise. The marketing email you will receive with chapter 1 will explain internet advertising in greater detail. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY! 5. For every $10.00 you receive, all you must do is e-mail them the chapter they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the chapter! CHAPTERS TO PURCHASE *** Order Each CHAPTER by NUMBER and NAME *** Notes: - ALWAYS SEND $10 CASH (U.S. CURRENCY) FOR EACH CHAPTER. CHECKS NOT ACCEPTED - ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the chapter you are ordering, (b) your e-mail address, and (c) your name & postal address. PLACE YOUR ORDER FOR THESE CHAPTERS NOW: _________________________________________________ CHAPTER #1 "SECRETS FOR THOSE WITH CREDIT CHALLENGES" ORDER CHAPTER #1 FROM: L&S Enterprises P.O. Box 11665 Eugene, OR 97440 CHAPTER #2 "THE LOWEST RATES IN CREDIT CARDS TODAY" ORDER CHAPTER #2 FROM: Unlimited Enterprises PO Box 1516 Eugene, OR 97440 CHAPTER #3 "DEBT MANAGEMENT TO YOUR ADVANTAGE" ORDER CHAPTER #3 FROM: Bergman & Associates PO Box 1083 Oakridge, OR 97463 CHAPTER #4 "OBTAINING LOANS FOR YOUR BUSINESS" ORDER CHAPTER #4 FROM: Dream Merchants P.O. Box 1850 Bonner's Ferry, ID 83805 _________________________________________________ ***IMPORTANT!!*** YOU WILL RECEIVE A MARKETING LETTER WITH CHAPTER ONE. YOU WILL NEED TO SEND THIS TO ANYONE WHO ORDERS CHAPTER ONE FROM YOU. THIS WILL EXPLAIN HOW TO MARKET THIS BOOK EFFECTIVELY. You might wonder how this program can make you so much money. Well, keep reading and you will see how powerful this AUTOMATIC online business actually is! Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. 1st level--your 10 members with $10.................$100 2nd level--10 members from those 10 ($10 x100).....$1000 3rd level--10 members from those 100 ($10 x 1,000).$10,000 4th level--10 members from those 1,000 ($10x10,000).$100,000 TOTALS ----------->$111,100! Remember, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT! Your cost to participate in this is relatively very little (surely you can afford $40). You obviously already have an Internet connection and e-mail is FREE! About 50,000 new people get online every month! ******* TIPS FOR SUCCESS ******* * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four chapters IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $10 order, you MUST send out the requested product to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. * Be PATIENT and PERSISTENT with this program. If you follow the instructions exactly, your results WILL be SUCCESSFUL! * ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! ******* YOUR SUCCESS GUIDELINES ******* Follow these guidelines to guarantee your success: If you don't receive 10 to 20 orders for chapter #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for chapter #2. If you don't, continue advertising until you do. Once you have received 100 or more orders for chapter #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a DIFFERENT chapter. You can KEEP TRACK of your PROGRESS by watching which chapter people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business! ******* T E S T I M O N I A L S ******* My name is Scott Hampton and I live in Portland, Oregon. I am an airline pilot and make very good money doing what I do. Unfortunately I have built up a HUGE debt load from poor business transactions over the past 5 years. I am now living paycheck to paycheck even though I make over $60,000 per year as a pilot. I received this email approximately 6 months ago and decided to try it. I promptly ordered the useful book "CREDIT SECRETS REVEALED" and began marketing it aggressively. I was surprised when I found my post office box filled with over 300 orders in less than 30 days. Over the course of the next 3 months I have personally made $113,540! I have been able to pay off my debts quickly and have taken a much needed vacation. The money continues to roll in and I am preparing to do another mailing in about 30 days. All I can say is that I was skeptical but now I am a believer! Scott Hampton, Portland, Oregon I received this email about 1 year ago and immediately tossed it out stating to my wife that I was going to track down the person who sent it to me and give them a piece of my mind. I forgot about it and about 7 months later received it again. However this time I was in very high debt because my son was just accepted to a prestigious school and the tuition was astronomical. I viewed this opportunity differently and decided to try it. I figured I could certainly afford the $40 and had little to lose. Well, I am pleased to say that my son now has a "free" education as a result of this incredible program. I have never seen anything like it in my life. Routinely my PO box has 50-100 letters in it at a time. You MUST try it to believe it. It is like opening a present every day! Walter Hickman Denver, Colorado My wife and I have been married for 3 years now and we just had our second child Heather. We have been living in a 700 square foot apartment with very basic living necessities. We are both working and making ends meet is nearly impossible. My school bills were nearly $30,000 and the monthly payment was making it hard to find money to buy food. In addition to that, I was spending my 12 hour workdays away from my family, putting a strain on them. Late one evening about 10 months ago I received this email. I felt things could not get much worse and decided to at least give it a try. I mailed for the book and began marketing as the instructions indicated. Well, the rest is history. We are now purchasing a new home with 30% down and I am happy to say that my school bill will be paid off in 3 months. I owe it all to this incredible online MLM program! Jeremy Bass, Providence, Rhode Island Believe me, your efforts will certainly be rewarded with this easy, automatic money making wonder! I started about 2 months ago and now have enough money to purchase a new Mercedes convertible. I never thought I'd ever have enough money to purchase the car of my dreams but now I do. This program has made me believe in MLM again! Larry Lancaster, Dallas, Texas All my life I have wanted to retire early. Well, here I was, nearly 65 years old with not a cent in my savings account. I had never been able to save money because of high medical bills that I have had since my bypass surgery. I am in debt over $74,000 and must keep working the rest of my life. My stressful corporate life lead to my heart problems and now I am stuck with paying my health bills. Needless to say, I jumped at the chance when I read this email. I mailed out the 4 $10 bills right away and started advertising when I received the complete book. I guess all I can say is that I never dreamed I'd be in a position like I am now. I have paid off my medical bills and have put over $30,000 into savings. I plan to advertise this program about every 4 months and build up my savings account to over $500,000 so I can retire in about 3 years or less. Believe me, without this amazing MLM program I'd never be in such an enviable position! Frank Statton, Los Angeles, California My name is Mary and I have lived alone since my husband Allen passed away 3 years ago. I have 4 young children and was constantly depending on Welfare and our church family to help get us through our financial crisis. There was always more month at the end of the money and it seems like there was absolutely no way out of this disaster. Even though all our friends have been wonderful to us I finally decided to do something about it. I received this email on the computer I share with my friend. She looked at it and told me it would never work. I decided to at least see how it would work if I tried it. That was about 5 months ago and my life will never be the same again. After one month I was able to purchase a much needed Dodge Caravan for getting the kids around in. I figured that was the end of the money but then the money volume went up by around 4 times! I could not believe it! We now are totally self sufficient and are purchasing a moderate sized home so we can! stretch out some. The product it self was very helpful and showed me how to improve my financial well-being considerably. You have to try it to see that it works! Go for it today! Mary Romero, Washington, DC ORDER THE BOOK "CREDIT SECRETS REVEALED" TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM! WITHOUT ACTION YOUR FUTURE CANNOT CHANGE! TAKE CONTROL OF YOUR FINANCIAL FUTURE NOW!! From b00kszz at hotmail.com Sun Jul 5 23:43:06 1998 From: b00kszz at hotmail.com (b00kszz at hotmail.com) Date: Sun, 5 Jul 1998 23:43:06 -0700 (PDT) Subject: 750 How-To Books:UNDER $50.00750 How-To Books:UNDER $50.00 Message-ID: <199807060628.PAA22897@extra.caelum.co.jp> We have over 750 high quality How-To Books & Reports that you can own, read, or even re-sell yourself. PRICE: Under $50.00!!! Popular Titles: Government Auctions, How to Get a Patent, Stop Smoking, Web Marketing, Business Start-ups, Legal Documents, Novels, many "Making Money" titles and more! For many FREE PREVIEWS and other FREEBIES go here: http://srsinfo.com/books.htm VERY WELL WRITTEN, QUALITY INFORMATION! RESALE RIGHTS INCLUDED. From fojiizoi93 at prodigy.com Mon Jul 6 02:39:16 1998 From: fojiizoi93 at prodigy.com (fojiizoi93 at prodigy.com) Date: Mon, 6 Jul 1998 02:39:16 -0700 (PDT) Subject: Email 57 Million People for $99 Message-ID: <199807061031HAA6919@pimiaia5y.accuweb.nb.ca> ��������� 57 MILLION EMAIL ADDRESSES FOR ONLY $99 ������ � You want to make some money? I can put you in touch with over 50 million people at virtually no cost. Can you make one cent from each of theses names? If you can you have a profit of over $500,000.00 ����� That's right, I have 57 Million� Fresh� email addresses that I will sell for only $99. These are all fresh addresses that include almost every person on the Internet today,� with no duplications. They are all sorted and ready to be mailed.� That is the best deal anywhere today !� Imagine selling a product for only $5 and getting� only a 1/10% response.�� That's� $2,850,000� in your pocket !!! Don't believe it? People are making that kind of money right now by doing the same thing, that is why you get so much email from people selling you their product....it works !� I will even tell you how to mail them with easy to follow step-by-step instructions I include with every order.� These 57 Million email addresses are yours to keep, so you can use them over and over and they come on 1 CD.� This offer is not for everyone. If you can not see the just how excellent the risk / reward ratio in this offer is then there is nothing I can do for you. To make money you must stop dreaming and TAKE ACTION. **************************************** THE BRONZE MARKETING SETUP 57,000,000 email addresses on CD These name are all in text files ready to mail!!! $99.00 **************************************** THE SILVER MARKETING SETUP 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. $ 139.00 **************************************** THE GOLD MARKETING SETUP VIRTUALLY EVERYTHING!! 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. ������������ AND Over 500 different Business Reports now being sold on the Internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell� information products. AND ...... .. a collection of the 100 best money making adds currently floating around on the Internet. $ 189 **************************************** THE PLATINUM MARKETING SETUP FOR THOSE READY TO "OWN THE NET" 57,000,000 email addresses on CD These name are all in text files ready to mail!!!������ AND 8 Different Bulk email programs and tools� to help with your mailings and list management. ������������ AND Over 500 different Business Reports now being sold on the Internet for up to $100 each. You get full rights to resell these reports. With this package you get the email addresses, the software to mail them AND ready to sell� information products. AND ...... .. a collection of the 100 best money making adds currently floating around on the Internet. AND ...... FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!! This is the Number 1 most powerful mass mailing software in the world today. There is nothing that can compare for speed, reliability, performance, and the ability to use "stealth" functions. This is the package that will allow you to use the net as your own personal "money tree" at will!!! $ 379 **************************************** SEVERAL WAYS TO ORDER !!! IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES WITHIN 12 HOURS OF YOUR ORDER!!! � 1) WE ACCEPT:� AMERICAN EXPRESS OR ��� ������������������������������ VISA <> MASTERCARD ���� TYPE OF CARD� AMX / VISA / MC??_______________ ����� EXPIRATION DATE�� ___________________________ ���� NAME ON CREDIT CARD________________________ ���� CREDIT CARD #________________________________ ���� BILLING ADDRESS ____________________________ ���� CITY_________________________________________ ��� STATE________________ZIP_____________________ �� PHONE INCLUDE AREA CODE___________________ �� ��� EMAIL ADDRESS______________________________ ������� WE WILL BILL selected amount to your account plus the following shipping costs ������� SHIPPING� COST OF 3.85 FIRST CLASS MAIL ������� SHIPPING COST OF� 15.00� 24 HOUR EXPRESS MAIL /� FEDERAL EXPRESS ������� SALES TAX� added to AR residents � >>> Send correct amount in cash, check or money order to: � >>> FIRE POWER!! � >>> 1320 N. "B" St., Suite 112-24 � >>> Fort Smith, AR� 72901 �� 2) Send the same above requested credit card information to above address. �� �� 3) Call phone # 530-876-4293.� This is a 24 hour phone number to place a CREDIT CARD order. FIRE POWER! is a private company and is not affiliated with, or endorsed by, AOL, MSN, or any other Internet Service Provider. Copyright 1998 All rights reserv From rah at shipwright.com Mon Jul 6 06:39:56 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 6 Jul 1998 06:39:56 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" Message-ID: Hettinga's three laws of internet payment technology investment: 1. Geodesic, peer-to-peer transactions. 2. Three orders of magnitude cost reduction. 3. Nothing but net. The application of the above to Cybercash, or SET, for that matter, I leave as an exercise for the reader... Cheers, Bob Hettinga --- begin forwarded text Delivered-To: ignition-point at majordomo.pobox.com X-Sender: believer at telepath.com Date: Sun, 05 Jul 1998 13:53:40 -0500 To: believer at telepath.com From: believer at telepath.com Subject: IP: "CyberCash can't oust credit cards" Mime-Version: 1.0 Sender: owner-ignition-point at majordomo.pobox.com Precedence: list Reply-To: believer at telepath.com Source: Charlotte (N.C.) Observer (printing a Washington Post article) Posted at 3:32 p.m. EDT Friday, July 3, 1998 CyberCash can't oust credit cards By MARK LEIBOVICH The Washington Post WASHINGTON -- Two years ago, CyberCash Inc. walked tall as a pioneer in the seemingly vast frontier of Internet commerce. Today, the Reston, Va., firm and its software that lets merchants receive payments over the Internet offers a cautionary lesson in how social habits in the digital age are difficult to predict -- and dicey to stake a business on. On Tuesday, CyberCash announced that its second-quarter revenue would be below expectations, and that it would lay off 20 percent of its staff. The news sent its stock price into a decline -- the latest to strike the company. Once trading in the $60 range, it fell steadily this week to finish at $11.12 1/2. The hard times come even as CyberCash has tried to tone down its aspirations and diversify into a more conventional business, the processing of credit-card transactions in ordinary stores. The moral, said Ulric Weil, a technology analyst at investment bank Friedman, Billings Ramsey Co. in Arlington, Va., is: ``It's always hard to bet on the purchasing mores of consumers.'' William N. ``Bill'' Melton, one of Northern Virginia's most accomplished technology entrepreneurs, envisioned a world of paperless purchasing when he founded CyberCash in August 1994. In this world, Internet users would purchase goods and services using new ``virtual currencies,'' such as CyberCoin, a CyberCash product that allows online purchases of up to $20 at a time by transferring funds from a credit card or bank account to an account that CyberCash oversaw. Few people bought anything with this virtual currency at first, but the market was patient. In the speculative world of Internet stocks, the potential for this commerce seemed limitless, and CyberCash was an instant Wall Street hit. Company shares, first offered to the public for $17 in February 1996, were trading at more than $60 by that June. But today, investors are tired of waiting. The predicted rush to electronic currency remains a mere trickle and what little there is generally uses plain-old credit card transactions, not a fancy new currency. For now, consumers shopping online merely want to use something they know and trust for payment, the credit card, not an entirely new form of currency. After this week's layoff, which involved about 20 positions in the Washington area, CyberCash has about 200 employees. It remains unprofitable, having reported a loss of $5.67 million on sales of $1.14 million in the January-March quarter. If life weren't uncertain enough in Reston, speculation was rampant this week among analysts who follow the company that its low stock price was making it a ripe takeover target. These predictions were fueled further by the company's announcement Tuesday that its board of directors had adopted a new shareholders rights, or ``poison pill,'' plan, which companies typically use to deter unwanted takeover bids. In this case, if an outside entity attempted to purchase a stake in CyberCash that exceeded 15 percent, the company board could invoke the provision -- at which point CyberCash shareholders would win the right to purchase company shares at a greatly discounted price. For a potential buyer, this would make CyberCash far more expensive. Russ Stevenson, CyberCash's general counsel, said the new provision was not related to the company's recent struggles, and that the timing of its adoption was coincidental. In a statement, CyberCash said the poison pill did not come in response to an acquisition proposal. James J. Condon, the company's chief operations officer, would not comment on whether CyberCash was in discussions to be acquired, citing a company policy ``never to comment'' on potential acquisitions. Melton, CyberCash's president and chief executive, was traveling Thursday and could not be reached for comment. CyberCash's recent woes stem in part from its May acquisition of ICverify Inc., an Oakland, Calif., company that makes credit-card processing software. CyberCash, which purchased ICverify for $57 million in cash and stock, hoped to complement its own technology with ICverify's more conventional ``point of sale'' software, which helps retailers process credit card transactions in shops and other commercial establishments. Entering the ``point of sale'' market was a way for CyberCash to hedge its bets against the uncertain future of electronic commerce, analysts said. ``This gave (CyberCash) a piece of the physical point of payment, as well as the electronic point of payment,'' said Scott Smith, an Internet commerce analyst at Current Analysis Inc. in Sterling. With the addition of ICverify, Condon said, CyberCash could now offer a full package of payment software to potential customers. They could now provide, say, a clothing retailer, the tools to process both in-person credit card transactions as well as Internet credit card purchases. But the ICverify acquisition proved a difficult transition. In recent months, analysts said, some customers of both companies have frozen their accounts, saying they were unsure about which transaction software they would deploy in the future. ``The ICverify transaction resulted in customers taking a close look at what direction they wanted to go in,'' said Weil. Condon said he expects this to be a short-term problem. He said he has spoken to several customers who plan to continue their accounts shortly. People who follow CyberCash generally agree on two things: that if the company can hang on long enough for electronic payments to become a widespread phenomenon, it will be well positioned to cash in. They also say the company has a strong, tenacious management team in place, led by Melton. ``He is the rock the company is built on, and he's committed to the company's success,'' said Smith. ``I don't see anyone there who is ready to back down.'' But in the end, Weil said, the future of CyberCash might rest with forces beyond its control. ``You can't change the psyche of consumers,'' he said. ``CyberCash doesn't have that kind of influence.'' ----------------------- NOTE: In accordance with Title 17 U.S.C. section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. ----------------------- ********************************************** To subscribe or unsubscribe, email: majordomo at majordomo.pobox.com with the message: (un)subscribe ignition-point email at address ********************************************** www.telepath.com/believer ********************************************** --- end forwarded text ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From jag.privat at home.se Mon Jul 6 07:07:46 1998 From: jag.privat at home.se (barBEARian) Date: Mon, 6 Jul 1998 07:07:46 -0700 (PDT) Subject: easy remailing tool for MacIntosh ? Message-ID: <19980706140648.19437.qmail@m2.findmail.com> does anybody know of any nice, easy and convenient tool for the MacOS platform to do this complicated set-up for a chain of anonymous remailers ? TIA, Harley From jya at pipeline.com Mon Jul 6 07:40:52 1998 From: jya at pipeline.com (John Young) Date: Mon, 6 Jul 1998 07:40:52 -0700 (PDT) Subject: NYT Hits GAK, Boosts GAKS Message-ID: <199807061440.KAA21885@camel14.mindspring.com> The New York Times, July 6, 1998, p. A10. Editorial Privacy in the Digital Age As more and more Americans communicate and do business electronically, the fear is spreading that information they transmit can be seized by hackers or criminals and used for illegal or unsavory purposes. Fortunately, the technology to thwart such invasions already exists. It is called encryption, or the encoding of digital information to secure its privacy. But the Federal Bureau of Investigation is trying hard to prevent the growing use of encryption, both in the United States and abroad, because of fears that the protective technology itself will get into the wrong hands. That shortsighted stand will undermine efforts to protect commercial transactions and may actually hamper law enforcement rather than help it. The Clinton Administration's current policies toward encryption have been largely dictated by the F.B.I. and the Justice Department. These two agencies now block encryption makers from exporting their most advanced technology unless they agree to develop a method allowing law enforcement agencies to gain access to it. The method favored by the F.B.I. is known as the key escrow, in which the key to cracking a code is kept with a third party that could hand it over quickly if law enforcement agencies demanded it. But the key escrow method poses tremendous threats to privacy. There is a danger that access to keys for the code could be abused by law enforcement agencies and others. Worse, the United States would be required to share key escrow information with law enforcement agencies of other countries, and giving access to private communications to countries with poor human rights records could lead to crackdowns on dissidents using encryption for their own communications. According to industry officials, the export controls are already backfiring. More and more foreign companies are supplying encryption technologies without key escrow arrangements, making it virtually impossible for the F.B.I. to eavesdrop and stealing business from American firms. The growing foreign role diminishes the ability of the F.B.I. to demand new safeguards or ways to penetrate the communications of criminals who use encryption. President Clinton might normally be more sympathetic to concerns over maintaining privacy in the digital world. But since Attorney General Janet Reno has protected Mr. Clinton from an independent counsel on campaign finance, the White House is said to be loath to oppose either her or Louis Freeh, the F.B.I. Director, on this issue. On Capitol Hill, the debate over encryption has created some unusual political alliances. Many conservative Republicans have stood with leaders of the high-tech industry to oppose any kind of ban on encryption within the United States and to support a loosening of export controls on encryption technology. It has been odd to see Trent Lott, the Senate majority leader, and Dick Armey, the House majority leader, stand with civil libertarians against the demands of the F.B.I. But the F.B.I. is not without influence. House Speaker Newt Gingrich, more friendly to the agency, has prevented a bill encouraging greater use of encryption from coming to a vote in the House. The concerns of law enforcement agencies are legitimate. But smart criminals are already using encryption, some of which is readily available on the Internet. That was the message conveyed only a few weeks ago by such unlikely allies as Bill Gates of Microsoft and Jim Barksdale of Netscape, who are on opposite sides in the Justice Department's antitrust lawsuit against Microsoft but agree on this issue. The F.B.I. should give up its losing fight against encryption and work with industry to develop new means to catch criminals who use it. One approach under discussion would be to develop software technology that could be surreptitiously placed in a suspect's computer to capture keystrokes before they are encrypted. Any such operation would have to be carried out under strict court control as the electronic equivalent of a search warrant. But law enforcement agencies have to find a legal and ethical way to stay ahead of technology, rather than stand in the way of it. Trying to block advances in the digital age is futile. [End] From jya at pipeline.com Mon Jul 6 07:50:40 1998 From: jya at pipeline.com (John Young) Date: Mon, 6 Jul 1998 07:50:40 -0700 (PDT) Subject: Gov Access to Key Strokes Message-ID: <199807061450.KAA11968@camel14.mindspring.com> Would any of the members of the NAS CRISIS panel know if keystroke surveillance one of the technologies proposed for the FBI as an alternative to GAK? Could this technology to be covertly placed in all keyboards for activation say, by remote control, or via a program/device on the Internet? Recall the various proposals for putting hardware encryption in keyboards, with the possibility of covert GAK. From rlpowell at calum.csclub.uwaterloo.ca Mon Jul 6 09:59:17 1998 From: rlpowell at calum.csclub.uwaterloo.ca (Robin Lee Powell) Date: Mon, 6 Jul 1998 09:59:17 -0700 (PDT) Subject: Code for Crypto for Work... Message-ID: <19980706165904Z204413-2874+14@calum.csclub.uwaterloo.ca> I need a crippleable cypher for work (i.e. one that can be done in 40-bit and something-reasonable modes), and I'm thinking rc5 might be a good choice. Anyone know where I could find source for this, or have other suggestions? For the record, I and my company are in Canada. -Robin From rlpowell at calum.csclub.uwaterloo.ca Mon Jul 6 10:01:28 1998 From: rlpowell at calum.csclub.uwaterloo.ca (Robin Lee Powell) Date: Mon, 6 Jul 1998 10:01:28 -0700 (PDT) Subject: Nevermind... :-) Message-ID: <19980706170121Z204409-2875+15@calum.csclub.uwaterloo.ca> OK, I poked around some more and RC5 is an exceptionally sucky choice. Anyone know of any good variable-length algorithms? -Robin PS: Sorry for the pseudo-off-topic-ness. From CTIA_Daily_News at um2.unitymail.com Mon Jul 6 10:27:36 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Mon, 6 Jul 1998 10:27:36 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 6, 1998 Message-ID: <199807061726.MAA12238@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. WIRELESS IT '98, The Next Generation in Personal Computing & Communications October 12-14, Las Vegas, Nevada Call (202) 785-0081 for more information! ============================================= From die at pig.die.com Mon Jul 6 11:43:02 1998 From: die at pig.die.com (Dave Emery) Date: Mon, 6 Jul 1998 11:43:02 -0700 (PDT) Subject: Gov Access to Key Strokes In-Reply-To: <199807061450.KAA11968@camel14.mindspring.com> Message-ID: <19980706144246.A3940@die.com> On Mon, Jul 06, 1998 at 10:46:27AM -0400, John Young wrote: > > Could this technology to be covertly placed in all keyboards > for activation say, by remote control, or via a program/device > on the Internet? > > Recall the various proposals for putting hardware encryption > in keyboards, with the possibility of covert GAK. John, I have on occasion mentioned on the net the possibility of doing this via secret back doors in Microsoft OS kernels (W98/NT), backdoors hidden by encrypted code (and that damn new WIPO treaty) that would only be decrypted inside the CPU using a chip key not available to the user. Given passage of WIPO I fully expect such technology to become common as a means of copyright protection with very severe penalties for those who would chose to peek inside the "technological means" or alter it in any way. And once one has created this secret space inside the core OS and protected it by draconian criminal laws, it doesn't take much for someone to add a little extra feature in there that logs and transmits back to Big Brother user keystrokes or keys used with the encryption routines or other such privilaged and private user information. This could be added by the FBI or by Microsoft under federal pressure (which they certainly are). And interfering with or disconnecting this nice little brother feature might well be considered to be tampering with a "technological means" of copyright protection and subject the user to 5 years in prison. Certainly public dissemination of tools and information (such as code listings) that would allow access to and alteration of this secret space would very likely result in criminal prosecution, even if such legal action was not common for individual users. In fact, under WIPO it would already be illegal to just disassemble and debug the relevant part of the OS to check to see if there was code in there to log and report keystrokes even if it was not encrypted or otherwise protected. And no doubt at all but that the rights enforcement software will be encrypted and otherwise protected just to make sure that anyone tampering with it or even just examining it for security flaws (such as keystroke recorders) would clearly be flagrantly violating WIPO in an unambiguous as possible way. What this means is that due to well meaning anti piracy measures carried to extremes - WIPO , it is likely to be impossible for a user of standard shrink wrapped commercial software to legally vet that software to determine that it does not contain deliberate (courtesy the FBI) means to grossly compromise the security of information on his computer system. He will have no legal recourse but to trust the provider of the software, as even the analysis required to prove such a deliberate security hole exists would be serious federal felonies... One wishes that Congress would see the light and allow circumvention of copyright protections for legitimate security analysis and audits (and for any purpose which would be construed as fair use under copyright law), but so far this hasn't happened. -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From jya at pipeline.com Mon Jul 6 12:08:32 1998 From: jya at pipeline.com (John Young) Date: Mon, 6 Jul 1998 12:08:32 -0700 (PDT) Subject: fwd from spyking@thecodex.com In-Reply-To: <35A111DE.9C6DDDBB@brainlink.com> Message-ID: <199807061908.PAA07802@camel14.mindspring.com> Answering Spyking's questions Ray posted in reverse: The Bronx incident started off as a major CB case, with barricades and plastic suits galore, in accord with the push for scare the beans out of the public with imaginary terrorism (another WMD terrorism trial is due to start in NYC shortly). It turns out that what was found were a couple of take-home, mildly radioactive elements (properly contained and marked) of a recently deceased employee of a plant that used them. The story died quickly. NYT covered it twice, once hot, once tepid. Second, what's driving the nationwide push to train First Responders and emergency room staff is Clinton's funding the program with billions, after he read Richard Preston's recent novel on biological terrorism (so said news reports), and got a few heart-thumping briefings from if you only knew blackhearts. Right now preparing for domestic defense against Weapons of Mass Destruction is the hottest career-jumpstart in the nation, and there's a frenzy of competition passing as cooperation among the military, National Guards, intel, FBI, FEMA, state and local cops, EMS, sawbones, Red Cross, CB weapons experts (US and RU), mercenaries, manufacturers, vets and revolving doorers of all the above, and, to be sure, the never-fake-it media goading and exaggerating (our straight-shooting members here excepted, well, except Y2Kites). Like many state and local officials relishing the vital national security role being porked to domestic forces, neatly bypassing the military's limitations, NYC's mayor is happy as a pig in shit with his plan for a new $16m anti-terrorist bunker on the 23rd floor of a buddy's office building across the street from the World Trade Center -- one RPG shot from the 23rd WTC into his impenetrable C4I nest. Rudy loves to watch "Patton" clad only in a Kevlar jockstrap. Of course, he's a "former federal prosecutor," the most common subtitle on TV of disembodied talking heads. From vjb at gil.com.au Mon Jul 6 13:56:05 1998 From: vjb at gil.com.au (Global Web Builders) Date: Mon, 6 Jul 1998 13:56:05 -0700 (PDT) Subject: Update on status of Pauline Hanson's One Nation web sites Message-ID: <1.5.4.32.19980706204122.00729e64@mail.ipswich.gil.com.au> G'day One Nation supporters in NSW I am Scott Balson, Pauline Hanson's web master and the moderator of the now defunct discussion forum mentioned in a recent news letter. You will notice that I am not using my normal "gwb" email. I apologise for the demise of the very successful discussion forum, but may I say that nothing surprises me any more. The forum was run on a third party web site and the owner took two weeks leave on Sunday - the day before the forum "shut down". Quite simply it was hacked by an unknown person because it was so successful. This is the face of free speech in Australia. NOTE: The hacker was not the site owner. To make matters worse, last Friday, the One Nation pages went down after the ISP we used, Pronet, had their link closed by Optus because of financial difficulties... we have taken remedial action and hope to have the site fully operational in the next 48 hours at: http://www.gwb.com.au/onenation The last few weeks I have seen, heard of and personally faced a growing number of personal attacks aimed at those involved in the One Nation party. In my case this has included being followed while driving my car (last week) and phone calls from the media wanting me to comment on "anonymous", unsubstantiated and trumped-up allegations that were made personally against me. (For example, when questioned about his call to me on Sunday Rory Callinan from "The (News Limited) Courier Mail" confirmed that they would not normally bother with allegations made on this basis but my role within the party had made an anonymous allegation "newsworthy" and worth pursuing.) This follows the party's success in the Queensland state elections. May I just say that this makes me realise that One Nation is obviously having a big impact on those who have got the most to lose and through their actions they have just increased my resolve to do all that I can to ensure Pauline Hanson and the party get a "fair go" on the Internet even if this right is denied by the mainstream media. The events and incidents against the party will continue to be covered on my Australian National News of the Day (anotd) which should be live again soon (also temporarily closed because of the Pronet collapse) The address for anotd is: http://www.gwb.com.au/gwb/news The agenda for getting One Nation back on-line and the discussion form up and running again is as follows: One Nation web site and anotd fully operation by Friday 10th July (probably before) http://www.gwb.com.au/onenation Discussion forum (through GWB) fully operational by end of July. I will keep this group informed when the discussion forum is again operational and once again apologise for the temporary loss of our forum in which to discuss issues. Please do not respond to this temporary account unless it is on a matter of urgency. The gwb at gwb.com.au email address will be up and running again by this weekend. GWB Scott Balson Pauline Hanson's Web Master From jya at pipeline.com Mon Jul 6 17:34:59 1998 From: jya at pipeline.com (John Young) Date: Mon, 6 Jul 1998 17:34:59 -0700 (PDT) Subject: Gov Secrecy Reform Act of 1998 Message-ID: <199807070034.UAA12735@camel7.mindspring.com> We've transcribed a fax of Senator Thompson's Amendment as Substitute for S.712, "Government Secrecy Reform Act of 1998," passed by the Governmental Affairs Committee on June 17: http://jya.com/s712-amend.htm (37K) Here's a report on the amendment and vote: NCC Washington Update, vol. 4, #25 July 1, 1998 [National Coordinating Committee for the Promotion of History] Senate Committee Adopts Substitute Bill for Moynihan's Government Secrecy Reform Act Senate Committee Adopts Substitute Bill for Moynihan's Government Secrecy Reform Act -- On June 17 the Senate Governmental Affairs Committee met to consider a substitute bill for S.712, the Government Secrecy Reform Act of 1998. By voice vote, with no negative votes heard, the Committee passed the substitute bill proposed by Senator Fred Thompson (R-TENN), the chair of the Committee, and Senator Susan Collins (R-ME). The original bill had provided a framework for reform but had lacked the specifics which this bill provides. The substitute bill make four major changes from the bill that was originally introduced. First, this bill eliminates the section calling for the establishment of a National Declassification Center in an existing agency -- which many had thought could be the National Archives -- and instead expands the functions and oversight responsibilities of the existing Information Security Oversight Office (ISOO) and moves that office from the National Archives to the Executive Office of the President. Second, the bill states that classified information must be declassified after 25 years unless, as the bill summary states, "extraordinary circumstances" require that it remain classified. The original bill had a 30 year time limit for most information to remain classified. Third, the substitute bill retains the balancing test of the original bill; however, the revised bill establishes criteria to guide agency classification decisions for weighing the concerns of national security and the public interest in disclosure. The national security criteria are taken directly from President Clinton's E.O 12958 and the public interest criteria are newly developed for the substitute bill. Fourth, the substitute bill establishes a Classification and Declassification Review Board composed of 5 public members to hear agency and individual appeals regarding classification and declassification decisions. Once the report for the amended S. 712 is filed, which is expected to happen in mid-July, then the substitute bill will be referred to the Senate Select Committee on Intelligence for 30 days for their consideration. It is anticipated that the Intelligence Committee may hold hearings and may have objections to the balancing test provision of the bill. Since there appears to be little attention in the House to this legislation and since there are not many legislative days remaining before adjournment, it is doubtful that this legislation will pass in the 105th Congress. From stuffed at stuffed.net Mon Jul 6 17:49:05 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Mon, 6 Jul 1998 17:49:05 -0700 (PDT) Subject: Secret World of Spice/Freeway of Love Message-ID: <19980706235722.1066.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 252 bytes Desc: not available URL: From jkthomson at bigfoot.com Mon Jul 6 19:06:30 1998 From: jkthomson at bigfoot.com (jkthomson) Date: Mon, 6 Jul 1998 19:06:30 -0700 (PDT) Subject: Junger et al. Message-ID: <3.0.3.32.19980706191157.006b9468@dowco.com> Reuters 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law professor's challenge to US regulations strictly limiting the export of computer data-scrambling technology. Judge James Gwin ruled late Friday that the export limits, which prevented Case Western Reserve University Law School professor Peter Junger from posting the text of encryption programs on the Internet, did not violate the constitutional right to free speech. The Ohio court's ruling contradicts a California district court ruling last August that said source code -- the instructions a person writes telling the computer what actions to perform -- constitutes a form of speech subject to First Amendment protection. "Unlike instructions, a manual or a recipe, source code actually performs the function it describes," Gwin wrote. "While a recipe provides instructions to a cook, source code is a device, like embedded circuitry in a telephone, that actually does the function of encryption." Neither ruling gave speech protection to compiled code, a version of source code converted into an actual software program that could be run on a computer. The US government appealed the California decision and the issue may ultimately be decided by the Supreme Court. Civil libertarians and high-tech companies had hoped the court would overturn the export limits on encryption technology, which uses mathematical formulas to scramble information and render it unreadable without a password or software "key." Once the realm of spies and generals, encryption has become an increasingly critical means of protecting electronic commerce and global communications over the Internet. But law enforcement agencies, fearing encryption will be used by terrorists and international criminals to hide their activities, have instituted strict controls to limit the export of strong scrambling products. Lawyers opposed to the export rules said the Ohio court misunderstood the difference between source code and compiled code. "The Ohio court clearly doesn't understand the communicative nature of software," said Shari Steele, an attorney with the Electronic Frontier Foundation. "It's true that software helps to perform functions, but it does so by telling computers what to do.... It certainly is speech deserving of the highest levels of First Amendment protection." ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- Technology is introduced, utilized, depended upon, obsolete, standardized, and understood, in that order ======================================================================= From Hua at teralogic-inc.com Mon Jul 6 19:30:22 1998 From: Hua at teralogic-inc.com (Ernest Hua) Date: Mon, 6 Jul 1998 19:30:22 -0700 (PDT) Subject: Junger et al. Message-ID: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com> I don't understand ... Did anyone demonstrate the "functionalness" of any arbitrary language via a scanner and a compiler? Why doesn't Gwin understand that the moment one successfully claims that a specific class of source code is not speech by the virtue of the fact that a compiler can transform it automatically into executable code which performs a function, then ANY speech of ANY sort is fundamentally vulnerable to being classified as functional as soon as a compiler can transform it into real machine code. So today, I can write the following: 1. Find a container. 2. Fill container with explosive substance. 3. Move container to target location. 4. Detonate container. As soon as I have a compiler and a target machine that can execute these instructions, suddenly this is not speech. However, before this compiler and machine combo exists, event the electronic form of this is speech! How could this be? Ern -----Original Message----- From: jkthomson [SMTP:jkthomson at bigfoot.com] Sent: Monday, July 06, 1998 7:12 PM To: cypherpunks at toad.com Subject: Junger et al. Reuters 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law professor's challenge to US regulations strictly limiting the export of computer data-scrambling technology. Judge James Gwin ruled late Friday that the export limits, which prevented Case Western Reserve University Law School professor Peter Junger from posting the text of encryption programs on the Internet, did not violate the constitutional right to free speech. The Ohio court's ruling contradicts a California district court ruling last August that said source code -- the instructions a person writes telling the computer what actions to perform -- constitutes a form of speech subject to First Amendment protection. "Unlike instructions, a manual or a recipe, source code actually performs the function it describes," Gwin wrote. "While a recipe provides instructions to a cook, source code is a device, like embedded circuitry in a telephone, that actually does the function of encryption." Neither ruling gave speech protection to compiled code, a version of source code converted into an actual software program that could be run on a computer. The US government appealed the California decision and the issue may ultimately be decided by the Supreme Court. Civil libertarians and high-tech companies had hoped the court would overturn the export limits on encryption technology, which uses mathematical formulas to scramble information and render it unreadable without a password or software "key." Once the realm of spies and generals, encryption has become an increasingly critical means of protecting electronic commerce and global communications over the Internet. But law enforcement agencies, fearing encryption will be used by terrorists and international criminals to hide their activities, have instituted strict controls to limit the export of strong scrambling products. Lawyers opposed to the export rules said the Ohio court misunderstood the difference between source code and compiled code. "The Ohio court clearly doesn't understand the communicative nature of software," said Shari Steele, an attorney with the Electronic Frontier Foundation. "It's true that software helps to perform functions, but it does so by telling computers what to do.... It certainly is speech deserving of the highest levels of First Amendment protection." ----------------------------------------------------------------------- james 'keith' thomson www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS ----------------------------------------------------------------------- Technology is introduced, utilized, depended upon, obsolete, standardized, and understood, in that order =======================================================================_ From PELUCHE-10 at worldnet.att.net Mon Jul 6 21:02:07 1998 From: PELUCHE-10 at worldnet.att.net (VICTOR HERRERA) Date: Mon, 6 Jul 1998 21:02:07 -0700 (PDT) Subject: No Subject Message-ID: <01bda95c$e2e22a00$1e83400c@edson> can u help me� thank u From egerck at laser.cps.softex.br Mon Jul 6 21:09:02 1998 From: egerck at laser.cps.softex.br (Ed Gerck) Date: Mon, 6 Jul 1998 21:09:02 -0700 (PDT) Subject: Junger et al. In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com> Message-ID: On Mon, 6 Jul 1998, Ernest Hua wrote: >So today, I can write the following: > >1. Find a container. >2. Fill container with explosive substance. >3. Move container to target location. >4. Detonate container. > >As soon as I have a compiler and a target machine that can execute these >instructions, suddenly this is not speech. However, before this >compiler and machine combo exists, event the electronic form of this is >speech! > >How could this be? Gwin has written a phrase which deserves more analysis, IMO -- free from political overtones if we want to be impartial. The phrase can be reworded as: "source code is a device, that actually does a function" The difference and importance here is between syntatic and semantics. Your 4-instruction source code above is not a device today -- it cannot perform any function. It has only syntatics, not the "how to". But, if there were a machine that could supply the proper semantics (ie, actually perform the functions 1-4) then your source code above would be a device. Further, your source code may not be a device today but be a device tomorrow. As another example, bringing together one pound of inert metal with another one pound of the same inert metal was not considered to be explosive -- until U235 was used for the inert metal and properly compressed. The difference is semantic, not syntatic. In that, Gwin is correct. Can the source code actually perform a function? Then, it is a device. Irrespective of the needed platform, in the same way that an electric shaver is a device irrespective of the local availablity of an appropriate power outlet. IMO, even though I consider Gwin to be correct to a very large extent, widespread use of crypto will not come from lifiting such bans ... but from real need -- which does not outweigh the hassle, today. The EFF has a wrong target there. Do you know how much Internet e-mail traffic is encrypted today? Can you believe less than 10%? Notwithstanding the rethoric exercises and limelight it may provide, talking about encryption export bans may not be as effective as desigining better and easier uses of strong crypto -- that can then really drive market, legislation and courts. Need to use is a better key than need to know, it seems. Cheers, Ed Gerck > >Ern > > -----Original Message----- > From: jkthomson [SMTP:jkthomson at bigfoot.com] > Sent: Monday, July 06, 1998 7:12 PM > To: cypherpunks at toad.com > Subject: Junger et al. > > > > Reuters > > 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has >dismissed a law > professor's challenge to US regulations strictly limiting the >export of > computer data-scrambling technology. > > Judge James Gwin ruled late Friday that the export limits, which >prevented > Case Western Reserve University Law School professor Peter >Junger from > posting the text of encryption programs on the Internet, did not >violate > the constitutional right to free speech. > > The Ohio court's ruling contradicts a California district court >ruling last > August that said source code -- the instructions a person writes >telling > the computer what actions to perform -- constitutes a form of >speech > subject to First Amendment protection. > > "Unlike instructions, a manual or a recipe, source code actually >performs > the function it describes," Gwin wrote. "While a recipe provides > instructions to a cook, source code is a device, like embedded >circuitry in > a telephone, that actually does the function of encryption." > > Neither ruling gave speech protection to compiled code, a >version of source > code converted into an actual software program that could be run >on a > computer. > > The US government appealed the California decision and the issue >may > ultimately be decided by the Supreme Court. > > Civil libertarians and high-tech companies had hoped the court >would > overturn the export limits on encryption technology, which uses > mathematical formulas to scramble information and render it >unreadable > without a password or software "key." > > Once the realm of spies and generals, encryption has become an >increasingly > critical means of protecting electronic commerce and global >communications > over the Internet. > > But law enforcement agencies, fearing encryption will be used by >terrorists > and international criminals to hide their activities, have >instituted > strict controls to limit the export of strong scrambling >products. > > Lawyers opposed to the export rules said the Ohio court >misunderstood the > difference between source code and compiled code. > > "The Ohio court clearly doesn't understand the communicative >nature of > software," said Shari Steele, an attorney with the Electronic >Frontier > Foundation. "It's true that software helps to perform functions, >but it > does so by telling computers what to do.... It certainly is >speech > deserving of the highest levels of First Amendment protection." > > > > >----------------------------------------------------------------------- > james 'keith' thomson >www.bigfoot.com/~ceildh > jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D >[06.07.98] > ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 >[05.14.98] > ICQ:746241 at pgp.mit.edu ...and former sysop of >tnbnog BBS > >----------------------------------------------------------------------- > Technology is introduced, utilized, depended upon, obsolete, > standardized, and understood, in that order > >=======================================================================_ > ______________________________________________________________________ Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br http://novaware.cps.softex.br --- Meta-Certificate Group member, http://www.mcg.org.br --- From Hua at teralogic-inc.com Mon Jul 6 21:44:11 1998 From: Hua at teralogic-inc.com (Ernest Hua) Date: Mon, 6 Jul 1998 21:44:11 -0700 (PDT) Subject: Junger et al. Message-ID: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com> I think we are in violent agreement here ... Except that it seems odd that speech is no longer 1st amendment protected as soon as it can be interpreted by a machine to do something. So, then, if I want to deny you first amendment protections for something, I can simply write a compiler to turn your words into machine executable code, and suddenly, your words are no longer protected speech. How could that be a reasonable interpretation of functional versus not? Secondly, Gwin said that encryption is a special class of software which is MORE functional. This is definitely a misunderstanding, to say the least. I don't see how any particular class of software is necessarily more or less functional than other classes of software. In the functional sense, all software, when compiled and executed is functional, period (whether it performs according to its original design is irrelevant). Ern -----Original Message----- From: Ed Gerck [SMTP:egerck at laser.cps.softex.br] Sent: Monday, July 06, 1998 9:09 PM To: Ernest Hua Cc: cypherpunks at toad.com; 'cryptography at c2.net' Subject: RE: Junger et al. On Mon, 6 Jul 1998, Ernest Hua wrote: >So today, I can write the following: > >1. Find a container. >2. Fill container with explosive substance. >3. Move container to target location. >4. Detonate container. > >As soon as I have a compiler and a target machine that can execute these >instructions, suddenly this is not speech. However, before this >compiler and machine combo exists, event the electronic form of this is >speech! > >How could this be? Gwin has written a phrase which deserves more analysis, IMO -- free from political overtones if we want to be impartial. The phrase can be reworded as: "source code is a device, that actually does a function" The difference and importance here is between syntatic and semantics. Your 4-instruction source code above is not a device today -- it cannot perform any function. It has only syntatics, not the "how to". But, if there were a machine that could supply the proper semantics (ie, actually perform the functions 1-4) then your source code above would be a device. Further, your source code may not be a device today but be a device tomorrow. As another example, bringing together one pound of inert metal with another one pound of the same inert metal was not considered to be explosive -- until U235 was used for the inert metal and properly compressed. The difference is semantic, not syntatic. In that, Gwin is correct. Can the source code actually perform a function? Then, it is a device. Irrespective of the needed platform, in the same way that an electric shaver is a device irrespective of the local availablity of an appropriate power outlet. IMO, even though I consider Gwin to be correct to a very large extent, widespread use of crypto will not come from lifiting such bans ... but from real need -- which does not outweigh the hassle, today. The EFF has a wrong target there. Do you know how much Internet e-mail traffic is encrypted today? Can you believe less than 10%? Notwithstanding the rethoric exercises and limelight it may provide, talking about encryption export bans may not be as effective as desigining better and easier uses of strong crypto -- that can then really drive market, legislation and courts. Need to use is a better key than need to know, it seems. Cheers, Ed Gerck > >Ern > > -----Original Message----- > From: jkthomson [SMTP:jkthomson at bigfoot.com] > Sent: Monday, July 06, 1998 7:12 PM > To: cypherpunks at toad.com > Subject: Junger et al. > > > > Reuters > > 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has >dismissed a law > professor's challenge to US regulations strictly limiting the >export of > computer data-scrambling technology. > > Judge James Gwin ruled late Friday that the export limits, which >prevented > Case Western Reserve University Law School professor Peter >Junger from > posting the text of encryption programs on the Internet, did not >violate > the constitutional right to free speech. > > The Ohio court's ruling contradicts a California district court >ruling last > August that said source code -- the instructions a person writes >telling > the computer what actions to perform -- constitutes a form of >speech > subject to First Amendment protection. > > "Unlike instructions, a manual or a recipe, source code actually >performs > the function it describes," Gwin wrote. "While a recipe provides > instructions to a cook, source code is a device, like embedded >circuitry in > a telephone, that actually does the function of encryption." > > Neither ruling gave speech protection to compiled code, a >version of source > code converted into an actual software program that could be run >on a > computer. > > The US government appealed the California decision and the issue >may > ultimately be decided by the Supreme Court. > > Civil libertarians and high-tech companies had hoped the court >would > overturn the export limits on encryption technology, which uses > mathematical formulas to scramble information and render it >unreadable > without a password or software "key." > > Once the realm of spies and generals, encryption has become an >increasingly > critical means of protecting electronic commerce and global >communications > over the Internet. > > But law enforcement agencies, fearing encryption will be used by >terrorists > and international criminals to hide their activities, have >instituted > strict controls to limit the export of strong scrambling >products. > > Lawyers opposed to the export rules said the Ohio court >misunderstood the > difference between source code and compiled code. > > "The Ohio court clearly doesn't understand the communicative >nature of > software," said Shari Steele, an attorney with the Electronic >Frontier > Foundation. "It's true that software helps to perform functions, >but it > does so by telling computers what to do.... It certainly is >speech > deserving of the highest levels of First Amendment protection." > > > > >----------------------------------------------------------------------- > james 'keith' thomson >www.bigfoot.com/~ceildh > jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D >[06.07.98] > ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 >[05.14.98] > ICQ:746241 at pgp.mit.edu ...and former sysop of >tnbnog BBS > >----------------------------------------------------------------------- > Technology is introduced, utilized, depended upon, obsolete, > standardized, and understood, in that order > >======================================================================= _ > ______________________________________________________________________ Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br http://novaware.cps.softex.br --- Meta-Certificate Group member, http://www.mcg.org.br --- From egerck at laser.cps.softex.br Mon Jul 6 22:28:14 1998 From: egerck at laser.cps.softex.br (Ed Gerck) Date: Mon, 6 Jul 1998 22:28:14 -0700 (PDT) Subject: Junger et al. In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com> Message-ID: On Mon, 6 Jul 1998, Ernest Hua wrote: >I think we are in violent agreement here ... > >Except that it seems odd that speech is no longer 1st amendment >protected as soon as it can be interpreted by a machine to do something. >So, then, if I want to deny you first amendment protections for >something, I can simply write a compiler to turn your words into machine >executable code, and suddenly, your words are no longer protected >speech. How could that be a reasonable interpretation of functional >versus not? > By the same reasoning as in my posting: >> >>As another example, bringing together one pound of inert metal with >>another one pound of the same inert metal was not considered to be >>explosive -- until U235 was used for the inert metal and properly >>compressed. The difference is semantic, not syntatic. >> Thus, your instructions to bring together those two one-pound pieces would be your right to free speech -- maybe it is poetry -- as long as that is not recognized as a federal crime! After it boooms the first time... it is a device, and it is immediately recognized to be an unlawful one. >Secondly, Gwin said that encryption is a special class of software which >is MORE functional. This is definitely a misunderstanding, to say the I could not find that quote -- "more functional". BTW, I think that Gwin was struggling to express the notion that source code (syntax) is a device whenever there is a clear binding between that source code and known semantics, together with proper pragmatics (the enviroment, as defined in semiotics), in order to perform the desired function. This is called a Just In-Iime Compiler ... and Gwin is 100% right when he affirms that the difference between source code and compiled code is null regarding its effects -- its desired function. Thus, if the device is unlawful then it must be unlawful both as a source code and as a compiled code. Cheers, Ed Gerck ______________________________________________________________________ Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br http://novaware.cps.softex.br --- Meta-Certificate Group member, http://www.mcg.org.br --- From nobody at REPLAY.COM Mon Jul 6 23:35:05 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 6 Jul 1998 23:35:05 -0700 (PDT) Subject: no subject!Anti-National ID Bill Message-ID: <199807070635.IAA08822@basement.replay.com> Where is this? Stalled. Looks dead in the water. Any further insights? H.R.3261 SPONSOR: Rep Paul (introduced 02/25/98) SUMMARY: (AS INTRODUCED) Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors and Disability Insurance) of the Social Security Act and the Internal Revenue Code to prohibit any Federal, State, or local government agency or instrumentality from using a social security account number or any derivative as the means of identifying any individual, except for specified social security and tax purposes. Amends the Privacy Act of 1974 to prohibit any Federal, State, or local government agency or instrumentality from requesting an individual to disclose his social security account number on either a mandatory or a voluntary basis. Prohibits any two Federal agencies or instrumentalities from implementing the same identifying number with respect to any individual, except as authorized under this Act. ---- STATUS: Detailed Legislative Status House Actions Feb 25, 98: Referred to the Committee on Ways and Means, and in addition to the Committee on Government Reform and Oversight, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned. Mar 2, 98: Referred to the Subcommittee on Government Management, Information and Technology. Feb 25, 98: Referred to the Committee on Ways and Means, and in addition to the Committee on Government Reform and Oversight, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned. From mgraffam at mhv.net Tue Jul 7 00:21:04 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Tue, 7 Jul 1998 00:21:04 -0700 (PDT) Subject: Junger et al. In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com> Message-ID: On Mon, 6 Jul 1998, Ernest Hua wrote: > Did anyone demonstrate the "functionalness" of any arbitrary language > via a scanner and a compiler? Indeed.. what we need is for someone to testify to the court about natural and computer language, and maybe some relevent material from information theory. Pseudo-code from any computer programming textbook would be helpful in making this point too. What about English in a voice recognition system? In this case, English can actually perform functions too, just as C does. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "Enlightenment is man's emergence from his self-incurred immaturity. Immaturity is the inability to use one's own understanding without the guidance of another. . .Sapere aude! Have the courage to use your own understanding!" - Immanuel Kant "What is Enlightenment?" From reinhold at world.std.com Tue Jul 7 05:46:16 1998 From: reinhold at world.std.com (Arnold G. Reinhold) Date: Tue, 7 Jul 1998 05:46:16 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: At 9:13 AM -0400 7/6/98, Robert Hettinga wrote: >Hettinga's three laws of internet payment technology investment: > >1. Geodesic, peer-to-peer transactions. >2. Three orders of magnitude cost reduction. >3. Nothing but net. > >The application of the above to Cybercash, or SET, for that matter, I leave >as an exercise for the reader... > Three orders of magnitude cost reduction as compared to what? I can believe that much improvement over running my credit card thru an imprinter and processing the paper slip. But I doubt you can get anything like1000X over SET, ugly as it is. Arnold Reinhold From Donotreply at 28806.com Tue Jul 7 05:55:49 1998 From: Donotreply at 28806.com (DOnotreply) Date: Tue, 7 Jul 1998 05:55:49 -0700 (PDT) Subject: Best Free XXX on the net!!!! Message-ID: <199807071254.FAA18182@toad.com> I have compiled a list of the best free XXX sites on the net!! Take a look at: Best ever You will save a lot! From billp at nmol.com Tue Jul 7 06:49:46 1998 From: billp at nmol.com (bill payne) Date: Tue, 7 Jul 1998 06:49:46 -0700 (PDT) Subject: keystrokes and crooked judges Message-ID: <35A22681.7F5D@nmol.com> I am reading http://www.jya.com/gaks-de.htm Perhaps this e-mail may interest you Best bill http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html Monday 6/8/98 7:53 AM John Young I am reading http://jya.com/sitesec.htm a bit more carefully. You have NEVER WRITTEN SO MUCH. Fishing was great. I used a $10 THE INSTANT CALLING CARD [TM] VOCALL COMMUNICATIONS CORP The World's Most advanced prepaid Calling Card which allows access with a pin of 718-2455-7091-xxx [my SECRET] in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN, FRENCH, ITALIAN to call you TWICE on Saturday. At only $.14/min. I left one message about Xandi and spiking computer keyboards. Xandi MADE low-power transmitters, http://www.gernsback.com/HyperNews/get/forums/resource/226.html like the kind I MIGHT use IF I were going to spike a keyboard [most which use an 8051 http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2] so that the keystrokes would be broadcast. This, of course, defeats crypto attempts to cipher keystrokes. But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other government agency. I, as a DOE contractor employee, was protected under 10 CFR 708. http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0 But 10 CFR 708 does not appear to be working well in my case. Therefore, we had to try other remedies. VOCALL is getting real close to digital cash, one of Orlin Grabbe's interests. http://www.aci.net/kalliste/dcguide.htm I have to do mostly technical work on the digital FX this week but will try to get two notices of appeal to the Tenth circuit written. http://jya.com/whp043098.htm Morales and I, with all the publicity you and Orlin have given us, can go all the way to the Supreme Court with our genocide and crypto deficiency lawsuits. http://jya.com/whpfiles.htm Pro se, of course. Too bad NSA did not take my criticisms of its shift register work more constructively. http://jya.com/da/whpda.htm, click on Appendix S Perhaps NSA should have worked with some of us at Sandia to come-up with fixes to overcome deficiencies. This unpleasantness could have been avoided. I've had ideas to improve shift register algorithm operation before. http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html Let's all hope for settlement of this UNFORTUNATE matter before it gets worse. Later bill And this too. Subject: FBI agents and Junger Date: Tue, 07 Jul 1998 07:32:36 -0600 From: bill payne To: jy at jya.com CC: art morales , whitfield diffie , tom carpenter - halcyon , marc rotenberg , national employee rights institute , mab at research.att.com, mejudson at mail.wdn.com, lwirbel at aol.com, klayman , john gilmore , jpcarson at mindspring.com, jdelia at gnn.com, jeff debonis <76554.133 at compuserve.com>, jay coughlan , jason vest , j orlin grabbe , david sobel , Cindy at McGlashan.com Tuesday 7/7/98 7:28 AM John Young I am reading http://www.jya.com/pdj10.htm FBI agents Perez, Rodrigues, and Silva warned us about the crooked judges at the appellate level. The FBI blackmailed Perez, Rodrigues, and Silva into a cheap settlement of their race discrimination lawsuit win in Lucius Bunton's West Texas court. They all lost money. And all got divorced. Perez is a buddy of Morales and Gonzales. Gonzales and Armenta are buddies of Silva. Hugo Rodrigues moved to Florida. This information is VERY VALUABLE to Morales and me. It shapes our response to the two letters from the Tenth I put in the mail to you yesterday. NO FUTURE IN ARGUING POINTS OF LAW WITH CROOKED JUDGES. bill Counterfeiting Wiegand Wire Access Credentials Bill Payne October 16,1996 Abstract Wiegand wire access credentials are easy and inexpensive to counterfeit. Access Control & Security Systems Integration magazine, October 1996 [http://www/securitysolutions.com] published the article, Wiegand technology stands the test of time by PAUL J. BODELL, page 12 Many card and reader manufacturers offer Wiegand (pronounced wee-gand) output. However, only three companies in the world make Wiegand readers. Sensor Engineering of Hamden Conn., holds the patent for Wiegand, and Sensor has licensed Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, Germany, to manufacture Wiegand cards and readers. ... A Wiegand output reader is not the same thing as a Wiegand reader, and it is important to understand the differences. In brief, Wiegand reader use the Wiegand effect to translate card information around the patented Wiegand effect in which a segment of a specially treated wire generates an electronic pulse when subjected to a specific magnetic field. If the pulse is generated when the wire is near a pick-up coil, the pulse can be detected by a circuit. Lining up several rows of wires and passing them by a cold would generate a series of pulses. Lining up two rows of wires - calling on row "zero bits" and the other "one bits" - and passing them by two different coils would generate two series of pulses, or data bits. These data bits can then be interpreted as binary data and used to control other devices. If you seal the coils in a rugged housing with properly placed magnets, and LED and some simple circuitry, you have a Wiegand reader. Carefully laminate the special wires in vinyl, and artwork, and hot-stamp a number on the vinyl, and you have a Wiegand card. IN THE BEGINNING Wiegand was first to introduce to the access control market in the late 1970s. It was immediately successful because it filled the need for durable, secure card and reader technology. Embedded in the cards, Wiegand wires cannot be altered or duplicated. ... Bodell's Last statement is incorrect. Tasks for EASILY counterfeiting Wiegand wire cards are 1 Locate the wires inside the card to read the 0s and 1s. 2 Build an ACCEPTABLE copy of the card. Bodell's clear explanation of the working of a Wiegand card can be visualized zero row | | | one row | | binary 0 1 0 0 1 representation Solutions to Task 1 A X-ray the card B MAGNI VIEW FILM, Mylar film reads magnetic fields ... Edmunds Scientific Company, catalog 16N1, page 205, C33,447 $11.75 is placed over the top of the Wiegand card. COW MAGNET, Cow magnetics allow farmers to trap metal in the stomachs of their cows. Edmunds, page 204, C31,101 $10.75 is placed under the card. Location of the wires is easily seen on the green film. Mark the position of the wires with a pen. Next chop the card vertically using a shear into about 80/1000s paper-match-sized strips. Don't worry about cutting a wire or two. Note that a 0 has the pen mark to the top. A 1 has the pen mark at the bottom. Take a business card and layout the "paper match"-like strips to counterfeit the card number desired. Don't worry about spacing. Wiegand output is self-clocking! Tape the "paper-match - like" strips to the business card. Only the FUNCTION of the card needs to be reproduced! History Breaking electronic locks was done as "work for others" at Sandia National Laboratories beginning in 1992 funded by the Federal Bureau of Investigation/Engineering Research Facility, Quantico, VA. The FBI opined that this work was SECRET/NATIONAL SECURITY INFORMATION. Details of the consequences of this work are covered in Fired Worker File Lawsuit Against Sandia Specialist Says He Balked When Lab Sought Electronic Picklock Software, Albuquer Journal, Sunday April 25, 1993 State-sanctioned paranoia, EE Times, January 22, 1996 One man's battle, EE Times, March 22, 1994 Damn the torpedoes, EE Times, June 6, 1994 Protecting properly classified info, EE Times, April 11, 1994 DOE to scrutinize fairness in old whistle-blower cases, Albuquerque Tribune, Nov 7 1995 DOE boss accelerates whistle-blower protection, Albuquerque Tribune, March 27, 1996 DOE doesn't plan to compensate 'old' whistle-blowers with money, Albuquerque Tribune September 27, 199 From zida27 at aol.com Tue Jul 7 07:26:27 1998 From: zida27 at aol.com (Your Home Town) Date: Tue, 7 Jul 1998 07:26:27 -0700 (PDT) Subject: Your Home Town Provides Everything You Need Message-ID: <19980706199GAA18653@base.staffs.ac.uk> YOUR HOME TOWN WILL DO 100% OF THE WORK FOR YOU WE OFFER: You the chance to own your own Home Based Business. WE OFFER: To build your Home Based Business for you. WE OFFER You financial independence. WE OFFER: You life saving and life changing products. WE OFFER: You the easiest way we know to, improve your Health, your Wealth and your Happiness. For more information Call: Our toll free 24 hr message center at 888-771-9338 Our toll free 24 hr recorded message at 888-771-9340. Reference # 1007698 our research showed you would be interested in this subject. If this is not true and you would like to be removed from our data base please call 888-771-9338 and leave your e-mail address for removal. Thank You. From rah at shipwright.com Tue Jul 7 07:40:04 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 7 Jul 1998 07:40:04 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: At 8:47 AM -0400 on 7/7/98, Arnold G. Reinhold wrote: > Three orders of magnitude cost reduction as compared to what? I can > believe that much improvement over running my credit card thru an imprinter > and processing the paper slip. Yes. SSL and HTML does that to paper, even telephone, credit card transactions. As long as you're using the net anyway. :-). > But I doubt you can get anything like1000X > over SET, ugly as it is. Actually, it's *SET's* burden to proove that it's 1000X cheaper (including the cost of fraud) than SSL, the status quo ante of internet payment systems. I don't think SET is cheaper, much less three orders of magnitude cheaper, than SSL. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From jya at pipeline.com Tue Jul 7 08:17:39 1998 From: jya at pipeline.com (John Young) Date: Tue, 7 Jul 1998 08:17:39 -0700 (PDT) Subject: US to Ease Crypto Export Message-ID: <199807071517.LAA25263@dewdrop2.mindspring.com> 7 July 1998 Source: http://www.washingtonpost.com/wp-srv/WPlate/1998-07/07/064l-070798-idx.html Thanks to FT U.S. to Ease Limits on Export of Data-Scrambling Technology By Elizabeth Corcoran Washington Post Staff Writer Tuesday, July 7, 1998; Page E04 Commerce Secretary William Daley plans to announce today that the government will give U.S. software companies new freedom to export their most sophisticated data-scrambling technology to financial institutions chartered in 45 countries, according to Clinton administration sources. Under the new rules, which officials said are likely to take effect in late summer, eligible banks, securities firms, brokerage houses and credit-card companies will need to receive approval only once from the Commerce Department before they can license the most sophisticated "encryption," or data-scrambling, technology. Once they receive approval, those institutions will be permitted to share the technology with any of their branch offices, except for those located in terrorist states. Government sources estimate that the new rules will include about 70 percent of the world's banks, including the 100 largest (ranked by assets). For years, the government has closely regulated export of encryption software, on the grounds that terrorists or hostile governments might use it to cloak their communications. The software industry argues that the rules are unworkable and unfairly block foreign sales. Unfriendly parties wanting to use encryption already can obtain it overseas, industry executives said. The new rules on banks are "a move in the right direction," said one industry executive familiar with the regulations. "But we're still leaving some groups out. Basically, we need to keep spreading the circle wider," to include the growing number of businesses offering financial services, such as insurance companies. "What we've heard sounds great," said Kawika Daguio, a lobbyist for the American Bankers Association. "We've been arguing [for several years] that the regulatory structure we have guarantees we're good citizens" who wouldn't make illicit use of the technology, he said. Now the government appears to have agreed. Current regulations require that U.S. companies apply for permits before exporting anything but the simplest versions of encryption products. To export more sophisticated technology, organizations must have a plan for creating so-called "spare keys." That way, law enforcement officials who have obtained a court order would be able to unlock the information. In May 1997, the Commerce Department said it would not restrict the sophistication of the data-encryption technology sold to financial institutions. But it required spare keys and case-by-case licensing. Approvals have been slow. Now the government is doing away with the key requirement, defining more precisely which financial institutions qualify and pledging to end case-by-case approval. Because of concerns about money laundering, the government will grant the new permission only to financial institutions chartered in countries that have agreed to take steps against money-laundering. If U.S. companies want to sell to financial institutions chartered in other countries, they will have to apply for licenses from the Commerce Department. Such provisions still fall short of the demands of U.S. companies. "To take a piecemeal approach [to loosening encryption restrictions] is the wrong direction," said Ed Gillespie, executive director of Americans for Computer Privacy, a lobbying group. "We need a blanket lifting of restrictions with individual prohibitions," such as bans on sending such technology to terrorist states, he said. In a related development, a federal court in Ohio ruled on Friday that posting the text of an encryption program on the Internet, where people all over the world could see it, was not protected by the constitutional right to free speech. The ruling, made late Friday, contradicts a ruling made by a California district court last August. Privacy advocates predict that the issue will be taken up by the U.S. Supreme Court. � Copyright 1998 The Washington Post Company From CTIA_Daily_News at um2.unitymail.com Tue Jul 7 09:13:58 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 7 Jul 1998 09:13:58 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 7, 1998 Message-ID: <199807071605.LAA11317@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. ============================================= From info at homebusinesscentral.net Tue Jul 7 09:56:42 1998 From: info at homebusinesscentral.net (info at homebusinesscentral.net) Date: Tue, 7 Jul 1998 09:56:42 -0700 (PDT) Subject: MAKE MORE MONEY ONLINE Message-ID: <199807071656.JAA23629@toad.com> Dear Friend and Internet Entrepreneur, Discover little known ways of how to promote virtually any product, service or idea online and see income within 24 hours. Guranteed! It's finally here! **ALL NEW** E-Mail Marketing Home Study Course reveals how to use responsible, targeted, e-mail marketing in your business to boost Web site traffic, generate leads, sell products, and make more sales online. Learn totally new information about how to e-mail your sales message to prospects and sell your products and services online without getting flamed. Discover detailed techniques for using opt-in marketing, compiling mailing lists, the secrets of writing ad copy, and much more. You will learn: How to create targeted e-mail lists of prospects who are as much as 5 times more responsive than names you can rent or buy. Discover which e-mail management and sending software is best. (And Receive A FREE 10 Day Trial Version Of The Best One) Discover which teaser ads and subject lines get your mail opened and responded to quickly. How to use e-mail to generate qualified traffic to a Web site. And Much Much More.... You will receive an extensive step by step course guiding you every step of the way! Plus as part of this national marketing test if you ACT NOW! you are going to receive as a bonus gift: "The Secrets To Successful Search Engine Submission" Audio series Learn how to get on top and stay on top! "I generated 19 brand new paying customers in less than a week with this course" Thank You To learn more about this exciting course please visit us at http://www.homebusinesscentral.net/emarket.html This is a very limited offer, so act now! To be removed from this list please respond with "remove" in the subject field World Tek Inc. 7210 Jordan Ave. Canoga Park CA. 91303 1-818-718-9429 From bill.stewart at pobox.com Tue Jul 7 10:07:12 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Tue, 7 Jul 1998 10:07:12 -0700 (PDT) Subject: Private-enterprise wiretapping Message-ID: <3.0.5.32.19980707100633.0090d580@popd.ix.netcom.com> STOLEN NUMBERS -- [New York Times, p. 31, 7/5.] Federal investigators said the scam was ingenious in its simplicity: Five people in New York City would tap into public pay phones at major airports across the country, then steal calling-card numbers punched in by unsuspecting travelers. The scheme ended last month with the arrests of four men and one woman. But the case is only the latest machination in a $4-billion-a-year telephone fraud industry that keeps reinventing itself. "This is something we have not seen before," said Boyd Jackson [of] network security at AT&T, one of the industry experts who helped Federal investigators on the case. "And there is nothing I am aware of that customers can do to fully protect themselves." The Secret Service was tipped off by AT&T, Bell Atlantic and MCI after they received an unusually high number of complaints from customers who had recently used their calling cards in airports. [Also San Jose Mercury News, 1C; Rocky Mountain News, 33A; Sun-Sentinel, 3A, 7/4.] From caj at math.niu.edu Tue Jul 7 10:53:49 1998 From: caj at math.niu.edu (Xcott Craver) Date: Tue, 7 Jul 1998 10:53:49 -0700 (PDT) Subject: Junger et al. In-Reply-To: Message-ID: On Tue, 7 Jul 1998 mgraffam at mhv.net wrote: > Indeed.. what we need is for someone to testify to the court about > natural and computer language, and maybe some relevent material from > information theory. What we need, IMO, is a well-placed stunt or two. On sci.crypt a while ago I mentioned that if perl-RSA got any smaller, one could make it the *subtitle* of one's next book: "Blah blah blah: what ``/usr/bin/perl blah blah blah ...'' means." The result would be a book, with book-like 1st amendment protections, but which would turn ONLINE library card catalogs into online repositories for strong crypto. Need RSA? Look up the book, cut and paste into a shell. Ta Daaaa! You're an evil terrorist. The point of this is to drive home the fact that while source code is something that *does* (i.e., a device), it's also something that *says*. It's information, even if executable information, and cannot be dispatched as easily as a gun or a bomb. Should the government attempt to declare a book title a munition, it'll fer sure end up in CNN fringe. > Pseudo-code from any computer programming textbook would be helpful > in making this point too. You'd need to prove it easily runnable. What's the tech status of OCR via, say, a minicam? If you could just hold a page of _Applied Crypto_ up to your computer and have it gleen C source (much easier than gleening English), It'll demonstrate the fuzziness of these things (again, IMO) in much starker terms than would just using a scanner. Another project would be to collect all our number theory and abstract algebra books, and type in verbatim the sections on RSA. These usually contain instructions somewhere between pseudocode and conversational English. If someone could for a Masters thesis develop a program capable of reading that stuff... -Caj From Cindy at mcglashan.com Tue Jul 7 11:15:45 1998 From: Cindy at mcglashan.com (Cindy Cohn) Date: Tue, 7 Jul 1998 11:15:45 -0700 (PDT) Subject: Junger decision Message-ID: <199807071759.KAA28716@gw.quake.net> For those who haven't yet heard, Judge Gwin in the District Court in Ohio has granted the government summary judgment in the Junger case. Judge Gwin apparently agreed with the government that the "functionality" of encryption source code, and the government's claims that it only intends to regulate that "functionality" mean that the regulations are not "narrowly and directed at expressive conduct" and so do not merit prior restraint analysis. The Judge then held that the regulations were content neutral, applied the intermediate scrutiny tests and found that the export restrictions meet those tests. I haven't had the opportunity to review the decision yet. As soon as I have, I will post some brief comments. Still no decision from the 9th Circuit in Bernstein. Cindy ****************************** Cindy A. Cohn, Cindy at McGlashan.com McGlashan & Sarrail, P.C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (650) 341-2585 (tel) (650) 341-1395 (fax) From johnl at iecc.com Tue Jul 7 11:20:03 1998 From: johnl at iecc.com (John R Levine) Date: Tue, 7 Jul 1998 11:20:03 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: > >2. Three orders of magnitude cost reduction. CyberCash's entire business model for e-cash is wrong. They ask for a 4% slice of each transaction, which is absurd. How much do issuers of real cash ask per transaction? Zero, of course. As I've mentioned before, the way you make money with money is seignorage, that is you print it and make your profit on the float and on coins that are never redeemed. Works great for travellers checks. I suspect that Bob H. would agree. Regards, John Levine, johnl at iecc.com, Primary Perpetrator of "The Internet for Dummies", Information Superhighwayman wanna-be, http://iecc.com/johnl, Sewer Commissioner Finger for PGP key, f'print = 3A 5B D0 3F D9 A0 6A A4 2D AC 1E 9E A6 36 A3 47 From root at ssds.com Tue Jul 7 11:29:21 1998 From: root at ssds.com (Jim Burnes) Date: Tue, 7 Jul 1998 11:29:21 -0700 (PDT) Subject: Junger et al. In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, 6 Jul 1998, Ernest Hua wrote: > I think we are in violent agreement here ... > > Except that it seems odd that speech is no longer 1st amendment > protected as soon as it can be interpreted by a machine to do something. > So, then, if I want to deny you first amendment protections for > something, I can simply write a compiler to turn your words into machine > executable code, and suddenly, your words are no longer protected > speech. How could that be a reasonable interpretation of functional > versus not? > Obviously there is no difference between 10 lines of PERL and 1500 lines of assembler (or machine code). Executability is in the eye of the beholder. I can create an interpreter to execute english (and in fact have done so in LISP). Does that mean english is no longer protected? By the same argument, DNA is also a device. The federal government can now determine who you can reproduce with. (eugenics?) DNA strands are instructions, code if you will, that describe to cellular automata (literally ;-), how to (1) create a human being (that could be dangerous -- they've been known to kill) and (2) through fantastic complexity generate a fully functioning human being, with all the behavioral patterns and biological operations necessary to sustain said human being. Imputing "deviceness" to code is missing the point. There is "deviceness" in all information. It just depends on the context. I would argue that it is specifically this "deviceness" that is protected in the first amendment. Speech isn't just about yammering on about abstract concepts. The imperative form of speech is probably the most necessary to protect in a free society. The most sacred form of democratic speech is probably the vote. Does it contain "deviceness"? Absolutely. The vote is democratic force. Is it not protected speech? Speech in action is code in action. When they can make code illegal, they can make comittees to un-elect illegal and they can make talking about impeaching the president illegal. Think about that. PostScript: It seems its not so much speech they don't like. They don't like us talking to our computers, because there are some things that computers do that are very powerful. Maybe more powerful than the state can handle. In other words, I can tell Jan Hammer in Germany exactly how to do what PGP does. It might take him an infinity to actually do it, but that speech is protected. When I tell Jan's computer how to do it, its illegal. So speech is ok as long as its ineffective. If it can actually effect change then its illegal. Interesting notion of free speech. jim -----BEGIN PGP SIGNATURE----- Version: PGP 5.0i Charset: noconv iQA/AwUBNaJpoulhVGT5JbsfEQJU/gCgziy0U50OJXycwYNZPd4XsUuQfP8An3NY BiWWWH8zvcvdVgKf2AM9ANu6 =6abs -----END PGP SIGNATURE----- From nobody at REPLAY.COM Tue Jul 7 11:41:03 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 7 Jul 1998 11:41:03 -0700 (PDT) Subject: Junger et al. Message-ID: <199807071841.UAA18158@basement.replay.com> Nevermind that source code is suppose to be "human readable" material that is _translated_ into function instructions of machine code. A play is normally considered 'protected' free speech under US law, but what if robot was created which acted out the play and Gwin's argument was extended to apply the situtation where a play performed. Would the play itself no longer be a protected form of free speech, because it is seen as "functional" instructions to the robot actor? Would the playwrite become responsible for the robot's actions, such as killing a character/actor? As a programmer, I have "acted out" source code myself, as part of the debugging process. It is normally called "a walkthrough," so the difference between source code and a play is not as broad as some people may view it. I have followed the source code like a script, acting out the instructions like stage directions in a play. Does it matter who might 'read' the material, in regards to the protection of free speech? Whether it is written so that Russians or computers might be able to read it? If source code is written on a napkin, it can be currently exported, but what if tomorrow a vendor announces a 'napkin computer' which can directly read from napkins akin to a super-low densiy floppy disc. At 07:20 PM 7/6/98 -0700, Ernest Hua wrote: >Did anyone demonstrate the "functionalness" of any arbitrary language >via a scanner and a compiler? > >Why doesn't Gwin understand that the moment one successfully claims that >a specific class of source code is not speech by the virtue of the fact >that a compiler can transform it automatically into executable code >which performs a function, then ANY speech of ANY sort is fundamentally >vulnerable to being classified as functional as soon as a compiler can >transform it into real machine code. > >Ern > > -----Original Message----- > From: jkthomson [SMTP:jkthomson at bigfoot.com] > Sent: Monday, July 06, 1998 7:12 PM > Reuters > >3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law >professor's challenge to US regulations strictly limiting the export of >computer data-scrambling technology. > >Judge James Gwin ruled late Friday that the export limits, which prevented >Case Western Reserve University Law School professor Peter Junger from >posting the text of encryption programs on the Internet, did not violate >the constitutional right to free speech. > >The Ohio court's ruling contradicts a California district court ruling last >August that said source code -- the instructions a person writes telling >the computer what actions to perform -- constitutes a form of speech >subject to First Amendment protection. > >"Unlike instructions, a manual or a recipe, source code actually performs >the function it describes," Gwin wrote. "While a recipe provides >instructions to a cook, source code is a device, like embedded circuitry in >a telephone, that actually does the function of encryption." From nobody at REPLAY.COM Tue Jul 7 12:27:01 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 7 Jul 1998 12:27:01 -0700 (PDT) Subject: A note on the latest randomness quarrel Message-ID: <199807071927.VAA23471@basement.replay.com> * Never use "the lowest few bits" or (t1>t2)?1:0 for the actual random number generation. You only use things like that for estimating the amount of entropy in a source. The number of bits of entropy in a pile of bits is one more than the base-two logarithm of the average number of guesses required of a badguy knowing your condidtioning routine, observing what it can, and interfering with your generator to figure out the value of the bits in the pile, so if your studies and statistical analyses estimate that it requires 2^127 guesses to guess the output of your conditioning routine, good for you, you've estimated that somewhere in its input are 128 bits of entropy. Um, I digress...point is, don't use that output straight. Take twice as much unconditioned input, non-random-looking stuff and all, as you estimate your conditioning routine needs to produce a key's worth of entropy and _hash_it_. Your conditioning routine can introduce some little bias you didn't see or make some unnoticed mistake that lets through predictable bits. Hashing can, too, but we've studied the hash functions to make sure they're good a lot more than we've studied your conditioning procedure. * A badguy's introduction of extra events doesn't poison your randomness. A badguy could introduce a multitude of predictable-but-random-looking events to make your generator close shop before it has enough unpredictable events to get its entropy. However, that only works if extra events make your generator stop collecting earlier. The amount of time it spends collecting randomness shouldn't depend on _any_ output of the generator, because that needlessly leaks entropy. Also, a badguy could introduce two nearly-simultaneous events near the beginning of the process, when it can be fairly sure that the wait between its events and the previous event will make a zero or make the lowest few bits of the delay between the bits match a certain value. (Interpreting that sentence is left as an exercise to the reader :) However, you can only do this in a system where your conditioning routine allows extra events to cause the routine to output bad bets. However, if you hash your raw data rather than using one of those conditioning routines, it's nearly -- nearly, that's your cue to say it has to be always -- impossible to weaken the output without knowing the other data hashed. Third, el badguy could introduce so many events that the gap between events was always less than the measurement threshhold. However, note that the Geiger counter, the computer, and the operator would all fail under these circumstances. Therefore, pretty much any strategy allowing extra events to kill entropy is flawed. ================================================================================ /// anonymous : nobody at replay.com : http://replay.com /// ================================================================================ From stuffed at stuffed.net Tue Jul 7 13:36:45 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Tue, 7 Jul 1998 13:36:45 -0700 (PDT) Subject: Kings & Queens/George Michael/Knocked up with NyQuil Message-ID: <19980707193242.4256.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 252 bytes Desc: not available URL: From jya at pipeline.com Tue Jul 7 14:04:16 1998 From: jya at pipeline.com (John Young) Date: Tue, 7 Jul 1998 14:04:16 -0700 (PDT) Subject: US to Ease Crypto Export In-Reply-To: <199807071517.LAA25263@dewdrop2.mindspring.com> Message-ID: <199807072104.RAA13648@dewdrop2.mindspring.com> There's a bit more on this from the Dept of Commerce. A press release that outlines the new policy and lists the 45 select countries: http://jya.com/doc-ease.htm Secretary Daley's speech today on broad export policy that touches on the crypto relaxation: http://jya.com/daley-expo.htm BXA Under Secretary Reinsch's speech today: http://www.bxa.doc.gov/press/98/BillUPDS.html The specific guidelines for easing of controls have not yet been issued, as far as we can learn. -------- The Junger decision is being scanned, later this evening Peter will announce it. From nobody at REPLAY.COM Tue Jul 7 16:32:49 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 7 Jul 1998 16:32:49 -0700 (PDT) Subject: Apology Message-ID: <199807072332.BAA17497@basement.replay.com> Might have just posted a message intended for coderpunks to the list, depending on whether toad still forwards. Sorry. From billp at nmol.com Tue Jul 7 18:07:45 1998 From: billp at nmol.com (bill payne) Date: Tue, 7 Jul 1998 18:07:45 -0700 (PDT) Subject: thinking about you and http://www.qainfo.se/~lb/crypto_ag.htm Message-ID: <35A2C56C.6A03@nmol.com> Tuesday 7/7/98 6:57 PM Laszlo Baranyi You DID NOT mention the Swiss radio international radio broadcasts. http://www.qainfo.se/~lb/crypto_ag.htm Rep McKinney and Sen Grassley now have copies. Send me a snail mail address and I will send you a copy. Using postcard, of course pob 14838 abq, nm 87191 usa Gustavus J Simmons Cryptanalysis and Protocol Failures COMMUNICATIONS OF THE ACM, November 1994, vol 37, no 11, page 56 The 'spiking' story, in obscure language. Simmons and R J Hanson http://sina.tcamc.uh.edu/~haskell/rjh/rjhres.html were two of the most responsible people for me coming to Sandia from Washington State U. Here are two of my former Ph.D. students in computer science from wsu. http://www.mhpcc.edu/general/john.html http://www.friction-free-economy.com NSA employee PAUL BRIDGE in about 1987 told me that Simmons was a security risk and that I should not talk to Simmons. In about 1992 I figured out something was fishy and began to talk to Simmons again. Simmons told me that he asked NSA employees Morris and Proto 1 NSA is sorry it delegated responsibility for implementation of electronic locks in the us nuclear arsenal to Sandia. 2 NSA wants the business back. Simmons told me neither Morris or Proto would respond to his question. Let's ALL http://www.wpiran.org/ hope for settlement of this UNFORTUNATE MESS. bill From listmaster at extensis.com Tue Jul 7 18:54:17 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Tue, 7 Jul 1998 18:54:17 -0700 (PDT) Subject: Announcing Extensis Preflight Pro 2.0 Message-ID: The Award-Winning, Preflighting Tool from Extensis Just Got Better. http://www.extensis.com/products/pfp2/ � New! Now supports all major graphics applications! � Inspect, correct and collect print jobs for perfect prepress delivery. � Advanced features include profiles, PDF creation, and AppleScript Automation. � FREE! 5 free copies of Collect Pro 2.0 with each copy of Preflight Pro 2.0! In May, Preflight Pro 1.0 received the 1998 Apple Design Award for Best Look and Feel. Just wait 'til they try 2.0. The best just got better. Extensis Preflight Pro is a comprehensive preflight solution designed to save prepress professionals significant time, money and materials. Preflight Pro inspects your documents and corrects problems to ensure they are error-free prior to printing. With an interface that mimics the traditional prepress workflow, Preflight Pro 2.0 provides you with a familiar environment to efficiently review files prior to printing. Further, Preflight Pro now supports documents in all the major graphics applications including Adobe PageMaker, Illustrator, Photoshop, QuarkXPress, Macromedia FreeHand, and Multi-Ad Creator2. New in Preflight 2.0 is the capability to automate the preflight process. Based on your custom settings for pass/fail, Preflight Pro uses 'watch folders' to determine which files are complete and ready for printing. Users can set the automation window for tasks, such as collecting a job or running an AppleScript. For greater utility, Preflight Pro now includes 5 free copies of Collect Pro 2.0. Give Collect Pro to any creative professional you work with to help them perfectly collect a job for hand-off to the prepress house. Collect Pro eliminates the problems of missing file information that can delay a job. Extensis Preflight Pro 2.0 will dramatically streamline your preflight workflow, saving you time, materials, headaches and money. In the world of preflighting, the best just got better. Introducing your Extensis PREFLIGHT SPECIALIST! For personal service or for more information, please contact your Preflight Specialist at (503) 274-2020 Ext. 167 or email to: mmoragne at extensis.com . For more information, to order, or to download a FREE, 30-day demo of Extensis Preflight Pro, please visit our web site at http://www.extensis.com/products/pfp2/ Or call at (800) 796-9798 or (503) 274-2020. * Preflight Pro is available for Macintosh users for $399.95 (includes 5 free copies of Collect Pro 2.0). * Special Extensis Customer Offer: Buy Preflight Pro for only $349.95 (SAVE $50! Includes 5 free copies of Collect Pro 2.0). * Special Upgrade Offer for PreFlight Pro 1.0 owners: Upgrade to Preflight Pro 2.0 for only $99.95 (SAVE $300! Includes 5 free copies of Collect Pro 2.0). Preflight Pro 2.0 and Collect Pro 2.0 are compatible with QuarkXPress 3.31 or later, including QuarkXPress 4.0, Adobe PageMaker 6.5 and later, Adobe Illustrator 5.5 and later, Adobe Photoshop 3.0.4 and later, Macromedia FreeHand 5.5 and later, and Multi-Ad Creator2 version 1.0. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with REMOVE in the subject line for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with ADD in the subject line and their email address in the body. From rah at shipwright.com Tue Jul 7 19:16:11 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 7 Jul 1998 19:16:11 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: At 2:19 PM -0400 on 7/7/98, John R Levine wrote: > CyberCash's entire business model for e-cash is wrong. They ask for a 4% > slice of each transaction, which is absurd. How much do issuers of real cash > ask per transaction? Zero, of course. > > As I've mentioned before, the way you make money with money is seignorage, > that is you print it and make your profit on the float and on coins that are > never redeemed. Works great for travellers checks. I suspect that Bob H. > would agree. Pretty much. Actually, the model I like is one where transactions on the net are free, but putting money *on* the net costs some smidge of money, just like buying traveller's checks cost money, something like one or two percent, I think. You can't get any network effects, oddly enough, if you charge to take it *off* the net, because merchants have to *pay* to participate. It would be as if you had to pay to redeem a traveller's check. If that were the case nobody would accept them. Pretty serious seignorage loss that would cause. :-). Again, I've a white paper on this. If anyone's interested, I'll send it to them offline. And, again, the dbs list folks have already seen it. :-). Speaking of gratuitous plugs ;-), there are only two more days until I close the subscription book on the symposium, and I still have some room. See and register now, if you want to go. Cheers, Bob ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From webmaster at nudevision.com Tue Jul 7 20:12:57 1998 From: webmaster at nudevision.com (webmaster at nudevision.com) Date: Tue, 7 Jul 1998 20:12:57 -0700 (PDT) Subject: FREE XXX VIDEO for your site !! Message-ID: <03024203507064@nudevision.com> Thats right FREE XXX VIDEO for your website.... - increase traffic - increase banner sales - BOOST your profit - Can be used by FREE SITE and PAY SITES FREE SITE webmasters go to http://free.nudevision.com MEMBERSHIP SITE webmasters go to http://www.nudevision.com/webmasters/index.htm We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which means SALES SALES SALES !! EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !! "WHAT? Are you guys nuts?" Well maybe a little..... go to http://www.traffictraders2.com for more details. GAY SITE webmasters click here: http://www.studvision.com/webmasters/index.html Best Regards, The Cytron Gang Cytron Technologies Ltd. Cytron Communications Ltd. From mok-kong.shen at stud.uni-muenchen.de Wed Jul 8 01:26:34 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 8 Jul 1998 01:26:34 -0700 (PDT) Subject: Junger et al. In-Reply-To: <199807071841.UAA18158@basement.replay.com> Message-ID: <35A32D1C.C9CE9598@stud.uni-muenchen.de> Anonymous wrote: > Does it matter who might 'read' the material, in regards to the protection > of free speech? Whether it is written so that Russians or computers might > be able to read it? If source code is written on a napkin, it can be > currently exported, but what if tomorrow a vendor announces a 'napkin > computer' which can directly read from napkins akin to a super-low densiy > floppy disc. Put the source code on a neuro-disk and you can export it under any crypto law that can ever be invented till eternity. M. K. Shen From StanSqncrs at aol.com Wed Jul 8 02:05:26 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Wed, 8 Jul 1998 02:05:26 -0700 (PDT) Subject: New Page! Message-ID: <634411ef.35a3361e@aol.com> I made another page, which details what Capital records did to Dark Side of the Moon when they reissued on cd. Guess what they covered-up. :-) Check it out, Stan, The Desecration of 'The Dark Side of the Moon' http://members.tripod.com/StanSqncrs/DarkSide/darkside.html From mgraffam at mhv.net Wed Jul 8 02:43:42 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Wed, 8 Jul 1998 02:43:42 -0700 (PDT) Subject: Junger et al. In-Reply-To: <35A32D1C.C9CE9598@stud.uni-muenchen.de> Message-ID: On Wed, 8 Jul 1998, Mok-Kong Shen wrote: > Put the source code on a neuro-disk and you can export it under > any crypto law that can ever be invented till eternity. Maybe.. or we'll all be outlaws.. one of the two. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "86% of conspiracy theories have some basis in truth... but, oddly enough, it's that last 14% that usually gets you killed." --Talas (http://cadvantage.com/~algaeman/conspiracy/public.htm) From aba at dcs.ex.ac.uk Wed Jul 8 03:32:02 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 8 Jul 1998 03:32:02 -0700 (PDT) Subject: RSA in perl illegal to export (Re: Junger et al.) In-Reply-To: Message-ID: <199807081004.LAA13983@server.eternity.org> Jim Burnes writes: > Obviously there is no difference between 10 lines of PERL and > 1500 lines of assembler (or machine code). One of Peter Junger's examples (I think used in the case) is the RSA in 2/3 lines. He actually obtained the US export administrations written decisions on which of a small collection of titchy programs was exportable. RSA in 3 lines of perl they stated was illegal to export. So fun things with RSA are possible because they have decided that it is not exportable, so perhaps you could export it on a floppy, or as your .signature, with media cameras rolling, and try to get yourself arrested for willful violation of dumb export laws. Adam -- Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199807081041.GAA16194@tana.mit.edu> Bob Hettinga wrote: > At 2:19 PM -0400 on 7/7/98, John R Levine wrote: > > > > CyberCash's entire business model for e-cash is wrong. They ask for a 4% > > slice of each transaction, which is absurd. How much do issuers of real > > cash > > ask per transaction? Zero, of course. > > > > As I've mentioned before, the way you make money with money is seignorage, > > that is you print it and make your profit on the float and on coins that are > > never redeemed. Works great for travellers checks. I suspect that Bob H. > > would agree. > > Pretty much. Actually, the model I like is one where transactions on the > net are free, but putting money *on* the net costs some smidge of money, > just like buying traveller's checks cost money, something like one or two > percent, I think. > > You can't get any network effects, oddly enough, if you charge to take it > *off* the net, because merchants have to *pay* to participate. It would be > as if you had to pay to redeem a traveller's check. If that were the case > nobody would accept them. Pretty serious seignorage loss that would cause. > :-). Haven't you said in the past that the *consumer* can't be charged anything to use the system in the way of fees (consumer being the party bringing money into the system), and that all fees need to get charged to the merchant (or whoever the party is who removes money from the system)? Certainly, at first order, the fee *should* be on removing money from the system, from a selfish point of view on the part of Ivan the Issuer -- if you're making money on seignorage, you're making money when people add money to the system *and leave it there*. Thus, you want to provide incentives for people to buy money and leave it there -- charging no "on" fees and minimal "off" fees would do it. To ensure that people have faith in the cheap convertability of electronic cash to real money, you could provide a highly regressive fee structure for taking money out of the system -- if people end up only redeeming their stuff through middlemen in huge batches, the fees will go down very fast, and so will your costs. The percentage cost of shipping a billion dollars to a major customer in exchange for a billion dollar token is much lower than shipping one billion one dollar bills to a bunch of holders of one dollar tokens. (This is an argument for regressive fees, not for charging out rather than in, since it would apply just as well to those who bought a billion tokens and then resold them, of course) >From a *technical* standpoint, it makes sense to design an electronic cash system to allow cheap coin-for-coin exchanges. The marginal cost of a transaction like this *is* 3 orders of magnitude less than one involving a back-office system and wire transfer. *This* is why electronic cash is 3 orders of magnitude cheaper than existing systems. If you kludge a back office system, a debit card system, and a wire transfer system onto the backend, transactions going through that system don't get any cheaper than they wold be in an unregulated traditional offshore bank. As an issuer, you want as few back-office processed transactions as possible, and those you do have, should be as large as possible. A better example is the credit card, rather than the traveler's check. I've *never* used a traveler's check, since I'm fundamentally annoyed by the idea that I'd have to pay a fee to put my money into the system. The *vast* majority of consumers are unwilling to pay a fee to conduct a transaction they can conduct in another way for free -- credit cards, cash, personal checks, wire transfer, or whatever. Merchants *already* pay money to handle money -- it's just another cost of doing business. For a merchant, processing *cash* costs money, credit cards cost 1-4%, and I'm sure traveler's checks cost *something* to handle. I think it's a fundamental principle of financial psychology that the resistance in going from a free service to a slightly charged service is far higher than even a much larger increase in a service that already costs money. I think the ideal fee structure for an electronic cash issuer is: * No cost to exchange coin-for-coin. These cost you microcents anyway. * Minimal (zero) cost to the public to issue cash. This could be done by selling large blocks of tokens at cost to issuers who are already in contact with the public, and who get some kind of tangible benefit from processing the transaction for the customer -- a pre-existing banking relationship that wants a value-add, a retail store, a web site with advertising, whatever. Primary market cash issuing might have a highly regressive fee structure, to force secondary markets to come into being, but this is not essential. * Secondary market redemption costs which *also* go to zero due to many players, for the same reason as issuance. Primary market should charge enough to recoup redemption costs (charge for the wire transfer, or whatever), and potentially a regressive structure to help pay for operations costs. Optionally, the issuer could link through a proprietary and cheap protocol their own bank accounts to the redemption of cash, making it much cheaper for customers of the issuer's bank to redeem cash. This is related to seignorage, if these bank accounts are at the same bank which holds the backing accounts for the currency. A lot of people have discussed this fee structure, and I agree with them that it is the best. AFAIK, Mark Twain had a somewhat opposite fee structure, and look at how successful they were... This model is not really the credit card model (charge per transaction), nor it is the traveler's check model. It is the *cash* model -- banks and cash handling companies charge handling fees for dealing with large quantities of paper bills. Think of user-to-user transactions as secondary market, withdrawing cash from the bank as primary market withdrawal, and exchanging electronic cash for fiat money as the (currently hypothetical) step of redeeming bank notes for their backing, or something similar to taking physical cash from retailer tills and getting it deposited to a cash management account. It is electronic *cash*, after all. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From rah at shipwright.com Wed Jul 8 05:17:29 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 8 Jul 1998 05:17:29 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote: > Haven't you said in the past that the *consumer* can't be charged anything to > use the system in the way of fees (consumer being the party bringing >money into > the system), and that all fees need to get charged to the merchant (or >whoever > the party is who removes money from the system)? Nope, and, if I did, I was wrong. :-). You probably can't bootstrap things on seignorage alone, I don't think, but if you did, again, you would kill your digital cash issue anyway, because of lack of merchant acceptance, especailly in the early phases. Note, in my canonical example, cash, that people already pay a fee for "foreign" ATM withdrawls anyway, and people are used to doing things that way. That's great, because I expect that margins on a net.ATM withdrawl through an underwriter would be significantly higher than what a bank makes on their non-customer ATM transactions. Three orders of magnitude cheaper? I wouldn't be surprised. > Certainly, at first order, the fee *should* be on removing money from the > system, from a selfish point of view on the part of Ivan the Issuer -- if > you're making money on seignorage, you're making money when people add money > to the system *and leave it there*. Thus, you want to provide incentives for > people to buy money and leave it there -- charging no "on" fees and minimal > "off" fees would do it. Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too. Didn't save them in the end, though. I just think that if merchants are the key to acceptance of digital bearer cash, much less fully anonymous blinded digital bearer cash :-), then you shouldn't charge merchants anything to accept the stuff. If a merchant can download a wallet or registerware free or very cheap, and instantly start taking cash payments for whatever they sell over the net, and, when it came time to take that cash and put it into their own bank it didn't cost them anything to do it, then they would probably accept the stuff a heartbeat. The cost of anything is the foregone alternative, three orders of magnitude, and all that and "free" comes pretty close to three orders of magnitude in cost reduction from merchant credit card fees in my book. :-). The other beneficiary, in terms of cost, of course, is both the underwriter, who's issuing cash for rediculously cheaper than a corresponding volume of noncustomer.meat.ATM transactions would cost, not to mention *some* seignorage :-), and the trustee, who's getting a share of both for something they do already for the mutual fund and stock/bond transfer markets. I see seignorage as a tasty long-view source of income, certainly, but I expect the half-life of a given dollar of digital cash to be measured in days, if not hours, in the early stages. Frankly, I don't see seignorage showing up significantly on the income statement of an underwriter until there are other bearer instruments (stocks, bonds, and especially mutual fund shares) to invest that cash in, keeping it on the net. I think that that's one of the reasons that the Fed, among other people, aren't too worried about the immediate macroeconomic effects of digital cash. That and that the Fed's seignorage income, in the overall scheme of Fed revenues, is pretty small, and probably dwarfed by other things like printing and handling costs, etc. Greenspan himself is/was a free banking advocate, certainly, and has said publically (see last September's Official Cypherpunk Forbes issue :-)) that he thinks that private electronic banknote issue is not a scary proposition at all. Anyway, by the time that there are other digital bearer instruments out there, and the money supply gets affected by digital cash seignorage, much less fractional reserve accounts, (which *will* happen as competition heats up and, someday even traveller's-check-type purchase premia on digital cash will go away [*some*day!]), then the central bankers will have other things to worry about besides just the impact if digital bearer settlement on their money supply. Problems like why have *national* instead of private, currencies, anyway. :-). Nice problem to have, I figure. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From jya at pipeline.com Wed Jul 8 05:37:28 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 05:37:28 -0700 (PDT) Subject: Initial summary/analysis: Junger v. Daley In-Reply-To: Message-ID: <199807081237.IAA10722@camel7.mindspring.com> Thanks to Greg for the excellent summary and analysis. Responses by Peter Junger and his attorneys, those involved with Bernstein and Karn, and others on the technical and legal interpretation would be welcome. On the interplay among the three cases: We have heard that there was meeting in DC of the three teams with the US side. And that there may have been a report on this meeting at the recent DC security conference. Is there a public report available? Note: Greg meant to quote Judge Gwin on source code: "all but *un*intelligible to most people." The contrast between Patel and Gwin remind of the campaign of Wassenaar members to claim relaxation of crypto controls while not truly doing so, as in the recent Irish and US press release deceptions. More are expected as the US trade and crypto czars make their global rounds to arrange overt-covert deals for marketing munitions. The complicity of the banks and giant corps is not surprising with their legacy of doing just that -- as one defense expert says, expect ex-gov crypto watchdogs to aid the market titans to lure government buyers while peddling cheap knockoffs to voters. Amazing that the NYT sent up that trial balloon for government access to key strokes in lieu of GAK. Who's pushing that, working on the technology? From egerck at laser.cps.softex.br Wed Jul 8 06:49:14 1998 From: egerck at laser.cps.softex.br (Ed Gerck) Date: Wed, 8 Jul 1998 06:49:14 -0700 (PDT) Subject: Ephemeral, was RE: Junger et al. Message-ID: Regarding my comment below: >Ed Gerck writes: >[...] > > BTW, I think that Gwin was struggling to express the notion that > > source code (syntax) is a device whenever there is a clear binding > > between that source code and known semantics, together with proper > > pragmatics (the enviroment, as defined in semiotics), in order to > > perform the desired function. > I received some private postings which questioned it by questioning its logical consequences, as for example: >So the judge should forbid publishing/export of Applied Cryptography >and the PGP Book with source code, right ? > First, IMO, this subject is hard to discuss because it is politically involved and also applies just to a particular set of countries -- so it is not based on a "universal" ruling. Further, I also think it is absurd to try to outlaw cryptography because it is essential and not just to obtain privacy (as in my posting on logical semantics and crypto, some months ago [1]). In fact, I think that cryptography is needed to provide *secure routing* [1] (a property that is more basic than secure content and which I think will be impossible to forbid in the future). However, I also think that the arguments being thought by each side may carry their own intrinsic worth. Further, even though the whole subject is IMO ephemeral because unworkable, some of those arguments may have a far reaching consequence and transcend the issue. Should we overlook that? IMO, no. Even thrash can be recycled ;-) My remark above was in this line of reasoning. So, it ought not to be extrapolated to printed books -- I am not at all concerned about the legal aspects. In fact, laws can be wrong and IMO this is a clear example. But, regarding printed books -- yes, the comment above (and others in that line) are right. If this logic exercise is carried to its fully immoral end, then books should not be allowed to carry complete and workable source code. Which does not show that the argument is illogical, just immoral. Technically, the argument is sound. As Hume pointed out a long time ago, if we were guided only by reason and logic then surely I should prefer to destroy the rest of the world instead of enduring even a small pain in one of my fingers. While this shows that logic is not all, it also shows that one cannot deny logic by moral or ethics but rather define what precedes what in case of conflict, for each society. While this can have different answers for different societies, eg where in some suicide is moral, the cryptography issue may take a different twist if the link to secure routing is further investigated and cryptography is not only used just for secure content as it is today. Thanks, Ed Gerck =========== Reference: [1] http://www.mcg.org.br/trustdef.htm#A.4.1 ______________________________________________________________________ Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br http://novaware.cps.softex.br --- Meta-Certificate Group member, http://www.mcg.org.br --- From ptrei at securitydynamics.com Wed Jul 8 06:52:54 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Wed, 8 Jul 1998 06:52:54 -0700 (PDT) Subject: Junger et al. Message-ID: > -----Original Message----- > From: Mok-Kong Shen [SMTP:mok-kong.shen at stud.uni-muenchen.de] > Anonymous wrote: > > > Does it matter who might 'read' the material, in regards to the > protection > > of free speech? Whether it is written so that Russians or computers > might > > be able to read it? If source code is written on a napkin, it can be > > currently exported, but what if tomorrow a vendor announces a 'napkin > > computer' which can directly read from napkins akin to a super-low > densiy > > floppy disc. > > Put the source code on a neuro-disk and you can export it under > any crypto law that can ever be invented till eternity. > > M. K. Shen [Trei, Peter] Tell that to the thousands forbidden to leave the nations which claim or claimed to own them, on the basis that they once had access to state secrets. The thankfully defunct Soviet Union regularly forbade dissidents to emigrate, on the basis that at some point in their lives they had had access to 'sensitive' information. I have no doubt that similar restrictions could be put in place in other nations. Peter Trei From mok-kong.shen at stud.uni-muenchen.de Wed Jul 8 07:26:19 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 8 Jul 1998 07:26:19 -0700 (PDT) Subject: Junger et al. In-Reply-To: Message-ID: <35A38178.4B276D1F@stud.uni-muenchen.de> Trei, Peter wrote: > > > -----Original Message----- > > From: Mok-Kong Shen [SMTP:mok-kong.shen at stud.uni-muenchen.de] > > Put the source code on a neuro-disk and you can export it under > > any crypto law that can ever be invented till eternity. > Tell that to the thousands forbidden to leave the nations > which claim or claimed to own them, on the basis that they > once had access to state secrets. I know the unfortunate truth of that. But I was excluding the exceptions and referring to disks that are new. > I have no doubt that similar restrictions could be put in > place in other nations. It is my conjecture that the chance of that happening in some countries that are not considered to be democratic is lower. M. K. Shen From jya at pipeline.com Wed Jul 8 08:10:47 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 08:10:47 -0700 (PDT) Subject: Junger Press Release Message-ID: <199807081510.LAA01265@camel14.mindspring.com> To: jvd-announce at samsara.law.cwru.edu Subject: Press Release: Judge holds software is not protected speech Date: Wed, 08 Jul 1998 09:39:36 -0300 From: "Junger v. Daley Announcements" Federal District Court Holds That Software Publishers Are Not Protected by the First Amendment Government Wins Summary Judgment in Junger v. Daley Judge Gwin's Opinion Is Available on Line ---------------------------------------------------------------- Cleveland, Ohio, Wednesday, July 8, 1998 For Immediate Release For More Information Contact: Peter D. Junger (216) 368-2535 Raymond Vasvari (216) 662-1780 Or see URL: http://samsara.law.cwru.edu/comp_law/jvd/ To be added to, or removed from, the list of those who were sent this press release, please send e-mail to . _________________________________________________________________ Cleveland, Ohio, July 8 -- On July 3, 1998 Judge Gwin of the United States District Court of the Northern District of Ohio held that computer programs are not writings protected by the constitution because they are ``inherently functional'' and granted summary judgment dismissing a suit challenging regulations that forbid the publication of encryption programs on the Internet or the World Wide Web. The suit was brought by Peter Junger, a law professor at Case Western Reserve University in Cleveland, to enjoin the enforcement of export regulations on encryption software that prevent him from publishing his class materials and articles for his course in Computing and the Law on the Internet because they contain some encryption programs. Junger claimed in his suit that those encryption programs were writings that were entitled to the full protection of the First Amendment. ``Of course they are writings,'' Junger says, ``I know because I wrote some of them. And I need to be able to publish them if I am ever going to be able to explain to lawyers and law students how computers work and how the law should be applied to computing.'' The government, on the other hand, argued that its export regulations, which require that one obtain a license from the Commerce Department before publishing materials containing encryption software on the Internet or the World Wide Web, seek only to restrict the distribution of encryption software itself, not ideas on encryption. And Judge Gwin agreed with the government, finding that: ``the Export Regulations are constitutional because encryption source code is inherently functional, because the Export Regulations are not directed at source code's expressive elements, and because the Export Regulations do not reach academic discussions of software, or software in print form.'' In a related case in California brought by mathematics professor Daniel Bernstein, Federal District Court Judge Patel held that computer programs are speech that is protected by the First Amendment, but Judge Gwin rejected that argument, saying: ``The Bernstein court's assertion that `language equals protected speech' is unsound. `Speech' is not protected simply because we write it in a language.'' It is Judge Gwin's position that computer source code is a purely functional device: ``The court in Bernstein misunderstood the significance of source code's functionality. Source code is `purely functional,' in a way that the Bernstein Court's examples of instructions, manuals, and recipes are not. Unlike instructions, a manual, or a recipe, source code actually performs the function it describes. While a recipe provides instructions to a cook, source code is a device, like embedded circuitry in a telephone, that actually does the function of encryption.'' There is thus a clear split between the two courts: Judge Patel holding that computer software is protected by the First Amendment and Judge Gwin holding that it isn't. The Bernstein case is on appeal and Professor Junger says that he intends to appeal Judge Gwin's decision: ``We have had almost no financial support for this case, but the issue of whether encryption software and software in general is protected like other writings under the First Amendment, or whether it is to be treated as a special exception like obscenity and fighting words as Judge Gwin held, is so important that we will have to scrape up the resources somehow to bring an appeal.'' Judge Gwin's opinion is now available at and is mirrored at . -30- From Charlie_Kaufman at iris.com Wed Jul 8 08:26:32 1998 From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com) Date: Wed, 8 Jul 1998 08:26:32 -0700 (PDT) Subject: Lotus Notes signature / encryption Message-ID: <8525663B.005553FE.00@arista.iris.com> >Could someone kindly tell me about the drawbacks of the Lotus Notes >signature / encryption system (export version)? I guess my first question would be "compared to what?". Compared to the Lotus Notes domestic version, the crypto is weaker in two ways. First, there is a backdoor by which all but 40 bits of each symmetric key is encrypted under a public key whose private half is known to the U.S. government. This encrypted value is included in all messages where the key is passed aroung. Depending on how you feel about breaking 40 bit keys, this means it is somewhere between easy and trivial for the U.S. government to eavesdrop on your communications It also uses 512 bit RSA keys for distribution of encryption keys, which makes it attackable by attackers other than the U.S. government. While no one has ever publicly demonstrated breaking a 512 bit RSA key (last I heard), the workfactor is well understood and it's clearly feasible (and in fact overdue). Compared to exportable versions of S/MIME or SSL, the crypto is considerably stronger. Against attackers other than the U.S. government (and even a paranoid would admit there are other attackers to be concerned about (e.g. the French government)), the workfactor to attack the symmetric keys is 64 bits - a little shakey but not the weakest link in most systems. Further, RSA signature keys are 630 bits, which is better than most exportable systems. Compared to non-exportable (but internationally available) systems, like PGP and strong S/MIME and SSL, the crypto is substantially weaker. Another aspect to consider is the strength of the PKI. Lotus Notes uses an organizationally based PKI, meaning that to a large degree your security depends on the trustworthiness and competence of your system administrator. With PGP, your security is under your own control to a much larger degree. For people who are more security aware than their administrators (as most PGP users are), the PGP PKI offers better security. For people who are less security aware than their administrators (as most Lotus Notes users are), the Lotus Notes PKI offers better security. Finally, a "drawback" that might be relevant to this group is the fact that because the Lotus Notes export version has a key-escrow-like backdoor, using it offers tacit political endorsement for the U.S. government's contention that key escrow is a technically practical compromise between the needs of users for privacy and the "needs" of government to know all the secrets of everyone on the planet. In my mind, this argues strongly in favor of using real strong crypto if that is an option, but using weak crypto as an alternative is offering tacit political endorsement for the even more dangerous contention that weak crypto is good enough. Your mileage may vary. --Charlie Kaufman (charlie_kaufman at iris.com) From rdl at MIT.EDU Wed Jul 8 09:44:13 1998 From: rdl at MIT.EDU (Ryan Lackey) Date: Wed, 8 Jul 1998 09:44:13 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: <199807081624.MAA18073@tana.mit.edu> Bob Hettinga wrote: > At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote: > You probably can't bootstrap things on seignorage alone, I don't > think, but if you did, again, you would kill your digital > cash issue anyway, because of lack of merchant acceptance, especailly in > the early phases. > I think you can bootstrap things on "value-add" to a bank, and on seignorage, taken together. It is *good business* for a bank to provide a service like this. It is one of those services, like online banking, ATMs, ubiquitous branch locations (mmm, BankBoston...), private banking personnel, etc. which make customers happier. It is a good business case for a bank. > Note, in my canonical example, cash, that people already pay a fee for > "foreign" ATM withdrawls anyway, and people are used to doing things that > way. That's great, because I expect that margins on a net.ATM withdrawl > through an underwriter would be significantly higher than what a bank makes > on their non-customer ATM transactions. Three orders of magnitude cheaper? > I wouldn't be surprised. My banks eat the foreign ATM costs as a customer value-add expense. For the cash example, banks don't generally charge users to withdraw or deposit money at a teller window, or at their own ATMs. I think an online bank dealing with electronic cash is more dealing with "internal" transactions than with "foreign" transactions -- AFAIK, a lot of the foreign ATM charges are charged by the foreign bank, which has no real interest in the user doing anything but switching banks, anyway. > > > Certainly, at first order, the fee *should* be on removing money from the > > system, from a selfish point of view on the part of Ivan the Issuer -- if > > you're making money on seignorage, you're making money when people add money > > to the system *and leave it there*. Thus, you want to provide incentives > > for > > people to buy money and leave it there -- charging no "on" fees and minimal > > "off" fees would do it. > > Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too. > Didn't save them in the end, though. I argue that they had already shot their feet full of holes to the extent that nothing they did would have saved them by that point, but Mark Twain is a complex enough example that it might be worth just ignoring. I don't know if their experiment will even be a footnote to the footnote to history that is DigiCash. > > I just think that if merchants are the key to acceptance of digital bearer > cash, much less fully anonymous blinded digital bearer cash :-), then you > shouldn't charge merchants anything to accept the stuff. If a merchant can > download a wallet or registerware free or very cheap, and instantly start > taking cash payments for whatever they sell over the net, and, when it came > time to take that cash and put it into their own bank it didn't cost them > anything to do it, then they would probably accept the stuff a heartbeat. > The cost of anything is the foregone alternative, three orders of > magnitude, and all that and "free" comes pretty close to three orders of > magnitude in cost reduction from merchant credit card fees in my book. :-). I've already shown why it is in the best interest of the issuer to participate. The next step is to convince merchants it is worth doing. Merchants, I believe, are willing to accept a percentage redemption fee for a new payment system if their customers demand it. They fundamentally want to make their customers happy. If a lot of customers request a new payment scheme, or they are convinced customers want to use it, they will happily use a new payment scheme. I think resistance to new payment schemes on the part of a merchant is in cost and effort to set up. Having a free apache commerce plugin which handles a variety of payment systems, including electronic cash, so the systems integration costs for adding electronic cash to an operation are zero, and they end up being cheaper than credit cards to process -- a 1% primary market fee, or a going-to-zero percent secondary market fee. Or, provide non-fee incentives for merchants to accept the system -- loyalty points, tax-free accounting in offshore bank accounts, the Amex approach of marketing merchants who accept the system to their client base directly, etc. For a directed payment system, going from customer to merchant to bank, then you definitely need merchants before you can get customers, which turns this on its head. *However*, a good electronic cash system is user-to-user, the Mondex model, rather than DigiCash's model. This means the system can bootstrap as soon as a single pair of people want to exchange money. People already want to exchange money user-to-user on the net -- there's a huge unsatisfied demand. That's more than enough to get it in place. Making it anonymous adds even more incentive. > > I see seignorage as a tasty long-view source of income, certainly, but I > expect the half-life of a given dollar of digital cash to be measured in > days, if not hours, in the early stages. Frankly, I don't see seignorage > showing up significantly on the income statement of an underwriter until > there are other bearer instruments (stocks, bonds, and especially mutual > fund shares) to invest that cash in, keeping it on the net. The half-life of a given dollar of digital cash will be *infinite* if there is an expanding base of users, a cheaper secondary market for getting electronic cash than the cash out and cash back in system, and there is never a big panic. The holding time for a particular user might be pretty short, but I think from the beginning a large amount of money will just be left on the net, since it's far cheaper for a consumer to buy cash from a merchant directly than for the merchant to cash out and the user to buy them on the primary market. > > I think that that's one of the reasons that the Fed, among other people, > aren't too worried about the immediate macroeconomic effects of digital > cash. That and that the Fed's seignorage income, in the overall scheme of > Fed revenues, is pretty small, and probably dwarfed by other things like > printing and handling costs, etc. Greenspan himself is/was a free banking > advocate, certainly, and has said publically (see last September's Official > Cypherpunk Forbes issue :-)) that he thinks that private electronic > banknote issue is not a scary proposition at all. I thought seignorage was a net profit for the Fed, after printing/handling. They *do* give the Treasury a kickback for this, and I'm not sure how the budget actually works, but I think they pay all distribution/printing/etc. costs themselves, and thus this is actually spare money. It doesn't really apply here, since many of those costs are fundamentally different in the electronic cash world than in the printed cash world. Greenspan is/was a libertarian, and would probably be ok with private electronic banknotes putting him out of business, as long as it was better for the economy and people as a whole. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From howree at cable.navy.mil Tue Jul 7 19:40:31 1998 From: howree at cable.navy.mil (Reeza!) Date: Wed, 8 Jul 1998 10:40:31 +0800 Subject: Rats in the Walls In-Reply-To: <199807021721.TAA23458@basement.replay.com> Message-ID: <3.0.5.32.19980703155145.008b4820@205.83.192.13> At 07:21 PM 02 07 98 +0200, Anonymous wrote: >"Reeza!" wrote: > >> At 04:41 PM 02 07 98 +0200, Anonymous wrote: >> >and there are indeed safe havens elsewhere, >> > >> >"Educate, don't Agitate" >> > >> >> Tell me more,,, > >You and who's army? > What army? I'm in the navy, and I'm getting sick of it. From CTIA_Daily_News at um2.unitymail.com Wed Jul 8 10:51:21 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 8 Jul 1998 10:51:21 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 8, 1998 Message-ID: <199807081644.LAA14528@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. ============================================= From jya at pipeline.com Wed Jul 8 11:03:21 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 11:03:21 -0700 (PDT) Subject: Covert Access to Data and ID Message-ID: <199807081736.NAA11731@camel14.mindspring.com> Froward From: Anonymous To: die at pig.die.com Cc: jy at jya.com Subject: Intel plans for world domination Date: Wed, 8 Jul 1998 10:51:04 -0500 Good afternoon gentlemen, I've been reading the correspondence on the possibility of govt keystroke access with some interest. I'm in a slightly odd position as I'm responsible for security in one of the larger wintel companies. As such I've been getting quite a feeling of deja vu reading your mails. Intel and others are moving in exactly this direction with a number of initiatives, most notably the PC98, PCXX, and "Wired For Management". WfM in particular is very scary - one of the components is a facility for PC's to download and run digitally signed software before the OS is booted - between "the end of BIOS initialisation and when control is transferred to a high-level OS" in the words of one Intel document. The code is verified by routines embedded in the BIOS and will allegedly use some subset of X.509v3 and PKCS#1. As so often happens in circumstances like this I can't risk passing documents directly as I can't be sure of their provenance - I really have no idea which ones are now considered trade secrets and which have been made public. Instead I recommend you have a look at the Intel WfM site http://www.intel.com/ial/wfm/ with particular reference to the "Pre-Boot Execution Environment" (PXE) and "System Management BIOS" (SMBIOS). The Microsoft pc98 site is at http://www.microsoft.com/hwdev/pc98.htm and the Intel one at http://developer.intel.com/design/pc98/. ---------- And, DM reminds of the DIRT program Ray Arachelian first posted here: There's an article on page 37 of the July 6, 1998 issue of NetworkWorld about a new software product for Windows machines that is basically a trojan horse that allows access to all keystrokes and files on a system from a remote "America's Most Wanted"-type HQ. I can't find the article online at www.networkworld.com, but you can go the the company's site at http://www.thecodex.com/dirt.html to see it. Sale of DIRT is "restricted to military, government, and law enforcement agencies", the article says. From hizaici72 at prodigy.com Wed Jul 8 11:28:13 1998 From: hizaici72 at prodigy.com (hizaici72 at prodigy.com) Date: Wed, 8 Jul 1998 11:28:13 -0700 (PDT) Subject: Join StarDates.com, The Internet's Best FREE Dating Service! Message-ID: <199807081009OAA45295@pimaia7y.csd.unbsj.ca> That's right! Stardates.com is the internet's best FREE dating service. No gimmicks, no free trials that expire, just FREE Click the link below: http://209.2.134.99/ and select JOIN FREE from the menu options to fill out our on-line application. All personal information is kept strictly confidential. We even have an anonymous email system to keep your email address private. So if your your looking to meet people, join Stardates.com Hey, what do you have to lose? Sincerely, Michael Sole Vice-President StarDates **************************************************** Bulk Email Advertising Works Best!! This Could Have Been Your AD !!! For Advertising Information Please Calll 1-510-653-4709 Evenings PST ********************************************** From jya at pipeline.com Wed Jul 8 12:07:14 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 12:07:14 -0700 (PDT) Subject: Jim Bell Message Message-ID: <199807081600.MAA05747@camel14.mindspring.com> Forwarded from a long-time cpunk who received a call from Jim Bell yesterday. Jim asked that this message be publicized: 7/7/98 By this post he is publically accusing the Federal Government of having spied on him from two physical addresses. These are two houses to the North & to the East of his parent's house. The government moved in within 6 months (approx) of the time before his arrest. One of the addresses is 7217 Mississippi, which is listed as "Billy King", who died a couple of years ago. The house is ostensibly being occupied by his widow (or that is the impression). It is listed as being as owned by Alverna King, but he has his doubts. The other is address is 7302 Corregidor, purchased about 2.5 - 3 years ago by someone. Listed as being the address of Sundown Development, a small business company. A second floor was added soon after it was acquired by the company. They aren't listed as the owners on record, but they are listed as being at that address. Thinks this is a sham. The govmt was basically next door spying on him for at least a year, before it started provoking him. In response to his using the internet for freewheeling debate, they engaged in some bugging that is illegal under Washington State law. It is illegal to use bugging without the knowledge of the participants. He has developed a technique for identifying when someone is tailing him. Found this on Father's day when some people got a little too close to him. He drove to his Sister's party on Hayden Island in Oregon, and noticed the tails. Identified them as Rixen Marine, which he thinks is a sham, another front organization. One of the reasons he was arrested (though they're not willing to admit it) is because was way too successful in tailing _them_. A few more days and he would have blown their entire operation. He couldn't go into the details of how he found out these things. Did research & sophisticated observation. Will be getting friends to do searches in databases, etc. to gather more info to substantiate his suspicions. He said his recent arrest was on a probation violation charge - failure to pay a fine or something, wasn't clear on the specifics. There will be a hearing on his case this Friday the 10th. Prosecutors last year didn't know what the govmt was up to - not told of the spying (a "black operation"). Their method of spying on him are techniques which are possible, though rarely used. If people knew they would be very surprised. It will be a big story - big as Watergate - when it comes out. Their usage of these high-tech methods for access is difficult, so not used often. The government is trying to cover up their reaction to what he wrote in his essays. ------------------- From rah at shipwright.com Wed Jul 8 12:10:31 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 8 Jul 1998 12:10:31 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" In-Reply-To: Message-ID: At 12:24 PM -0400 on 7/8/98, Ryan Lackey wrote: > My banks eat the foreign ATM costs as a customer value-add expense. Yes, but what do they do for customers of *other* banks? They *charge* them for it. Which is exactly what any underwriter should do to put money onto the net. There is no difference between an underwriter of digital cash and a provider of a third-party cash machine, be it at a bank other than your own, or, more equivalent, those private ATM machines you see all over the place now. > I argue that they had already shot their feet full of holes to the extent >that > nothing they did would have saved them by that point, but Mark Twain is a > complex enough example that it might be worth just ignoring. I don't know > if their experiment will even be a footnote to the footnote to history that > is DigiCash. Well, certainly no more than Otto Lillienthal was... :-). > I've already shown why it is in the best interest of the issuer to >participate. > The next step is to convince merchants it is worth doing. By making it so cheap for them to use that it becomes ubiquitous? ;-). > The half-life of a given dollar of digital cash will be *infinite* if there > is an expanding base of users, a cheaper secondary market for getting > electronic > cash than the cash out and cash back in system, and there is never a big >panic. Big pile of "ifs" there. I expect that all you really need are other digital bearer assets which provide a better return than cash. :-). > I thought seignorage was a net profit for the Fed, after printing/handling. > They *do* give the Treasury a kickback for this, and I'm not sure how the > budget > actually works, but I think they pay all distribution/printing/etc. costs > themselves, and thus this is actually spare money. Okay. Since the actual, financial definition of seignorage is in fact the difference between what money's worth and what it costs to produce it, you're probably right. :-). Nonetheless, income on seignorage is miniscule to other income that the Fed makes, and that's a fact. Greenspan has gone on record (see the Forbes article) as saying that it would be no skin off his nose if the Fed never saw any of it. > It doesn't really apply here, since many of those costs are fundamentally > different in the electronic cash world than in the printed cash world. Well, yeah, to the extent that the cost structure is somewhat :-) different. Unique, non-replicable money-bits *are* easier to print and control than paper ones after all. Some people say three orders of magnitude cheaper. ;-). > Greenspan is/was a libertarian, and would probably be ok with private > electronic > banknotes putting him out of business, as long as it was better for the >economy > and people as a whole. Agreed, and he's said as much, like I've said. Controlling the money supply's more what Greenspan's interested in, and, frankly, given the amount of eurodollars (the "other" e$ :-)) held in dollar-denominated accounts in foriegn banks, it's probably safe to say that that's going to be more of a problem for him as time goes on. And, of course, the physical cash sitting in some Russian mattresses is, well, seignorage. Cheers ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From daveb-lists at mail.hyperion.co.uk Wed Jul 8 12:10:46 1998 From: daveb-lists at mail.hyperion.co.uk (Dave Birch) Date: Wed, 8 Jul 1998 12:10:46 -0700 (PDT) Subject: IP: "CyberCash can't oust credit cards" Message-ID: <1312194872-63102733@hyperion.co.uk> Ryan Lackey said >I think resistance to new payment schemes on the part of a merchant is in >cost and effort to set up. Having a free apache commerce plugin which >handles >a variety of payment systems... What's wrong with this model is that it imports historical physical models that are irrelevant on the Net. Why does the merchant take payments at all? Imagine this scenario: you go into the Good Guys and buy a Walkman. The clerk gives you a ticket. You go round to your branch of Wells Fargo and get a cashiers cheque made out to the merchant, walk round to the merchant's branch of BankAmerica -- or BankBank, or whatever it's called now :) -- and deposit the cheque in the merchants account. BankBank gives you a receipt which you take back to the Good Guys and pick up your Walkman. Now, apart from all of the walking around, this is not a bad system. The Good Guys don't need cash registers, links to First Data etc etc. The Good Guys don't need to put up stickers saying "we take Visa", because the bank takes everything. The Good Guys don't care how you paid. The bank is much better placed than the merchant to handle the risks associated with payments and therefore the information asymmetries associated with the payment are significantly reduced (there's a good article about this in the Federal Reserve Bank of Atlanta's Economic Review, 1Q98). On the Net, there's no walking around. In the physical world, it clearly makes no sense for every bank to build a network out to every merchant: hence it makes sense to have physical payment instruments (e.g. notes, cheques) and credit/charge cards. On the Net, though, every participant is connected. When you buy a book from Amazon, what is the point of sending your credit card details to Amazon just so that they can send the details on to an acquiring network, third-party processor etc. Surely it makes more sense for merchants to have deals with payment agents (this is the model in OTP, Smart Access etc). When you press the button marked "Pay" on your browser, wouldn't it be more natural for a message to go to your bank than to the merchant? Thus, I get a "ticket" from Amazon saying "you owe $20 for this book". I pass the ticket to a payment agent (which may be a bank) and pay them (the negotiation being between my wallet and the agent"). The agent sends me a receipt to keep: I send the receipt to Amazon and they send me a book. Alternatively, perhaps the receipt let's me play Doom for a month or get ten upgrade to an item of software or whatever. All Amazon care is that the money has been paid: what do they care whether I used DigiCash or Mondex, Visa or MasterCard? You might argue that the merchant would discount for cleared funds (pay by Mondex and get 2% off) but I think that its frankly too much bother for them to work out N different prices by M different payment methods. I would imagine that just a merchants run loyalty schemes ("double points if you buy cornflakes") then so would payment agents ("double points for DigiCash") but each could operate their business independently. I would argue that the idea that merchants take payments is outdated. Since merchants don't care about cypherpunk favourites such as bearer instruments and anonymity, they'll be perfectly happy to have an acquiring account with BigBank and get a statement at the end of the month that details the payments taken and says "Money collected $1000, our fee $50, deposited to your account $950". Now, the merchant hasn't had to buy a commerce server, negiotiate 10 different acquiring agreements, implement SET or do anything else. Hey, so it's 5%: so what? Regards, Dave Birch. === mailto:daveb at hyperion.co.uk ===== http://www.hyperion.co.uk/ === From jya at pipeline.com Wed Jul 8 12:12:17 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 12:12:17 -0700 (PDT) Subject: Covert Access to Data and ID Message-ID: <199807081547.LAA21623@camel14.mindspring.com> Dave Emery's remarks on government access to keystrokes (proposed by the NYT as an alternative to GAK) points to the probable increase of intrusive devices to counter increasing use of encryption and other privacy and anonymity measures. This topic comes up here now and then, with mentions of a slew of methods to protect privacy of data during transmission or storage. But the possibility of logging the initial creation or manipulation of data is not as often discussed, nor how to tie a person to the data, as now being asked in legal and law enforcement fora to identify, catch, convict and jail computer culprits. That the NYT floated the idea surely means someone is testing public response to an idea that seems to be more intrusive than GAK: the logging of initial data and any manipulation of it, prior to encrypting, and maybe including a means to link the actions to the user. If this is logging (and related retrieval) is done covertly, encryption could thereby become a falsely reassuring cloak of privacy. Dave thinks devices like these are surely in the works, and he can say more about their sponsors, technologies and implementations. One driving force, as he previously noted, is the desire for devices to assure copyright protection, backed by the WIPO treaty, which now being considered for approval. See the House report on it at: http://jya.com/hr105-551.txt (141K) And the EFF and ACLU opposition to it: hr2281-opp.htm Other forces, though, are employers who want to snoop, law enforcement, government, marketers, actually the same groups who dislike privacy protection measures, but often prefer to snoop covertly while loudly proclaiming support for privacy. Thus, the more general question Dave has raised is how widespread is the development and implementation of technolgies for covert surveillance on the Web and in desktop boxes -- happily spreading quietly while attention is focussed on the very encryption which it will circumvent? And what are these devices, or what might they be, what might be countermeasures and who might be working for and against them. SDA must have insights to share. Over to Dave Emery and those more knowledgeable. For those who missed his earlier message we've put it, with a follow-up at: http://jya.com/gaks-de.htm From xena at best.com Wed Jul 8 12:25:44 1998 From: xena at best.com (Xena - Warrior Princess) Date: Wed, 8 Jul 1998 12:25:44 -0700 (PDT) Subject: U.S. relaxes licensing grip on encryption Message-ID: (From the Mercury News, see subject line) http://www.sjmercury.com/business/center/encrypt070898.htm It's a start, at least. From StanSqncrs at aol.com Wed Jul 8 13:44:29 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Wed, 8 Jul 1998 13:44:29 -0700 (PDT) Subject: A Mirror - 'Don't be blue if you should be green' Message-ID: Sorry, that server that address I gave you on earlier seems to be all locked up, so I created a mirror, check it out, Stan, The Desecration of 'The Dark Side of the Moon' http://members.aol.com/RealityWal/DarkSide/darkside.html From nobody at REPLAY.COM Wed Jul 8 14:29:06 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 8 Jul 1998 14:29:06 -0700 (PDT) Subject: No Subject Message-ID: <199807082129.XAA00872@basement.replay.com> I made another page, which details what Capital records did to Dark Side of the Moon when they reissued on cd. Guess what they covered-up. :-) Check it out, Stan, The Desecration of 'The Dark Side of the Moon' http://members.tripod.com/StanSqncrs/DarkSide/darkside.html From adam at homeport.org Wed Jul 8 14:38:58 1998 From: adam at homeport.org (Adam Shostack) Date: Wed, 8 Jul 1998 14:38:58 -0700 (PDT) Subject: Covert Access to Data and ID In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com> Message-ID: <199807082138.RAA12934@homeport.org> John Young wrote: | If this is logging (and related retrieval) is done covertly, | encryption could thereby become a falsely reassuring | cloak of privacy. | | Dave thinks devices like these are surely in the works, | and he can say more about their sponsors, technologies | and implementations. Keystroke logging technology exists commercially as a result of the shit reliability of commercial OSs. Turning one of them quite stealth wouldn't be hard; they're very innocous as is. Also note things like the recent MS 'send chunks of ram in Word documents' bug in Word for the Mac. (Actually an OLE bug.) The benefit to encryption is not that it makes your data secure, but that it allows you to communicate safely in the presense of adversaries. (Rivest's definition.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From cds at mcmurdo.gov Wed Jul 8 15:37:10 1998 From: cds at mcmurdo.gov (Chris Liljenstolpe) Date: Wed, 8 Jul 1998 15:37:10 -0700 (PDT) Subject: RSA in perl illegal to export (Re: Junger et al.) In-Reply-To: Message-ID: <19980708223047.H93@erebus.mcmurdo.gov> Greetings, There are t-shirts out there with both human readable and machine readable (bar code) versions of the RSA in 3 code.... Wear it when boarding an international flight.... They even state that they are a munition and ITAR controlled in BIG letters on the back... Chris On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote: > > Jim Burnes writes: > > Obviously there is no difference between 10 lines of PERL and > > 1500 lines of assembler (or machine code). > > One of Peter Junger's examples (I think used in the case) is the RSA > in 2/3 lines. He actually obtained the US export administrations > written decisions on which of a small collection of titchy programs > was exportable. RSA in 3 lines of perl they stated was illegal to > export. > > So fun things with RSA are possible because they have decided that it > is not exportable, so perhaps you could export it on a floppy, or as > your .signature, with media cameras rolling, and try to get yourself > arrested for willful violation of dumb export laws. > > Adam > -- > Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ > > print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> > )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 I still have a few of those shirts left (I ate the cost ... along with a few copies of Secret Power). If anyone wants to do this, I will be happy to donate the T-shirt (and be an "arms" supplier). In fact, one of the people who expressed an interest in buying the T-shirt wanted to send one to Dave Letterman (Letterman was hot at the time). Did you ever do it? Ern -----Original Message----- From: Chris Liljenstolpe [SMTP:cds at mcmurdo.gov] Sent: Wednesday, July 08, 1998 3:31 PM To: Adam Back; jim.burnes at ssds.com Cc: Ernest Hua; egerck at laser.cps.softex.br; cypherpunks at toad.com; cryptography at c2.net Subject: Re: RSA in perl illegal to export (Re: Junger et al.) Greetings, There are t-shirts out there with both human readable and machine readable (bar code) versions of the RSA in 3 code.... Wear it when boarding an international flight.... They even state that they are a munition and ITAR controlled in BIG letters on the back... Chris On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote: > > Jim Burnes writes: > > Obviously there is no difference between 10 lines of PERL and > > 1500 lines of assembler (or machine code). > > One of Peter Junger's examples (I think used in the case) is the RSA > in 2/3 lines. He actually obtained the US export administrations > written decisions on which of a small collection of titchy programs > was exportable. RSA in 3 lines of perl they stated was illegal to > export. > > So fun things with RSA are possible because they have decided that it > is not exportable, so perhaps you could export it on a floppy, or as > your .signature, with media cameras rolling, and try to get yourself > arrested for willful violation of dumb export laws. > > Adam > -- > Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ > > print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> > )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 test From caj at math.niu.edu Wed Jul 8 17:00:17 1998 From: caj at math.niu.edu (Xcott Craver) Date: Wed, 8 Jul 1998 17:00:17 -0700 (PDT) Subject: RSA in perl illegal to export (Re: Junger et al.) In-Reply-To: <19980708223047.H93@erebus.mcmurdo.gov> Message-ID: On Wed, 8 Jul 1998, Chris Liljenstolpe wrote: > Greetings, > > There are t-shirts out there with both human readable and > machine readable (bar code) versions of the RSA in 3 code.... RSA in 3 or RSA in 5? Is there a new version? Now, all *real* Nettites know that the original shirts were by Joel Furr, are no longer for sale, and have an X-ed out Bill of Rights (or excerpts thereof) on the back, rather than any of this ITAR stuff. And!! It glows in the dark. Rock rock. -Caj "This shirt is a ... " [squints] "... munchkin?" From Jeff.Nisewanger at Eng.Sun.COM Wed Jul 8 17:02:24 1998 From: Jeff.Nisewanger at Eng.Sun.COM (Jeff Nisewanger) Date: Wed, 8 Jul 1998 17:02:24 -0700 (PDT) Subject: RSA in perl illegal to export (Re: Junger et al.) Message-ID: <199807090001.RAA20366@puuoo.eng.sun.com> > There are t-shirts out there with both human readable and > machine readable (bar code) versions of the RSA in 3 code.... Wear it > when boarding an international flight.... They even state that they > are a munition and ITAR controlled in BIG letters on the back... Or take out a classified ad (so to speak) in the New York Times and have it published on paper. Jeff From Hua at teralogic-inc.com Wed Jul 8 17:18:22 1998 From: Hua at teralogic-inc.com (Ernest Hua) Date: Wed, 8 Jul 1998 17:18:22 -0700 (PDT) Subject: RSA in perl illegal to export (Re: Junger et al.) Message-ID: <413AC08141DBD011A58000A0C924A6D52C35AE@mvs2.teralogic-inc.com> Would someone who has actually scanned this T-shirt in please let us know how you did it (which equipment, what software, etc.)? Thanks! Ern From jya at pipeline.com Wed Jul 8 17:37:02 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 17:37:02 -0700 (PDT) Subject: DoD Plans Global Domestic Invasion Message-ID: <199807090036.UAA06849@dewdrop2.mindspring.com> DoD released today the text of a June 11 speech which describes how the military is planning for the first time in US history to establish a homeland defense command, to operate inside US borders for protection against terrorism and weapons of mass destruction: http://jya.com/dsd061198.htm A special unit will handle cyber threats. The CINC-US will be a vast increase over the traditional role of domestic law enforcement by FBI, ATF and other federal, state and local authorities, lately supplemented by the National Guard, FEMA, PCCIP, and the newly formed COIA at Commerce and the President's special office on domestic terrorism. Deputy Secretary of Defense Hamre said the command will work with the newly formed Defense Threat Reduction Agency (DTRA) which will be under C4I of DoD. Another press release today covered Hamre's June 22 speech in Vienna where he outlined similar measures for European defense through NATO: http://jyacom/dsd062298.htm Finally, the Wash Post had a report today on DoD's attempt to come up with workable plans for offensive cyberwar -- which is claimed to be the serious first serious competitor for the nuclear threat in fifty years: http://jya.com/cyber-how.htm It says that a component of cyberwar offense is regular prowling of other countries networks and military command systems for the purpose of "pre-planning the battlefield." That this is the way DoD justifies ignoring the limitations of intel agencies' need to get presidential approval for invading the borders of other countries. "Cyberspace is borderless," says the Pentagon. Many covert prowling, surveilling and crashing tools are in operation or poised to take down systems like those of the nuclear command and control systems of Pakistan and India should the need arise. One guy brags that any one of a dozen experts in the US "could take out a country in six hours" by disrupting cyber infrastructure, and that might be looming for the US. Is it true infowar, or is it whistling in the dark psy war: "my megaherz-death bombers are sneakier than yours"? So, it appears that key stroke logging and MS/Intel's vicious "wired for management" are kidstuff cheapskate knockoffs of far worse invasive technology pouring dollars into Wintel labs and fabs. From e9710041 at unitele.com.my Wed Jul 8 18:14:43 1998 From: e9710041 at unitele.com.my (RAPHAEL_PHAN_CHUNG_WEI) Date: Wed, 8 Jul 1998 18:14:43 -0700 (PDT) Subject: No Subject Message-ID: From jya at pipeline.com Wed Jul 8 18:19:26 1998 From: jya at pipeline.com (John Young) Date: Wed, 8 Jul 1998 18:19:26 -0700 (PDT) Subject: DoD Plans Global Domestic Invasion In-Reply-To: <199807090036.UAA06849@dewdrop2.mindspring.com> Message-ID: <199807090119.VAA03382@dewdrop2.mindspring.com> To not accuse only follow-the-leaders Wintel, that last paragraph should have been: So, it appears that key stroke logging and MS/Intel's vicious "wired for management" are kidstuff cheapskate knockoffs of far worse invasive technology pouring dollars into much DIRTier than Wintel labs and fabs. From stuffed at stuffed.net Wed Jul 8 21:25:38 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Wed, 8 Jul 1998 21:25:38 -0700 (PDT) Subject: Elvis stole my panties/Whip me please! Message-ID: <19980709010446.28505.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 270 bytes Desc: not available URL: From sales at electronicpromotion.com Wed Jul 8 22:04:43 1998 From: sales at electronicpromotion.com (sales at electronicpromotion.com) Date: Wed, 8 Jul 1998 22:04:43 -0700 (PDT) Subject: INCREASE YOUR CASHFLOW NOW!!!!! Message-ID: <199807090504.WAA14973@toad.com> Do you wish there was a way to easily communicate directly with potential customers who already have an interest in your particular product or service? Now with ElectronicPromotion Direct Email you can! ElectronicPromotion offers this highly targeted alternative that quickly delivers your email to individuals who are more likely to respond to an email regarding a topic they have made a post about in a newsgroup or in a webpage. http://www.electronicpromotion.com or Call 813.781.9782 for more info Because individuals have an interest in specific topics, they are more likely to read the message. Response rates to ElectronicPromotion Direct Email are exceptional.. This results in the recipient actually visiting your web site because they have an active interest in your product or service. Compared to postal mailings, direct email is both less expensive and more effective. ***Did you know? Nearly 50 percent of the U.S. population, or 135 million people, will communicate via email by 2001. Fifteen percent of the U.S. population (approximately 30 million adults 16 and over) use email now. (Forrester Research) Why wait your target market is on the net now send your ElectronicPromotion Announcement TODAY!!! We also offer 100% Guaranteed Results so please visit http://www.electronicpromotion.com Or call 813.781.9782 to get started ASAP ============================================================== If you would like to be blocked from any further mailings reply with "REMOVE" as the subject. You will be promtly removed. =============================================================== From caj at math.niu.edu Wed Jul 8 22:47:28 1998 From: caj at math.niu.edu (Xcott Craver) Date: Wed, 8 Jul 1998 22:47:28 -0700 (PDT) Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com> Message-ID: On Wed, 8 Jul 1998, Jeff Nisewanger wrote: > > There are t-shirts out there with both human readable and > > machine readable (bar code) versions of the RSA in 3 code.... Wear it > > when boarding an international flight.... > > Or take out a classified ad (so to speak) in the New York Times > and have it published on paper. Woo! This sounds like an easily doable, easily managable mass protest. We start a mailing list or website (a website would be better) of volunteers and the newspapers they intend to place ads in. Major papers would hopefully get multiple copies of the ad in multiple sections. All on the same day. But then, they often charge per word, and one gigantic string of nonsense might not obey any newspaper's rules. But I like the idea of organizing a classified add campaign, or such. Blitzing the nationwide press with a large number of tiny notes, all one day. Maybe instead they could all contain a URL, pointing to a carefully written, agreed-upon, readable and fairly exhaustive collection of info about the issues at hand. Well, maybe they shouldn't all point to the same machine.... Ferget just signing petitions, dammit. Petitions are for wimps. Ask folks to participate by buying an ad. I mean, communication is what a lot of us here specialize in. And in our protocols, we have Alice and Bob writing out hundreds of anonymous money orders, broadcasting public keys via radio from prison, and hiding love letters in GIFs of farm animals. Surely there's enough imagination here to turn even a small fund into a very effective PR campaign. -Caj > Jeff ,oooooooo8 o ooooo at math.niu.edu -- http://www.math.niu.edu/~caj/ o888' `88 ,888. 888 888 ,8'`88. 888 "The user's going to pick dancing pigs 888o. ,oo ,8oooo88. 888 over security every time." `888oooo88 o88o o888o 888 -Bruce Schneier ____________________8o888'_________________________________________________ From melliott at ncsa.uiuc.edu Wed Jul 8 07:56:40 1998 From: melliott at ncsa.uiuc.edu (Matt Elliott) Date: Wed, 8 Jul 1998 22:56:40 +0800 Subject: Tracking: iButton (fwd) In-Reply-To: <3.0.5.32.19980708002919.00950100@popd.ix.netcom.com> Message-ID: >What's to prevent someone from doing that? time... Matt From ricki514 at msn.com Wed Jul 8 23:09:25 1998 From: ricki514 at msn.com (ricki514 at msn.com) Date: Wed, 8 Jul 1998 23:09:25 -0700 (PDT) Subject: Go for the gold. Message-ID: <199807090609.XAA19899@toad.com> Adults Only Website ! CHECK TO SEE IF YOU ARE A WINNER!!!!! CLICK HERE From vjb at gil.com.au Wed Jul 8 23:35:28 1998 From: vjb at gil.com.au (Global Web Builders) Date: Wed, 8 Jul 1998 23:35:28 -0700 (PDT) Subject: One Nation going back on-line Message-ID: <1.5.4.32.19980709054803.0073c9b8@mail.ipswich.gil.com.au> Dear Pauline Hanson's One Nation supporter in NSW We are pleased to be able to advise that the problems faced following the financial collapse of our Internet Service Provider (ISP), Pronet, have now been resolved. During the last week we have: ============================= - re-directed the "gwb" and "onenation" domain's to our new ISP. - established 170 mBytes of data including several hundred images and hundreds of related One Nation web pages and thousands of links on the new host. - begun the process of establishing a moderated discussion board at our new ISP (under our direct control). It is important to realise that the DNS re-delegation of the "gwb" and "onenation" domain names will "filter through" over the next 48 hours. In the meantime establishing a link with: onenation.com.au or gwb.com.au/onenation might be a temporary problem until your DNS look-up is updated on your ISP. If you come across links that do not work on our new ISP please contact GWB with the URL that you tried to access the link from and the link "caption" (eg 'take this link to see...'). Your assistance in this regard would be greatly appreciated. By Sunday, 12th July, you should be able to access the full One Nation web site and Australian News of the Day web sites USING YOUR OLD BOOKMARKS. Please Note: A summary of news on this week's Australian National News of the Day (anotd) will be available on fax back number: 1902 211037 from tomorrow (Friday) afternoon. Last week's summary of the anotd is currently available at that number for Australian based recipients of this email. The cost is 75 cents per minute. Email: ====== The email currently address being used (vjb at gil.com.au) has been on a temporary basis and will no longer be used by the writer after the end of July. The "gwb at gwb.com.au" email address will be active when you are able to access the One Nation web sites through your old bookmarks. Once again we apologise for this break in providing you Pauline Hanson's One Nation on-line and thank you for your patience and support. GWB Scott Balson Pauline Hanson's Web Master From mok-kong.shen at stud.uni-muenchen.de Thu Jul 9 01:14:25 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Thu, 9 Jul 1998 01:14:25 -0700 (PDT) Subject: Covert Access to Data and ID In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com> Message-ID: <35A47BD1.1F51A0D5@stud.uni-muenchen.de> John Young wrote: > Thus, the more general question Dave has raised is how > widespread is the development and implementation of > technolgies for covert surveillance on the Web and in > desktop boxes -- happily spreading quietly while attention > is focussed on the very encryption which it will circumvent? I don't know whether it is relevant but there is recently an announcement of a conference on intrusion detection. Perhaps one gets some relevant research results there presented. M. K. Shen From finances at softhome.net Thu Jul 9 02:28:30 1998 From: finances at softhome.net (finances at softhome.net) Date: Thu, 9 Jul 1998 02:28:30 -0700 (PDT) Subject: Make Money From Our National Television Infomercial! Message-ID: <199807090928.CAA28650@toad.com> There is over 400 BILLION DOLLARS IN UNCLAIMED money in North America. We want to help return this money to its rightful owners! To do this we are launching a NATIONAL INFOMERCIAL ON TELEVISION. We are looking for 300 INDEPENDENT AGENTS who will become a part of this infomercial. NO SELLING IS REQUIRED!!! Each Agent will own an exclusive territory and will receive a percentage of the money generated from the television informercial! Your involvement will be very finacially rewarding. Find out more about the opportunity and how you can get involved. Visit our website at http://205.152.190.238/opp From announce at dmail1.real-net.net Thu Jul 9 07:46:29 1998 From: announce at dmail1.real-net.net (RealNetworks News) Date: Thu, 9 Jul 1998 07:46:29 -0700 (PDT) Subject: Speed Up Your Dial-up Connection! Message-ID: <199807091446.HAA24275@dmail3.real-net.net> Dear RealPlayer User, I'm excited to tell you about a great software product that will dramatically speed up your dial-up connection for faster Internet access and the availability of the RealPlayer and RealPlayer Plus G2 'pre-beta' preview releases. TWEAKDUN ACCELERATES YOUR INTERNET CONNECTION By optimizing your Windows 95 Registry internet settings, TweakDUN by Patterson Design Systems eliminates fragmentation of data packets allowing for faster Internet data transfer rates. This means faster browsing, quicker downloads, and improved Internet performance. TweakDUN won ZDNet Editors' Pick with a 5-star rating! "TweakDUN is the most-cost efficient option available for boosting your 'net speed." -- Stroud's Consummate Winsock Applications Review 4/21/98 You can order and download your copy of TweakDUN, from RealStore simply by visiting: http://www.realstore.com/specials/tweakd.html TweakDUN is guaranteed to speed up your dial-up connection or your money back. (Return required within 30 days of purchase for refund.) ------------------------------------------------------- NEW REALPLAYER AND REALPLAYER PLUS G2 NOW AVAILABLE I also wanted to tell you about the 'pre-beta' preview release of RealPlayer and RealPlayer Plus G2. These new G2 players deliver dramatic quality improvements, including entirely new features like a 10-channel graphic equalizer and more. To download now, visit: --> http://www.real.com/50/tweakpre.html ------------------------------------------------------- Thank you for using RealNetworks products, Maria Cantwell Senior Vice President RealNetworks, Inc. Seattle, WA USA --------------------------------------------- ABOUT THIS E-MAIL This e-mail was sent to users of RealPlayer software who indicated a preference during the download or installation process to receive notification of new RealNetworks products or services via e-mail. For information about subscribing to or unsubscribing from future announcements, visit http://www.real.com/mailinglist/index.html From CTIA_Daily_News at um2.unitymail.com Thu Jul 9 10:13:32 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 9 Jul 1998 10:13:32 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 9, 1998 Message-ID: <199807091702.MAA14127@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM. Please click on the icon / attachment for the most important news in wireless communications today. WIRELESS IT '98, The Next Generation in Personal Computing & Communications October 12-14, Las Vegas, Nevada Call (202) 785-0081 for more information! ============================================= From Fr0gFAQ at aol.com Thu Jul 9 10:43:03 1998 From: Fr0gFAQ at aol.com (Fr0gFAQ at aol.com) Date: Thu, 9 Jul 1998 10:43:03 -0700 (PDT) Subject: Hey! Message-ID: � To: Fr0gFAQ at aol.com Subject: Hey! From: Fr0gFAQ at aol.com Date: Thu, 9 Jul 1998 11:30:53 EDT Hello, Click Here Please! Thanx From MCROACH at delphi.com Thu Jul 9 12:32:54 1998 From: MCROACH at delphi.com (MCROACH at delphi.com) Date: Thu, 9 Jul 1998 12:32:54 -0700 (PDT) Subject: journalist seeking help... Message-ID: <01IZ79RMKJWI8ZYMJZ@delphi.com> Dear Cypherpunks: I write for the New York Times Magazine. My editor wants to profile, as he put it, "a group of hackers who've gone legit" and now do consulting for corporations. Paul Kocher of Cryptography Research thought you guys might have a couple suggestions. He mentioned a co-op in Boston, but couldn't recall their name. Also -- anyone know what Robert Morris Jr. is up to? Or how to contact him? Thanks very much. Mary Roach From attila at hun.org Thu Jul 9 12:37:00 1998 From: attila at hun.org (attila) Date: Thu, 9 Jul 1998 12:37:00 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: Message-ID: On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME: >... > The revolution will not be televised -- at least not in Afghanistan. > The Taliban government today banned TV, and gave Afghans 15 days to > get rid of all sets and VCRs. After that, if the organization's > enforcers find one in your house, it will be destroyed and you will be > punished. >... sounds good to me; I've raised 5 children who know how to _read_. I've never owned a television, never saw the need to bring cancer into the home. TV could have been one of the greatest educational tools in the existence of mankind --and, what is it? nothing more than bread and circus for the mass, a tool for social reoganization and the destruction of the family. babysitter? momma's little helper? not really; a creator of a vast unthinking social wasteland --which, of course, fits the policy goals of Hillay's Global Village where everybody is just another butterscotch pudding to her recipe. __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ From lithron at bellsouth.net Thu Jul 9 12:38:25 1998 From: lithron at bellsouth.net (lithron) Date: Thu, 9 Jul 1998 12:38:25 -0700 (PDT) Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) (fwd) In-Reply-To: <199807091306.IAA03984@einstein.ssz.com> Message-ID: <35A51BD8.4378ADC9@bellsouth.net> This does sound like a fun way to protest. I'd be willing to donate a little cash if people would send me copies of the papers that it gets put in. Heh.. it would be good for a laugh to visit an airport on that day just to see all the people taking news papers with them on international flights :) Anyone want to take a stab at a date? lithron at bellsouth dot net Jim Choate wrote: > > Forwarded message: > > > Date: Thu, 9 Jul 1998 00:47:18 -0500 (CDT) > > From: Xcott Craver > > Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) [snip snip snip] > [text deleted] > > I like this idea a lot also. I'm definitely interested... > > Let me look into it but I suspect I could cover Austin, Houston, Dallas, Ft. > Worth, & El Paso in Tx. To ensure accuracy the actual text should be faxed in > if not sent via email. > > Other than a list of current objectionable issues what else should be sent > in? It would be worth a point or two to have it signed 'Publius'. From ericm at lne.com Thu Jul 9 13:28:00 1998 From: ericm at lne.com (Eric Murray) Date: Thu, 9 Jul 1998 13:28:00 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: Message-ID: <199807092027.NAA02656@slack.lne.com> attila writes: > > On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME: > > >... > > The revolution will not be televised -- at least not in Afghanistan. > > The Taliban government today banned TV, and gave Afghans 15 days to > > get rid of all sets and VCRs. After that, if the organization's > > enforcers find one in your house, it will be destroyed and you will be > > punished. > >... > > sounds good to me; I've raised 5 children who know how to _read_. > [rant against tv deleted] While I agree that TV is a brain-sucking void, banning any form of dissemination of information is a Bad Thing and a sign of serious government oppression. First the came for the TV sets, and I didn't say anything because TV is merely bread and circuses for the masses. Then they came for my radio, and I didn't complain because I can't get Rush very good anyhow. Then they came for the newspaper, and that really pissed me off, so I wanted to protest. I wanted my protest to get a lot of exposure, so I went to call the TV and radio stations but they don't exist any more. > policy goals of Hillay's Global Village where everybody is just > another butterscotch pudding to her recipe. I'd rather be dealing with Hillary than the Talliban. -- Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com (email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5 From pooh at efga.org Thu Jul 9 13:34:22 1998 From: pooh at efga.org (Robert A. Costner) Date: Thu, 9 Jul 1998 13:34:22 -0700 (PDT) Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com> Message-ID: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net> At 12:47 AM 7/9/98 -0500, Xcott Craver wrote: > We start a mailing list or website (a website would be better) > of volunteers and the newspapers they intend to place ads in. > Major papers would hopefully get multiple copies of the ad in > multiple sections. All on the same day. If there is any real interest in doing this as a group, I'll be happy to setup a web site and a mail list for this. Does newsprint from most major US papers still qualify as "A small group of internet users manufacturing and distributing tons of high end munitions for export overseas?" -- Robert Costner Phone: (770) 512-8746 Electronic Frontiers Georgia mailto:pooh at efga.org http://www.efga.org/ run PGP 5.0 for my public key From hrook at exchange.microsoft.com Thu Jul 9 14:27:38 1998 From: hrook at exchange.microsoft.com (Harvey Rook (Exchange)) Date: Thu, 9 Jul 1998 14:27:38 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? Message-ID: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO> So attila, Afghanistan will be a better place because they've banned television? I think you miss the point. Harv. From: attila [mailto:attila at hun.org] > Sent: Thursday, July 09, 1998 12:37 PM > To: Declan McCullagh; cypherpunks > Subject: Re: FC: Forget Internet restrictions -- how about banning TV? > > > On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME: > > >... > > The revolution will not be televised -- at least not in > Afghanistan. > > The Taliban government today banned TV, and gave Afghans > 15 days to ...deletia... > > sounds good to me; I've raised 5 children who know how to _read_. > > I've never owned a television, never saw the need to bring cancer > into the home. ...deletia... From mgraffam at mhv.net Thu Jul 9 14:31:00 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Thu, 9 Jul 1998 14:31:00 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: Message-ID: On Thu, 9 Jul 1998, attila wrote: > On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME: > > >... > > The revolution will not be televised -- at least not in Afghanistan. > > The Taliban government today banned TV, and gave Afghans 15 days to > > get rid of all sets and VCRs. After that, if the organization's > > enforcers find one in your house, it will be destroyed and you will be > > punished. > >... > > sounds good to me; I've raised 5 children who know how to _read_. > > I've never owned a television, never saw the need to bring cancer > into the home. TV could have been one of the greatest educational > tools in the existence of mankind --and, what is it? nothing more > than bread and circus for the mass, a tool for social reoganization > and the destruction of the family. I suspect one day someone will be saying something similar about the net. I have a small TV and cable, which sits a few feet away from my computer. If I could, I'd just fly around the country going to Mets and Yankees games.. and of course during the "slow season" I can always go to football games. TV is what you make of it. I suppose if a kid sits in a room by himself and vegges out in front of it, it does more harm than good.. on the other hand, when you're 15 years old and can't talk to your dad about much because its just that time in life, I'd be willing to bet baseball or sports is still neutral enough territory. I don't see much wrong with crowding around the idiot box as a family or group, if it gives people something to talk about. Politics and religion can be fun now and then, but we all get weary of fighting the same battles. Sure, lots of TV is garbage.. but hell.. look around.. a whole lot of the net is too. It isn't TV's fault, and it isn't the net.. the reason why so many things suck is because we made them. More often than not, we're the garbage. hmm.. I had hoped this message might be uplifting. Guess not. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html #!/bin/perl -sp0777i Message-ID: On Thu, 9 Jul 1998, Eric Murray wrote: > [snip] > >Then they came for the newspaper, and that really pissed me off, so >I wanted to protest. I wanted my protest to get a lot of exposure, so >I went to call the TV and radio stations but they don't exist any more. > point duly noted. however, TV as a degenerative (self eating watermelon) force is an option --which I took by refusing it the privilege of its one eyed stare. never owned one as the fraction of worthwhile programming is overwhelmed by mind-fuck. >> policy goals of Hillay's Global Village where everybody is just >> another butterscotch pudding to her recipe. > >I'd rather be dealing with Hillary than the Talliban. > by all means. Hillary is an unprincipled, amoral automan who expects her comforts. the Talliban/Taleban/or_however_whichever_network_spells_it is religious fanaticism; no worse than the Catholic Inquisition I would expect, but that's not saying much. Hillary can be beaten back into her cage... Taleban fanaticism ends only with their death(s). There is no safety this side of the grave. Never was; never will be. ________________________________________________________________attila__ From attila at hun.org Thu Jul 9 14:53:07 1998 From: attila at hun.org (attila) Date: Thu, 9 Jul 1998 14:53:07 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO> Message-ID: On Thu, 9 Jul 1998, Harvey Rook (Exchange) wrote: >So attila, Afghanistan will be a better place because they've banned >television? > >I think you miss the point. > >Harv. > I didnt miss the point, Harv... at least I am free to choose whether or not I grant the one-eyed beast an audience, the Taleban have precluded that choice. TV _had_ enormous potential; it has been squandered. ergo, I chose. __________________________________________________________________________ To be a ruler of men, you need at least 12 inches.... _________________________________________________________________ attila__ From jya at pipeline.com Thu Jul 9 15:52:29 1998 From: jya at pipeline.com (John Young) Date: Thu, 9 Jul 1998 15:52:29 -0700 (PDT) Subject: Bye Homeland Liberty Message-ID: <199807092252.SAA07453@camel14.mindspring.com> Note the single mention of cyber warfare, hooked to chemical and biological dangers. http://www.defenselink.mil/news/ Remarks by Deputy Secretary of Defense John J. Hamre Commemorating the 200th Anniversary of the Recall of George Washington to Active Duty Mount Vernon, Virginia Saturday, July 4, 1998 [Snip] Two hundred years ago, Washington was called back to service to prepare America's defenses. Today, the American homeland faces a new and different danger. The threat is not from overt invasion, but from the sinister dangers of chemical, biological and cyber warfare. Chemical and biological weapons are a poor man's atomic bomb. They are easier to build, to hide, and to deliver to their targets. They are especially appealing to small terrorist cells and known individuals who can not challenge American military superiority on the battlefield. As in Washington's time, America is not yet fully prepared for this new challenge. We too must organize, plan, and act anew. We too must recognize that complacency and delay is dangerous. President Clinton and Secretary of Defense Cohen have made preparing the American homeland against chemical and biological weapons a top priority. The continental United States has not confronted a direct threat to its territory in this century precisely because we have confronted threats before they touched our shores. But this is a new era, where adversaries can bring their fight to our doorstep. National security now must assume a new dimension. The Department of Defense and the intelligence community must work hand in hand with law enforcement to deal with this far-reaching threat. We are taking steps to improve our knowledge of hostile elements and their plans. We are reorganizing the Defense Department to integrate our approach to counter-proliferation of these terrible new weapons, and we are launching new programs to help local emergency response forces to mitigate the effects of chemical and biological attack. [Snip] Shortly, we will commemorate this day by planting a new tree, adding to Washington's beloved "shades of Mount Vernon." We place it here as a mark of gratitude to a leader who accepted the burdens of public service to defend our young republic. We also place it here to mark our commitment to ensure future generations will live in peace and security. One hundred years from now we will not be here, but I hope Americans will gather under this tree to celebrate the 300th anniversary of Washington's act of patriotic sacrifice. And I hope they will also say, of us, that we too left a measure of our day and, by our deeds, we too preserved the safety of this sweet land of liberty. Thank you all for coming today. -END- From aba at dcs.ex.ac.uk Thu Jul 9 16:19:26 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Thu, 9 Jul 1998 16:19:26 -0700 (PDT) Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) In-Reply-To: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net> Message-ID: <199807092311.AAA07749@server.eternity.org> Robert writes: > If there is any real interest in doing this as a group, I'll be happy > to setup a web site and a mail list for this. and Jim Choate said similar. A constructive comment: in my obeservation setting up mailing lists for mini-projects is a sure way to reduce the number of participants in the project. A few years back when we were all cracking RC4, it was done right here on the cypherpunks list. There were no new lists created. I suspect that the CPU resoureces contributed benefitted orders of magnitude due to this as people got swept up in the fun of it and joined in. (I won't volunteer Perry's list as he tries to keep it focussed and I suspect a few hundred posts on adverts and PR would result in him turning up the squelch). So I suggest use cypherpunks list (*). (subscribe to majordomo at cyberpass.net with message: subscribe cypherpunks, for those on cryptography). If we had on the other hand started a list, I suspect a few dozen might have subscribed, and the rest of us would have forgotten about it, and heard no more feedback on it. Lets go for it, I'll join in also, but please in the interests of it's chances of success, keep it to the cypherpunks list. Some comments on the thread of what would be most effective: Anyone with a tame PR expert they can quiz about the best way to maximise publicity: - what stunt would create most publicity - who in the press should be contacted - which computer companies and who to contact with in them to donate funds if funds are required (eg advert) it may be for example that plenty of publicity can be had for free with a suitable stunt, if media can be interested. Perhaps (or perhaps not) Peter Junger could be involved, or referrenced to tie the two togther in the presses mind, and he would perhaps make a good person for media hacks to interview also. Adam (*) Or if someone gets keen perhaps a filtered version of cypherpunks selecting only posts on this topic might be useful to a few people -- cpunks is high volume. From stuffed at stuffed.net Thu Jul 9 18:25:24 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Thu, 9 Jul 1998 18:25:24 -0700 (PDT) Subject: Larry Flynt hustles Congress/Monica Lewinskookies Message-ID: <19980709233913.21088.qmail@eureka.abc-web.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 269 bytes Desc: not available URL: From whgiii at invweb.net Thu Jul 9 20:22:07 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Thu, 9 Jul 1998 20:22:07 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: Message-ID: <199807100325.WAA005.93@geiger.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 07/09/98 at 09:47 PM, attila said: >Hillary can be beaten back into her cage... Taleban fanaticism > ends only with their death(s). Yes, but more importantly: Is there a bag limit? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Windows with bullet-proof glass. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNaWJx49Co1n+aLhhAQFqhQP/QudW4N6LjfI1gbIdQ852BG17R8xhhe3f mLpBzL3jmTndNbp80Gve4MOLi5Nu73j1G/FANPK5qPmmG0CIs03emgV0gpe0ow3s wrel8TcUV4ugFc5SjQd9qEpZt+4DOrYnhk7oHEQFZJeW/QSfpRRSdYGMWN51dMlf 66BNE01a9QI= =k2kr -----END PGP SIGNATURE----- From jerry at weboneinc.net Thu Jul 9 20:49:25 1998 From: jerry at weboneinc.net (Jerry) Date: Thu, 9 Jul 1998 20:49:25 -0700 (PDT) Subject: no subject Message-ID: <199807092321.XAA23250@steve1.weboneinc.com> ------------------------------------------------------------------ This is a targeted mailing to adult webmasters or persons involved in the adult internet entertainment industry. If you have received this message by mistake, please delete it and accept our apologies. ------------------------------------------------------------------ Just wanted to let you know about the highest paying Gay referral program: GAY CASH NETWORK $25 per member, online realtime stats, high signup ratios and more! For more info please go to: http://208.156.131.103/gay/ Also if you have straight sites check out X-CASH at: http://208.156.131.103/xtv/ From attila at hun.org Thu Jul 9 21:01:25 1998 From: attila at hun.org (attila) Date: Thu, 9 Jul 1998 21:01:25 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: <199807100325.WAA005.93@geiger.com> Message-ID: On Thu, 9 Jul 1998, William H. Geiger III wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >In , on 07/09/98 > at 09:47 PM, attila said: > >>Hillary can be beaten back into her cage... Taleban fanaticism >> ends only with their death(s). > >Yes, but more importantly: Is there a bag limit? > bag limit? heavens, no! in fact, the last I heard there was a $5/ear bounty. and someone else told me they, like lawyers, taste "just like chicken" --bok-bok-- __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ From eva654 at hotmail.com Thu Jul 9 21:23:56 1998 From: eva654 at hotmail.com (eva654 at hotmail.com) Date: Thu, 9 Jul 1998 21:23:56 -0700 (PDT) Subject: Now See Amazing World Record Sex! Message-ID: Attention! Warning! Adults Only! Warning! Adults Only! If you are under 21 years of age, or not interested in sexually explicit material... please hit your keyboard delete button now and please excuse the intrusion. Removal instructions appear at the end of this email. Available NOW for only $9.95! Next 10 Days Only! WORLD RECORD SEX! Be There! See It Now On Video! Unbelievable ...But True! You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show] "The World's Biggest Gang Bang" See sexy Annabel Chong as she sets the world Gang Bang Record in this fantastic video documentary that chronicles her 24 hour sexathon with 251 men engaging in sexual intercourse and oral sex with her! Don't worry, you won't have to stay up 24 hours to watch it all. We've selected only the most exciting and red hot scenes for you...all in breathtaking living color with plenty of extreme close-ups! This video is guaranteed to knock your socks off and leave you breathless! You've never seen anything like it! Annabel takes on five men at a time! 90 minutes! Order Today! Only $9.95 plus $3 shipping and handling [Total $12.95]. "GANG BANG II" The Record Breaker!!! Starring Jasmin St. Claire! See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's gang bang record by taking on 300 men in one 24 hour sex session! You won't believe your eyes at all the hot firey action that you will see as the new world record is established before your eyes as Jasmin takes on five men at a time for sexual intercourse and oral sex! Your friends will break down your door to see this video! You'll be the most popular guy in town! The action is truly unreal and you will see the best of it in living life-like color! Order Today and see Jasmin break the record! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95]. Also Available... The Uncensored Authentic Underground... Pamela Anderson Lee & Tommy Lee Sex Video Tape! Everyone is talking about this exciting video! See Pam and Tommy engaging in sexual intercourse and oral sex in the car, on the boat and much, much more! A real collectors video! 30 minutes. Only $9.95 plus $3 shipping and Handling [total $12.95] "Tonya Harding Wedding Night Sex Video" Now see the beautiful Ice Skating Shame of the Olympics Tonya Harding engaging in sexual intercourse and oral sex on her wedding night with husband Jeff Gillooly! This "Bad Girl" is Hot! Don't miss this video! 30 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] "Traci...I Love You" Starring Traci Lords Now see the most beautiful and popular porn star in her last adult video before she hit the big time! It's the blockbuster of the year...sensual...fiery and exposive! Traci Lords in her most erotic and controversial film ever! Don't Miss It! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] EMAIL SPECIAL! ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!! Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper. For Priority Mail - Add $5 For Overnight Express - add $15 You can order by Phone, Fax, Mail or Email. We accept all Major Credit Cards and checks by phone or fax. Visa - MasterCard - American Express - Discover 10 Day Money Back Guarantee! We know that you will be pleased with these Videos! To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD Send email to our special email address below: connie274 at juno.com [Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at 718-287-3800] Phone our office 9am to 10 pm [eastern time] [718] 287-3800 to Order By Phone for FASTEST SERVICE! We can accept your credit card or check by phone Fax Your Order 24 hours per day to [718] 462-5920 You can fax your credit card information or your check Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to TCPS, INC. 4718 18th Ave. Suite 135 Brooklyn, NY 11204 Make Checks & Money Orders Payable to TCPS, Inc. New York State Residents Please Add 85 cents for Sales Tax per Video! You must be over 21 years of age to order and give us your date of birth with your order! The Following Order Form is for Your Convenience! ............................................................................................................. Please ship me the following video tape[s]! Qty___________Annabel Chong "World's Biggest Gang Bang" Qty__________"Gang Bang II" Jasmin St. Claire Qty___________"Pamela & Tommy Lee Sex Video Tape" Qty_________ "Tonya Harding Wedding Night Sex Video Tape" Qty__________"Traci I Love You" Traci Lords at $9.95 each plus $3.00 for shipping and handling per tape [$12.95 per video or "SPECIAL $51.80 for ALL FIVE"! Credit Card #______________________________Exp Date___ I hereby represent that I am over 21 years of age. My date of birth is_________________________________ Signature______________________________________________ Ship to: Name_______________________________________ Address____________________________________________ City________________________State___________Zip________ Area Code and Home Phone [ ]___________________________ Fax # [ ]______________________________________________ Email Address___________________________________________ To remove your name from our mailing list, send us an email with remove in the subject line. This is a one time offer and you should not hear from us again! FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world. By deleting your unwanted E-Mail you waste one keystroke, yet by throwing away paper mail you waste our planet! SAVE THE TREES and support internet E-Mail instead of paper mail! [C] Copyright TCPS 1998 From dformosa at cit.nepean.uws.edu.au Fri Jul 10 04:48:20 1998 From: dformosa at cit.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 10 Jul 1998 04:48:20 -0700 (PDT) Subject: FC: Forget Internet restrictions -- how about banning TV? In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 9 Jul 1998, attila wrote: > On Thu, 9 Jul 1998, Eric Murray wrote: > > [snip] > > > >Then they came for the newspaper, and that really pissed me off, so > >I wanted to protest. [...] > point duly noted. however, TV as a degenerative (self eating > watermelon) force is an option --which I took by refusing it > the privilege of its one eyed stare. However you have the right to choose not to watch TV, and we have the right to watch TV. Its not weather TV is good or bad, but do we have the ablity to make that decistion on our own. Indeed if I wish to do something that is degenerative and self-destructive I should be allowed to. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNaXwk6QK0ynCmdStAQFFDQQA0JH1omnj/kAsjG9y8pADYpwSfwXs0CvR 10LvVcplpHz4XECKmnvzkccT8zG1qBpyDAHH5QFfpwbO6RG0Ig5E9JvEFHMY5aLG z0WYq3hEATH07ivaVADTa+H/9dI0k9nJxFc8i1jFDNpDm8JR8o3aF7tSP0F/uja1 3osAe406fNY= =ZBGz -----END PGP SIGNATURE----- From 24893232 at 03820.com Fri Jul 10 06:01:37 1998 From: 24893232 at 03820.com (Lisa) Date: Fri, 10 Jul 1998 06:01:37 -0700 (PDT) Subject: For Your Eyes Only Message-ID: <007801bda6a2$0673b140$37ab9dcc@ativg.co>

Hi...

I would like to inform you of a great sex site on the web. it contains everything you will ever dream of.

There is also a Live Sex Show from Amsterdam, with sound and a chat box.

Go check it out

http://members.xoom.com/moonshine_81/index.html

Loads of Free Videos and Free Pictures

Love

Lisa









From Mia.Westerholm at DataFellows.com  Fri Jul 10 07:02:52 1998
From: Mia.Westerholm at DataFellows.com (Mia Westerholm)
Date: Fri, 10 Jul 1998 07:02:52 -0700 (PDT)
Subject: Data Fellows Premiers F-Secure VPN+
Message-ID: <3.0.2.32.19980710155153.00a4b7c0@smtp.DataFellows.com>


For immediate release
10 July 1998

DATA FELLOWS PREMIERES F-SECURE VPN+
                              
New Software Line Offers IPsec-Based Strong Security for Mission Critical
Networks
        
Helsinki, Finland, July 10, 1998 -- Data Fellows, the global leader in
Internet security solution development, has begun shipping its new F-Secure
VPN+ product family.

Compliant with the IEFT's (Internet Engineering Task Force) latest IPsec
standards (Internet Protocol Security standard), F-Secure VPN+ provides a
peerless software - only solution for both large corporate networks and remote
or small office networking.  The product line supports several different
encryption algorithms, including triple DES (168-bit), DES (56-bit), Blowfish
(40-446 bit), and CAST128 (40-128 bit). All VPN+ products are centrally
administered with an easy-to-use policy management tool and they also
support centrally managed automated installation.

F-Secure VPN+ operates at the network (IP protocol) level, which is invisible
at the application and end-user level.  The product line does not require
special hardware, and the ordinary user does not even notice its presence
since it requires no changes to network applications or their configurations.
F-Secure VPN+ works in conjunction with existing routers and firewalls, off-
loading encryption functions from those devices. By combining the products in
the F-Secure VPN+ line, companies of any size can use either the Internet or
cost-effective public networks to create virtual private networks without
requiring special hardware.
	
The F-Secure VPN+ family consists of the following products: 
   
- F-Secure VPN+ Client,  which operates in Windows and Solaris workstations
and encrypts all data traffic from such a workstation to an F-Secure VPN+
Gateway, a server equipped with F-Secure VPN+ Server, or another
workstation equipped with F-Secure VPN+ Client.  
  
- F-Secure VPN+ Server, which operates in Windows NT or Solaris
servers and encrypts all data traffic from the server to workstations equipped
with F-Secure VPN+ Client.  

- F-Secure VPN+ Gateway, which encrypts all data traffic from a LAN
through a WAN using the IPsec protocol to other LANs, or to workstations
equipped with encryption software.  A user can connect to a VPN+ Gateway
using either another VPN+ Gateway or VPN+ Client.  

- F-Secure VPN+ Enterprise Gateway, which encrypts all data traffic from a
Local Area Network (LAN) through a Wide Area Network (WAN) using the IPsec
protocol to other LANs, and to workstations equipped with encryption software.
The Enterprise version allows simultaneous connections from both VPN+
Clients and VPN+ Gateway devices.  
   
 "What is revolutionary about F-Secure VPN+ is that a virtual
private network can now be built cost-effectively between just two
workstations," says Mr. Teemu Lehtonen, Product Manager for Data Fellows.
"This is great news for small and medium sized organizations. Large
organizations can also utilize F-Secure VPN+ to extend their corporate network
to sites outside the corporate domain." 

F-Secure VPN+ integrates fully with the recently-introduced Data Fellows'
F-Secure FileCrypto and F-Secure Anti-Virus products. Together, these
products offer the most complete security solution for modern corporations.
The products support centralized policy based management.

F-Secure VPN+ is available from Data Fellows' resellers around the world.
The products have been tested for interoperability with almost 20 other
vendors' (including Cisco Systems, IBM and Check Point) IPsec-standardized
products.

About Data Fellows

Data Fellows is one of the world�s leading developers of data security
software. The company�s groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning F-PROT Professional anti-virus engine, which is now an
integral part of the multiple engine structure of F-Secure Anti-Virus.   

Data Fellows has offices in San Jose, California, and Helsinki, Finland. In
addition, it offers a worldwide network of technical support, training and
distribution in over 80 countries. 

Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.  

For further information, please contact:

USA:
Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700 
Fax  +1 408 938 6701
E-mail:  Pirkka.Palomaki at DataFellows.com

Finland:
Data Fellows Ltd.
Mr. Teemu Lehtonen, Product Manager 					
Tel.  +358 9 859 900
Fax. +358 9 8599 0599
E-mail: Teemu.Lehtonen at DataFellows.com

or visit our web site at http://www.DataFellows.com

����������������������������������������������������
Mia.Westerholm at DataFellows.com 
http://www.DataFellows.com

Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599





From billp at nmol.com  Fri Jul 10 07:31:34 1998
From: billp at nmol.com (bill payne)
Date: Fri, 10 Jul 1998 07:31:34 -0700 (PDT)
Subject: FOIA, Navajo code talkers, Rule 54(b) and PROGRESS
Message-ID: <35A624DB.328F@nmol.com>


Friday 7/10/98 7:39 AM

John Young

I am reading http://www.jya.com/nsa-foia-req.htm	

This FOIA stuff appears to be catchy.

Will you do a pro se lawsuit in case NSA does not come across?  

There is some great stuff on the web on on that subject.
http://jya.com/whpfiles.htm

I just found

navahode.htm       Navaho Code Expert Dies                          
June 26, 1998 http://www.jya.com/navahode.htm

NavaJo is spelled different in the southwest.

Carpet intaller George Chavez junior told me yesterday that his father
George senior was a code talker.

I told Chavez I would send him a copy of what you posted.

Chavez told me that Carl Gorman, RC Gorman's father
http://www.iwaynet.net/~sabrina/gorman.html
was also a code talker.

Chavez commented that RC is a 'bit wierd.'

Chavez is an UNMISTAKABLE Navajo native American -  complete with LONG
pony tail.

Native Americans in the southwest frequently have TWO names.  One an
anglo or hispanic
name and one their native American name.  Like Star Road or White Sun
made famous by Taos NM
artist Blumenschein.

I'll have to ask Chavez if he has another name.

   Life is to short to do everything in line.
   I lead multiple lives, that is why I have more adventures.
   
   Adam Fortunate Eagle, New Mexican, Sunday, 21 Aug 94

Morales and I believe we are going to win our lawsuits a result of
technical legal mistakes made both in district court and the two SHOW
CAUSE orders I mailed to you.  Partial rulings can cause problems.

Rule 54(b) is VERY COMPLEX.

Life is ABOUT back to normal.

First there was PATTY'S floor tile project in about March.

Then the trip to Austin to see our kids and new granddaughter

Then there was THE FLOOD.  Which was CAUSED BY A MICROCONTROLLER
SOFTWARE
DESIGN AND IMPLEMENTATION ERROR - blunder!  And perhaps some DEFICIENT
washing machine hardware design too.

Next was the about month delay caused by getting the Allstate insurance
adjuster to come around to the carpet sellers, our, and the Allstate 
insurance agent way of thinking about how much Allstate should pay.

Next was the several week delay ordering the carpet.

Last Thursday the downstairs carpet got installed.

Thursday, also, I spent in the ER - which stopped the Friday carpet
completion project.

So yesterday the carpet installers finished.  

Looks GREAT!  And both the carpet installers were real nice guys.

And some legal filings while all of the other above was going on.

So the next two orders of business are

	1  finish the digital FX
	2  conclude our legal fights with SETTLEMENT - before things get WORSE.

On your NSA FOIA I suggest that you seek a waiver of fees since the
material you seek 
benefits the public.

I just saw http://www.jya.com/crypto.htm

  DoE: Pay Bill Payne   
  DoJ: Free Jim Bell 
  DoJ: Free Kevin Mitnick 

THANK YOU.  

Best
bill







From CTIA_Daily_News at um2.unitymail.com  Fri Jul 10 09:53:00 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 10 Jul 1998 09:53:00 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 10, 1998
Message-ID: <199807101642.LAA11829@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================

 








From sales at no-isp.com  Fri Jul 10 11:04:46 1998
From: sales at no-isp.com (sales at no-isp.com)
Date: Fri, 10 Jul 1998 11:04:46 -0700 (PDT)
Subject: New Way to Access Internet
Message-ID: <899909450@no-isp>


Dear User,


We do not wish to send e-mail to anyone who does not want to receive it.
If you are not interested , please reply to sales at no-isp.com with "REMOVE"
in the subject line and you will be promptly removed from our database.
Thank you for your patience and we apologize for intruding on your time 
and privacy.

If, however, you are looking for a fast and easy way to dial into the
Internet whenever you want and from wherever you are, then read on.

Our *Instant Access* service gives you *Internet-on-demand* and you DON'T
need to subscribe to an Internet Service Provider !!

No monthly charges and no setup fee

No registration of any kind required

No Proxy in the way

Absolute ANONYMOUS login !!

Unlimited personal access duration

Fast connection

Access from all over the world

Nothing is censored on this network

Visit our site at www.no-isp.com for full details now.


Happy surfing!





From howree at cable.navy.mil  Fri Jul 10 11:52:51 1998
From: howree at cable.navy.mil (Reeza!)
Date: Fri, 10 Jul 1998 11:52:51 -0700 (PDT)
Subject: no subject
In-Reply-To: <199807092321.XAA23250@steve1.weboneinc.com>
Message-ID: <3.0.5.32.19980710205216.0089ed30@205.83.192.13>


At 11:21 PM 09 07 98 GMT, Jerry wrote:
--snip--
Message-ID: 


On Fri, 10 Jul 1998, Declan McCullagh wrote:

>   Remember when your underage friend ginned up that fake driver's
>   license to go bar-hopping? Soon it may be a federal crime, punishable
>   by serious fines and up to 15 years in the slammer. The Senate
>   Judiciary Committee yesterday unanimously approved the "Identity Theft
>   and Assumption Deterrence Act," a clunkily named bill that bans
>   obtaining, possessing or using ID "other than that issued lawfully for
>   the use of the possessor."
>   [...remainder snipped...]
>
    oh, shit. does that mean I will be forced to tell everyone my real
    name is FUD?  or TruthMonger? or, even HugeCajones? at least it's
    not DV_KOTM!

    speaking of the late, lamentable foul mouth... whatever happened to
    dmitri?

	attila out...    while I can still be outing attila.






From ulf at REPLAY.COM  Fri Jul 10 13:26:22 1998
From: ulf at REPLAY.COM (ulf at REPLAY.COM)
Date: Fri, 10 Jul 1998 13:26:22 -0700 (PDT)
Subject: Mixmaster protocol
Message-ID: <199807102025.WAA06967@basement.replay.com>


I'd like to get feedback on the clarity of this draft describing the
Mixmaster protocol.

I'll post the proposed extensions for version 3 later.



Mixmaster Protocol
==================

Abstract

Most e-mail security protocols only protect the message body, leaving
useful information such as the the identities of the conversing
parties, sizes of messages and frequency of message exchange open to
adversaries. This document describes Mixmaster, a mail transfer
protocol designed to protect electronic mail against traffic analysis.


Table of Contents

1. Introduction
2. The Mix-Net Protocol
   2.1 Message Creation
   2.2 Remailing
3. Message Format
   3.1 Cryptographic Algorithms
   3.2 Packet Format
   3.2.1 Header Chart Format
   3.2.2 Body Format
   3.3 Mail Transfer Encoding
   3.5 Transfer through Socket Connections
4. Key Format
5. References


1. Introduction

This document describes a mail transfer protocol designed to protect
electronic mail against traffic analysis. Most e-mail security
protocols only protect the message body, leaving useful information
such as the the identities of the conversing parties, sizes of
messages and frequency of message exchange open to adversaries.

Message transmission can be protected against traffic analysis by the
mix-net protocol. A mix (remailer) is a service that forwards
messages, using public key cryptography to hide the correlation
between its inputs and outputs. If a message is sent through a
sequence of mixes, one trusted mix is sufficient to provide anonymity
and unobserveability of communications against a powerful
adversary. Mixmaster is a mix-net implementation for electronic mail.

This document describes version 2 of the Mixmaster message format.


2. The Mix-Net Protocol

The mix-net protocol [Chaum] allows to send messages while hiding the
relation of sender and recipient from observers (unobserveability). It
also provides the sender of a message with the ability to remain
anonymous to the recipient (sender anonymity). If anonymity is not
desired, authenticity and unobserveability can be achieved in the same
time by transmitting digitally signed messages.

This section gives an overview over the protocol used in
Mixmaster. The message format is specified in section 3.


2.1 Message Creation

To send a message, the user agent splits into parts of fixed size,
which form the bodies of Mixmaster packets. If sender anonymity is
desired, care should be taken not to include identifying information
in the message. The message may be compressed.

The sender choses a sequence of up to 20 remailers for each
packet. The final remailer must be identical for all parts of the
message.

The packet header consists of 20 charts. For a sequence of n
remailers, header charts n+1, ... , 20 are filled with random
data. For all charts i := n down to 1, the sender generates a
symmetric encryption key, which is used to encrypt the body and all
following header charts. This key, together with other control
information for the remailer, is included in the i-th header chart,
which is then encrypted with the remailer's public key.

The message is sent to the first remailer in an appropriate transport
encoding.

To increase reliability, multiple copies of message may be sent
through different paths. The final remailer must be identical for all
paths, so that duplicates can be detected and the message is delivered
only once.


2.2 Remailing

When a remailer receives a message, it decrypts the first header chart
with its private key. By keeping track of a packet ID, the remailer
verifies that the packet has not been processed before. The integrity
of the message is verified by checking the packet length and verifying
message digests included in the packet. Then the first header chart is
removed, the others are shifted up by one, and the last chart is
filled with random padding. All header charts and the message body are
decrypted with the symmetric key found in the header. This reveals a
public key-encrypted header chart for the next remailer at the top,
and obscures the old top header chart. Transfer encoding is applied to
the resulting message.

The remailer collects several encrypted messages before sending the
resulting messages in random order. Thus the relation between the
incoming and outgoing messages is obscured to outside adversaries even
if the adversary can observe all messages sent. The message is
effectively anonymized by sending it through a chain of independently
operated remailers.


2.3 Message Reassembly

When a packet is sent to the final remailer, it contains a flag
indicating that the chain ends at that remailer, and whether the
packet contains a complete message or part of a multi-part message. If
the packet contains the entire message, the body is decrypted and
after reordering messages the plain text is delivered to the
recipient. For partial messages, a packet ID is used to identify the
other parts as they arrive. When all parts have arrived, the message
is reassembled and delivered. If the parts do not arrive within a time
limit, the message is discarded.

Only the last remailer in the chain can determine whether packets are
part of a certain message. To all the others, they are completely
independent.

If necessary, the reassembled message is decompressed before sending
it to the recipient.

When anonymous messages are forwarded to third parties, the final
remailer should ensure that the sender cannot supply header lines that
indicate a false identity or send Usenet control messages that may
have security implications. Appropriate information about the origin
of the message should be inserted in the Comments: header line of the
message.

If the recipient does not wish to receive anonymous messages, the
remailer can ensure authenticity be verifying that the message is
cryptographically signed [RFC 1991, RFC 2311] by a known sender.


3. Message Format

3.1 Cryptographic Algorithms

The asymmetric encryption operation in Mixmaster version 2 uses RSA
with 1024 bit RSA keys and PKCS #1 padding [RFC 2313]. The symmetric
encryption uses EDE 3DES with cipher block chaining (24 byte key, 8
byte initialization vector) [Schneier]. MD5 [RFC 1321] is used as the
message digest algorithm.


3.2 Packet Format

A Mixmaster packet consists of a header containing information for the
remailers, and a body containing the payload. To ensure that packets
are undistinguishable, the size of these encrypted data fields is
fixed.

The packet header consists of 20 header charts (specified in section
A.2) of 512 bytes each, resulting in a total size of 10240 bytes. The
header charts and the body are encrypted with symmetric session keys
specified in the first header chart.


3.2.1 Header Chart Format

     Public key ID                [  16 bytes]
     Encrypted session key length [   1 byte ]
     RSA-encrypted session key    [ 128 bytes]
     Initialization vector        [   8 bytes]
     Encrypted header section     [ 328 bytes]
     Padding                      [  31 bytes]

Total size:
  512 bytes

A random 24 bit Triple-DES key is encrypted with RSA, resulting
in 1024 bit of encrypted data.

The header section encrypted with this session key is:

     Packet ID                     [ 16 bytes]
     Triple-DES key                [ 24 bytes]
     Packet type identifier        [  1 byte ]
     Packet type 0:
        19 Initialization vectors  [152 bytes]
        Remailer address           [ 80 bytes]
     Packet type 1:
        Message ID                 [ 16 bytes]
        Initialization vector      [  8 bytes]
     Packet type 2:
        Packet number              [  1 byte ]
        Number of packets          [  1 byte ]
        Message ID                 [ 16 bytes]
        Initialization vector      [  8 bytes]
     Timestamp                     [  7 bytes] (optional)
     Message digest                [ 16 bytes]

Total size:
  Type 0: 297 bytes (+ 7 if timestamp is used)
  Type 1:  81 bytes (+ 7 if timestamp is used)
  Type 2:  83 bytes (+ 7 if timestamp is used)

This data structure is padded to 328 bytes.

Packet ID: randomly generated packet identifier.

Key: symmetric key used to encrypt the following header charts and the
body.

Packet type identifier:

Intermediate hop           0
Final hop                  1
Final hop, partial message 2

Initialization vectors: For packet type 1 and 2, the IV is used to
symmetrically encrypt the body. For packet type 0, there is one IV for
each of the 19 following header charts. The IV for 19th header chart
is also used for the body.

Remailer address: address of next hop.

Message ID: randomly generated identifier unique to (all packets of)
this message.

Packet number: Sequence number used in multi-packet messages.

Number of packets: Total number of packets.

Timestamp: A timestamp is introduced with the byte sequence (48, 48,
48, 48, 0). The following two bytes specify the number of days since
Jan 1, 1970, given in little-endian byte order. A random number of up
to 3 may be substracted from the number of days in order to obscure
the origin of the message.

Digest: MD5 digest computed over the preceding elements of the
encrypted header section.

Header charts 2 .. 20 and the body each are decrypted separately using
the respective initialization vectors.


3.2.2 Body Format

     Number of destinations     [        1 byte]
     Destination addresses      [ 80 bytes each]
     Number of header lines     [        1 byte]
     Header lines               [ 80 bytes each]
     Payload                    [      any size]

Destination addresses are Internet mail addresses. Additionally,
the following special destinations are defined:

null:             Dummy message, will be discarded by the final mix.
post: newsgroup   Message will be posted to Usenet.

The payload may be compressed using GZIP [RFC 1952] if the
capabilities attribute of the final remailer contains the flag
"C". When compressing the message, the operating system field must be
set to Unix, and file names must not be given. The remailer treats
messages beginning with the GZIP identification header (31, 139) as
compressed.

The resulting message is split into chunks of 10236 bytes. To each chunk,
its length is prepended as a 4 byte little-endian number to form the body
of a Mixmaster packet.


3.3 Mail Transfer Encoding

Mixmaster packets are sent as text messages [RFC 822]. The body has
the following format:

  ::
  Remailer-Type: Mixmaster [version number]
  
  -----BEGIN REMAILER MESSAGE-----
  [message length]
  [message digest]
  [encoded message]
  -----END REMAILER MESSAGE-----

The length field always contains the decimal number "20480", since the
size of Mixmaster messages is constant. The MD5 message digest [RFC
1321] of the message is encoded as a hexadecimal string.

The message itself is encoded in base 64 encoding [RFC 1421] and
broken into lines of 40 characters.


4. Key Format

Remailer public key files consist of a list of attributes and a
public RSA key:

  [attributes list]
  
  -----Begin Mix Key-----
  [key ID]
  [length]
  [encoded key]
  -----End Mix Key-----

The attributes are listed in one line separated by spaces:

identifier:   a human readable alphabetical string identifiying the remailer
address:      the remailer's Internet mail address
key ID:       public key ID
version:      the Mixmaster version number
capabilities: flags indicating additional capabilites of the remailers

The identifier consists of alphanumeric characters, begining with an
alphabetic character. It must not contain whitespace.

The encoded key packet consists of two bytes specfying the key length
(1024 bits) in little-endian byte order, and of the RSA modulus and
the public exponent in big-endian form using 128 bytes each, with
preceding null bytes where necessary. The packet is encoded in base
64, and broken into lines of 40 characters each. Its length (258
bytes) is given as a decimal number.

The key ID is the MD5 message digest of the reprentation of the RSA
public key (not including the length bytes). It is encoded as a
hexadecimal string.

The capabilities field is optional. Clients should ignore unknown flags.
The following flags are used in version 2.0.4:

C     accepts compressed messages.
M     will forward messages to another mix, when used as the final hop.
Nm    supports posting to Usenet throught a mail-to-news gateway.
Np    supports direct posting to Usenet.

Digital signatures [RFC 1991] should be used to ensure the
authenticity of the key files.


5. References

[Chaum] Chaum, D., "Untraceable Electronic Mail, Return Addresses, and
Digital Pseudonyms", Communications of the ACM 24 (1981) 2.

[RFC 822] Crocker, D., "Standard for the Format of ARPA Internet Text
Messages", STD 11, RFC 822, August 1982.

[RFC 1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
April 1992.

[RFC 1421] Linn, J., "Privacy Enhancement for Internet Electronic
Mail: Part I -- Message Encryption and Authentication Procedures", RFC
1421, February 1993.

[RFC 1952] Deutsch, P., "GZIP file format specification version 4.3",
RFC 1951, May 1996.

[RFC 1991] Atkins, D., Stallings, W. and Zimmermann, P., "PGP Message
Exchange Formats", RFC 1991, August 1996.

[RFC 2311] Dusse, S., Hoffman, P, Ramsdell, B, Lundblade, L. and
Repka, L., "S/MIME Version 2 Message Specification", RFC 2311, March
1998.

[RFC 2313] Kaliski, B., "PKCS #1: RSA Encryption, Version 1.5", RFC
2313, March 1998.

[Schneier] Schneier, B., "Applied Cryptography", 2nd Edition, Wiley,
1996.






From stuffed at stuffed.net  Fri Jul 10 13:53:51 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 10 Jul 1998 13:53:51 -0700 (PDT)
Subject: Tit 'n' Run/Man sues self/World's worst liar
Message-ID: <19980710190741.21988.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 270 bytes
Desc: not available
URL: 

From pay83 at hotmail.com  Fri Jul 10 15:19:41 1998
From: pay83 at hotmail.com (Lenders Plus Network)
Date: Fri, 10 Jul 1998 15:19:41 -0700 (PDT)
Subject: Get Cash You need Right Away!!
Message-ID: <1998071094ZAA4803@post.net>





                GET THE MONEY YOU NEED RIGHT NOW!

Here's your chance to...

        > Eliminate Credit Card Debt!
       > Take advantage of LOW INTEREST RATES!
        > Escape from High Monthly Payments!
        > Get Relief and Have the Money You Need!
        > Cash in Your Pocket Usually within 7 to 14 days!
        > Make Home Improvements You've Always Wanted!
     > Take the Vacation You Deserve!

How?  Simply CLICK HERE TO VISIT OUR WEBSITE -->
http://www.bighitter.holowww.com/american107.htm

Would you like money for...

           ~ A New Car?
        ~ College Tuition?
          ~ Taxes?
          ~ Consolidate Your Credit Cards?
        ~ A Dream Vacation?
          ~ Home Improvements?

Now It Can Be Yours!   What are you waiting for?

For a FREE evaluation please visit our website by...

               CLICKING HERE (http://www.bighitter.holowww.com/american107.htm


or type or cut & paste: http://www.bighitter.holowww.com/american107.htm

Especially if you're a homeowner, we can help you.  Try us!



n+4 iden





From remove00012 at usa.net  Fri Jul 10 20:59:51 1998
From: remove00012 at usa.net (remove00012 at usa.net)
Date: Fri, 10 Jul 1998 20:59:51 -0700 (PDT)
Subject: Spend Extra Time With Your Family.
Message-ID: <94691665_60884038>



Dear Prospective Entrepreneur;
 
I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is 
growing at a fantastic rate; in fact, after only 10 
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.

What makes this company and this opportunity I am 
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the 
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind.  Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.

After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that 
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.

Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me 
calling them.

Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical 
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.

If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You 
also can respond to this e-mail if you so wish.

If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me.  WHAT HAVE YOU GOT TO
LOSE?  I made that same call a few months ago, and I 
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy 
it will be for you to make that extra money.

Thanks, 
Clyde Fontenot


This message is brought to you from Clyde Fontenot, 
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535. If you would like to be removed from
future e-mails, please "reply" with the word 
REMOVE in the subject of your reply message.





From bill.stewart at pobox.com  Fri Jul 10 21:13:29 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 10 Jul 1998 21:13:29 -0700 (PDT)
Subject: no subject!
In-Reply-To: <199807070635.IAA08822@basement.replay.com>
Message-ID: <3.0.5.32.19980710170837.008f0990@popd.ix.netcom.com>


At 08:35 AM 7/7/98 +0200, Anonymous wrote:
>Where is this?  Stalled.  Looks dead in the water.  Any further insights?

Dr. Ron Paul often introduces good bills that will never get anywhere,
because he's _not_ a mainstream Congressscritter.
He was a conservative Republican Congresscritter from Houston, 
quit the GOP in ~1986/1987, ran for President as a Libertarian, (lost),
and a couple of years ago decided to re-emerge as a Republican.

He's generally in favor of personal and economic freedom,
though he seems to believe that the US government owns the country
and therefore has the right to ban immigrants; I took the Ron Paul
bumper sticker off my car a few years after the election when he
endorsed Pat Buchanan for the Republican nomination instead of
the also-bad George Bush.  He's also rabidly against the U.N.,
and borders on Black-Helicopter paranoia on occasion :-)

He's willing to take a strong stand against the Republicrats 
when there are issues of principle, and therefore doesn't have a 
lot of support - often he and Bernie Sanders, the Vermont Socialist, 
are about the only members opposing a bill.  So no surprise if the bill dies.


>H.R.3261 
>SPONSOR: Rep Paul (introduced 02/25/98) 
>
>SUMMARY: 
>
>(AS INTRODUCED) 
>
>Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors
>and Disability Insurance) of the Social Security Act and the Internal
>Revenue Code to prohibit any Federal, State, or local government agency or
>instrumentality from using a social security account number or
>any derivative as the means of identifying any individual, except for
>specified social security and tax purposes. 
>
>Amends the Privacy Act of 1974 to prohibit any Federal, State, or local
>government agency or instrumentality from requesting an individual to
>disclose his social security account number on either a mandatory or a
>voluntary basis. 
>
>Prohibits any two Federal agencies or instrumentalities from implementing
>the same identifying number with respect to any individual, except as
>authorized under this Act. 
>
>
>----
>STATUS: Detailed Legislative Status 
>
>                                                 House Actions
>
>Feb 25, 98:
>     Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
>     be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
>     committee concerned. 
>     Mar 2, 98:
>          Referred to the Subcommittee on Government Management,
>Information and Technology.
>Feb 25, 98:
>     Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
>     be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
>     committee concerned.
>
>
>
>
>
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From bill.stewart at pobox.com  Fri Jul 10 21:14:19 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 10 Jul 1998 21:14:19 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID: <3.0.5.32.19980710171121.008f33f0@popd.ix.netcom.com>


At 03:11 AM 7/7/98 -0400, mgraffam at mhv.net wrote:
>On Mon, 6 Jul 1998, Ernest Hua wrote:
>> Did anyone demonstrate the "functionalness" of any arbitrary language
>> via a scanner and a compiler?
>Indeed.. what we need is for someone to testify to the court about
>natural and computer language, and maybe some relevent material from
>information theory. 
>
>Pseudo-code from any computer programming textbook would be helpful
>in making this point too.
>
>What about English in a voice recognition system? In this case, English
>can actually perform functions too, just as C does.

A particularly relevent language is the Algorithmic Language, Algol,
which was designed for mathematicians to describe algorithms to each other,
though it was also designed in a way to support compilers,
such as ALGOL-60.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From hugh at east.toad.com  Fri Jul 10 21:25:35 1998
From: hugh at east.toad.com (Hugh Daniel)
Date: Fri, 10 Jul 1998 21:25:35 -0700 (PDT)
Subject: ANNOUNCE: Bay Area Cypherpunks, Sat.July 11, 12-6, KPMG Mountain View
Message-ID: <199807110201.TAA03498@east.toad.com>



The July Bay Area Cypherpunks Meeting will be Saturday July 11 198
from 12-6, at KPMG, 500 E. Middlefield Rd., Mountain View.

Sameer Parekh will talk about the SSL / PKCS#1 crack and repair.

Dinner after the meeting will be at some restaurant on Castro
St. Mtn.View.

Directions: KPMG is a relatively-unmarked building at the corner of
Middlefield Rd. and Ellis St. in a Netscape-infested section of
Mountain View.
The lobby entrance is on the Ellis St. side.  
The Ellis exit on 101 is between 85 and 237.

http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-122.05265%7CY%3A37.39603%7CLT%3A37.39603%7CLN%3A-122.05265%7CLS%3A20000%7Cc%3AMountain_View%7Cs%3ACA%7Cz%3A94043%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.39603%3A37.39603&IC=5&IC%3A=KPMG&GAD2=500+E+Middlefield+Rd&GAD3=Mountain+View%2C+CA++94043-4008&W=600&H=350&MA=1&zoom.x=28&zoom.y=172

Probable speakers for next month:
- Sue Bardakos from Entrust 
- Paul Kocher talking about differential power analysis

-----------
Mailing list administrivia - this announcement has been sent to
        cypherpunks at cyberpass.net
        cypherpunks-announce at toad.com
        coderpunks at toad.com
        cryptography at c2.net
If you want to get off one of the lists, send mail to
        listname-request at machine.domain   (probably majordomo!)
for the listserver that sent you the mail.
-----------

                                Thanks! 
                                        Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From mminow at yahoo.com  Fri Jul 10 23:58:04 1998
From: mminow at yahoo.com (Martin Minow)
Date: Fri, 10 Jul 1998 23:58:04 -0700 (PDT)
Subject: Junger et al.
Message-ID: <19980711065637.27355.rocketmail@send1a.yahoomail.com>


My declaration for the Junger lawsuit (available on jya.com) touched
on these issues, but the court chose not to accept my reasoning. My
quick reading of the decision is that the court took note that sourc
and object code are functional (they control a computer), and chose
to ignore their ability to express an algorithm and, hence, to
communicate
the substance of an encryption algorithm to another human being.

The court also appears to assume that, because computer source code
requires
technical skill and training understand, it somehow loses its First
Amendment privileges: this I find confusing.

Martin Minow (minow at pobox.com)

---Bill Stewart  wrote:
>
> At 03:11 AM 7/7/98 -0400, mgraffam at mhv.net wrote:
> >On Mon, 6 Jul 1998, Ernest Hua wrote:
> >> Did anyone demonstrate the "functionalness" of any arbitrary
language
> >> via a scanner and a compiler?
> >Indeed.. what we need is for someone to testify to the court about
> >natural and computer language, and maybe some relevent material from
> >information theory. 
> >
> >Pseudo-code from any computer programming textbook would be helpful
> >in making this point too.
> >
> >What about English in a voice recognition system? In this case,
English
> >can actually perform functions too, just as C does.
> 
> A particularly relevent language is the Algorithmic Language, Algol,
> which was designed for mathematicians to describe algorithms to each
other,
> though it was also designed in a way to support compilers,
> such as ALGOL-60.
> 				Thanks! 
> 					Bill
> Bill Stewart, bill.stewart at pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639
> 
> 

==
Please reply to minow at pobox.com


_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com






From stuffed at stuffed.net  Sat Jul 11 08:49:40 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 11 Jul 1998 08:49:40 -0700 (PDT)
Subject: My date with a dwarf/Nice guys come first
Message-ID: <19980711145448.24797.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 272 bytes
Desc: not available
URL: 

From tne1870 at hotmail.com  Sat Jul 11 11:20:15 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 11:20:15 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From tne1870 at hotmail.com  Sat Jul 11 11:39:28 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 11:39:28 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From tne1870 at hotmail.com  Sat Jul 11 12:02:58 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:02:58 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From jrsd3424 at hotmail.com  Sat Jul 11 12:09:19 1998
From: jrsd3424 at hotmail.com (jrsd3424 at hotmail.com)
Date: Sat, 11 Jul 1998 12:09:19 -0700 (PDT)
Subject: News Release....
Message-ID: <9807091526.AA15333@pharmdec.wustl.edu>


NEWS RELEASE

NuOncology Labs Inc

Symbol: NLAB
Trades:  OTC BB

July 9, l998

NUONCOLOGY LABS COMPLETES ACQUISITION

Virginia Beach, VA - NuOncology Labs, Inc.
(OTC BB: NLAB), a Florida Corporation, announced
today that it has acquired all the outstanding and 
issued shares of NuOncology Labs, Inc. (Nulab),
a private Virginia Corporation.  The new combined
entity will maintain the name NuOncology Labs Inc.

NuOncology Labs, Inc's Senior Medical Director is
R. Michael Williams, Ph.D, the co-founder, Senior
Medical Director and Chief Medical Officer of Cancer
Treatment Centers of America.  The company's 
Scientific Director is Fraser S. Baker, Ph. D., co-
founder and Director of Baker-Sanger Laboratory,
Inc., a Houston based chemosensitivity testing
laboratory.

NuOncology Labs, Inc. participates in the multi-
billion dollar cancer treatment industry by supporting
the research and marketing of a promising cancer
treatment along with the delivery of predictive tests
for the optimization of contemporary cancer 
treatment.  Both activities could greatly improve
clinical outcomes while reducing treatment costs.



NuOncology Labs Inc has a "dramatically effective 
cancer treatment" in trials with over 200 patients
at this time.  This project as well as NuOncology
Labs Inc is being lead by a "very distinguished
research and management team".

To receive a complete investor package on 
NuOncology Labs Inc, as well as a FREE 
subscription to our newsletter that profiles
specially selected companies in the "New
Economy" we feel have the potential for
tremendous growth potential PLEASE CLICK
HERE:

Free Info

Please note that by sending an e-mail to this
address you are requesting additional information
on NuOncology Labs Inc as well as a FREE
no obligation subscription to our newsletter.
You may unsubscribe at any time.

We profile these companies at the time they
initially go public - before they have been
discovered by 'the Street' and financial media
and already doubled or tripled in price.





end.






From tne1870 at hotmail.com  Sat Jul 11 12:25:06 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:25:06 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From tne1870 at hotmail.com  Sat Jul 11 12:49:45 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:49:45 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From tne1870 at hotmail.com  Sat Jul 11 13:10:17 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 13:10:17 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID: 



INFORMATION ONLY

The Pre-Press Brokerage Company brokers used pre-press 
equipment for the newspaper industry.

Our web address:     http://www.pe.net/~pbc
Our email address:    pbc at pe.net

You may call our office at 909.686.2875.
Thank you for your consideration.

Geoff McPartlin
Sales Director






From gwb at gwb.com.au  Sat Jul 11 14:33:30 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 11 Jul 1998 14:33:30 -0700 (PDT)
Subject: The Australia/Israel Review list and Jetset Travel
Message-ID: <1.5.4.32.19980711210318.007236b8@gwb.com.au>


Dear One Nation supporter in NSW,

It should be noted by One Nation supporters that the man behind the
Australia/Israel Review, Mr Leibler, is one of the men behind Jetset Travel. 

When booking your next holiday trip I would ask you to consider what
Leibler's views are on the publication of the list of the names and Suburbs
of 2000 One Nation members and donors in the Australia/Israel Review.

Mr Leibler said the decision to publish the list of members and donors was
in the interests of "political transparency". He said concerns about privacy
had been met by not publishing full addresses and telephone numbers. 

What Leibler failed to mention is that they published the suburbs that
members live in. Many One Nation members had phone calls from the media -
contacts made directly through the list published by the Australia/Israel
Review. 

The Australia/Israel Review has since shelved plans to publish the names of
One Nation's remaining 8,000 members. Mr Leibler said: "We feel we have made
our point."

Perhaps it is time for One Nation supporters to make their point?

Jetset can be contacted on: info at jetset.com.au 

GWB



Scott Balson






From StanSqncrs at aol.com  Sat Jul 11 23:21:47 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 11 Jul 1998 23:21:47 -0700 (PDT)
Subject: A Note to 'Nobody'
Message-ID: <490d1a8.35a855ce@aol.com>


Hey 'Nobody' (tcmay at got.net (Tim May)), you may as well stop sending me all
your junk mail.  Since you've resorted to attempting to get me kicked off of
AOL for responding to individual pieces of it (Cypherpunks, that's a lie.  He
did that attempt in an attempt to get my website kicked off of AOL), I'm
simply deleting everything that comes in from all the anon. remailing services
without reading it.

If you don't have enough guts to put a return address on your mail, obviously,
you aren't worth reading.

Stan,
Stan and the Sequencers
http://members.aol.com/StanSqncrs/





From stuffed at stuffed.net  Sun Jul 12 04:18:45 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sun, 12 Jul 1998 04:18:45 -0700 (PDT)
Subject: World's dumbest gunslinger/Exclusive: Are her tits real?
Message-ID: <19980712093021.24392.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 270 bytes
Desc: not available
URL: 

From StanSqncrs at aol.com  Sun Jul 12 04:26:15 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sun, 12 Jul 1998 04:26:15 -0700 (PDT)
Subject: A Note to 'Nobody'
Message-ID: 


In a message dated 7/12/98 2:33:18 AM Central Daylight Time, tcmay at got.net
writes:

<< ... Further proof that AOL is the dumping ground for the incompetent. >>

And Tim expects AOL to listen to his complaint with that at the end of it?
Ha!

Stan





From jya at pipeline.com  Sun Jul 12 08:38:25 1998
From: jya at pipeline.com (John Young)
Date: Sun, 12 Jul 1998 08:38:25 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
Message-ID: <199807121538.LAA18345@camel14.mindspring.com>


The New York Times, July 12, 1998:

Danger of Encryption

To the Editor:

Re "Privacy in the Digital Age" (editorial, July 6): No law 
enforcement agency is "trying hard to prevent the growing 
use of encryption." But encryption represents a serious 
public safety concern. We are open to any solution that 
recognizes that it is the ability to collect electronic 
evidence that has allowed us to prevent airliners from 
being bombed and to put major drug dealers behind bars.

Key escrow is one possible solution. There are others, and 
certainly a statutory scheme can be devised that will all 
but eliminate any risk of abuse by law enforcement. But if 
we do not allow for court-ordered access, for the first time 
in the history of this country a court order for seizure of 
evidence will be an absolute nullity.

We want to work with industry on a real solution, recognizing 
that those who acquire encryption over the Internet or from 
abroad naively make assumptions about the security it affords. 
We are not fighting encryption, but we know what will happen 
if technology cannot be made to work for law enforcement as 
it works for criminals and terrorists.    

Louis J. FREEH
Dir., Federal Bureau of Investigation
Washington, July 10,1998







From Webroot at ix.netcom.com  Sun Jul 12 18:38:01 1998
From: Webroot at ix.netcom.com (Webroot at ix.netcom.com)
Date: Sun, 12 Jul 1998 18:38:01 -0700 (PDT)
Subject: Cancer Treatment BREAKTHROUGH!!!!
Message-ID: <199807060040.TAA11965@cityatlas.com>


DRAMATICALLY EFFECTIVE CANCER 

TREATMENT IN FINAL DEVELOPMENT

FOR SOFT TISSUE CANCERS OF THE

LIVER, BREAST AND LUNGS -  

by a company that just went public last week! 

Now you can participate in the multi-billion
dollar cancer treatment industry by owning 
stock in this company before the "Wall Street
Analysts" discover it. The company is in 
the final stages of researching and 
developing this new drug to help cure soft  
tissue cancers of the liver, breast and lungs.

This company is led by a very distinguished 
team of Cancer Research Specialists who have
studied this disease for the last two decades.
The company holds the worldwide manufacturing
and marketing rights (except for the former
Soviet Union) for this drug. 

The company is called :

NuOncology Labs Inc.

Trading Symbol: NLAB

Trades:   OTC  BB

'NLAB' started trading last Thursday,July 9,
at: $5 15/32

At the market close Friday, July 10, it was:
$6 1/8

Trials are now being conducted on over 200 
human cancer patients with this new drug and
some very important announcements are 
expected to come from NuOncology over the 
next few weeks.

To have complete investor information sent to 
you via e-mail on this innovative new 
pharmaceutical research and development 
company just :

Click Here

You will get back complete information via
e-mail within the next 24 hours on :
  
NuOncology Labs, Inc. 

We profile companies at the time they initially
go public - before they have been discovered 
by 'The Street' and financial media and have 
by that time already doubled or tripled in price.
By requesting additional information on 
NuOncology Labs, Inc., you are also requesting 
a subscription to our newsletter that profiles
emerging new companies. There is no obligation
and absolutely no cost to you. You may 
unsubscribe at any time. 






From trei at ziplink.net  Sun Jul 12 20:19:04 1998
From: trei at ziplink.net (Trei Family)
Date: Sun, 12 Jul 1998 20:19:04 -0700 (PDT)
Subject: RSA DES Challenge starting!
Message-ID: <35A989DA.C1246441@ziplink.net>


I'd like to remind people that Monday, July 13th,
1998, RSA Data Security is releasing the challenge
data for the next RSA DES Challenge (the brute force
solution of a DES encrypted message).

For more information on this challenge, please see
http://www.rsa.com. The prize stands at 10,000 USD
for the first solution found within 10 days.

If wish to attempt the challenge by yourself, I
reccomend that you look at Svend Mikkelsen's
Bryddes (http://inet.uni2.dk/~svolaf/des.htm),
which is by far the fastest Intel implementation
I know of - considerably better than my own
Deskr.

If you're interested in a joint effort, you could
do worse than look at http://distributed.net. This
group won the RC5-56 and January 1998 DES challenges,
and are currently working on RC5-64. Their clients
will automatically switch over to DES Monday
morning. It looks like they should attain around
86 billion keys/second, which will exhaust the
keyspace in under 10 days. However, only a fraction
of the prize money goes to the person who finds
the key.

Cracking DES in these challenges serves a higher
purpose than winning a prize or gaining bragging
rights.

Single DES (the kind used in this challenge) is the
strongest general purpose encryption which Americans
are currently permitted to send overseas without
special and rarely granted waivers.

As a result, the US government is turning over the
world market in high quality cryptography to
non-US firms, with a cost of billions of dollars a
year to the US economy, thousands of American jobs,
and increased crime and terrorism resulting from the
poor security this policy promotes.

Demonstrating how vulnerable US 'export quality'
encryption actually is creates pressure to remove
those restrictions entirely.

I regard this as a desirable goal.

Peter Trei
trei at ziplink.net







From caj at math.niu.edu  Sun Jul 12 22:22:33 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Sun, 12 Jul 1998 22:22:33 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To: <199807121538.LAA18345@camel14.mindspring.com>
Message-ID: 


On Sun, 12 Jul 1998, John Young wrote:

> The New York Times, July 12, 1998:
>
	[...]
 
> but eliminate any risk of abuse by law enforcement. But if 
> we do not allow for court-ordered access, for the first time 
> in the history of this country a court order for seizure of 
> evidence will be an absolute nullity.

	This is an interesting claim.  Surely it's only been
	in this century that law enforcement has ever had 
	the kind of systematic access to communication that presently
	does.  I'd say Louis Freeh is lacking in the history department
	if he really believes that Americans have never possessed
	as much privacy as strong crypto offers.

	I'd also say he's missed a few history classes if he 
	thinks that the world will blow up without him listening
	in.

							-Xcott






From 58577650 at bluewin.ch  Sun Jul 12 22:34:50 1998
From: 58577650 at bluewin.ch (58577650 at bluewin.ch)
Date: Sun, 12 Jul 1998 22:34:50 -0700 (PDT)
Subject: IIIII=Email Advertising?=IIIII
Message-ID: <199807130528.AAA24174@mail-gw2adm.rcsntx.swbell.net>


WE REALLY SEND IT !                
         
         * We use remove systems
         * We use addresses recently collected
         * Recently Improved System Produces More Responses

Now offering targeted lists!  10 cents per address, 4000 address minimum.
     
General Mailing :

Only $350 per 1 million. Introductory offer :

Get the first million for only $250 !

" Test Drive " Special !  Try our service for $55, we send 250,000 
of your ads.    
 
Click here to reply back about this offer 

Or, type in this address in your web browser if you are not html compatible:
http://209.84.246.162/bmform.htm

Admin
Internet Services
[ This message is not intended for residents in the state of Washington,
screening of addresses has been done to the best of our technical ability.
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by using the 
following link:

If you are a Washington resident or otherwise wish to be removed from this
list,   
Click here to go to global remove site if you want your address removed from
mailing 







....











From stuffed at stuffed.net  Mon Jul 13 04:38:55 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Mon, 13 Jul 1998 04:38:55 -0700 (PDT)
Subject: Woman saved by sex/Dog chewed my balls off
Message-ID: <19980713092147.6142.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 830 bytes
Desc: not available
URL: 

From paulmerrill at acm.org  Mon Jul 13 07:48:21 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Mon, 13 Jul 1998 07:48:21 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To: 
Message-ID: <35AA4A36.1EB56250@acm.org>


Actually, his statement was interesting and a masterpiece.  While it is
true that the access to communications is recent, the court orders for
evidence have been around.  What he "failed to mention" was that they have
access currently which is unheard of in the past and that it is only that
slice of life that would have "absolute nullity".

Gee, don't they teach Propoganda 101 anymore?

PHM

Xcott Craver wrote:

> On Sun, 12 Jul 1998, John Young wrote:
>
> > The New York Times, July 12, 1998:
> >
>         [...]
>
> > but eliminate any risk of abuse by law enforcement. But if
> > we do not allow for court-ordered access, for the first time
> > in the history of this country a court order for seizure of
> > evidence will be an absolute nullity.
>
>         This is an interesting claim.  Surely it's only been
>         in this century that law enforcement has ever had
>         the kind of systematic access to communication that presently
>         does.  I'd say Louis Freeh is lacking in the history department
>         if he really believes that Americans have never possessed
>         as much privacy as strong crypto offers.
>
>         I'd also say he's missed a few history classes if he
>         thinks that the world will blow up without him listening
>         in.
>
>                                                         -Xcott








From whgiii at invweb.net  Mon Jul 13 08:22:46 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Mon, 13 Jul 1998 08:22:46 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To: <35AA4A36.1EB56250@acm.org>
Message-ID: <199807131528.KAA013.84@geiger.com>


-----BEGIN PGP SIGNED MESSAGE-----

In <35AA4A36.1EB56250 at acm.org>, on 07/13/98 
   at 10:56 AM, "Paul H. Merrill"  said:

>Actually, his statement was interesting and a masterpiece.  While it is
>true that the access to communications is recent, the court orders for
>evidence have been around.  What he "failed to mention" was that they
>have access currently which is unheard of in the past and that it is only
>that slice of life that would have "absolute nullity".

>Gee, don't they teach Propoganda 101 anymore?

Sure they do, it's part of the on the job training for all government
employees.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNaonpY9Co1n+aLhhAQEgMAQAy+xSgY6m3cAS4M3ccqqNgGYA4uuSBNE6
Ik4SzG+GW2I0whBcqcS4hICPCgTKIMqDFvZ6dL2MLnV2HeFnpgwhVyAETa/Sd7rj
CwEDiUqw38rUzUmahjFR1VWBqe90SjWBklLSMlcwIoigreV5QusutU4izadnmD0e
jKO+VzFu15U=
=P8VS
-----END PGP SIGNATURE-----







From Sergey.Bobok at p3.f9.n4646.z2.fidonet.org  Mon Jul 13 08:32:37 1998
From: Sergey.Bobok at p3.f9.n4646.z2.fidonet.org (Sergey Bobok)
Date: Mon, 13 Jul 1998 08:32:37 -0700 (PDT)
Subject: 
Message-ID: <900340977@p3.f9.n4646.z2.FIDOnet>







From jya at pipeline.com  Mon Jul 13 08:53:09 1998
From: jya at pipeline.com (John Young)
Date: Mon, 13 Jul 1998 08:53:09 -0700 (PDT)
Subject: Home/Officeland Defense
Message-ID: <199807131553.LAA07422@camel14.mindspring.com>


Thanks to DT


http://www.fcw.com/pubs/fcw/1998/0713/fcw-newscyber-7-13-98.html

The Defense Department plans to create a new military organization 
to spearhead DOD's effort to protect the nation's critical computer 
systems against information warfare attacks, marking the first time 
DOD has taken responsibility for protecting infrastructure within
the United States. ...

The Pentagon also is considering the formation of a reserve cadre 
of "cyberdefense warriors," who would have hands-on responsibility 
for protecting the nation's sensitive information networks and 
systems from information warfare attacks. According to an industry 
source familiar with the project, about 300 Ph.D.-carrying 
reservists would work from home computers that would be tied into 
high-speed communications links. DOD has budgeted $10 million to 
jump-start the effort, the source said. ...







From wombat at mcfeely.bsfs.org  Sun Jul 12 18:32:44 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Mon, 13 Jul 1998 09:32:44 +0800
Subject: web site on 18 yr olds losing virginity
In-Reply-To: <199807120303.UAA02103@netcom18.netcom.com>
Message-ID: 




Either "stopthis1" is a clever marketer drumming up interest in this 
site, or the christian coalition has become inbred to the point of 
unbelievable stupidty. Any bets?

On Sat, 11 Jul 1998, Vladimir Z. Nuri wrote:

> hmmmmmmm, just to show you the possibilities of cyberspace and
> what it's coming to
> 
> 
> From: stopthis1 at juno.com
> Date: Sat, 11 Jul 1998 02:25:08
> Subject: 2 kids to lose "virginity" LIVE on the Internet
> 
> Please join me in shutting this website down.  
>  
> http://www.ourfirsttime.com 
>  
> I caught my grandson and his friends giggling over this website 
> where it says two 18 year old kids are going to lose their 
> virginity - LIVE on the Internet. 
>  
> Just because these two idiot kids saw a woman give birth LIVE on 
> the Internet, they have decided that anything goes and will have 
> sex for the first time on the Internet. What has the world come to 
> when people can do absolutely any lewd and deviant thing they want 
> to, and let innocent children watch on their computers. 
>  
> They are mocking the sanctity of marriage. What concerns me the 
> most is there are no controls on this website to keep children 
> out.  Please send a protest email to your congressman or senator, 
> and ask them to "SHUT THIS OBSCENE WEBSITE DOWN" !!! 
>  
> Click here to go to the Christian Coalition's page of email 
> address for all Congressmen and Senators. Find your representative 
> and demand their help to stop the Internet from being prostituted 
> by brain damaged sex maniacs. 
>  
>          http://www.christian-coalition.org/ 
> Email Guide to Congress from the Christian Coalition 
>  
> Also send emails to the following individuals asking for their 
> help to shut this site down - 
>  
> President Clinton   -   president at whitehouse.gov 
>  
> Jesse Helms   -   jesse_helms at helms.senate.gov 
>  
> Newt Gingrich   -   georgia6 at hr.house.gov 
> 
> Jerry Falwell   -   chancellor at liberty.edu 
>  
> Pat Robertson   -   cbnonline at cbn.org 
>  
> Christian Coalition   -   coalition at cc.org 
>  
> Praise the Lord and pass this on to all.  
>  
>  
>  
>  
>  
>  
>  
> 
> 





From tne1870 at hotmail.com  Mon Jul 13 09:33:31 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Mon, 13 Jul 1998 09:33:31 -0700 (PDT)
Subject: Pre-Press Pre-Owned Equipment
Message-ID: 



INFORMATION ONLY:
The Pre-Press Brokerage Company brokers used pre-press
equipment for the printing industry.

Our web address:          http://www.pe.net/~pbc

Our e-mail address:        pbc at pe.net

You may call:   909.686.2875

Thank you for your consideration.

Geoff McPartlin, Sales Director






From CTIA_Daily_News at um2.unitymail.com  Mon Jul 13 09:42:12 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Mon, 13 Jul 1998 09:42:12 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 13, 1998
Message-ID: <199807131633.LAA24664@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA
Daily News
from WOW-COM.� Please click on the
icon / attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for
more information!
=============================================

 






From nobody at replay.com  Mon Jul 13 10:14:58 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 13 Jul 1998 10:14:58 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
Message-ID: <199807131715.TAA06057@basement.replay.com>


On Sunday, July 12, 1998, in The New York Times, Louis J. Freeh 
had the unmitigated gall of a lying Nazi Fuck to write:

> To the Editor:
> 
> Re "Privacy in the Digital Age" (editorial, July 6): No law 
> enforcement agency is "trying hard to prevent the growing 
> use of encryption." 

In the face of such overwhelming evidence as virtually 
litters the landscape and graces more than one court docket,
how can Louis Fuck-the-Free open with such a bald-faced lie, 
unsupported by any data or argument whatsoever? His own 
agency, not to mention several "non-law-enforcement" agencies 
(is this the lawyer's catch in his assertion?) have been 
lobbying _vigorously_ and without letup for several years
now to "prevent the growing use of encryption." The whole
export control regime for encryption has as its sole purpose
to "prevent the growing use of encryption."

I'm all for a constitutional amendment that would put this 
kind of bald-faced lying by high public officials on the same 
footing as treason, with the same penalties.

> But encryption represents a serious public safety concern. 

It sure does! The lack of widely available, fully functional 
strong crypto is a national and individual weakness that 
allows control freak fucks like Louis to make a reach for 
the ultimate levers of control and cement us into the 
ultimate surveillance state, from which there will be no
return.

> We are open to any solution that recognizes that it is 
> the ability to collect electronic evidence that has 
> allowed us to prevent airliners from being bombed and 
> to put major drug dealers behind bars.

 Right! Like you prevented TWA 800, Lockerbee, and
the ValuJet eaten in midair by illegally transported live 
oxygen canisters? Just HOW MANY AIRLINERS HAVE YOU SAVED,
you lying Nazi fuck?

Don't talk to us about the drug dealers... the ones who 
wouldn't be able to earn a penny if it weren't for the 
War on Drugs in the first place. We already know that the
pharmaceutical market value of a dose of heroin is something
like 25 cents, and that the only reason those addicts are
breaking into our homes and killing us on the streets is
because the GOVERNMENT has made it illegal for them to 
obtain their sleepytime meds at reasonable prices that even
a minimum-wage burger flipper could afford if he wanted to
waste himself that way.

> Key escrow is one possible solution. 

No it isn't. It's not a solution to anything at all. It's 
the destruction of privacy through more heavy-handed tactics 
and intrusion into private affairs. It's the police state's
wet dream, second only to full, real time monitoring of 
everything and everything. One step at a time, though, eh,
lying Nazi fuck?

> There are others, and certainly a statutory scheme can 
> be devised that will all but eliminate any risk of abuse 
> by law enforcement. 

You must be taking some of those drugs your agents seize! If
there is one constant, one unchangeable feature of government
landscape, it is that NO POWER can be safeguarded against 
abuse, and that EVERY POWER will be abused, just some more
than others. This claim is an insult to the intelligence of
even the most retarded, obedient American. Your mother 
clearly didn't wash your mouth with a strong enough brand of
laundry soap to make an impression on your little proto-Nazi
mind.

We should really suspend the ENTIRE debate right now, pending
the prosecution and imprisonment of the thousands of FBI
personnel involved in past, DOCUMENTED violations of rights.
Before we even take you seriously I want to see the asses of
the SAs who have done "black bag jobs", who have killed and 
maimed men, women and children, who have instigated unlawful
acts by incompetents through agents provocateurs, AND their 
SACs, AND their authorizing DDs, etc., ALL LANGUISHING IN 
LEVEL 6 FACILITIES doing the the HARD TIME of multiple life 
terms they so richly deserve for having arrogantly and 
systematically violated their oaths of office and the laws 
of the land. Then and ONLY THEN can we "talk," you strutting, 
lying little Nazi fuck!

> But if we do not allow for court-ordered access, for the 
> first time in the history of this country a court order 
> for seizure of evidence will be an absolute nullity.

Utter Nazi rubbish! The truth is that if you _do_ get what 
you want, for the first time in the history of this country 
it will be unlawful or even impossible for Americans to secure 
their communications as they could in 1789 when the Constitution 
was ratified. It is _not_ the ability to protect communications 
and writings that is new -- it is the invasive technology and 
the windfall to you of communications and records being handled 
by third parties that is new. Your claim of being locked out by 
new technology not contemplated by the Constitution is false. 
What was not contemplated and now needs to be remedied is that 
conversations easily secured against eavesdroppers in 1789 
are now easily overheard, and communications easily secured 
in 1789 are now easily violated. THAT'S what needs to be
fixed, NOT your inability to continue and expand your
totalitarian invasion of the natural rights of Americans
and others.

> We want to work with industry on a real solution, 

More bullshit! You want what you want when you want it and
you have been vigorously campaigning for new and expanded
powers to every ear on Capitol Hill that would listen, even
conducting closed briefings to make your one-sided case out 
of the light of public scrutiny. Admit it -- you're a
thorough-going weasel, and proud of it!

> recognizing that those who acquire encryption over the 
> Internet or from abroad naively make assumptions about 
> the security it affords. 

Oh, PLEASE! You have the security of naive Internet users
at heart? Is that what we're supposed to believe? Do you
really think we just fell off the turnip truck? The very
encryption you fear most, strong public key encryption that
you can't break and won't be able to break within the 
predicted lifetime of the universe, is presently available
over the Internet, AND THAT IS PRECISELY WHAT YOU DON'T LIKE,
you lying Nazi fuck!

> We are not fighting encryption, 

HAVE YOU NO SHAME AT ALL, uttering bald-faced lies like that?

> but we know what will happen if technology cannot be made 
> to work for law enforcement as it works for criminals 
> and terrorists.    

We know, too: freedom will continue to have a chance. You 
need to take a deep breath and consider that many people now
understand the sham in which you are involved. More and more
people are wondering why you don't just nail the truly bad
guys the way they have been nailed for millenia -- by good,
conventional police work. Bad guys have been apprehended since
time immemorial without resort to data-mining the databases and
eavesdropping on all forms of communication. Now, just because
technology allows you means of invasion never contemplated by
the Constitution, suddenly you can't do your job without
them? Utter nonsense! Lying Nazi fuck nonsense!

Louis J. FREEH 
(Louis J. FUCK-THE-FREE)

Dir., Federal Bureau of Investigation
(Generalisimo, Federal Bureau of Absolute Control)

Washington, July 10,1998
(Disneyland-on-the-Potomac)

TruthIsAsPlainAsTheNoseOnYourLyingNaziFuckFaceMonger II






From SupportOnlineStaff_000926 at news.newswire.microsoft.com  Mon Jul 13 11:31:29 1998
From: SupportOnlineStaff_000926 at news.newswire.microsoft.com (Support Online Staff)
Date: Mon, 13 Jul 1998 11:31:29 -0700 (PDT)
Subject: Developer Support News Watch - July 13, 1998
Message-ID: <199807131831.LAA05698@toad.com>


Developer Support News Watch
============================
As a subscriber to Developer Support News Watch, you receive e-mail
twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site.  

Table of Contents
=================
(1) Announcements
(2) New Knowledge Base Articles
(3) Requesting Articles via E-Mail
(4) Developer Product FAQs & Support Resources
(5) Additional Resources

(1) Announcements

Integrated Solutions: Microsoft Business Applications Conference 98
-------------------------------------------------------------------
At the Microsoft Business Applications Conference, the content will 
be technical, but the focus will be on how you can build the best 
integrated solutions for your most common business problems. 
Sign up today -- see http://www.microsoft.com/events/bizapps/

Southern California Developers
------------------------------
Attention all Developers in Southern California :
On July 21 & 22, attend the FREE Microsoft TechNet Quarterly Briefing and 
gain the know-how to implement the latest technology. Keynote on the Windows 
desktop plus a developer must: the Developer Track covering Windows DNA and 
3-tier app development.  Use VIP CODE LSMTS.

New Features Make Finding Your Answers on Support Online Even Easier
--------------------------------------------------------------------
Support Online recently released a number of new features to make it 
even easier to find the answers you need. The following highlights some of 
the enhancements you'll see on Support Online at http://support.microsoft.com/.

For information about how to use these new Support Online features, see 
http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the 
  Knowledge Base article you want, you can enter the ID number 
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your 
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online. 

- See what's new. If you want to see the latest information about 
  a product and/or a topic, use the What's New option and select 
  the number of days you want to review. You can select 1, 3, 7, 
  14, or 30 days.  

- Toggle between Advanced View and Basic View. Advanced View 
  offers additional search options and other features. Now you 
  can easily toggle between Advanced View and Basic View.

Need help using these features? See http://support.microsoft.com/support/howto/.


(2) New Knowledge Base Articles
===============================
In addition to the FAQ documents mentioned below, the 
following articles were recently updated in the Microsoft Knowledge Base:

ActiveX Data Objects 
--------------------
PRB: Decimal Values Passed to a Stored Procedure Get Truncated (Q188574)
  http://support.microsoft.com/support/kb/articles/Q188/5/74.asp

ActiveX SDK 
-----------
INFO: Internet Explorer designMode Property Is Not Supported (Q188864)
  http://support.microsoft.com/support/kb/articles/Q188/8/64.asp

Active Server Pages 
-------------------
PRB: Request.ServerVariables("LOGON_USER") Returns Empty String (Q188717)
  http://support.microsoft.com/support/kb/articles/Q188/7/17.asp
PRB: Implements Keyword Fails in VB DLL called from ASP (Q188716)
  http://support.microsoft.com/support/kb/articles/Q188/7/16.asp
HOWTO: Change Information in a Database from ASP (Q188713)
  http://support.microsoft.com/support/kb/articles/Q188/7/13.asp

Automation/VBA
--------------
BUG: Starting Word Manually Uses Same Instance as Automation (Q188546)
  http://support.microsoft.com/support/kb/articles/Q188/5/46.asp

Internet Development 
--------------------
PRB: The File Upload Control Cannot Publish Your Files (Q188953)
  http://support.microsoft.com/support/kb/articles/Q188/9/53.asp
BETA-INFO: DHTML Behaviors Limited to One Per HTML Element (Q188866)
  http://support.microsoft.com/support/kb/articles/Q188/8/66.asp
PRB: Forms 2.0 CommandButton Fires Click Event When Disabled (Q188766)
  http://support.microsoft.com/support/kb/articles/Q188/7/66.asp
BETA-PRB: Type Mismatch for Document.parentWindow (Q188764)
  http://support.microsoft.com/support/kb/articles/Q188/7/64.asp
BUG: document.readyState Not in Sync with Download in IFrame (Q188763)
  http://support.microsoft.com/support/kb/articles/Q188/7/63.asp
HOWTO: Show Web Page Source from a Hyperlink (Q188762)
  http://support.microsoft.com/support/kb/articles/Q188/7/62.asp

Java
----
BUG: KEY_PRESSED Event Not Generated for Some Controls (Q188808)
  http://support.microsoft.com/support/kb/articles/Q188/8/08.asp
FIX: Setting Colors for List/Choice Control Fails (Q188448)
  http://support.microsoft.com/support/kb/articles/Q188/4/48.asp
FIX: AFC Deadlock May Occur When Setting UIFrame's Cursor. (Q188446)
  http://support.microsoft.com/support/kb/articles/Q188/4/46.asp

MAPI Programming 
----------------
HOWTO: Use BatchExport to Specify Which Attributes to Export (Q188960)
  http://support.microsoft.com/support/kb/articles/Q188/9/60.asp
PRB: Error 2001 Linking Simple MAPI Applications (Q188959)
  http://support.microsoft.com/support/kb/articles/Q188/9/59.asp
INFO: Possible Causes for Memory Leaks in MAPI Clients/Providers (Q188958)
  http://support.microsoft.com/support/kb/articles/Q188/9/58.asp
PRB: Transport Causes MAPI Spooler to Shutdown Unexpectedly (Q188653)
  http://support.microsoft.com/support/kb/articles/Q188/6/53.asp
PRB: CDO Rendering Library Not Available Outside of ASP (Q188599)
  http://support.microsoft.com/support/kb/articles/Q188/5/99.asp
HOWTO: Open the Global Profile Section (Q188482)
  http://support.microsoft.com/support/kb/articles/Q188/4/82.asp

Mastering Series 
----------------
PRB: Troubleshooting Active Movie Problems in Mastering Series (Q188660)
  http://support.microsoft.com/support/kb/articles/Q188/6/60.asp
PRB: Marisa.dll Causes Movie Clip Errors in Mastering Series (Q188445)
  http://support.microsoft.com/support/kb/articles/Q188/4/45.asp

ODBC Programming 
----------------
PRB: Stored Procedure Invocation Returns "Protocol Error in TDS" (Q188558)
  http://support.microsoft.com/support/kb/articles/Q188/5/58.asp
Internet Scripting Languages 
HOWTO: Use Internet Transfer Control in ASP or in WSH Script (Q188955)
  http://support.microsoft.com/support/kb/articles/Q188/9/55.asp

Visual Basic 
------------
BUG: Incorrect Localized Strings Display in the Visual Basic IDE (Q189056)
  http://support.microsoft.com/support/kb/articles/Q189/0/56.asp
PRB: ITC Cannot Perform ASCII-type FTP Transfer (Q188956)
  http://support.microsoft.com/support/kb/articles/Q188/9/56.asp
HOWTO: Use the Remote Data Control to Pass Bookmarks (Q188861)
  http://support.microsoft.com/support/kb/articles/Q188/8/61.asp
FILE: VB5SP3DS.EXE Contains Visual Basic SP3 Debugging Symbols (Q188588)
  http://support.microsoft.com/support/kb/articles/Q188/5/88.asp
HOWTO: Expedite the Visual Basic Support Process (Q188586)
  http://support.microsoft.com/support/kb/articles/Q188/5/86.asp
BUG: UserControl's ContainedControls Do Not Inherit ScaleMode (Q188552)
  http://support.microsoft.com/support/kb/articles/Q188/5/52.asp
INFO: Visual Basic Requirements for Using Exported DLLs (Q188541)
  http://support.microsoft.com/support/kb/articles/Q188/5/41.asp

Visual C++ 
----------
BUG: Calling CHttpFile::ErrorDlg Function Causes Errors 127 & 2 (Q189094)
  http://support.microsoft.com/support/kb/articles/Q189/0/94.asp
BUG: Step 2 of the MFC AppWizard Does Not Set Macro Values (Q189073)
  http://support.microsoft.com/support/kb/articles/Q189/0/73.asp
PRB: WinDBG for WinCe 2.0 Does Not Support Named Pipes (Q189036)
  http://support.microsoft.com/support/kb/articles/Q189/0/36.asp
HOWTO: VC++ MFC Client for the ComCallingJava Sample (Q188817)
  http://support.microsoft.com/support/kb/articles/Q188/8/17.asp
BUG: AV Using ios-Derived Type in Multithreaded Apps (Q188721)
  http://support.microsoft.com/support/kb/articles/Q188/7/21.asp
PRB: Error Executing ~vcecho!Compiling (Q188720)
  http://support.microsoft.com/support/kb/articles/Q188/7/20.asp
BUG: Error C1083 Building Large Projects with Browse Info (Q188708)
  http://support.microsoft.com/support/kb/articles/Q188/7/08.asp
INFO: Visual C++ and the Year 2000, Years that Cause an Overflow (Q188707)
  http://support.microsoft.com/support/kb/articles/Q188/7/07.asp
BUG: Memory Leak with Jet 3.51 and Remote ODBC Data Sources (Q188579)
  http://support.microsoft.com/support/kb/articles/Q188/5/79.asp

Visual FoxPro 
-------------
HOWTO: Determine the Operating System Build Number (Q188987)
  http://support.microsoft.com/support/kb/articles/Q188/9/87.asp
HOWTO: Use the Win32 API to Access File Dates and Times (Q188977)
  http://support.microsoft.com/support/kb/articles/Q188/9/77.asp
HOWTO: Setting the System Date and Time Programmatically (Q188897)
  http://support.microsoft.com/support/kb/articles/Q188/8/97.asp
BUG: "String is too long to fit" Error Passing Variables to COM (Q188888)
  http://support.microsoft.com/support/kb/articles/Q188/8/88.asp
PRB: "Cannot Open File" Message Building FoxPro 2.6 Project (Q188536)
  http://support.microsoft.com/support/kb/articles/Q188/5/36.asp
HOWTO: Sharing Data Between Processes Using Memory-Mapped Files (Q188535)
  http://support.microsoft.com/support/kb/articles/Q188/5/35.asp
HOWTO: Use API Calls to Detect Other Running Applications (Q188404)
  http://support.microsoft.com/support/kb/articles/Q188/4/04.asp
HOWTO: Modify Report Fields Programmatically (Q188403)
  http://support.microsoft.com/support/kb/articles/Q188/4/03.asp
PRB: ACCESS Cannot Import/Link Table if Index Contains Function (Q188401)
  http://support.microsoft.com/support/kb/articles/Q188/4/01.asp

Visual InterDev
---------------
BUG: Executing "SP_PrimaryKey" results in no primary key (Q188719)
  http://support.microsoft.com/support/kb/articles/Q188/7/19.asp
HOWTO: Troubleshoot IUSR_machine Permissions Problem (Q188712)
  http://support.microsoft.com/support/kb/articles/Q188/7/12.asp

Win32 SDK 
---------
HOWTO: Programmatically Trigger a SNMP Trap (Q189131)
  http://support.microsoft.com/support/kb/articles/Q189/1/31.asp
FIX: ICMP API Header & Library Files Missing from Windows CE (Q189120)
  http://support.microsoft.com/support/kb/articles/Q189/1/20.asp
HOWTO: Create Context-Sensitive HTML Help in a Visual Basic App (Q189086)
  http://support.microsoft.com/support/kb/articles/Q189/0/86.asp
HOWTO: Use the SetupAPI's SetupIterateCabinet() Function (Q189085)
  http://support.microsoft.com/support/kb/articles/Q189/0/85.asp
HOWTO: Create a Tri-pane Window with HTML Help Workshop (Q189084)
  http://support.microsoft.com/support/kb/articles/Q189/0/84.asp
BUG: LoadPerfCounterTextString Fails with Error 87 (Q188769)
  http://support.microsoft.com/support/kb/articles/Q188/7/69.asp
INFO: Working with the FILETIME Structure (Q188768)
  http://support.microsoft.com/support/kb/articles/Q188/7/68.asp
HOWTO: Specify Access Control on Window NT Container Objects (Q188760)
  http://support.microsoft.com/support/kb/articles/Q188/7/60.asp
INFO: UserDomain Method Does Not Work Under Win95 with WSH (Q188602)
  http://support.microsoft.com/support/kb/articles/Q188/6/02.asp
BUG: ADSI NDS Provider Does Not Support Extension of NDS Schema (Q188510)
  http://support.microsoft.com/support/kb/articles/Q188/5/10.asp
BUG: Editing MAP or ALIAS in the HTML Help Workshop Causes Error (Q188444)
  http://support.microsoft.com/support/kb/articles/Q188/4/44.asp


(3) Requesting articles via e-mail
==================================

You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

(4) Developer Product FAQs & Support Resources
==============================================
Here's some highlights and pointers to the latest information on 
Microsoft Developer Tools:

Visual Studio Service Pack Released: Visual Studio 97 Service Pack 3 
contains bug fixes for many tools, and is now available for developers 
who use any of the Visual Studio tools. See 
http://www.microsoft.com/vstudio/sp/ for the latest information.

Visual BASIC Frequently Asked Questions:
For pointers to the latest Visual BASIC FAQ's, see
http://support.microsoft.com/support/vbasic/faq/default.asp

Visual C++ 5.0 (Professional & Enterprise) 
Frequently Asked Questions - FAQ (Q167654), see
http://support.microsoft.com/support/kb/articles/Q167/6/54.asp

Visual FoxPro 5.0 Frequently Asked Questions (FAQ), see
http://support.microsoft.com/support/vfoxpro/content/faq
/vfoxpro/vfp50win/default.asp

Visual J++ Frequently Asked Questions - FAQ (Q169173), see
http://support.microsoft.com/support/kb/articles/Q169/1/73.asp

Visual InterDev Troubleshooting Guide:
Look through this guide to help you quickly troubleshoot and overcome
the most common technical issues you may encounter when first setting up
your Microsoft Visual InterDev working environment.
See http://support.microsoft.com/support/vinterdev/content/tsguide.asp

Microsoft SourceSafe Frequently Asked Questions (FAQ) (Q134369), see
http://support.microsoft.com/support/kb/articles/Q134/3/69.asp

Microsoft Developer Support Messaging Frequently Asked Questions (FAQ)
http://support.microsoft.com/support/messagingsdk/faq/default.asp

Multimedia Sample Projects:
Add multimedia functionality to your Visual Basic program by using the
techniques in these Visual Basic sample projects. See
http://support.microsoft.com/support/vbasic/vbmm.asp

Active Template Library (ATL) Frequently Asked Questions (Q166480), see
http://support.microsoft.com/support/kb/articles/Q166/4/80.asp

Popular MFC Samples--created by support engineers for MFC developers.
See http://support.microsoft.com/support/visualc/atlmfc/samples.asp

OLE Automation Using MFC
For the latest articles about automating Microsoft Office 97 components
using the Microsoft Foundation Classes (MFC), see
http://support.microsoft.com/support/visualc/atlmfc/oleatmfc.asp

VBA Software Development Kit Frequently Asked Questions - FAQ (Q170298) 
http://support.microsoft.com/support/kb/articles/Q170/2/98.asp

COM Security Frequently Asked Questions - FAQ (Q158508), see 
http://support.microsoft.com/support/kb/articles/Q158/5/08.asp

ADC 1.0 FAQ Available for Download (Q165292), see
http://support.microsoft.com/support/kb/articles/Q165/2/92.asp
Or download directly from:
http://support.microsoft.com/download/support/mslfiles/ADC10FAQ.EXE

Visual Modeler 1.0 Frequently Asked Questions (FAQ)(Q166395), see
http://support.microsoft.com/support/kb/articles/Q166/3/95.asp

ActiveX Data Objects (ADO) Frequently Asked Questions (Q183606) 
http://support.microsoft.com/support/kb/articles/Q183/6/06.asp 

Microsoft Internet Finance Server Toolkit (MIFST) Frequently Asked 
Questions (Q182448) 
http://support.microsoft.com/support/kb/articles/Q182/4/48.asp 

Developing with the ActiveX SDK - FAQ (Q158264), see 
http://support.microsoft.com/support/kb/articles/Q158/2/64.asp 

Developing with the Internet Client SDK - FAQ (Q167435), see 
http://support.microsoft.com/support/kb/articles/Q167/4/35.asp

SDK for Java Frequently Asked Questions - FAQ (Q168942), see
http://support.microsoft.com/support/kb/articles/Q168/9/42.asp

Microsoft SDK for Java Release:
Go to this page to download the latest released Microsoft SDK for 
Java (2.02), which contains the Java VM from IE 4.01, support 
for JDK 1.1, J/Direct, AFC, samples, the latest Java compiler, 
and documentation.  See http://www.microsoft.com/java/download.htm

The latest Microsoft VM for Java: Easily upgrade to the latest VM, 
See http://www.microsoft.com/java/vm/dl_vmsp2.htm

Java/COM/DCOM Frequently Asked Questions - FAQ (Q168935), see
http://support.microsoft.com/support/kb/articles/Q168/9/35.asp

CAB Files Frequently Asked Questions - FAQ (Q168941), see
http://support.microsoft.com/support/kb/articles/Q168/9/41.asp

AFC Frequently Asked Questions - FAQ (Q168943) 
http://support.microsoft.com/support/kb/articles/Q168/9/43.asp


(5) Additional Resources
========================
In addition, the following resources might prove helpful:

Check out the MSDN "Buzz" for the latest information on Microsoft's
developer tools and strategies: http://www.microsoft.com/msdn/

For the latest and greatest information about Internet technologies,
the Microsoft SiteBuilder Network can be found at:
http://www.microsoft.com/workshop/default.asp

For links to specific developer tools products and technologies, refer to:
Products:  http://www.microsoft.com/msdn/products/
Technologies:  http://www.microsoft.com/msdn/techsite/

TechNet has a new site, ITHome, which offers comprehensive resources for
corporate developers: http://www.microsoft.com/ithome/


Sincerely,
The Microsoft Developer Support team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit





From list at 1800birks4u.com  Mon Jul 13 11:35:41 1998
From: list at 1800birks4u.com (The Birkenstock Store)
Date: Mon, 13 Jul 1998 11:35:41 -0700 (PDT)
Subject: Birkenstocks on Sale Now!!
Message-ID: 


Hi

Visit www.BirksonSale.com to learn not only which Birkenstocks are on sale
now, but which are in stock for immediate delivery. Updated daily,
Monday-Friday.

We have just added hundreds of pairs!

Order on line and Save at least 20%!

For example, Save $21.00 today on the Arizona in Sand, Mink and Violet
Suede BirksonSale price $68.95 (Catalog Price $89.95) 

Your order is secure, including encryption of your credit card information,
using the latest in SSL technology.

Log on today and Save!

If you know someone that would also like to save on Birkenstocks forward
this message to them!
____________________________________________________________________________

_

If you would like to be removed from this list email us at
list at 1800birks4u.com and include the word  remove  in the subject line.






From rubin at research.att.com  Mon Jul 13 12:34:37 1998
From: rubin at research.att.com (Avi Rubin)
Date: Mon, 13 Jul 1998 12:34:37 -0700 (PDT)
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Message-ID: <199807131932.PAA01744@mgoblue.research.att.com>


Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.security.pgp
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Summary: 
Expires: 
Sender: 
Followup-To: 
Distribution: world
Organization: AT&T Labs, Florham Park, NJ
Keywords: 
Cc: 

Cipher is the electronic newsletter of the IEEE Technical Committee on 
Security & Privacy. We put out a newsletter by e-mail every couple of 
months. There is also a companion web site at:

   http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

Below is the table of contents of our latest issue. You can find subscription
information on the web site, or just visit back from time to time.




       _/_/_/_/  _/_/_/  _/_/_/_/   _/    _/  _/_/_/_/  _/_/_/_/
      _/          _/    _/     _/  _/    _/  _/        _/     _/
     _/          _/    _/_/_/_/   _/_/_/_/  _/_/      _/_/_/_/
    _/          _/    _/         _/    _/  _/        _/   _/
   _/_/_/_/  _/_/_/  _/         _/    _/  _/_/_/_/  _/     _/

====================================================================
Newsletter of the IEEE Computer Society's TC on Security and Privacy
Electronic Issue 28                                    July 13, 1998
Avi Rubin and Paul Syverson, Editors
                                       Bob Bruen, Book Review Editor
                                        Hilarie Orman, Assoc. Editor
                                     Mary Ellen Zurko, Assoc. Editor
                                      Anish Mathuria, Reader's Guide
====================================================================
         http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/

Contents:                                         [3037 lines total]
 o  Letter from the TC Chair
 o  Letter from the Editor
Security and Privacy News Briefs:
 o LISTWATCH: Items from security-related lists, by Mary Ellen Zurko
 o Microsoft Plans for FIPS 140-1 Compliance
 o Common Criteria Full-use Version 2.0 Completed
 o Purdue CERIAS Opens
 o US Government Announces Comprehensive Privacy Plan
 o Controversial Intellectual Property Law Headed Towards Enactment
 o SKIPJACK and KEA declassified, Biham et al. Announce Cryptanalysis
 o AES Submissions All In
 o DataFellows Reports On Word Macro Virus
 o Industry coalition pushes for new Encryption policy
Commentary and Opinion: Book Reviews by Bob Bruen
 o Virtual Private Network.
   by Charles Scott, Paul Wolfe & Mike Erwin. Reviewed by Robert Bruen
 o Java Security.
   by Gary McGraw and Edward Felten. Reviewed by Robert Bruen
 o Java Security.
   by Scott Oaks. Reviewed by Robert Bruen
 o Java Cryptography.
   by Jonathan Knudsen. Reviewed by Robert Bruen
 o Protecting Networks with Satan.
   by Martin Freiss. Translated by Robert Bach. Reviewed by Robert Bruen
Conference Reports:
 o IEEE Symposium on Security and Privacy (Oakland '98) by Mary Ellen Zurko
 o IEEE Computer Security Foundations Workshop (CSFW11) by Levente Buttyan
 o LICS98 Workshop on Formal Methods and Security Protocols by Scott Stoller
Conference announcements:
 o ACM Conference on Computer and Communications Security
 o ASIACRYPT'98
New reports available via FTP and WWW: several
New Interesting Links on the Web
Who's Where: recent address changes
Calls for Papers: NDSS, DCCA, ASSET, FC, PKC, S&P (Oakland), JCS, DPS
Reader's guide to recent security and privacy literature
 o Conference Papers
 o Journal and Newsletter articles
Calendar
List of Computer Security Academic Positions, maintained by Cynthia Irvine
Publications for Sale -- S&P and CSFW proceedings available
TC officers
Information for Subscribers and Contributors


*********************************************************************
Aviel D. Rubin                                 rubin at research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************





From powergal at polbox.com  Mon Jul 13 19:16:49 1998
From: powergal at polbox.com (Power & Prosperity)
Date: Mon, 13 Jul 1998 19:16:49 -0700 (PDT)
Subject: UCE - I am a real Person sending you a real
Message-ID: <419.435989.92825289powergal@polbox.com>


I'm not here on the Internet to burden you with unsolicited advertising 
solicitations. If I've offended you in any way, I am sorry.  If you do not wish to 
receive any more information, then do not respond to this message and you 
won't hear from me again.  I do not re-use email addresses.  After they are 
used ONCE, they are deleted.


My point is brief.  

The reason I am writing to you is that I am overwhelmed with Leads.
I would like to find just a few quality people to work with who have 
the desire to make six-figure results so that I can help them get started.  
I will not sell to anyone, nor will I do any convincing, and neither will you.

If you would like more information, just say the words (words=GPG in the 
subject line of your return email) and I'll email a free, helpful file that will 
give you more information.

Sincerely, 
 
 Dobbin


 PS - Yes, I do read all your responses and I'll handle each one personally.

Note:  To comply with all Federal and State Laws, the following information is 
included. This message is sent by Dobbin Cashman (me) domiciled at 1064 
Bunn Hill Road in Vestal, NY. (800) 350-5426.  






From SupportOnlineStaff_000929 at news.newswire.microsoft.com  Mon Jul 13 19:32:30 1998
From: SupportOnlineStaff_000929 at news.newswire.microsoft.com (Support Online Staff)
Date: Mon, 13 Jul 1998 19:32:30 -0700 (PDT)
Subject: No Subject
Message-ID: <199807140232.TAA09439@toad.com>


Microsoft Office Support News Watch
===================================

As a subscriber to the Microsoft Office Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site.

Office
======

For the latest information about Microsoft Office 97 SR-1 see these Knowledge Base articles.

   Q172475   OFF97: How to Obtain and Install MS Office 97 SR-1
   http://support.microsoft.com/support/kb/articles/Q172/4/75.asp

   Q174422   OFF97: Microsoft Office 97 Service Release 1 Patch Update
   http://support.microsoft.com/support/kb/articles/Q174/4/22.asp

   Q150613   OFF97: Microsoft Office 97 Service Release 1 Patch
   http://support.microsoft.com/support/kb/articles/Q150/6/13.asp

   Q173990   OFF97: Troubleshooting the Microsoft Office 97 SR-1 Patch
   http://support.microsoft.com/support/kb/articles/Q173/9/90.asp

   Q156542   OFF97: Microsoft Office 97 Service Release 1 Enterprise Update
   http://support.microsoft.com/support/kb/articles/Q156/5/42.asp

   Q171749   OFF97: How to Determine If SR-1 Is Installed
   http://support.microsoft.com/support/kb/articles/Q171/7/49.asp

   Q172387   OFF97: Files Installed and Updated in MS Office 97 SR-1 Patch
   http://support.microsoft.com/support/kb/articles/Q172/3/87.asp

   Q172476   OFF97: Contents of the Microsoft Office 97 SR-1 Patch Readme
   http://support.microsoft.com/support/kb/articles/Q172/4/76.asp

Net Show and the Microsoft Media Player
=======================================

The Net Show Player has been replaced by the new Microsoft Media Player. The latest Net Show and Microsoft Media Player support information is available at:

   http://support.microsoft.com/support/NetShow/

Download the new media player at:

   http://www.microsoft.com/windows/mediaplayer/

Microsoft Chat
==============

The latest support information for Microsoft Chat, version 2.5 is available at:

   http://support.microsoft.com/support/chat/

Get Support Online Articles by E-mail
=====================================

You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.


Sincerely,
The Support Online team

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit





From jf_avon at citenet.net  Mon Jul 13 20:28:03 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Mon, 13 Jul 1998 20:28:03 -0700 (PDT)
Subject: [humor] Fwd: Win98's README.1ST
Message-ID: <199807140342.XAA12447@cti06.citenet.net>


==================BEGIN FORWARDED MESSAGE==================
>Subject: Win98's README.1ST



Did you intend to upgrade to Win98?
If you do, here's a preview of the READ ME FIRST page


-------------------------------------------------------------------

Congratulations on your purchase of Windows 98 (c),
the latest version of the world's #1 computer operating
system from Microsoft.

A) Before using your new software, please take the time to read these
instructions carefully. Failure to do so may further limit the terms of the
limited warranty. Windows 98 (c) represents a significant
technological improvement over Microsoft's previous operating
system, Windows 95 (c).
You'll notice immediately that
  * "98" is a higher number than "95,"
  * a better than 3 percent increase.
But that's not all. Windows 98 (c) contains many features not found in
Windows 95 (c), or in any competing computer operating system, (if
there are any of course).

Among the improvements: faster storing and
retrieving of files (not in all models), enhanced "Caps Lock" and
back-space functionality, smoother handling, less knocking and
pinging, an easy-to-follow 720-page User's Guide, and rugged
weather-resistant shrink wrap around the box. Most important,
Windows 98 (c) offers superior compatibility with all existing
Microsoft products. We're betting that you'll never use another
company's software again.

Windows 98 (c) comes factory-loaded with the latest version of
Microsoft Explorer, the world's most popular Internet browser. And
despite what you may have heard from the U.S. Department of
Justice, Windows 98 (c) offers you the freedom to select the
Internet browser of your choice, whether it's the one produced by
the world's largest and most trusted software producer, or by a
smaller company that will either go out of business or become part
of the Microsoft family.

Configuring Windows 98 (c) to use a browser OTHER than Microsoft
Explorer is easy. Simply open the "Options" folder, click on the
"time bomb" icon, and select "Load Inferior Browser." A dialog box
will ask "Are you sure?" Click "yes." This question may be asked
several more times in different ways and in 12 different languages
; just keep clicking "yes." Eventually, the time-bomb icon will
enlarge to fill the entire screen, signifying that the browser is
being loaded. You'll know the browser is fully loaded when the fuse
on the time bomb "runs out" and the screen "explodes." If at any
time after installation you become disappointed with the slow speed
and frequent data loss associated with other browsers, simply tap
the space bar on your keyboard. Microsoft Explorer will automatically be
re-installed- permanently.

Windows 98 (c) also corrects, for the first time anywhere, the "Year
2000" computer problem. As you may know, most computers store
the current year as a two-digit number and, as a result, many will
mistake the year 2000 for 1900. Windows 98 (c) solves the
problem by storing the year as a four-digit number and, in theory,
you won't have to upgrade this part of the operating system until the
year 10000.

However, the extra memory required to record the year in four digits
has prompted a few minor changes in the software's internal
calendar. Henceforth, Saturday and Sunday will be stored as single
day, known as "Satsun," and the month of June will be replaced by
two 15-day months called "Bill" and "Melissa." Please also take the
time to complete the online registration form. It only takes a few
minutes and will help us identify the key software problems our
customers want addressed. Be assured that none of the
information you provide, whether it's your Social Security number,
bank records, fingerprints, retina scan or sexual history, will be
shared with any outside company not already designated as a
Microsoft DataShare partner.

We've done our best to make using Windows 98 (c) as trouble-free
as possible. We want to hear from you if you're having any
problems at all with you software. Simply call our toll-free Helpline
and follow the recorded instructions carefully. (The Helpline is open every
day but Satsun, and is closed for the entire month of Bill.)

If we don't hear from you, we'll assume your software is working
perfectly, and an electronic message to that effect will be forwarded
to the Justice Department. We'll also send, in your name, a letter to
the editor of your hometown newspaper, reminding him or her that
American consumers want software designed by companies that
are free to innovate, not by government bureaucrats.

Again, thanks for choosing Windows 98 (c).




===================END FORWARDED MESSAGE===================


Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Soci�t� d'Importation Lt�e
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From michael at nudevision.com  Tue Jul 14 00:30:47 1998
From: michael at nudevision.com (Michael)
Date: Tue, 14 Jul 1998 00:30:47 -0700 (PDT)
Subject: FREE XXX VIDEO for your site !!
Message-ID: <18330673314336@nudevision.com>



Thats right FREE XXX VIDEO for your website....

- increase traffic
- increase banner sales
- BOOST your profit
- Can be used by FREE SITE and PAY SITES

FREE SITE webmasters go to http://free.nudevision.com

MEMBERSHIP SITE webmasters go to
http://www.nudevision.com/webmasters/index.htm

We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which
means SALES SALES SALES !!


EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !! 

"WHAT? Are you guys nuts?"

Well maybe a little..... go to http://www.traffictraders2.com for
more details.

GAY SITE webmasters click here:
http://www.studvision.com/webmasters/index.html

Best Regards,

The Cytron Gang

Cytron Technologies Ltd.
Cytron Communications Ltd.





From jya at pipeline.com  Tue Jul 14 05:06:45 1998
From: jya at pipeline.com (John Young)
Date: Tue, 14 Jul 1998 05:06:45 -0700 (PDT)
Subject: Jim Bell Request
Message-ID: <199807141206.IAA28181@camel8.mindspring.com>


A forwarded message from Jim Bell:

Jim is requesting that cpunks try to get the Oregon 
newspaper to write up another story on his case.

John Branton is the "crime reporter" for the Columbian 
newspaper (editors at columbian.com). Jim asks that people 
send Branton a note saying they would like to see a 
story on the issue of Jim's being spied on.  This reporter 
already knows what the allegations are, but Jim wants
to prod him into covering his story, because he thinks 
it's important enough for the public to know about it.

Jim also would like any reporters on the list who are 
interested in talking to him, to send him their phone 
number and he will give them a call.

BTW, the next hearing date is set for the 7/30/98.  In 
the meantime, he's hanging around shooting pool, reading 
magazines, etc.

[End Jim message]

----------

Jim's address:

    James Bell #26906086
    Federal Detention Center
    P.O. Box 68976
    Seattle WA 98168

----------

Latest court docket entries:


6/30/98  50  MINUTE ORDER by Judge Franklin D. Burgess  that the
             Probation Revocation hrg is rescheduled to 1:30 p.m. on
             7/10/98 for James Dalton Bell (cc: counsel, Judge) (car)
             [Entry date 06/30/98]

7/8/98   --  PROPOSED Supplemental Violations (car) [Entry date 07/08/98]

7/10/98  51  PROBATION PETITION/ORDER by Judge Franklin D. Burgess as to
             James Dalton Bell re: Supplemental Violations  (cc:
             counsel, Judge, USPO) (car) [Entry date 07/10/98]

[END OF DOCKET: 3:97cr5270-0]

----------

Documents on Jim Bell:

   http://jya.com/jdbfiles.htm







From CTIA_Daily_News at um2.unitymail.com  Tue Jul 14 10:08:41 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Tue, 14 Jul 1998 10:08:41 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 14, 1998
Message-ID: <199807141700.MAA32024@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================

 






From ian at deepwell.com  Mon Jul 13 20:33:58 1998
From: ian at deepwell.com (Ian Briggs)
Date: Tue, 14 Jul 1998 11:33:58 +0800
Subject: No Subject
Message-ID: <199807140330.UAA13890@rigel.infonex.com>



Well since it looks like its a valid converstation peace here, I might as
well give ya my 2 bits worth.




>>http://www.ourfirsttime.com
>>
>>aww... ain't 'dat sweet....
>>
>
>I'd appreciate it more if I hadn't been spammed twice already by
>self-proclaimed born-again Christians attempting to mobilize people
>against those two kids...

Or by one of the weaselly marketers in a while.

Think of it.
You creat a site based on a recent headline making Internet first .
Then you spam the shit out of everyone faking like your the oposition.
You don't get nailed for spamming
you give your opisition a black eye
you artificially create a media blitz, since the news runs to cover this
confrontation between the relegious right and the new internet morality.

You get about a billion hits
you add one or two click through adds
or some other such thing to the web page

Here comes the big day

Bingo, a quick 30,000$ in your bank account.

You sell the rights to porn companies to include in their feeds
since there is so much product recognition.

;)

smart little bastard
not that I am saying that is what is going on.


not that im cynical or anything....

Ian







From jya at pipeline.com  Tue Jul 14 14:18:19 1998
From: jya at pipeline.com (John Young)
Date: Tue, 14 Jul 1998 14:18:19 -0700 (PDT)
Subject: NSA on Sat Crypto Device
Message-ID: <199807142118.RAA25583@camel7.mindspring.com>


This is a DoD fax of an NSA-brief on the Chinese satellite crypto device.
It was prepared for July 8 testimony by DoD's Franklin Miller before the 
Senate Subcommittee on International Security, Proliferation and Federal 
Affairs. Miller's testimony was cancelled but DoD has provided the one-
page brief to the media upon request.


JUL-14-1998 12:51   DEPARTMENT OF DEFENSE PA       703 697 3501 p.02


                                                          JUL 8 1998


Question: What happened to the encryption device that was aboard the
failed INTELSAT launch in 1996?

Answer: The U.S. personnnel present searched the site for two days after 
the launch failure. Despite extremely hazardous conditions that made 
recovery very difficult, the U.S. personnel believed that they recovered 
all recoverable U.S. parts and components that survived the launch 
failure.

No identifiable parts or components associated with the Telemetry 
Tracking and Control Encryption devices [TT&C], and the circuit board on 
which it was mounted, were recovered. We have been advised by Loral that 
the devices were embedded on a tray mounted within the Command Processor 
Box  of the satellite. lf this is the case, it is highly unlikely that 
the devices survived the crash because of the crash impact and high 
temperatures produced by the burning rocket propellants. According to 
Loral, the Command Processor Box was located adjacent to the propellant 
tanks and U.S. personnel at the site recovered only 30% of the box.

The COMSEC circuit board consisted of a printed wiring board and forty
plus, off-the-shelf and semi-custom discrete small sca]e integrated 
circuit chips. The COMSEC board is somewhat large and relatively fragile 
(about 6x10 inches), with interconnecting "tracks" on the board which 
interconnect the many logic devices into the COMSEC algorithm. As such 
a whole circuit board, its whole composite set of pieces, and the whole 
set of logic chips need to be recovered to succeed in reengineering the 
design of the device. If Loral's assessment of the physical 
implementation of the two COMSEC devices aboard INTELSAT 708 and the 
extent of damage to the command processor from the crash, impact and 
fire are correct, NSA and DTSA believe that it is highly unlikely that 
these items could have been recovered in sufficient detail to reverse 
engineer.

In the unlikely event that the Chinese were able to recover all the 
items fully intact, it is important to note that the encryption board 
involved many embedded devices. Any loss of the chips and associated 
encryption algorithm would have have only minimal impact on national 
security because the INTELSAT 708 satellite was uniquely keyed.

[End fax]






From teezi62 at nimbus.rz.uni-konstanz.de  Tue Jul 14 15:06:39 1998
From: teezi62 at nimbus.rz.uni-konstanz.de (Jorge Boback)
Date: Tue, 14 Jul 1998 15:06:39 -0700 (PDT)
Subject: Here's the password you wanted....Don't pass it on
Message-ID: <199807143027VAA7354@post.agri.ch>


What's up Gary,

Here's the password. 

Don't, I repeat don't give it to anyone

Remember press enter once you get there.

USR:  harry
PWD: balls

CLICK HERE>> http://www.hpic.com/public-bin/redirect.cgi?file=dick&clickline=0&cookie=no_cookie 

Jorge






From nobody at remailer.ch  Tue Jul 14 16:44:27 1998
From: nobody at remailer.ch (Anonymous)
Date: Tue, 14 Jul 1998 16:44:27 -0700 (PDT)
Subject: FC: Why not to have "Privacy Commissioners"
In-Reply-To: 
Message-ID: <19980715000720.2548.qmail@hades.rpini.com>


> Declan, These articles (unfortunately in German) are excellent
> examples of the true purpose of EU-style "Privacy
> Commissioners". Their purpose of course being to provide a whitewash
> to privacy violating activities by the government.

> Anyone want to translate 'em?

Here's a very quick translation. I loved that bit where AltaVista
translated "crackle" as "kneeling asterisk", anyway I hope this is
more readable than those miracles of machine translation.


SonntagsZeitung Online, July 12, 1998:

The movement profiles do exist

A confidential report by the data protection commissioner unveils:
Swisscom collects the complete Natel cell phone data every three hours

BY NIKLAUS RAMSEYER AND DENIS VON BURG

BERNE - a secret report by data protection commissioner Odilo Guntern
proves: Swisscom locates all powered-on Natel phones in Switzerland
with an accuracy of 100 meters every three hours and stores these data
for seven days.

Things are not as bad as all that, it's all legal, and there's no
problem whatsoever, the Swiss federal data protection commissioner
Odilo Guntern appeased the public last Monday. Swisscom AG apparantly
has "the possibility of locating every powered-on Natel at any time",
he admitted. That however only within the so-called Location Areas
comprising of 50 kilometers each - and certainly not down to the 2,500
a few kilometers small radio cells in the country "as claimed by the
SonntagsZeitung", Guntern said.

What the public did not learn: Gunterns lean three-page paper is only
the tip of the iceberg. Hidden behind it there is a 30 pages long
secret report that Guntern delivered only to "the parties involved",
as he calls it. "Involved" are Swisscom, Leuenberger's
(communications) and Koller's (justice and police) departments and the
parliament's revisions delegation.

Gunterns confidential report not only contains the crucial information
to the Natel issue. It partly contradicts the public remarks and to a
large extent confirms the SonntagsZeitung article of 28 December
1997. In particular Guntern concealed that the 800,000 Natel users in
Switzerland can not only "be located", but are subject to a fully
automatted Periodic Location Updating (PLU). PLU means: Every active
Natel will announce itself to the closest antenna every three hours,
then Swisscom will register its location.

Each Natel owner can verify that himself: It is sufficient to put the
switched-on mobile telephone next to a transistor radio. It then will
emit a clearly audible galloping crackle.

Movement data in some cases are stored for many weeks

The location information covers not only "one of only 30 location
areas" in the country, as Guntern wanted to make believe, it descends
down to "radio cell level". In cities it has a precision of a few 100
meters - in open rural areas still a precision of max. 10
kilometers. At least that is what experts from a leading Natel company
assure. Thus the quite precise Natel location is registered every
three hours. Worse yet: Swisscom stores the cell phones' corresponding
"movement data" for seven days - in some cases even for weeks and
months.

SVP member of parliament Bernhard Seiler, who is president of the
parliament's GPK delegation, confirms these facts to the
SonntagsZeitung. Data Protection commissioner Odilo Guntern too
admits: "The subject PLU is discussed in detail in my report." He will
not talk about "technical details" however.

It is quick to calculate. Eight location reports from 800,000 cell
phones per day, stored for one week: Swisscom permanently has more
that 40 million data available on where and how the 800,000 Natels are
moving through the country. They only serve for making connections, is
said officially. But whoever has access to this information can
immediately print out a "movement profile" and learn where exactly the
Natel (and thus, its owner) has been during the past seven
days. Guntern: "That is not impossible." Using radiogoniometics (see
graphics) Swisscom can even locate each Natel to an exactness of 50
meters and tap the conversations.

That also applies to the controversial Natel D Easy: "we have movement
data and operational data for these devices as well", Odilo Guntern
assures. That explains why the Conferedate Justice and Police
Department and Federal Attorney General Carla Del Ponte demand that
buyers of such devices should be registered systematically. If
necessary the police would like to know whom the movement profile of a
given Natels belongs to.

And why did the Guntern report remain secret? The "parties involved"
blame each other for the secretiveness. Guntern: "I didn't even ask
them if they would like to publish the report, and decided myself that
it was not public."

The controlling authorities at the Swiss parliament are not going to
accept that: "We were of the opinion that the entire Guntern report
would be presented in public", says the SP deputy Werner Carobbio from
Tessin, who also is a member of the GPK delegation. "We will bring up
the issue of "movement profiles of Natel users" for deepened
discussion", he promises.

---------------------------------------------------------------

Les Temps Online, July 7, 1998:

COMMUNICATION

TELECOMS. Yesterday the federal data protection commissioner presented his
annual report

Odilo Guntern: �Natel owners must be able to remain anonymous�

By Gabriel Sigrist

In Switzerland, every citizen can walk into a store and acquire a
smard part to be inserted into a portable telephone for 120
francs. Swisscom's system Natel D Easy does not require any
subscription and thus the user can remain anonymous. This anonymity
disturbs the Attorney General of the Confederation, Carla Del Ponte,
who on several occasions set her face against a system �used by all
the criminals�. According to the department of public prosecution, the
new ordinance on telecommunications imposed identification of Natel D
easy users beginning January 1st. The federal data protection
commissioner's report completely contradicts this assertion. �There is
no legal base for keeping records of Natel easy customers�, Odilo
Guntern concludes in his annual report. The data protection
commissioner goes even further: �In our society, protection of the
individual requires the possibility to talk on the phone without being
recorded in files, he stated towards Les Temps. Record the purchasers
of �easy� cards does not make sense because the criminals use other
means to remain anonymous, such as foreign cards but also call-back
services or simply phone booths.� In the neighbour countries however
the purchasers of such cards must declare their identity. �It is
because the laws are different, explains Odilo Guntern. In
Switzerland, identification is obligatory only when there is a
long-term customer provider relation, which is not the case with
pre-paid cards.� The card easy is thus legally comparable to a CFF
multicourse subscription or a phone card to use in booths. Goods which
can be acquired anonymously.

However the debate is not closed: �In our opinion the legal base is
sufficient to impose registration of the users, explains J�rg Blaser,
spokesman of the department of public prosecution. It is essential for
the security of our country to be able to identify the holders of
portable telephones.� The federal Office of communications (Ofcom)
will decide. According to Odilo Guntern, it currently remains
�perfectly legal� to acquire a card easy without giving your
name. Swisscom however encourages the purchasers to identify
themselves: the operator offers a small gift to those who reveal their
personal data.

The comissioner also occupied himself with in the possibilities of
tracing mobile telephones. According to his report, Swisscom can
locate a simply powered-on portable in a relatively large zone, but
not to the cell (a circle of ten kilometers). There too, opinions
diverge.

According to Christian Masson, enthusiastic activist of the freedom of
circulation, the GSM system used by Swisscom's Natel stores the
precise localization of the devices every three hours, for maintenance
purposes. Odilo Guntern does not mention such a process in his
report. According to Swisscom, the users' positions are erased
during their movement.

The report also puts emphasis on customer fidelity cards such as the
M-Cumulus by Migros. �Any holder of such a card must be informed of
the various discounts of which he can profit, as well as of the data
processing relating to it�, indicates the report.

On the Internet:

The full report of the federal data protection commissionser on
www.edsb.ch

The site of Mr. Masson on www.iimel.com/interception/mobile_trace.htm





From Cindy at mcglashan.com  Tue Jul 14 18:07:21 1998
From: Cindy at mcglashan.com (Cindy Cohn)
Date: Tue, 14 Jul 1998 18:07:21 -0700 (PDT)
Subject: No Subject
Message-ID: <199807150056.RAA09720@gw.quake.net>


Hi all,

I've now had a chance to review the decision in the Junger case.  I think it
contains many flaws, but will just highlight a few here.  

The most striking thing about the opinion is how much the judge's willfully
ignored the undisputed factual record.   Plaintiffs submitted voluminous
declarations from programmers, computer science professors and others
confirming that they often communicate using source code.  The Declarants
included Professor Abelson of MIT, author of the key introductory textbook
of computer science, as well as Professor Appel from Princeton and several
prominent cryptographers and general computer scientists.  All of them
confirmed the need to read, write and share source code as part of their
work, and as part of the development of science.  They also testified to the
fact that many, many other people communicate using source code, and that
higher level languages are developed to allow humans to write, read and
develop each others ideas.  

The Judge does quote the Supreme Court ruling that speech must be protected
by the First Amendment unless it is  "so far removed from any exposition of
ideas, and from truth,  *science,* morality, and arts in general . . . "
 
Yet despite these clear facts and despite the Supreme Court's clear
inclusion of scientific speech as protected expression,  Judge Gwin states:  

 1.  "encryption source code may *occasionally* be expressive (p.12)
2.   that in the "overwhelming majority of circumstances" encryption source
code is exported to transfer functions, not to communicate ideas."  (p.13)
 3.  "For the broad majority of persons receipting such source code, the
value comes from the function" (p.13-14).
4.   "encryption source code is rarely expressive"  (p. 15).
5.  "source code is conduct that can occasionally have communicative
elements."  (p.16)
6.  "Source code is a set of instructions to a computer that is *commonly*
distributed for the wholly non-expressive purpose of controlling a
computer's operation."  (page 17)
7.   "encryption software is not typically expression"  (page 18)

There are similar statements of fact throughout the decision, none of which
contain citations to anything in the record to support them.  

So where is the evidence to support his conclusions?  The government
submitted no empirical studies of source code "exports"  from which one
could conclude how often source code is "expressive."  Certainly this is not
the kind of thing which can be judicially noticed.  At a minimum, the
declarations create a triable issue of material fact as to how often source
code is used to communicate ideas.  This alone should preclude summary
judgment.  

Also, I know of know authority which holds that the number of people who
communicate in a given language is the basis on which we decide whether that
communication is speech.  Judge Gwin certainly cited none, but his opinion
assumes that this is relevant.  

He also says that "certain software is inherently expressive" (page 13)
without stating what he thinks that kind of software is and how it differs
from encryption software.  The Junger team argued that the "functionality"
of encryption software, allowing privacy of speech, makes the software
subject to the First Amendment on its own, just as the regulations of
printing presses and newspaper racks violate the First Amendment even though
the item itself may not be speech.  The Judge ignored this argument
entirely.      

Once the judge has decided that source code is not *sufficiently*
expressive, he ignores the settled analysis for prior restraints in order to
avoid applying the tests.  The easiest mistake to see is his reliance on the
9th Circuit Roulette decision for his holding that prior restraint review
shouldn't apply.  Roulette was *not* a prior restraint case.  It considered
an ordinance which allowed the police to arrest citizens for sitting on the
sidewalks.  In Roulette, a person didn't have to apply for a license to sit
on the sidewalks, he or she simply did it.  The question of whether the act
was expressive or not would always be reviewed by a Judge, as part of the
criminal process.  In the case of cryptography,in contrast,  one of the key
issues has been the fact that the cryptography regulations do not allow for
a judge to review agency decisions denying or requiring a license.  Thus,
applying Roulette as the standard to judge whether prior restraint analysis
applies is just plain wrong.  

Having dispensed with prior restraint by relying on a non-prior restraint
case, the Court then considers overbreadth.   Again, he ignores the record
entirely.  He claims, again without any citation to the record,  that Junger
has failed to show that "the resulting injury to other academics is the very
same injury that Junger allegedly suffered."  

But Junger included Declarations from people who were *not* academics who
have been injured by the export restrictions.  He included declarations from
Mr. Liebman (concerning some O'Reilly software) and Mr. Behlendorf
(concerning the Apache server) demonstrating that even those whose software
contains no encryption capability whatsoever have been injured by the
encryption regulations.  The record contains plenty of evidence that people
other than Junger, attempting to do different kinds of things than he does,
have suffered different kinds of injury due to the regulations.   Similarly,
Judge Gwin states that the regulations are not vague, ignoring the record
evidence that many, many people do not understand them and have been chilled
as a result.  

Next, Judge Gwin finds content neutrality based upon the argument that
government is controlling the "functionality" of the software rather than
its content.  Acceptance of this phony distinction requires that a person
have no understanding of computer programming.  The content and the
functionality of a computer program are synonymous.  They have to be.  There
is no way to change or limit the functionality without also changing the
content of the source code.  To mandate key recovery is to mandate that
computer programs have different content than they would otherwise; its'
like saying that the government wants to control the "taste" of chocolate
cake rather than the recipe.  Change one, you must change the other.  

Judge Gwin also relies on the fact that the Government allows "export" of
software on paper, thus defining "functionality" as based upon the fact that
source code can be converted into object code which can be run.   But this
analysis also ignores the existence of scanners and typists.  Software on
paper isn't any less "functional" than software in electronic form.   It
simply requires one more, simple, step to make it functional.  In the case
of the single page of source code which is Snuffle, in the Bernstein case,
the difference cannot be more than ten minutes worth of typing or a few
minutes to scan and correct errors prior to compiling.  *This* is the
difference our national security rests upon?

Judge Gwin then applies intermediate scrutiny, quickly finding that the test
is met.  

In the end, Judge Gwin decided, despite the evidence, that source code isn't
often read by anyone and so shouldn't really deserve First Amendment
protection.  The rest of the analysis flows from there, with no regard for
the actual facts in the record.  The result is that we have a new category
of lesser protected expression, speech which is also "functional," without
any clear or understandable definition of the term "functional."  And all
those computer scientists and their settled methods of communicating with
each other apparently don't count when it comes to the First Amendment.

The larger ramifications of this holding, if it becomes law for the rest of
us, are frightening.  Taken to its extreme, this holding could be the
exception that swallows the rule of Reno v. ACLU.  If the fact that
something can "function" means it is not speech, every web page written in
HTML could be held not protected, since at some level each page is a
"functioning" computer program.  Certainly any web page or other electronic
publication which contains a Java applet is a "functioning" program. 

As I noted above, there are other criticisms which can be leveled as well.
These are simply a few that I've found so far.   

Cindy 
 






******************************
Cindy A. Cohn, Cindy at McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)






From stuffed at stuffed.net  Tue Jul 14 18:48:27 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Tue, 14 Jul 1998 18:48:27 -0700 (PDT)
Subject: Can't keep it DOWN/Man gets breasts by mistake
Message-ID: <19980714234348.22245.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 831 bytes
Desc: not available
URL: 

From remailer at htp.org  Tue Jul 14 18:55:41 1998
From: remailer at htp.org (Anonymous)
Date: Tue, 14 Jul 1998 18:55:41 -0700 (PDT)
Subject: Stan & Tim
Message-ID: <19980715015501.29920.qmail@nsm.htp.org>



Hints that an anonymous poster is Tim may be red herrings. Given Stan's recent "research" into Xian conspiracy,
he may have other enemies than Tim...
[cypherpunk issue: how do you tell that anonymous posts aren't really anonymous?]

That said, I'm surprised at the number of "SPANK" emails directed at Stan. (Especially since they're from
anonymous accounts which he just said he has killfiled. Duh!)

I find some of his posts amusing, some edifying, some boring, but mostly not "clueless", unlike the following
cascade which I've paraphrased slightly:

some nobody said:
> another nobody said:
>> yet another nobody said:
>>> still more nobody said:
>>>> I think Stan is clueless
>>> Me Too.
>> Me Too!
> Me Too!!!





From webmaster at mountainkeep.com  Tue Jul 14 20:11:01 1998
From: webmaster at mountainkeep.com (webmaster at mountainkeep.com)
Date: Tue, 14 Jul 1998 20:11:01 -0700 (PDT)
Subject: Herbal Remedies
Message-ID: <199807150310.UAA27242@toad.com>


Dear Internet Friends,

If you want to learn about how to provide your family with herbal remedies from the garden to the medicine 
cabinet, please visit our website at www.mountainkeep.com   Thank you.

This message complies with the proposed United States Federal requirements for commercial email bill, 
Section 301.  
For additional info see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Mountainkeep Publishing
2510 N. 47th St. #204
Boulder, CO 80301
(303)545-5452

Per Section 301, Paragraph (a)(2)(C) of S. 1618,
further transmissions to you by the sender of this
email may be stopped at no cost to you by
sending a reply to this email address with theword "remove" in the subject line.







From remove5050 at usa.net  Tue Jul 14 20:19:35 1998
From: remove5050 at usa.net (remove5050 at usa.net)
Date: Tue, 14 Jul 1998 20:19:35 -0700 (PDT)
Subject: Status
Message-ID: <265046_24589591>



reply to
remove5050 at usa.net


Please excuse this intrusion.

Your Name Has ALREADY BEEN DELETED from our database.

I would like to let you in on a good idea...

I NEVER THOUGHT I'D BE THE ONE TELLING YOU THIS....

I ACTUALLY READ & ACTED ON THIS PIECE OF E-MAIL,
AND THEN WENT TO EUROPE FOR THE HOLIDAYS, PAYING
FOR IT IN CASH!

My name is Matthew Forti ; I'm a 42-year-old father, husband, and
full time scientist.  As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business.  I received what
I assumed was this same e-mail countless times and deleted it each time.


About two months ago I received it again and, because of the catchy
subject line, I finally read it. Afterwards, I thought, "OK, I give
in, I'm going to try this. I can certainly afford to invest $20 and,
on the other hand, there is nothing wrong with creating a little
excess cash." I promptly mailed four $5 bills and, after receiving the
reports paid a friend of mine a small fee to send out some e-mail
advertisements for me. After reading the reports, I also learned how
easy it is to bulk e-mail for free!

I was not prepared for the results.  Everyday for the last six weeks,
my P.O. box has been overflowing with $5 bills; many days the excess
fills up an extra mail bin and I've had to upgrade to the corporate-size

box!  I am stunned by all the cash that keeps rolling in!

I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to follow
up (and count your money!), you will make at least as much money
as we did.  You don't need to be a whiz at the computer, but I'll
bet you already are. If you can open an envelope, remove the money,
and send an e-mail message, then you're on your way to the bank.
Take the time to read this so you'll understand how easy it is.
Believe me, it works!

GO FOR IT NOW!

Sincerely,

Matthew Forti
*       *       *       *       *       *       *       *       *
*       *       *

**************************************************
You are about to make up to $50,000 - In less than 90 days
Read the enclosed program...THEN READ IT AGAIN!
**************************************************

This is the letter that got my attention.  Read on and I'm sure
you will agree that this is a great plan!


Dear Friend,

The enclosed information is something I almost let slip through
my Fingers. Fortunately, sometime later I re-read everything and
gave some thought and study to it. Please do the same.  It's so
simple to do.

And you won't be left out in the cold to figure it all out yourself.
Look further down in this letter for the information you will
receive from JNC Marketing.  They give you the locations of the best
software
(FREE SOFTWARE) to send out large quantities of email.
(normally this kind of software is several hundred dollars)
They even give you easy to understand, proven, step by step
instructions for success with this program.  In fact, they helped
me get started and I'm so thankful.  It's hard to believe that this
is as simple as it is, but it really is SIMPLE.  You will even get
support from them to send out a mailing (if you need it).  You won't
get this kind of help from other programs of this nature.  It
makes all the difference in the world.
_____________________________________________________________

My name is Anne Bowman. I am 31-year-old graduate student
desperately trying to finish my degree and begin working in
my chosen field--that is, if I am lucky enough to find a job in
the crowded market.  Like most people in this day and age, it
is hard to make ends meet, and being a student does not help
the situation at all ( If I ever have to buy one more box of
macaroni and cheese I think I would have to scream).  I
returned to school after having worked for several years
with little potential for achieving what I had expected
out of life.  I figured if I returned to school and received my
Ph.D. there would be several opportunities for me out there
to achieve my goals.  After seeing my fellow graduate students
receive their degrees and, depressingly, not find respectable
positions in their chosen field I began to think, "Oh no not
again!"  Four extra years in school and an extra $20,000 in
student loans on top of the first $18,000, what will I do if the
same happens to me?"  I began to doubt my patience for the
long term investment in schooling, and decided enough was
enough, "Why can't I make real money now instead of waiting
to graduate with no guarantee of a lucrative return for all of my
efforts!"  I am writing to share my experience with other hopeful
students out there, as well as ANYONE looking for an opportunity
to take their financial situation into their own hands.  I hope you
will consider this opportunity seriously and that this will change
your life FOREVER!.., FINANCIALLY!!!  And once you get
started it takes so little of your time.


In mid October '97, I received this program. I didn't send for
it, or ask for it, they just got my name off a mailing list. I TOOK
THIS AS A SIGN!!!  After reading it several times, to make
sure I was reading it correctly, it made perfect sense.  Here was
a MONEY-MAKING PHENOMENON. I could invest as much
as I wanted to start (about as much as it costs for a pizza!),
without putting me further in debt. After I got a pencil and paper
and figured it out, I would at least get my money back. After
determining that the program is LEGAL and NOT A CHAIN
LETTER, I decided "I HAVE NOTHING TO LOSE".

Initially I sent 15,000 emails, (without any costs to me) only a
couple of hours of my time on-line. The great thing about email
is that I didn't need any money for printing to send out the
program, only the time to fulfill my orders.  There is a vast
on-line market available to everyone who owns a computer.
Following the advice of the person from whom I received this
letter, I am telling you like it is, and I hope it doesn't turn you
off, but I promised myself I would not "rip-off" anyone, no
matter how much money it cost me!  After you receive the
reports they explain everything to you.

In one week, I was starting to receive orders for REPORT #1.
By mid November, I had received 40 orders for REPORT #1.
When you read the GUARANTEE in the program you will
see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR
REPORT #1 WITHIN 2 WEEKS IF YOU DON'T SEND
OUT MORE PROGRAMS UNTIL YOU DO!" My first step
In making $50,000 in 20 to 90 days was done. By the beginning
of December, I had received 174 orders for REPORT #2. If you
go back to the GUARANTEE.  "YOU MUST RECEIVE 100 OR
MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS.
IF NOT SEND OUT MORE PROGRAMS UNTIL YOU DO.
ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX,
YOU WILL MAKE YOUR $50,000 GOAL". Well, I had 174 orders
for REPORT #2, 74 more than I needed. So I sat back and relaxed.
By January 20th, of my emailing of 15,000, I received $54,000 with
more coming in ever day.  The great thing about this program
is you can begin the process over and over again without any limit
on potential income!

I paid off ALL my student loans, and together with everything
I have learned in school, I am now saving in order to open up my
own business related to my field as soon as I graduate. Please take
time to read the attached program. IT WILL CHANGE YOUR LIFE
FOREVER! Remember, it won't work if you don't try it.  This program
does work, but you must follow it EXACTLY!  Especially the rules
of not trying to place your name in a different place on the list. It
doesn't work, you'll lose out on a lot of money! REPORT #2 explains
this.  ALWAYS follow the guarantee, 15 to 20 orders of REPORT #1
and 100 or more orders for REPORT #2 and you will make $50,000
or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS!!

If you choose not to participate in this program, I'm sorry, It really
is
a great opportunity with little cost or risk to you. If you choose to
participate, follow the program and you will be on your way to financial

security.

To my fellow graduate students out there, good luck to you and I
sympathize.  And to all other persons in financial trouble consider this

letter a sign and please take advantage of this opportunity.  YOU WON'T
BE DISAPPOINTED!

                                                            Sincerely,
                                                            Anne Bowman

The following testimonial was at the bottom of this letter but it was
too good to leave down there so I moved it up here.  It is exactly how
I felt at first and feel now.

"The first week after I started this program was torture.  I couldn't
wait to see if it was really going to work after I mailed out my first
batch of letters.  I chuckle every day now when I walk out of the
post office with my envelopes.  This is so easy, I still can't believe
it's happening!"
Don Masterson, Troy, NY


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

>From here down is the instruction portion of this letter...


This is a LEGAL, LOW-COST, MONEYMAKING PHENOMENON.

PRINT this letter, read the directions, THEN GET STARTED TODAY!

You are about to embark on the most profitable and unique program
you may ever see.  Many times over, it has demonstrated and proven
its ability to generate large amounts of cash.  This program is showing
fantastic appeal with a huge and ever-growing on-line population
desirous of additional  income.

This is a legitimate, LEGAL, moneymaking opportunity.  It does not
require you to come in contact with people, do any hard work, and
best of all, you never have to leave the house, except to get the mail
and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow
the easy instructions in this letter, and your financial dreams will
come true! When followed correctly, this electronic, multi-level
marketing program works perfectly... 100% OF THE TIME!

Thousands of people have used this program to:
-  Raise capital to start their own business
-  Pay off debts
-  Buy homes, cars, etc.,
-  Even retire!

This is your chance, so read on and get started today!
----------------------------------------------------------------------------------

OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail. As with all multi-level businesses, we
build our business by recruiting new partners and selling our products.
Every state in the U.S. allows you to recruit new multi-level business
online (via your computer).

The products in this program are a series of four business and financial

reports costing $5.00 each.  Each order you receive via "snail mail"
will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
ordered.

To fill each order, you simply e-mail the product to the buyer. The
$5.00 is yours!
This is the EASIEST electronic multi-level marketing business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I N S T R U C T I O N S *******

This is what you MUST do:

1.  Order all 4 reports shown on the list below (you can't sell them if
you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose

        name appears on the list next to the report.

     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save
them
        on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four

         reports.  Save them on your computer so they will be accessible

         for you to send to the 1,000's of people who will order them
from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next  to each report, or their sequence on the list, in any way
other
     than is instructed below in steps "a" through "d" or you will lose
out
     on the majority of your profits.  ONCE YOU UNDERSTAND THE WAY THIS
     WORKS, YOU WILL UNDERSTAND WHY IT DOESN'T WORK IF YOU CHANGE IT.
Remember,
     this method has been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and
address
         under REPORT #1 with your name and address, moving the one that

         was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to
         REPORT #3.

    d.  Move the name and address that was under REPORT #3 down to
         REPORT #4.

    e.  The name and address that was under REPORT #4 is removed from
         the list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and
save
     it to your computer.  Make NO changes to the INSTRUCTION portion of

     this letter.

4.  Now you're ready to start an advertising campaign on the
     Internet!  Advertising on the Internet is very, very
     inexpensive, and there are HUNDREDS of FREE places to
     advertise, but email has, by far, proven itself to be the best
medium for
     this program.  And the emailers best friend is e-mail lists.
     You can buy these lists for under $20/20,000 addresses or you can
pay
     someone a minimal charge to take care of the mailing for you.  BE
SURE TO START
     YOUR AD CAMPAIGN IMMEDIATELY!  Each day that passes while you think
about
     it is a day without profit.

5.  For every $5.00 you receive, all you must do is e-mail them the
report
     they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE
     ON ALL ORDERS!  This will guarantee that the e-mail THEY send out,
     with YOUR name and address on it, will be prompt because they can't

     advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
-  Make sure the cash is concealed by wrapping it in at least two sheets
of
paper
-  On one of those sheets of paper, include: (a) the number & name of
the
report you are ordering, (b) your e-mail address, and � your postal
address.  (using your printer is the best way to do this)
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:

Stat Services, Inc.
PO Box 72
Long Green, MD 21092-9998
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

JNC Marketing of Maryland
P.O. Box 25070
Baltimore, MD 21224-5707

*****IMPORTANT NOTE*****
Our success is due to sending out emails to prospective participants, we
are happy to help you get started by giving you the location of several
free programs that will allow you to send out large quantities of e-mail
easily. Also, we can help you email to huge lists. We will email the
information to you the same day we receive your report request.  Just
jot down "help please" on the report request that you send with your
$5.  You will receive our real email address when we send you this
report and you can contact us for any questions you may have.   (program
participants, you may leave this offer with us as we are moved down the
list.  We will honor it for the duration of the program. Just move it
down, with the name, to the next position when you send out your first
mailings).
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

Capital H Ventures
P.O. Box 8029
Jacksonville, FL 32239
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

Abot Marketing
PO BOX 2523
Chapel Hill, NC 27515-2523

----------------------------------------------------------------------------

HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
----------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works.
Assume
your goal is to get 10 people to participate on your first level.
(Placing
a lot of FREE ads on the Internet will EASILY get a larger response.)
Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 down line
members. Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with$5...................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS----------->$55,550

Remember friends, this assumes that the people who participate only
recruit 10 people each.  Think for a moment what would happen if they
got 20 people to participate!  Most people get 100's of participants!
THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can
afford $20 for a chance to make $ 55,000).  You obviously already have
an Internet connection and e-mail is FREE!!!  REPORT# 3 shows you the
most productive methods for bulk e-mailing and purchasing e-mail lists.
Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

*  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow
     the directions accurately.

*  Send for the four reports IMMEDIATELY so you will have them when
    the orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S.  Postal & Lottery Laws, Title

    18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S.
Code,
    also Code of Federal Regs. Vol. 16, Sections 255 and 436, which
    state that "a product or service must be exchanged for money
received."

*  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

*  Be patient and persistent with this program.  If you follow the
    instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

*  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:
I CAN'T STRESS ENOUGH HOW IMPORTANT THIS NEXT SECTION IS!!!!

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you
should receive at least 100 orders for REPORT #2.  If you don't,
continue
advertising until you do.  Once you have received 100 or more orders
for REPORT #2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front
of
a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching
which report people are ordering from you.  If you want to generate more
income,
send another batch of e-mails and start the whole process again!  There
is
no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business

name, how income tax is handled, etc., contact your local office of the
Small
Business Administration (a Federal agency) for free help and answers to
questions.  Also, the Internal Revenue Service offers free help via
telephone
and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

The first week after I started this program was torture.  I couldn't
wait
to see if it was really going to work after I mailed out my first batch
of letters.  I chuckle every day now when I walk out of the post office
with my envelopes.  This is so easy, I still can't believe it's
happening!
Don Masterson, Troy, NY


This program does work, but you must follow it EXACTLY!  Especially
the rule of not trying to place your name in a different position, it
won't
work and you'll lose a lot of potential income.  I'm living proof that
it works.
It really is a great opportunity to make relatively easy money, with
little
cost to you.  If you do choose to participate, follow the program
exactly,
and you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS

My name is Frank.  My wife, Doris, and I live in Bel-Air, MD.  I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving
"junk mail." I made fun of the whole thing, spouting my knowledge of the

population and percentages involved.  I "knew" it wouldn't work.  Doris
totally ignored my supposed intelligence and jumped in with both feet.
I made merciless fun of her, and was ready to lay the old "I told you
so"
on her when the thing didn't work...  Well, the laugh was on me!  Within

two weeks she had received over 50 responses.  Within 45 days she had
received over $147,200 in $5 bills!  I was shocked!  I was sure that I
had
it all figured and that it wouldn't work. I AM a believer now.  I have
joined
Doris in her "hobby."   I did have seven more years until retirement,
but I
think of the "rat race" and it's not for me.  We owe it all to MLM.
Frank T., Bel-Air, MD

I just want to pass along my best wishes and encouragement to you.  Any
doubts you have will vanish when your first orders come in.  I even
checked
with the U.S. Post Office to verify that the plan was legal.  It
definitely is!
IT WORKS!!!
Paul Johnson, Raleigh, NC

The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount
of
money in a short time.  I was approached several times before I checked
this out.  I joined just to see what one could expect in return for the
minimal
effort and money required.  To my astonishment, I received $36,470.00 in

the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.

Not being the gambling type, it took me several weeks to make up my
mind to participate in this plan.  But conservative that I am, I decided
that
the initial investment was so little that there was just no way that I
wouldn't
get enough orders to at least get my money back.  Boy, was I surprised
when
I found my medium-size post office box crammed with orders!  For awhile,
it
got so overloaded that I had to start picking up my mail at the window.
I'll
make more money this year than any 10 years of my life before.  The nice
thing
about this deal is that it doesn't matter where in the U.S. the people
live. There
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI

I had received this program before.  I deleted it, but later I wondered
if I shouldn't have given it a try.  Of course, I had no idea who to
contact
to get another copy, so I had to wait until I was e-mailed another
program.
11 months passed then it came...I didn't delete this one!...I made more
than
$41,000 on the first try!!
Wilburn, Muncie, IN

This is my third time to participate in this plan.  We have quit our
jobs,
and will soon buy a home on the beach and live off the interest on our
money.  The only way on earth that this plan will work for you is if you
do
it.  For your sake, and for your family's sake don't pass up this golden

opportunity.  Good luck and happy spending!
Charles Fairchild, Spokane, WA

When you have made your money and want to travel, find great cruises,
tours and airline tickets at our favorite on-line travel site at
http://www.NeTrip.com. This program works. IT WILL CHANGE YOUR LIFE FOR
THE BETTER AND GIVE YOU FINANCIAL FREEDOM. It has given our marriage the
freedom to travel the world.
Steve and Eileen, Chicago, IL

ORDER YOUR REPORTS TODAY AND GET
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!








From lreed at west.cscwc.pima.edu  Tue Jul 14 20:32:47 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 14 Jul 1998 20:32:47 -0700 (PDT)
Subject: No Subject
Message-ID: <009C92EF.3F4221C0.5@west.cscwc.pima.edu>


~         BUMGIRL          ~
Entertainment for NastyGirls             July 1998 * $7.09
____________________________

Trojan Horse Sucking
Anniversary Issue

BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr., 
     AConsistentNetPersonaToBeNamedLater, CypherPunks
     Philosopher King, The Last True CypherPunk, 
     The Only Real CypherPunk, ad infinitum}

VIAGRA AND SALTPETER
Jim Belushi's Untold Story

Mick 
Jagger
GIVES GREAT LIP!

_____________________________________________________________

			DEAR BUMGIRL

BUMMED BO
  "I was devastated to learn that the June, 1998, issue of
  BumBoy Magazine was nothing more than a fraudulent ruse
  by the Electronic Forgery Foundation.
  "Were the terrible things said about Tim C. May in the
  BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.

  {ou will find out in this month's BumGirl Interview,
   as we bend you over and 'give it to you'--straight 
   from the Horse's Ass. - BG}

		     THE BUMGIRL ADVISOR

THE DOORS OF DEPTH PERCEPTION
  "I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
  Dawn Long Juan of the CypherPunks Disturbed Male LISP

  {Wake up! (and smell Jennifer Flowers...) - BG}


			 MOVIES

TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation 
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make 
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."

BUMGIRL RATING - One Long, Hard Prick Up our Butt

__________________________________________________________

BumGirl Interview: T.C. BUTTSLAM

  A LindaLoveLaceInDepthInterview with one of the original
  Flounders ("I may smell like fish, but don't call me 
  chicken.") of the CypherPunks Disturbed Male LISP, Timothy 
  C. "No! It doesn't stand for 'cocksucker'!" May.
  After checking the Andy WhoreHole Mailing List archives, 
  and finding that it was  who originally 
  posted the concept that, in the future, every CypherPunk 
  would have 15" of fame, BumGirl EditWhores decided to change
  the cover of the July, 1998, edition to feature a picture
  of a variety of current CypherPunks wearing only athletic-
  support cups with long, long, long bar-codes on them. 

  {ANastyBumGirlToBeReamedLater, caught in a cross-fire on
  Mayonnaise Mountain between Timothy C. May, the Philosopher
  Marksman of the CypherPunks Disturbed Male LISP, and LEA's
  who were badly outmanned and outgunned by the Cult Of One
  CypherPunk who owns a variety of weaponry registered in
  the names of a plethora of CypherPunks Consistent Net
  Personas, bent over and stuck her head in the sand, hoping
  that if she took one in the butt, it would be a long, hard
  one, Teflon-tipped, in order to penetrate her new Kevlar
  panties.
  The BumGirl interview took place during lulls in the action,
  when LEA agents carried off their dead and wounded, while
  LittleBigTimmy and Dust'em Hoffman argued over their Pretty
  Lousy Privacy CryptoPhones as to how many dead IRS agents
  it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}


BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.

TCM: Let's talk about the Author, instead.

BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?

TCM: ou don't understand...*I* am the Author!

BumGirl: Well, bend me over and pretend we're married! Are 
you serious?

TCM: Nuke DC!
But seriously...Nuke DC!

BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?

TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...

BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!

TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...

  [There was a loud popping sound on the audio tape that 
   the BumGirl EditWhores received from some anonymous
   coward, via snailmail with no return address on the
   envelope.
   The freelance BumGirl ReportWhore sent to do the
   interview mysteriously failed to return, causing us
   to wonder if we'd been duped, when the head of the
   DOBJ suddenly became 'unavailable for comment' at 
   the same time our ReportWhore disappeared. A few days
   later, however, the head of the DOBJ was spotted by
   the MainDream press as she exited a secret underground
   lavoratory suspected to be involved in cloning-related
   technology.
   Once an anonymous email arrived from Mark Hedges, who 
   really should learn to use learn remailers properly if 
   he's going to claim to be a CypherPunk (hint: delete 
   your digital signature before sending the fucking thing,
   dude...), BumGirl EditWhores couldn't help but notice 
   that, when she removed her glasses, she *did* look a lot 
   like Buddy...]


BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of 
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret 
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices 
by a barefoot, toothless old fart wearing a T-shirt with three 
lines of Perl code on the front) to local Ferral Bureau42 of 
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose 
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not 
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy 
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's 
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.

The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."

Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce 
that she was just taking him downtown, 'to answer a few 
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.

      Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
 the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of 
 my teeth..."
CenterFold: Blanc Weber 
 "WhiteLipstick Power in MicroSoft Village"
 [WAS: MicroHard Victim of Friendly MakeOver--Corporate 
  Assettes Down 2" As BadBillyG Emerges From Closet Dressed
  For SuckSession, With Micro$not DC NaziSpinLobbyists 
  Standing Firmly  Behind Him]
 [NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
  Gay Activists Force Them Back In...]





From lreed at west.cscwc.pima.edu  Tue Jul 14 20:33:39 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 14 Jul 1998 20:33:39 -0700 (PDT)
Subject: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C92EF.5F68B900.7@west.cscwc.pima.edu>


~         BUMGIRL          ~
Entertainment for NastyGirls             July 1998 * $7.09
____________________________

Trojan Horse Sucking
Anniversary Issue

BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr., 
     AConsistentNetPersonaToBeNamedLater, CypherPunks
     Philosopher King, The Last True CypherPunk, 
     The Only Real CypherPunk, ad infinitum}

VIAGRA AND SALTPETER
Jim Belushi's Untold Story

Mick 
Jagger
GIVES GREAT LIP!

_____________________________________________________________

			DEAR BUMGIRL

BUMMED BO
  "I was devastated to learn that the June, 1998, issue of
  BumBoy Magazine was nothing more than a fraudulent ruse
  by the Electronic Forgery Foundation.
  "Were the terrible things said about Tim C. May in the
  BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.

  {ou will find out in this month's BumGirl Interview,
   as we bend you over and 'give it to you'--straight 
   from the Horse's Ass. - BG}

		     THE BUMGIRL ADVISOR

THE DOORS OF DEPTH PERCEPTION
  "I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
  Dawn Long Juan of the CypherPunks Disturbed Male LISP

  {Wake up! (and smell Jennifer Flowers...) - BG}


			 MOVIES

TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation 
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make 
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."

BUMGIRL RATING - One Long, Hard Prick Up our Butt

__________________________________________________________

BumGirl Interview: T.C. BUTTSLAM

  A LindaLoveLaceInDepthInterview with one of the original
  Flounders ("I may smell like fish, but don't call me 
  chicken.") of the CypherPunks Disturbed Male LISP, Timothy 
  C. "No! It doesn't stand for 'cocksucker'!" May.
  After checking the Andy WhoreHole Mailing List archives, 
  and finding that it was  who originally 
  posted the concept that, in the future, every CypherPunk 
  would have 15" of fame, BumGirl EditWhores decided to change
  the cover of the July, 1998, edition to feature a picture
  of a variety of current CypherPunks wearing only athletic-
  support cups with long, long, long bar-codes on them. 

  {ANastyBumGirlToBeReamedLater, caught in a cross-fire on
  Mayonnaise Mountain between Timothy C. May, the Philosopher
  Marksman of the CypherPunks Disturbed Male LISP, and LEA's
  who were badly outmanned and outgunned by the Cult Of One
  CypherPunk who owns a variety of weaponry registered in
  the names of a plethora of CypherPunks Consistent Net
  Personas, bent over and stuck her head in the sand, hoping
  that if she took one in the butt, it would be a long, hard
  one, Teflon-tipped, in order to penetrate her new Kevlar
  panties.
  The BumGirl interview took place during lulls in the action,
  when LEA agents carried off their dead and wounded, while
  LittleBigTimmy and Dust'em Hoffman argued over their Pretty
  Lousy Privacy CryptoPhones as to how many dead IRS agents
  it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}


BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.

TCM: Let's talk about the Author, instead.

BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?

TCM: ou don't understand...*I* am the Author!

BumGirl: Well, bend me over and pretend we're married! Are 
you serious?

TCM: Nuke DC!
But seriously...Nuke DC!

BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?

TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...

BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!

TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...

  [There was a loud popping sound on the audio tape that 
   the BumGirl EditWhores received from some anonymous
   coward, via snailmail with no return address on the
   envelope.
   The freelance BumGirl ReportWhore sent to do the
   interview mysteriously failed to return, causing us
   to wonder if we'd been duped, when the head of the
   DOBJ suddenly became 'unavailable for comment' at 
   the same time our ReportWhore disappeared. A few days
   later, however, the head of the DOBJ was spotted by
   the MainDream press as she exited a secret underground
   lavoratory suspected to be involved in cloning-related
   technology.
   Once an anonymous email arrived from Mark Hedges, who 
   really should learn to use learn remailers properly if 
   he's going to claim to be a CypherPunk (hint: delete 
   your digital signature before sending the fucking thing,
   dude...), BumGirl EditWhores couldn't help but notice 
   that, when she removed her glasses, she *did* look a lot 
   like Buddy...]


BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of 
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret 
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices 
by a barefoot, toothless old fart wearing a T-shirt with three 
lines of Perl code on the front) to local Ferral Bureau42 of 
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose 
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not 
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy 
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's 
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.

The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."

Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce 
that she was just taking him downtown, 'to answer a few 
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.

      Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
 the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of 
 my teeth..."
CenterFold: Blanc Weber 
 "WhiteLipstick Power in MicroSoft Village"
 [WAS: MicroHard Victim of Friendly MakeOver--Corporate 
  Assettes Down 2" As BadBillyG Emerges From Closet Dressed
  For SuckSession, With Micro$not DC NaziSpinLobbyists 
  Standing Firmly  Behind Him]
 [NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
  Gay Activists Force Them Back In...]





From nobody at REPLAY.COM  Tue Jul 14 21:00:00 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 14 Jul 1998 21:00:00 -0700 (PDT)
Subject: Message From Jim Bell
Message-ID: <199807150400.GAA00984@basement.replay.com>


Jim would like to thank those of you who have sent him
hidden files, as he requested.
However, he would appreciate it if you clueless fucks
would send the hidden files in *cakes*, not in floppy
disks.
[I told him it was a mistake to post to the Cypherpunks
AOL Distributed Node.]

Nobody Juno, eh?






From optinnow at latinmail.com  Tue Jul 14 21:39:53 1998
From: optinnow at latinmail.com (optinnow at latinmail.com)
Date: Tue, 14 Jul 1998 21:39:53 -0700 (PDT)
Subject: Fast Growing Home Based Business...
Message-ID: <199807150441.NAA07224@age-ns.agesystem.co.jp>


This message complies with the proposed United States Federal
requirements for commercial e-mail bill, Section 301. For additional
information see:

http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html

Required Sender Information
Richard Eastburn
8535 Tanglewood Square, Suite 5108
Chagrin Falls, OH 44023-6401
1-440-564-2084

To:   Savvy Network Marketer
RE:  NEW FAST GROWING HOME BUSINESS
From:  Richard Eastburn

This is an advertisement for a Home Business.  We hope you will find the
 information we provide useful in achieving your financial, personal,
and family goals.  If we have mailed this to you in error, please click
remove below.  You are on our list because you emailed me or I read a
classified ad of yours.  Thank you for your consideration

Unbelievable Growth In This Company Expected:     Now. . .Future

Get in on the early stage of a new dynamic business started in April
'98. Since April, people have joined by the thousands!.  We expect thousands
 more to be coming!�.. Yes, I did say thousands!!

Why is this company attracting so many people?
� Solid leadership to help you learn and gain success.
� Networking leaders bring in their downlines.
� Excellent products of value YOU will use.
� The best of compensation plans.
� Free suite of Internet business and marketing tools.

In the next few months this company has the strong potential to
 double--triple--and more.  The spillover will be incredible; AND that
benefits you'if you get in now.  If you get TWO people into the 2X6
matrix you are qualified.  Most people get EXCITED and get new people to join.
Many people are bringing their whole family into this business.  When
was the last time you saw a Home Business that you or others wanted lots of
family in the business??   

 Take a look-.over 65% of all people who look like it and join.  This is 
your chance for a truly unique business opportunity that can create your 
financial independence.

If you are interested in creating your financial independence 

        CALL:           1-440-564-2084
                                                    or
        WRITE:          Financial Independence, Suite 5108
                               8535 Tanglewood Square
                               Chagrin Falls, OH 44023-6401

Thank you. . . . .Richard Eastburn

>>> Per Section 301, Paragraph (a) (2) (C) of S. 1618,  <<<
>>> further transmissions to you by the sender of this  <<<
>>> email may be stopped at no cost to you by sending a <<<
>>> reply to this email address with the word "Remove"  <<<
>>> in the subject line. Thank you for your time <<<








From gwb at gwb.com.au  Wed Jul 15 01:45:14 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Wed, 15 Jul 1998 01:45:14 -0700 (PDT)
Subject: Aboriginal voting and the 1967 Referendum
Message-ID: <1.5.4.32.19980715075812.00734c6c@gwb.com.au>


Dear One Nation supporter in NSW

I would draw your attention to the following press release by Pauline Hanson
today:

Aboriginal voting and the 1967 Referendum 

It is clear Pauline Hanson is often misrepresented by the press and the
recent headlines headlines that suggest she questioned Aboriginal
Australian's rights to vote is yet another example of selective reporting.
Is this because of the search for what will be the most inflammatory or is
it just that some members of the press pick out of context what they believe
will do the most damage to Pauline Hanson? 

"I have not and would not question the right to vote of any Australian
citizen. What I question is whether Australians would have thought twice
about their vote in the 1967 referendum if they had known their attempt to
bring about equality was going to cause the pendulum to go the other way. 

"The main point of the 1967 referendum was the change of section 51 of the
constitution that allowed the government to make special laws with respect
to Aborigines. It is from this that successive governments have created race
based policies such as Abstudy and 1.5% loans for Aboriginals starting
businesses. 

"Aboriginal Australians like all Australians should and do have the right to
vote but no one should be treated differently on the basis of race - all
Australians should be treated equally and the same. I am quite certain that
if Australians had understood
where the 1967 referendum would lead, many would have voted differently. 

"These special laws based on race have led to reverse discrimination and the
rorting of taxpayers money without helping the Aborigines in most need. We
must assist Aborigines, but as Australians in need, not on the basis of
race. We must not make
laws that set Australians apart and are open to abuse by those who pretend
to look after the Aboriginal people. 

"It is often reported that I want to take benefits from Aboriginal people,
that is not correct and never was correct. It is true many Aboriginal people
are seriously disadvantaged but they do not have a monopoly on being
disadvantaged and should not
be singled out on the basis of race. Everyone should be assisted on the
basis of need." 

Statement issued by Pauline Hanson MP, member for Oxley 

-----------

GWB



Scott Balson






From email at helmy.com  Wed Jul 15 05:18:21 1998
From: email at helmy.com (HELMY Enterprises, Inc.)
Date: Wed, 15 Jul 1998 05:18:21 -0700 (PDT)
Subject: Hi
Message-ID: <199807150518420530.012FA568@server03.option.net>


>From HELMY Enterprises, Inc.

Dear Webmaster,

Offer daily updated 'Headline News' (and more) and look like one of the big boys!

To learn more please visit us at:

http://www.helmy.com/dc/index.html






From CTIA_Daily_News at um2.unitymail.com  Wed Jul 15 09:48:43 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 15 Jul 1998 09:48:43 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 15, 1998
Message-ID: <199807151630.LAA20849@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
 






From Charlie_Kaufman at iris.com  Wed Jul 15 11:14:46 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Wed, 15 Jul 1998 11:14:46 -0700 (PDT)
Subject: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256642.0064AF8F.00@arista.iris.com>


GAK4 is technically inaccurate but very good metaphor by which to consider
this proposal. I believe this is a minor skirmish in the war between civil
libertarians and Big Brother with industry playing the role of arms
merchant. It is not Government Access to Keys, it is Government Access to
Encrypted Data, which for everyones purposes is the same thing.

In answer to the question: "Should Cisco and friends be allowed to export
this technology?", of course they should. People should be allowed to
export whatever they want. Even if you're Big Brother, this proposal
enables all the same capabilities as GAK, so there is no reason to oppose
it.

In answer to the question: "Is this a 'compromise' that addresses the
issues of civil libertarians?", not a bit. The devil is in the details, of
course, in issues of whether the government can ask the encryption points
for copies of the data in real time, in an unaudited fashion, and/or with
what kind of "trusted third party" intermediaries. But these questions are
exactly akin to the details to be worked out with GAK and self-escrow.

In answer to the question: "Is there anything at all different between this
proposal and GAK?", the answer is some, and the differences might be
relevant to some. This proposal is a little better than GAK for law
enforcement because it would be easier to use and they tend to be
technically unsophisticated. It is a little worse than GAK for the NSA
because the extra data flows mean that it is harder to conduct surveillance
in a totally undetectable way. It favors some vendors over others because
it favors those who want to encrypt at firewalls over those who want to
encrypt end-to-end. It might slow overall progress in network security
because end-to-end encryption is technically superior (though harder to
deploy) and universal firewall to firewall encryption might reduce the
demand for it.

In answer to the question: "Would approval of this proposal be a good or a
bad thing?", the answer is ambiguous for the civil libertarian side. Any
time a new thing is allowed to be exported, it increases the flexibility of
vendors in crafting solutions and is likely to increase overall security.
On the other hand, anything which makes continuation of export controls
less in-your-face-painful will decrease pressure to repeal them and
therefore may in the long run decrease overall security. And anything which
makes it easier to make systems secure against all attackers other than Big
Brother brings closer the disasterous day when non-GAK crypto can be
outlawed.

If you're Big Brother, approval seems to be uniformly a good thing. It
garners political points among the unsophisticated as being willing to make
"technical compromises". It costs nothing in terms of access. And it may
bring closer the glorious day when non-GAK crypto can be outlawed.

     --Charlie Kaufman







From stuffed at stuffed.net  Wed Jul 15 12:17:18 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 15 Jul 1998 12:17:18 -0700 (PDT)
Subject: Could the world turn lesbian?/Men's privates enlarging
Message-ID: <19980715161601.28080.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 833 bytes
Desc: not available
URL: 

From jya at pipeline.com  Wed Jul 15 14:41:58 1998
From: jya at pipeline.com (John Young)
Date: Wed, 15 Jul 1998 14:41:58 -0700 (PDT)
Subject: NYT Crypto OpEd
Message-ID: <199807152141.RAA24473@camel7.mindspring.com>


The NYT has a fairly good OpEd on encryption today,
written by a novelist, who makes a good case for 
the citizen's need for the privacy protection, now that
there are a zillion ways computers pry into private
affairs.

   http://www.nytimes.com

For those outside the US: NYT today began its free 
worldwide online service, so the whole world can log 
on to its prying computers. (Non-USes heretofore 
had to pay for privacy loss.) It claims to have 4 million 
daily online consumers and is happy to run an advertiser 
drivern operation to suck in millions more around the 
planet.

Take note, Slate.








From eric at clever.net  Wed Jul 15 15:17:32 1998
From: eric at clever.net (Cyberdog)
Date: Wed, 15 Jul 1998 15:17:32 -0700 (PDT)
Subject: Whitehouse Bastards want my name named.
Message-ID: 


Blumenthal Discovery requests both the Email subscriber list to
Drudge Report AND contributor list to Drudge Legal Defense
Fund...







From howree at cable.navy.mil  Wed Jul 15 20:14:47 1998
From: howree at cable.navy.mil (Reeza!)
Date: Wed, 15 Jul 1998 20:14:47 -0700 (PDT)
Subject: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <009C92EF.5F68B900.7@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980716120515.00902370@205.83.192.13>


Didn't this start out as

SPACE ALIENS ATE MY DRUGS!

Reeza!





From jf_avon at citenet.net  Wed Jul 15 20:24:46 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Wed, 15 Jul 1998 20:24:46 -0700 (PDT)
Subject: [humor]
Message-ID: <199807160338.XAA02713@cti06.citenet.net>



      In Computer Heaven:
         The management is from Intel,
         The design and construction is done by Apple,
         The marketing is done by Microsoft,
         IBM provides the support,
         Gateway determines the pricing.

      In Computer Hell:
         The management is from Apple,
         Microsoft does design and construction,
         IBM handles the marketing,
         The support is from Gateway,
         Intel sets the price.



Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Soci�t� d'Importation Lt�e
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From antons at jps.net  Wed Jul 15 21:12:04 1998
From: antons at jps.net (Anton Sherwood)
Date: Wed, 15 Jul 1998 21:12:04 -0700 (PDT)
Subject: your papers please
Message-ID: <35AD7D5B.31E5@jps.net>

An embedded message was scrubbed...
From: unknown sender
Subject: no subject
Date: no date
Size: 31089
URL: 

From 14633260 at msn.com  Wed Jul 15 21:34:32 1998
From: 14633260 at msn.com (14633260 at msn.com)
Date: Wed, 15 Jul 1998 21:34:32 -0700 (PDT)
Subject: Make $1000's Weekly ! --- First Check Next Week !
Message-ID: 




*****   All You Do Is Advertise OUR phone number !!!   *****
              ****   WE DO THE REST !!!   ****
                (800) 811-2141  ID# 55916

- GET PAID EVERY FRIDAY !!!
- NO PHONE CONVERSATIONS !!!
- NO SELLING !!!
- NO EXPLANING !!!
- NO CONVINCEING !!!
- NO TALKING TO ANYONE !!!
- NO ONGOING MEMBERSHIP FEES !!!
- NO COMPLICATED BUSINESS TO RUN !!!
- You do nothing but advertise Our Phone Number !!!
       - Send Bulk Email, Flyers, Little Classified Ads, Whatever You Like!

- OUR Live Operators handle all your calls professionally & courteously,
  then WE Pay You !

A successful, honest, & proven Home Based Business Opportunity !

People are already making in excess of $1000 per week doing 
doing nothing more than advertising OUR Toll Free Number and
your personal ID Number !!!!

Need Additional Income? You owe it to yourself to just listen.  
Toll Free Testimonials: (888) 703-5389, (888)731-3457, (888)446-6951


For More Information, Call Us Today: (800) 811-2141   ID# 55916
     

---------
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by use of the 
following link:
 
Click here to go to global remove site if you want your address removed from
mailing 






From lreed at west.cscwc.pima.edu  Wed Jul 15 22:14:24 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 15 Jul 1998 22:14:24 -0700 (PDT)
Subject: Atilla Remailer Down...
Message-ID: <009C93C6.999133A0.1@west.cscwc.pima.edu>


From:	MX%"Postmaster at west.cscwc.pima.edu"  "SMTP delivery agent" 15-JUL-1998 22:13:46.82
To:	MX%"lreed at west.cscwc.pima.edu"
CC:	
Subj:	SMTP delivery error

Return-Path: <>
Date: Wed, 15 Jul 1998 22:13:44 MST
From: SMTP delivery agent 
To: 
Subject: SMTP delivery error
X-Report-Type: Nondelivery; boundary="> Error description:"

Note: this message was generated automatically.

An error was detected while processing the enclosed message.  A list of
the affected recipients follows.  This list is in a special format that
allows software like LISTSERV to automatically take action on incorrect
addresses; you can safely ignore the numeric codes.

--> Error description:

Error-For:  attila at prime.net
Error-Code: 2
Error-Text: %MX_SMTP-F-GENERIC_FAILURE, unknown failure status
            -(Via prime.net)
  -Transcript:
    -Rcvd: 220 webm4.ntx.net ESMTP Sendmail 8.8.5/8.8.5; Wed, 15 Jul 1998 21:58:47 -0700 (PDT)
    -Sent: HELO west.cscwc.pima.edu
    -Rcvd: 250 webm4.ntx.net Hello west.wc.pima.edu [144.90.64.14], pleased to meet you
    -Sent: MAIL FROM:
    -Rcvd: 250 ... Sender ok
    -Sent: RCPT TO:
    -Rcvd: 571 ... [144.90.64.14] not permitted to relay from  to 

Error-End:  1 error detected

------------------------------ Rejected message ------------------------------
Received: by west.cscwc.pima.edu (MX V4.2 VAX) id 21; Wed, 15 Jul 1998 22:13:22 MST
Date: Wed, 15 Jul 1998 22:13:22 MST
From: Linda Reed--PCC West Campus CSC 
To: attila at prime.net
Message-ID: <009C93C6.3E06C0E0.21 at west.cscwc.pima.edu>
Subject: Sure, you *claim* you're a Deacon...


"Evangelists do more than lay people."






From katt at nbn.net  Thu Jul 16 00:10:58 1998
From: katt at nbn.net (dennis e strausser jr)
Date: Thu, 16 Jul 1998 00:10:58 -0700 (PDT)
Subject: show me
Message-ID: <35ADD147.713B@nbn.net>


I will not say much
  give me what you have





From N.Robidoux at massey.ac.nz  Thu Jul 16 00:50:02 1998
From: N.Robidoux at massey.ac.nz (Nicolas Robidoux)
Date: Thu, 16 Jul 1998 00:50:02 -0700 (PDT)
Subject: [humor]
In-Reply-To: <199807160338.XAA02713@cti06.citenet.net>
Message-ID: <9807160740.AA28593@ma-kaka.massey.ac.nz>



Nicolas' homebrewed quip (vive Linux!):

I really like the Natural Keyboard, but I would never trust a keyboard
manufacturer to put together an operating system.

nicolas





From stuffed at stuffed.net  Thu Jul 16 05:03:17 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Thu, 16 Jul 1998 05:03:17 -0700 (PDT)
Subject: My wife shagged the pool team/Swedish hooker sues clients
Message-ID: <19980716110827.14015.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 832 bytes
Desc: not available
URL: 

From nobody at samson.ml.org  Thu Jul 16 08:07:12 1998
From: nobody at samson.ml.org (Samson)
Date: Thu, 16 Jul 1998 08:07:12 -0700 (PDT)
Subject: Whitehouse Bastards want my name named.
Message-ID: 




Cyberdog wrote:
> 
> Blumenthal Discovery requests both the Email subscriber list to
> Drudge Report AND contributor list to Drudge Legal Defense
> Fund...

mailto:help at nym.alias.net - don't subscribe without it.






From announce at dmail1.real-net.net  Thu Jul 16 08:44:53 1998
From: announce at dmail1.real-net.net (RealNetworks News)
Date: Thu, 16 Jul 1998 08:44:53 -0700 (PDT)
Subject: FREE! Brilliant Audio With New RealPlayer G2
Message-ID: <199807161544.IAA27433@dmail3.real-net.net>


Dear RealPlayer User,

I'm very excited to announce the beta release of
RealPlayer G2 and RealPlayer Plus G2, available 
for download now.

With RealPlayer G2 you'll get a quantum leap in 
RealAudio and RealVideo quality, including an 80% 
improvement in RealAudio's frequency response and 
smoother, sharper RealVideo.

RealPlayer G2 technology dramatically reduces 
rebuffering, which means less break-up in RealAudio
and RealVideo streams.  With this new feature you'll
notice increased performance over your modem -- even
under poor network conditions.

RealPlayer G2 allows you to reach a universe of
programming directly through your player.  With the 
touch of a button through RealChannels you can access
great channels like CNN, Screening Room (movie 
previews), ABC, NPR, Comedy Central, and more.

To download now, visit:

--> http://www.real.com/50/rg26a.html

We are also releasing a new version of the premium 
RealPlayer, RealPlayer Plus G2.  With RealPlayer Plus
G2 you'll receive:

*  Even better RealAudio and RealVideo quality
*  Hi-fi audio display with spectrum analyzer
*  10 channel graphic equalizer for tuning treble, bass,
   and mid-range
*  Video controls which work just like your TV set --
   you control brightness, contrast, and saturation

All of this with a 30-day money back guarantee -- just
$29.99.  To download now, visit:

--> http://www.real.com/50/plusg26a.html

+===+===+===+===+===+===+===+===+===+===+===+===+===+
"RealPlayer G2 from RealNetworks is the next generation
of streaming media players. End users can now experience
high quality audio and video..." - ZDNet, 5/1998

"Overall, RealPlayer is a class-act, this is one 
application you'll definitely want to have for your online
daily web surfing..." - Strouds Review, 5/1998

84% of our users say RealPlayer G2 sounds better.  86% 
say the new RealPlayer G2 interface is better.  They also
use RealPlayer G2 to stay informed everyday!  We hope 
you'll try for yourself -- and ENJOY!
+===+===+===+===+===+===+===+===+===+===+===+===+===+
Thank you for continuing to use RealNetworks products,

Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA  USA

---------------------------------------------
 ABOUT THIS E-MAIL

 This e-mail was sent to users of RealPlayer
 software who indicated a preference during
 the download or installation process to receive
 notification of new RealNetworks products or
 services via e-mail.

 For information about subscribing to or
 unsubscribing from future announcements, visit
 http://www.real.com/mailinglist/index.html






From real at freenet.edmonton.ab.ca  Thu Jul 16 10:16:27 1998
From: real at freenet.edmonton.ab.ca (Graham-John Bullers)
Date: Thu, 16 Jul 1998 10:16:27 -0700 (PDT)
Subject: FREE! Brilliant Audio With New RealPlayer G2
In-Reply-To: <199807161544.IAA27433@dmail3.real-net.net>
Message-ID: <199807161715.LAA14028@freenet.edmonton.ab.ca>


Date sent:      	Thu, 16 Jul 1998 08:44:35 -0700
To:             	cypherpunks at toad.com
Subject:        	FREE! Brilliant Audio With New RealPlayer G2
From:           	RealNetworks News 
Send reply to:  	RealNetworks News 

> Dear RealPlayer User,
> 
> I'm very excited to announce the beta release of
> RealPlayer G2 and RealPlayer Plus G2, available 
> for download now.
> 
> With RealPlayer G2 you'll get a quantum leap in 
> RealAudio and RealVideo quality, including an 80% 
> improvement in RealAudio's frequency response and 
> smoother, sharper RealVideo.
> 
> RealPlayer G2 technology dramatically reduces 
> rebuffering, which means less break-up in RealAudio
> and RealVideo streams.  With this new feature you'll
> notice increased performance over your modem -- even
> under poor network conditions.
> 
> RealPlayer G2 allows you to reach a universe of
> programming directly through your player.  With the 
> touch of a button through RealChannels you can access
> great channels like CNN, Screening Room (movie 
> previews), ABC, NPR, Comedy Central, and more.
> 
> To download now, visit:
> 
> --> http://www.real.com/50/rg26a.html
> 
> We are also releasing a new version of the premium 
> RealPlayer, RealPlayer Plus G2.  With RealPlayer Plus
> G2 you'll receive:
> 
> *  Even better RealAudio and RealVideo quality
> *  Hi-fi audio display with spectrum analyzer
> *  10 channel graphic equalizer for tuning treble, bass,
>    and mid-range
> *  Video controls which work just like your TV set --
>    you control brightness, contrast, and saturation
> 
> All of this with a 30-day money back guarantee -- just
> $29.99.  To download now, visit:
> 
> --> http://www.real.com/50/plusg26a.html
> 
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> "RealPlayer G2 from RealNetworks is the next generation
> of streaming media players. End users can now experience
> high quality audio and video..." - ZDNet, 5/1998
> 
> "Overall, RealPlayer is a class-act, this is one 
> application you'll definitely want to have for your online
> daily web surfing..." - Strouds Review, 5/1998
> 
> 84% of our users say RealPlayer G2 sounds better.  86% 
> say the new RealPlayer G2 interface is better.  They also
> use RealPlayer G2 to stay informed everyday!  We hope 
> you'll try for yourself -- and ENJOY!
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> Thank you for continuing to use RealNetworks products,
> 
> Maria Cantwell
> Senior Vice President
> RealNetworks, Inc.
> Seattle, WA  USA
> 
> ---------------------------------------------
>  ABOUT THIS E-MAIL
> 
>  This e-mail was sent to users of RealPlayer
>  software who indicated a preference during
>  the download or installation process to receive
>  notification of new RealNetworks products or
>  services via e-mail.
> 
>  For information about subscribing to or
>  unsubscribing from future announcements, visit
>  http://www.real.com/mailinglist/index.html







From CTIA_Daily_News at um2.unitymail.com  Thu Jul 16 10:38:56 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 16 Jul 1998 10:38:56 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 16, 1998
Message-ID: <199807161726.MAA04271@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
 






From SupportOnlineStaff_000988 at news.newswire.microsoft.com  Thu Jul 16 13:21:25 1998
From: SupportOnlineStaff_000988 at news.newswire.microsoft.com (Support Online Staff)
Date: Thu, 16 Jul 1998 13:21:25 -0700 (PDT)
Subject: Windows and Internet Explorer Support News Watch - July 13, 1998
Message-ID: <199807162021.NAA27346@toad.com>


Windows and Internet Explorer Support News Watch
================================================

As a subscriber to the Windows and Internet Explorer Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site. The following are new Support Online articles that answer frequently asked questions about using Windows and Internet Explorer:

Contents
--------

 - Microsoft Windows 98
 - Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
 - Microsoft Windows CE

Microsoft Windows 98
--------------------

Troubleshooting Windows 98 Startup Problems and Error Messages (Q188867)
http://support.microsoft.com/support/kb/articles/q188/8/67.asp

Cannot Connect to America Online or Install America Online 4.0 (Q188654)
http://support.microsoft.com/support/kb/articles/q188/6/54.asp

Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp

Err Msg: Not Enough Memory to Convert to FAT32. To Free Up... (Q188561)
http://support.microsoft.com/support/kb/articles/q188/5/61.asp

DVD Support in Windows 98 (Q188513)
http://support.microsoft.com/support/kb/articles/q188/5/13.asp

Error Message: Error 745: An Essential File Is Missing (Q174579)
http://support.microsoft.com/support/kb/articles/q174/5/79.asp

Error Message "Invalid System Disk" After Setup Reboots (Q128730)
http://support.microsoft.com/support/kb/articles/q128/7/30.asp

"Earlier Version of MSN Detected" Using Inbox Icon (Q189077)
http://support.microsoft.com/support/kb/articles/q189/0/77.asp

"Call to Undefined Dynalink" Message During Windows 98 Setup (Q188970)
http://support.microsoft.com/support/kb/articles/q188/9/70.asp

"Internal Error Occurred" Error Message Using Internet Explorer (Q188952)
http://support.microsoft.com/support/kb/articles/q188/9/52.asp

Error Message: Not Enough Memory to Load RamDrive (Q188886)
http://support.microsoft.com/support/kb/articles/q188/8/86.asp

Err Msg: This Software Does Not Support Windows 98 and... (Q188865)
http://support.microsoft.com/support/kb/articles/q188/8/65.asp

Err Msg: This Version of Windows Does Not Run on MS-DOS 7.0... (Q188795)
http://support.microsoft.com/support/kb/articles/q188/7/95.asp

Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp

Err Msg: Windows Cannot Find Program.exe, Which Is Needed... (Q188592)
http://support.microsoft.com/support/kb/articles/q188/5/92.asp

Cannot Gain Access to Multiple CD-ROM Drives Using Startup Disk (Q188391)
http://support.microsoft.com/support/kb/articles/q188/3/91.asp

Err Msg: The Microsoft Dial-Up Adapter Is in Use or Not... (Q188141)
http://support.microsoft.com/support/kb/articles/q188/1/41.asp

Minimum Hardware Requirements for Windows 98 Installation (Q182751)
http://support.microsoft.com/support/kb/articles/q182/7/51.asp



Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
-----------------------------------------------------------------

Err Msg: Internet Explorer Cannot Open the Site ... (Q189057)
http://support.microsoft.com/support/kb/articles/q189/0/57.asp

Internet Explorer Issues Extra Challenge with NTLM (Q189033)
http://support.microsoft.com/support/kb/articles/q189/0/33.asp

Check Boxes and Option Buttons on Web Page Are Not Printed (Q188988)
http://support.microsoft.com/support/kb/articles/q188/9/88.asp

Err Msg: Internet Explorer Cannot Open the Internet Site... (Q188839)
http://support.microsoft.com/support/kb/articles/q188/8/39.asp

Problems with Internet Explorer and the Safe Passage Program (Q188706)
http://support.microsoft.com/support/kb/articles/q188/7/06.asp


Microsoft Windows CE
--------------------

WinCE: Cannot Connect Handheld PC Using Dial-Up Networking (Q189122)
http://support.microsoft.com/support/kb/articles/q189/1/22.asp

WinCE 2.0: Terminal Connection Settings Spontaneously Change (Q189097)
http://support.microsoft.com/support/kb/articles/q189/0/97.asp

WinCE: Infrared Connection Disconnects During Synchronization (Q189058)
http://support.microsoft.com/support/kb/articles/q189/0/58.asp

WinCE: System Tool in Control Panel Lists Only One PC Card (Q188980)
http://support.microsoft.com/support/kb/articles/q188/9/80.asp

WinCE: Remote Networking Connection Preferences Are Not Saved (Q188894)
http://support.microsoft.com/support/kb/articles/q188/8/94.asp

Summary of Known Issues in Pocket Word on a Handheld PC (Q188782)
http://support.microsoft.com/support/kb/articles/q188/7/82.asp

Summary of Issues in Note Taker on a Palm-Size PC (Q188505)
http://support.microsoft.com/support/kb/articles/q188/5/05.asp

InstallShield Hangs When You Install Windows CE Services (Q188485)
http://support.microsoft.com/support/kb/articles/q188/4/85.asp



Get Support Online Articles by E-mail
-------------------------------------

You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:

   Subject: Q162721

You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:

   Subject: Q178049, Q174914, Q174062

To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example: 

   Subject: Index

The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.

Visit Support Online
--------------------

We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.

New Features Make Finding Your Answers on Support Online Even Easier
====================================================================

Support Online recently released a number of new features to make it even easier to find the answers you need. The following highlights some of the enhancements you'll see on Support Online at http://support.microsoft.com/. For information about how to use these new Support Online features, see http://support.microsoft.com/support/howto/.

- Specify an article ID number. If you know the ID number of the 
  Knowledge Base article you want, you can enter the ID number 
  to find that specific article.

- Search for troubleshooting tools. Now you can customize your 
  search to include troubleshooting tools only.

- Search for specific drivers and other downloadable files. If you
  know the name of the driver or download file you want, enter the
  full file name to find the file on Support Online. 

- See what's new. If you want to see the latest information about 
  a product and/or a topic, use the What's New option and select 
  the number of days you want to review. You can select 1, 3, 7, 
  14, or 30 days.  

- Toggle between Advanced View and Basic View. Advanced View 
  offers additional search options and other features. Now you 
  can easily toggle between Advanced View and Basic View.

Need help using these features? See http://support.microsoft.com/support/howto/.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.

Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.  The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.  Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This  document may be copied and distributed subject to the following conditions:
1.   All text must be copied without modification and all pages must be included
2.   All copies must contain Microsoft's copyright notice and any other notices provided therein
3.   This document may not be distributed for profit





From jya at pipeline.com  Thu Jul 16 13:47:28 1998
From: jya at pipeline.com (John Young)
Date: Thu, 16 Jul 1998 13:47:28 -0700 (PDT)
Subject: Senate Talks Crypto Law
Message-ID: <199807162047.QAA20692@dewdrop2.mindspring.com>


Thanks to Greg Garcia, ACP:

"Congress Needs to Act on Encryption Legislation,"
In July 15 Congressional Record.

An encryption colloquy among Senators Lott, Leahy, Craig,
Burns, Ashcroft, Abraham, and Shelby:

   http://jya.com/cr071598.htm

Private doorbell is gummed.








From abcdefg at mindspring.com  Thu Jul 16 14:01:37 1998
From: abcdefg at mindspring.com (abcdefg at mindspring.com)
Date: Thu, 16 Jul 1998 14:01:37 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID: 



FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS

Steve Langford is the only candidate for Governor who has paid the bills of a business and passed 
bills in the General Assembly.  Langford Construction, his family business, was awarded the Family 
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State 
University.  Steve Langford was given a score of 92% by the National Federation of Independent 
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).

HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about 
reproductive health--and he has the voting record to prove it:
-  Voted against state-mandated lectures and forced waiting periods.
-  Voted against--and took the Senate well to speak against--Senate Bill 357, which would have 
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional 
by the U.S. Supreme Court.

HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the 
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of 
Atlanta's water and sewer systems. Why does it matter?  Each time it rains more than 1/10 inch, 
Atlanta sewers overflow into the Chattahoochee.  Of course, if you live downstream of Atlanta, you 
already knew that.

HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when 
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have 
gotten a $100 rebate on your taxes).  No surplus?  No rebate.  Makes sense, doesn't it?

LIKE WHAT YOU SEE?  INTERESTED IN LEARNING MORE?  
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org

GOT SOMETHING TO SAY?  E-MAIL STEVE LANGFORD AT stevelangford at mindspring.com

THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT: 
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068






From abcdefg at mindspring.com  Thu Jul 16 14:22:14 1998
From: abcdefg at mindspring.com (abcdefg at mindspring.com)
Date: Thu, 16 Jul 1998 14:22:14 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID: 



FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS

Steve Langford is the only candidate for Governor who has paid the bills of a business and passed 
bills in the General Assembly.  Langford Construction, his family business, was awarded the Family 
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State 
University.  Steve Langford was given a score of 92% by the National Federation of Independent 
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).

HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about 
reproductive health--and he has the voting record to prove it:
-  Voted against state-mandated lectures and forced waiting periods.
-  Voted against--and took the Senate well to speak against--Senate Bill 357, which would have 
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional 
by the U.S. Supreme Court.

HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the 
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of 
Atlanta's water and sewer systems. Why does it matter?  Each time it rains more than 1/10 inch, 
Atlanta sewers overflow into the Chattahoochee.  Of course, if you live downstream of Atlanta, you 
already knew that.

HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when 
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have 
gotten a $100 rebate on your taxes).  No surplus?  No rebate.  Makes sense, doesn't it?

LIKE WHAT YOU SEE?  INTERESTED IN LEARNING MORE?  
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org

GOT SOMETHING TO SAY?  E-MAIL STEVE LANGFORD AT stevelangford at mindspring.com

THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT: 
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068






From nobody at REPLAY.COM  Thu Jul 16 14:48:47 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 16 Jul 1998 14:48:47 -0700 (PDT)
Subject: DES-II-2 contest finished already!
In-Reply-To: <199807161906.VAA05449@basement.replay.com>
Message-ID: <199807162149.XAA27444@basement.replay.com>


Will RSA pay if the DES-gilmo was used? Or was 
RSA playacting john?







From kevin.stephenson at pobox.com  Thu Jul 16 23:30:37 1998
From: kevin.stephenson at pobox.com (Kevin Stephenson)
Date: Thu, 16 Jul 1998 23:30:37 -0700 (PDT)
Subject: NYT Crypto OpEd
In-Reply-To: <199807152141.RAA24473@camel7.mindspring.com>
Message-ID: <199807170630.XAA13442@mail2.deltanet.com>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


 At 05:36 PM 7/15/98 -0400, you wrote: >The NYT has a fairly good OpEd
on encryption today, >written by a novelist, who makes a good case for
>the citizen's need for the privacy protection, now that >there are a
zillion ways computers pry into private >affairs. > >=A0=A0
http://www.nytimes.com > >For those outside the US: NYT today began
its free  >worldwide online service, so the whole world can log  >on
to its prying computers. (Non-USes heretofore  >had to pay for privacy
loss.) It claims to have 4 million  >daily online consumers and is happy
to run an advertiser  >drivern operation to suck in millions more around
the  >planet. > >Take note, Slate. >   How many smaller sites
will be able to break even with advertising subsidies, let alone make a
profit? Advertisers are going to head to the big sites and you'll see a
media concentration on the Internet just like TV and print, unless small
sites can find a creative way to charge for content.  If people aren't
willing to pay for on-line New York Times, they sure  as hell aren't going
to pay much if anything for Mom and Pop's Independent Media/Content. If
they were willing to pay, they probably wouldn't want to use an unfamiliar
and exotic technology like digital cash and they don't want to ring up
$1.00 charges on their Visa for the smaller bits of content wanted from
these other providers.  How about consolidated third-party content billing,
with monthly payment to the billing company by any form (check, cash,
digital cash, credit card, gold coins)? Full anonimity available when
paying with cash or the like.  Give the consumer easy credit and they will
come.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.2

iQA/AwUBNa7vh3boo5vy7gslEQIdrgCgt4pceZMvqLApbKHt/y/yhDZeTY4AoMQe
+6rV1sFP4mGmJXNd/lNa3WTR
=fc8V
-----END PGP SIGNATURE-----






From gnu at toad.com  Fri Jul 17 00:16:30 1998
From: gnu at toad.com (John Gilmore)
Date: Fri, 17 Jul 1998 00:16:30 -0700 (PDT)
Subject: "EFF DES Cracker" machine brings honesty to crypto debate
Message-ID: <199807170716.AAA04031@toad.com>


FOR IMMEDIATE RELEASE
July 17, 1998

CONTACTS:
   Alexander Fowler, +1 202 462 5826, afowler at eff.org
   Barry Steinhardt, +1 415 436 9333 ext. 102, barrys at eff.org
   John Gilmore, +1 415 221 6524, gnu at toad.com

  "EFF DES CRACKER" MACHINE BRINGS HONESTY TO CRYPTO DEBATE

 ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE

SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today
raised the level of honesty in crypto politics by revealing that the
Data Encryption Standard (DES) is insecure.  The U.S. government has
long pressed industry to limit encryption to DES (and even weaker
forms), without revealing how easy it is to crack.  Continued adherence
to this policy would put critical infrastructures at risk; society
should choose a different course.

To prove the insecurity of DES, EFF built the first unclassified
hardware for cracking messages encoded with it.  On Wednesday of this
week the EFF DES Cracker, which was built for less than $250,000,
easily won RSA Laboratory's "DES Challenge II" contest and a $10,000
cash prize.  It took the machine less than 3 days to complete the
challenge, shattering the previous record of 39 days set by a massive
network of tens of thousands of computers.  The research results are
fully documented in a book published this week by EFF and O'Reilly and
Associates, entitled "Cracking DES: Secrets of Encryption Research,
Wiretap Politics, and Chip Design."

"Producing a workable policy for encryption has proven a very hard
political challenge.  We believe that it will only be possible to
craft good policies if all the players are honest with one another and
the public," said John Gilmore, EFF co-founder and project leader.  "When
the government won't reveal relevant facts, the private sector must
independently conduct the research and publish the results so that we
can all see the social trade-offs involved in policy choices."

The nonprofit foundation designed and built the EFF DES Cracker to
counter the claim made by U.S. government officials that governments
cannot decrypt information when protected by DES, or that it would
take multimillion-dollar networks of computers months to decrypt one
message.  "The government has used that claim to justify policies of
weak encryption and 'key recovery,' which erode privacy and security
in the digital age," said EFF Executive Director Barry Steinhardt.  It
is now time for an honest and fully informed debate, which we believe
will lead to a reversal of these policies."

"EFF has proved what has been argued by scientists for twenty years,
that DES can be cracked quickly and inexpensively," said Gilmore.
"Now that the public knows, it will not be fooled into buying products
that promise real privacy but only deliver DES.  This will prevent
manufacturers from buckling under government pressure to 'dumb down'
their products, since such products will no longer sell."  Steinhardt
added, "If a small nonprofit can crack DES, your competitors can too.
Five years from now some teenager may well build a DES Cracker as her
high school science fair project."

The Data Encryption Standard, adopted as a federal standard in 1977 to
protect unclassified communications and data, was designed by IBM and
modified by the National Security Agency.  It uses 56-bit keys,
meaning a user must employ precisely the right combination of 56 1s
and 0s to decode information correctly.  DES accounted for more than
$125 million annually in software and hardware sales, according to a
1993 article in "Federal Computer Week."  Trusted Information Systems
reported last December that DES can be found in 281 foreign and 466
domestic encryption products, which accounts for between a third and
half of the market.

A DES cracker is a machine that can read information encrypted with
DES by finding the key that was used to encrypt that data.  DES
crackers have been researched by scientists and speculated about in
the popular literature on cryptography since the 1970s.  The design
of the EFF DES Cracker consists of an ordinary personal computer
connected to a large array of custom chips.  It took EFF less than
one year to build and cost less than $250,000.

This week marks the first public test of the EFF DES Cracker, which
won the latest DES-cracking speed competition sponsored by RSA
Laboratories (http://www.rsa.com/rsalabs/).  Two previous RSA
challenges proved that massive collections of computers coordinated
over the Internet could successfully crack DES.  Beginning Monday
morning, the EFF DES Cracker began searching for the correct answer to
this latest challenge, the RSA DES Challenge II-2.  In less than 3
days of searching, the EFF DES Cracker found the correct key.  "We
searched more than 88 billion keys every second, for 56 hours, before
we found the right 56-bit key to decrypt the answer to the RSA
challenge, which was 'It's time for those 128-, 192-, and 256-bit
keys,'" said Gilmore.

Many of the world's top cryptographers agree that the EFF DES Cracker
represents a fundamental breakthrough in how we evaluate computer
security and the public policies that control its use.  "With the
advent of the EFF DES Cracker machine, the game changes forever," said
Whitfield Diffie, Distinguished Engineer at Sun Microsystems and famed
co-inventor of public key cryptography.  "Vast Internet collaborations
cannot be concealed and so they cannot be used to attack real, secret
messages.  The EFF DES Cracker shows that it is easy to build search
engines that can."

"The news is not that a DES cracker can be built; we've known that for
years," said Bruce Schneier, the President of Counterpane Systems.
"The news is that it can be built cheaply using off-the-shelf technology
and minimal engineering, even though the department of Justice and the FBI
have been denying that this was possible."  Matt Blaze, a cryptographer
at AT&T Labs, agreed: "Today's announcement is significant because it
unambiguously demonstrates that DES is vulnerable, even to attackers with
relatively modest resources.  The existence of the EFF DES Cracker proves
that the threat of "brute force" DES key search is a reality.  Although
the cryptographic community has understood for years that DES keys are
much too small, DES-based systems are still being designed and used
today.  Today's announcement should dissuade anyone from using DES."

EFF and O'Reilly and Associates have published a book about the EFF
DES Cracker, "Cracking DES: Secrets of Encryption Research, Wiretap
Politics, and Chip Design."  The book contains the complete design
details for the EFF DES Cracker chips, boards, and software.  This
provides other researchers with the necessary data to fully reproduce,
validate, and/or improve on EFF's research, an important step in the
scientific method.  The book is only available on paper because
U.S. export controls on encryption potentially make it a crime to
publish such information on the Internet.

EFF has prepared a background document on the EFF DES Cracker, which
includes the foreword by Whitfield Diffie to "Cracking DES."  See
http://www.eff.org/descracker/.  The book can be ordered for worldwide
delivery from O'Reilly & Associates at http://www.ora.com/catalog/crackdes,
+1 800 998 9938, or +1 707 829 0515.

                              **********

The Electronic Frontier Foundation is one of the leading civil liberties
organizations devoted to ensuring that the Internet remains the world's
first truly global vehicle for free speech, and that the privacy and
security of all on-line communication is preserved.  Founded in 1990 as a
nonprofit, public interest organization, EFF is based in San Francisco,
California.  EFF maintains an extensive archive of information on
encryption policy, privacy, and free speech at http://www.eff.org.






From stuffed at stuffed.net  Fri Jul 17 03:05:53 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 17 Jul 1998 03:05:53 -0700 (PDT)
Subject: Sex industry takes on US govt/Hormones improve whore moans http://stuffed.net
Message-ID: <19980717084625.28072.qmail@eureka.abc-web.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 830 bytes
Desc: not available
URL: 

From gwb at gwb.com.au  Fri Jul 17 04:01:20 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Fri, 17 Jul 1998 04:01:20 -0700 (PDT)
Subject: HANSON BEING BANNED: PLEASE ACT ON THIS EMAIL
Message-ID: <1.5.4.32.19980717102002.0073f0f4@gwb.com.au>


Dear One Nation supporter in NSW,

Pauline Hanson has been banned from using council facilities in her
electorate of Blair.

The Labor-dominated Ipswich City Council, the heart of Pauline Hanson's seat
of Blair, has returned to their old politically motivated tricks against the
One Nation party.

With the recent Queensland State Election turning the mainstream parties on
their heads the word has gone out - do anything that you can to deny One
Nation their right to a "fair go".

The Council allowed One Nation to use their facilities after a 6 month long
ban following the breaking of a council hall window at the party's launch by
protesters in April 1997. The ban was imposed on the basis of "protecting
council staff from danger".

http://www.gwb.com.au/gwb/news/onenation/launch.html

An example of recent (1998) pre-state election use by Pauline Hanson of the
Ipswich City Council facilities can be seen at:

http://www.gwb.com.au/onenation/qldstate/polaunch/index.htm

at the above link Pauline Hanson launched One Nation's state policies
without any security problems or risk to council staff.

One Nation used Ipswich City Council facilities on several occasions this
year without any protesters even making an appearance.

The basis of "fair go" and "freedom of assembly" is equity in decision making. 

At a recent Labor Party meeting One Nation members demonstrated peacefully
outside the council venue yet no such threat or withholding of council
facilities to Labor has been suggested - nor should it.

Following the State Election the rules have apparently changed.

The Ipswich City Council this week rejected an application by Pauline
Hanson's One Nation to use council facilities on the basis of "concern for
the safety of staff".
The mayor of Ipswich, John Nugent, was one of those voting against One
Nation's use of council facilities.

This is laughable as the last time protesters appeared at a One Nation
meeting was over a year ago in June 1997.

One Nation has (to ensure council staff safety) offered to supply private
security and ensure that sufficient police are on standby - this offer has
been rejected.

The link below will take you to an image of one of the chief protagonists,
Councillor Paul Tully, a Labor supporter who has made it his life ambition
to destroy what Pauline Hanson and you stand for.

http://www.gwb.com.au/gwb/news/onenation/gold/tully.jpg

Can we let him win?

I don't think so.

I appeal to you to write, in the strongest terms possible, to the local
Ipswich paper, The Queensland Times.

Their email address is:

qt at gil.com.au

Remember to keep your letter to under 200 words to ensure publication.

Issues to look at:
==================

1) The damage to Ipswich's reputation through these undemocratic antics.
2) Freedom of speech.
3) Labor's underlying undemocratic motives.
4) What role the ratepayers who voted Hanson have been allowed in on this
decision by the Labor council?

I encourage you to send the Queensland Times an email letting them know how
YOU FEEL about the Ipswich City Council's decision to prevent Pauline Hanson
from using ratepayer's facilities.

GWB




Scott Balson






From BUFFU at aol.com  Fri Jul 17 08:37:02 1998
From: BUFFU at aol.com (BUFFU at aol.com)
Date: Fri, 17 Jul 1998 08:37:02 -0700 (PDT)
Subject: Civil disobediance only gets you an invitation to the anarchist's big bash
Message-ID: <89904731.35af6f4d@aol.com>


     We are sending you an invitation to be one of our special guests this
year, big harry ass lawsuits are always of interest.  Bring a friend if you
like, but I have to warn you, Liberatarians are not welcome.  This years menu
includes red meat and poptarts.  Clothing is optional.

                Sincerely,

                   Beth





From KMHAsfaha at aol.com  Fri Jul 17 10:26:46 1998
From: KMHAsfaha at aol.com (KMHAsfaha at aol.com)
Date: Fri, 17 Jul 1998 10:26:46 -0700 (PDT)
Subject: kmha@aol.com
Message-ID: <90f10915.35af77d7@aol.com>


please i need some suggestions with topics for my informative speech, or may
some 
infromative speeches already outlined to use it for refrence.
    thankyou.





From jf_avon at citenet.net  Fri Jul 17 10:46:30 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 10:46:30 -0700 (PDT)
Subject: New Computer Software for Police
Message-ID: <199807171800.OAA05948@cti06.citenet.net>



Date: Thu, 16 Jul 1998 18:14:18 -0600
From: rmcreat at istar.ca (BC NFA)
Subject: New Computer Software for Police

NATIONAL FIREARMS ASSOCIATION
BRITISH COLUMBIA BRANCH

Announced on the 6 o'clock news July 15, 1998.

I ask you to read this please; while reading keep in mind
this is easily adaptable to observe firearms owners patterns.

Const. Oscar Ramos and Const. Raymond Payette of the
Vancouver City Police made announcement of their new
"Shame the Johns" software.  It is designed to share
information with all levels of police in the Lower Mainland
and elsewhere.

This software allows the tracking of vehicle movements
and buying patterns.  It allows police to predict when and
where you will be at anytime.  It is designed to collect
name, date of birth, license number, discription of vehicle
- -and-other-information.  It will automatically generate
a letter to send to the persons home informing other
family members of the persons activities.

Michelle Traver
SSAC
NFA-BC
1706 E. 1st Ave., Van., BC  V5N 1B1
1877-254-2100, local 604-254-2100
fax 604-255-2202






Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada
��DePompadour,�Soci�t�d'Importation�Lt�e
�����Limoges�fine�porcelain�and�french�crystal
��JFA�Technologies,�R&D�physicists�&�engineers
�����Instrumentation�&�control,�LabView�programming
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C



From announce at inbox.nytimes.com  Fri Jul 17 11:16:53 1998
From: announce at inbox.nytimes.com (The New York Times on the Web)
Date: Fri, 17 Jul 1998 11:16:53 -0700 (PDT)
Subject: Great News...
Message-ID: <199807171854.NAA3471112@inbox.nytimes.com>


Dear Subscriber,

The New York Times on the Web has made it easier for you to stay
current and to make your way around our site, with a newly redesigned
home page and the addition of two features, Quick News and Page One Plus.

*** OUR NEW HOME PAGE  ***

CONTINUOUS NEWS. Our new home page gives you an instant look at the
top news from The Times, with updates throughout the day reflecting
news judgments from the editorial team of The Times on the Web. Breaking
news from the Associated Press, refreshed every 10 minutes, gives you
an immediate take on the changing world. And a new ticker brings you
a quick look at the current state of the market.

IMPROVED NAVIGATION. We've also made it simpler to get around our site,
with an easy to find, easier to use navigation panel that takes you
directly to the major news and feature sections with fewer clicks.

MORE LINKS TO MORE STORIES. Top features from around the site are now
highlighted on the home page as well, giving you faster access to news
and features from The New York Times.

http://www.nytimes.com


*** QUICK NEWS  ***

QUICK NEWS. Our new Quick News page is your best source for what's
happening right now. Regularly updated by the editors of The Times
on the Web, this page highlights and summarizes the top stories
developing at the moment, with links to other major news of the day.

http://www.nytimes.com/yr/mo/day/late/index.html


***  PAGE ONE PLUS ***

PAGE ONE PLUS. We've improved the presentation of the articles that
appear on the front page of the printed New York Times, with quick
links to the major sections of the newspaper.

http://www.nytimes.com/yr/mo/day/front/


We hope you'll make a point of visiting the site soon and letting
us know what you think.

Sincerely,
Rich Meislin
Editor in Chief
The New York Times Electronic Media Company



***********************************************************************
When you registered with The New York Times on the Web you indicated
that you wished to receive information about new features and services.
For assistance please consult The New York Times on the Web's Help
Center, where you can remove yourself from the mailing list on the
page "View or Edit Your Subscriber Profile", at:
http://www.nytimes.com/subscribe/help/email.html
Please do not reply to this e-mail.





From zxq_5 at hotmail.com  Fri Jul 17 11:17:11 1998
From: zxq_5 at hotmail.com (zxq_5 at hotmail.com)
Date: Fri, 17 Jul 1998 11:17:11 -0700 (PDT)
Subject: 2 Free copies...
Message-ID: <199807171817.LAA02198@toad.com>


 The time is now to reach out to all the people on the 
 Internet.
 
 It's your business,how are you going to advertise your          
 product or service over the Internet?              

 Direct email puts you in front of millions of people who want to 
 know about your product or service.The most cost effective way  
 to make your business explode!

 Never before has it been possible to reach so many for so       
 little.

  We are the leaders in direct email because we do what we      
 say.Our data banks have email buyers for every business.

 Don't worry we will help you with a subject and letter that    
 will work for you.
.                                                                
      Guaranteed
  CALL 1-800-600-0343 ext,1669 leave message.
  CALL 1-702-796-6123 speak to a consultant.
 
 
 
 
 





From Charlie_Kaufman at iris.com  Fri Jul 17 12:39:12 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Fri, 17 Jul 1998 12:39:12 -0700 (PDT)
Subject: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256644.006C6CB1.00@arista.iris.com>


I believe there is nothing really good, really evil, or even really novel
about the Cisco et al proposal. That makes it hard for a technical
community like this one to evaluate it.

The controversy should not be around the technology, but around the
spin-doctoring. It is both wrong and dangerous to portray this as a step
forward in resolving the crypto export debate. It is comparable to the
Lotus Notes 64/40 encryption scheme or the Microsoft/Netscape and later
Lotus scheme for making strong cryptography available between exportable
browsers and international banks. These may be significant to some
customers and to some vendors, but they are not steps toward resolving the
controversy. They are more likely to extend the controversy, since they
decrease the urgency of the debate for some of the players.

There is no reason to believe this controversy will be settled anytime
soon. The battle continues with no plausible resolution because both sides
believe they will win if they hold out long enough. Civil Libertarians
believe that the public will not stand for the sorts of draconian controls
that will be necessary to enable universal snooping and that the courts
will rule such controls unconstitutional. The argument against this view is
that the American people are sheep and the Constitution says what the
Supreme Court says it does and have you looked at the makeup of the Supreme
Court lately? Big Brother thinks he will win because he has the pictures.
And because he always does.

So think of these confusing technological tweaks as sending food aid to the
starving peasants in the war zone. It might extend the war by masking some
of its most painful effects, and hence might in the long run be a bad
thing. But the effect is ambiguous at worst, and it's difficult to argue
with the humanitarian groups that want to do it.

I was involved with choosing the wording of the Lotus press release around
64/40. It was a constant effort to restrain the enthusiasm of the
marketeers who wanted to talk about how wonderful it was. I think we
overall did a good job of making it clear that this was not a great thing,
and that we hoped it would not be a long term thing. It was a small
improvement for a limited set of customers while we continued the war.

If you read Cisco's publications, they have been fairly restrained in their
enthusiasm. But some of their partners and some of the press coverage has
gotten completely out of hand. The most offensive testimonial is from
Novell:

"This solution represents a real step forward for U.S. encryption policy,"
said Eric Schmidt, CEO of Novell. "At last, we have a market solution that
meets the needs of consumers, corporations, law enforcement and national
security."

This seems like a case where we need to shoot the messenger.

     --Charlie Kaufman







From Charlie_Kaufman at iris.com  Fri Jul 17 12:39:47 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Fri, 17 Jul 1998 12:39:47 -0700 (PDT)
Subject: EFF Announces GAK 5
Message-ID: <85256644.006C6F08.00@arista.iris.com>


Given that the EFF has demonstrated hardware capable of breaking DES in a
short period of time, they should now form an industry alliance asking for
general export permission for DES. If law enforcement ever needs to access
any encrypted data, they can bring it to EFF, along with a court order, and
EFF will "recover" the key. This should be allowed under the existing Key
Recovery exception, which says things are exportable if you provide the
government with a mechanism for getting at the keys!

Of course, some will claim that EFF is selling out to Big Brother by
manufacturing this technology, and that granting export permission for DES
will only prolong the pain of export controls. Others will claim that it is
wonderful that we have finally developed a technology that solves once and
for all the crypto debate. Flames will ensue.

[Note: In case it is not obvious to everyone, this note is a lame attempt
at sarcasm. Please don't hang me.]

     --Charlie Kaufman







From jf_avon at citenet.net  Fri Jul 17 13:26:02 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 13:26:02 -0700 (PDT)
Subject: No Subject
Message-ID: <199807172040.QAA09454@cti06.citenet.net>


The original paper is available at:
http://www.cisco.com/warp/public/146/july98/2.html

For any precise analysis, use the original document at the aforementionned address.



------------- begin "cut and paste" text ---------------
White Paper

The Export of Certain Networking Encryption Products under ELAs As An Alternative to
"Key Escrow/Recovery Products" under KMI: A Networking Industry White Paper on
Encryption Export Controls

by
Elizabeth Kaufman, Cisco Systems, Inc. and
Roszel C. Thomsen II, Thomsen & Burke LLP


     Encryption Press Release
     PR Contact: Doug Wills, (408) 527-9475, dwills at cisco.com



Executive Summary

The Clinton Administration's export control policy is designed to promote development of cryptographic products that provide law enforcement agencies with
access to encrypted data. Products that implement key escrow/recovery to provide such access are broadly exportable under License Exception KMI.
Although some customers have indicated interest in products that implement key escrow/recovery for stored data, customers generally oppose mandatory key
escrow/recovery for data in transit. This White Paper proposes that certain networking encryption products that provide for authorized access without key
recovery should also be eligible for broad export under appropriate Encryption Licensing Arrangements.

The Administration's export control policy must also reflect the equities of the intelligence community. Therefore, the proposed Encryption Licensing
Arrangements should be approved subject to riders and conditions designed to prevent the export of strong encryption products to military end-users, for
military end-uses, or to any government ministry, agency or department of certain countries.

The operational characteristics of networking encryption products to be eligible for export under appropriate Encryption Licensing Arrangements are not
complex. Simply stated, the operator action model delivers a 'private door-bell,' not a 'house-key' to parties lawfully seeking access to data. Qualifying
products must incorporate an operator-controlled management interface that enables dynamic, real-time access to specified network traffic prior to
encryption, or after decryption, at a designated access point.

Background

In Executive Order 13026 of November 15, 1996, President Clinton said that cryptographic products implementing the Key Management Infrastructure
("KMI") would be eligible for export without licenses after a one-time technical review.1 On December 30, 1996, the Commerce Department's Bureau of
Export Administration ("BXA") published an interim rule amending the Export Administration Regulations ("EAR", 15 CFR Part 730 et seq.) that implements
Executive Order 13026.2

The better-known provision of this interim rule states that "key escrow or key recovery products" are exportable under License Exception KMI. The term
"key escrow or key recovery products" is defined in great detail in Section 740.8(d)(1)(i) and Supplement No. 4 to Part 742 of the EAR.

A lesser-known provision of this interim rule states that "other recoverable encryption products" shall receive "favorable consideration" for export. The term
"other recoverable encryption items" is defined briefly in Section 740.8(d)(1)(ii) of the EAR, and the type of "favorable consideration" that should be accorded
to such products is not defined at all. The ambiguity of this provision provides an opportunity to explore new approaches to exporting cryptographic products.

Overview

Industry has studied the technical, market and policy issues surrounding the KMI. These studies suggest that there may be market demand for products
implementing key escrow/recovery techniques for retrieval of encrypted stored data. Such products would also appear to meet law enforcement's
requirements for retrieval of encrypted stored data. However, no market demand exists for products implementing key escrow/recovery techniques for
retrieval of encrypted transient data. Eminent cryptographers have argued that key escrow/recovery techniques create unnecessary risks for encrypted
transient data.3 The National Security Agency ("NSA") has confirmed these findings.4

The networking industry proposes that certain networking encryption products described in this White Paper may receive wide market acceptance and meet
the requirements of law enforcement with respect to transient data without implementing key recovery. The intelligence community's equities, though not
reflected in the EAR, must be respected as well.

Analysis of Market Requirements

In order to meet market requirements, networking encryption products must: (1) provide strong security, (2) adhere to open standards, and (3) support an
operator-controlled management mechanism to specify encrypted flows.

Strong security is essential for products that encrypt transient data. Customers, particularly service providers, have stated repeatedly and emphatically that they
will not purchase products that encrypt transient data, if those products also facilitate unauthorized, covert surveillance by third parties. The government should
encourage the deployment of products that implement strong security, because such products will deter certain kinds of crimes, like theft of trade secrets by
third parties.

Deployment of products that encrypt transient data requires open standards. Without open standards, different vendors' products will not inter-operate, and
broad deployment will not be possible. The government should encourage the deployment of standards-compliant products, because it has a shared interest in
a common cross-vendor solution and the rapid deployment of strong new viable technologies.

Some customers also have indicated that operator-control of encryption flows is a useful feature for network diagnostics and reporting, and for allowing the
efficient transmission of non-sensitive data. Customers in regulated industries, such as banking and securities, also may need to monitor their employees'
communications from time-to-time. Most customers also desire the ability to respond to a court order without exposing all of their data across the Internet or
the public switched telephone network.

Analysis of Government Requirements

The EAR describes key escrow/recovery products primarily in terms of their utility to law enforcement. The government's interests, however, are not
monolithic. The law enforcement and intelligence communities have different requirements.

Law enforcement's main priority has been to establish procedures for access to encrypted data in transit that are comparable to existing procedures for voice
communications and therefore capable of introduction into evidence in a court of competent jurisdiction. The technical characteristics of the networking
encryption products described in this White Paper will be of greatest interest to law enforcement, because these technical characteristics are the key to
meeting law enforcement's requirements for access to plaintext.

The intelligence community, on the other hand, has not shown much confidence that key escrow/recovery will meet its requirements since the secret Skipjack
algorithm and governmental escrow agents featured in the original Clipper Chip were abandoned in favor of vendor-selected algorithms and commercial
escrow agents. Its primary concern currently appears to be the broad deployment of encryption technology that does not interfere with current best
operational practices. In this regard, the technical characteristics of qualifying products may be of secondary importance to the intelligence community, and
proposed riders and conditions on the ELA may be of greater importance. 

An Alternative to Key Escrow/Recovery for Networking Products

Although key escrow/recovery is not acceptable for data in transit, some customers require a mechanism that can reveal real-time plaintext for network
diagnostics and reporting, the transmission of non-sensitive data, occasional employee monitoring, and to support law enforcement. The proposed alternative
to key escrow/recovery does not require weakened cryptography, yet provides access similar to that currently available for voice communications.

Packet switched data networks handle traffic differently than circuit-switched voice networks. Circuit switched voice networks are characterized by the
opening of a dedicated circuit where communications are transferred in "real time." Packet switched networks are a statistically-multiplexed environment where
communications are routed packet-by-packet, so that data is fragmented but delivered in near real time. In spite of these differences, packet switched data
networks can, with some limitations, enable real-time access to plaintext. The proposed alternative to key recovery provides customers with full-strength
encryption, while simultaneously enabling the dynamic creation of an access point that allows real-time interception of plaintext based upon the target's source
or destination, whether the product is located within an enterprise or at a service provider's premises.

Two Access Scenarios: Access in the Enterprise, and Access at a Service Provider's Premises

The access point concept is not a perfect solution for all products. For example, it does not easily apply to user-to-user desktop applications. However, it
does appear to offer a reasonable alternative to key recovery on many classes of network applications and platforms. Specifically, it is a viable approach to
access to plaintext for devices where the individual responsible for data creation/reception is not the same individual responsible for platform operation. Such
devices constitute a significant percentage of the available networked platforms, including firewalls, routers, switches and other networking devices.

Classes of Network Devices

            Self-managed
                              3rd party-managed
 Single-user
            Home PC
                              Enterprise desktop
                              Enterprise telephone
                              Set-top box
                              Service Provider VPN
                              Outsourced firewall
 Multi-user
            Enterprise network
            Enterprise server
            Multi-user workstation

Can provide access to plaintext without the end user's knowledge

Meeting Law Enforcement Requirements

In order to be exportable under the proposed Encryption Licensing Arrangements, networking encryption products must contain a management interface that
dynamically controls encryption by source and destination address, and by network protocol, to enable real-time access to selected network traffic prior to
encryption or after decryption. The operational characteristics of these products may be summarized below:

     a) A qualifying network encryption product must incorporate an encryption management interface that:
     i) is remotely accessible;
     ii) controls the encryption configuration of the platform;
     iii) configures encryption policy by source and destination network address;
     iv) enables a remote operator to modify the encryption configuration dynamically;
     v) enables the interception of network traffic between a specific source and destination either prior to encryption or after decryption at a defined access
     point;

     b) A qualifying network encryption product may:
     i) be hardware, software, or a combination of hardware and software;
     ii) encrypt any network protocol and/or at any network layer;
     iii) support any
          a) encryption algorithm
          b) key length
          c) key generation mechanism
          d) key management scheme;
     iv) be standalone, or integrated with other functions;
     v) be a single user, multi-user or infrastructure platform;
     vi) enable interception on the wire, on media (such as a hard disk), via a specialized communications port, or at another defined access point.

Two figures that illustrate how qualifying products may provide access to plaintext are set forth in Figures 1 and 2 of this paper.

Meeting Intelligence Community's Requirements

Current best operational practices are not widely understood by the public, and they may be compromised by the broad deployment of networking encryption
products, whether of US or of foreign manufacture. However, the possible loss of access to plaintext communications due to use of commercial cryptography
must be analyzed within the broader framework of advances in new technologies. As one eminent cryptographer testified before the Senate Judiciary
Subcommittee on Technology and the Law, "Advances in emitter identification, network penetration techniques, and the implementation of cryptanalytic or
crypto-diagnostic operations within intercept equipment are likely to provide more new sources of intelligence than are lost as a result of commercial use of
cryptography."5

In further recognition of and deference to the intelligence community's equities, industry is not requesting authorization to export products with key lengths
exceeding 56 bits to military end-users or for military end-uses, or to any government ministry, agency or department of the countries listed in "Tier 3" (as
defined for purposes of computer export controls). Exports of products exceeding 56 bits to these end-users would require a separate license issued by BXA
after full inter-agency review under applicable Executive Orders. The differences between the proposed ELA and export under License Exception KMI are
summarized in the chart below:

                 License Exception KMI
                                                        Proposed ELA
 Eligible Products
                 Key recovery products
                                                        Products providing access to plaintext at intermediate stations of the data network
 Territory
                 All except Cuba, Iran, Iraq, Libya, North Korea,
                 Sudan and Syria
                                                        Same as KMI
 Eligible End-users
                 All end-users are eligible
                                                        (1) All end-users are eligible for 56 bit products,
                                                        HOWEVER,
                                                        (2) Products exceeding 56 bits would not be eligible for government agencies and
                                                        military end-users in Tier 3 countries
 Duration
                 Indefinite
                                                        Three years, renewable in three year increments
 Reporting
                 Biannual
                                                        Same as KMI


                                                     Conclusion

This White Paper has defined a class of networking encryption products that should be authorized for export under appropriate Encryption Licensing
Arrangements. The operational characteristics of qualifying products ensure that law enforcement will continue to enjoy authorized real-time access to plaintext

References:
1. 61 FR 58767.
2. 61 FR 68572.
3. The Risk of Key Recovery, Key Escrow and Trusted Third Party Encryption,
H.Abelson et al. on June, 1998.
4. Threat and Vulnerability Model for Key Recovery (KR), NSA, X3
on February 18, 1998.
5. Key Escrow: Its Impact and Alternatives, testimony of Dr. Whitfield Diffie,
Distinguished Engineer, Sun Microsystems, Inc. before the Senate Judiciary
Subcommittee on Technology and Law on May 3, 1994.

Cisco Systems

Cisco Systems, Inc. (NASDAQ: CSCO) is the worldwide leader in networking for the Internet. News and information are available at
http://www.cisco.com.

For more information visit Cisco PR Contacts



All contents copyright � 1992--1998 Cisco Systems Inc. Important notices.
---------- end of "cut and paste" text ---------------

Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
  DePompadour, Soci�t� d'Importation Lt�e
     Limoges fine porcelain and french crystal
  JFA Technologies, R&D physicists & engineers
     Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C







From rah at shipwright.com  Fri Jul 17 13:38:09 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 17 Jul 1998 13:38:09 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
Message-ID: 


-----BEGIN PGP SIGNED MESSAGE-----

Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack.

It seems that Gilmore and Moore's Law have just turned the
once-respected DES into cryptographic snake-oil. He keeps hurting
snakes like that, he's gonna get himself canonized. ;-).


Seriously. Many thanks to Mr. Gilmore for proving, once again, that
lobbying is pointless, and that physics is not optional.

Outstanding. Marvellous.

Cheers,
Bob Hettinga

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5

iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH
OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR
Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK
Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9
leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm
0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg==
=Zeyp
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga 
Philodox Financial Technology Evangelism 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
  July 23-24, 1998: 





From jf_avon at citenet.net  Fri Jul 17 13:53:06 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 13:53:06 -0700 (PDT)
Subject: Politicians...
Message-ID: <199807172107.RAA09933@cti06.citenet.net>



you wrote in the Canadian Firearms Digest V2 #498

>Date: Fri, 17 Jul 1998 09:33:52 -0600
>From: Gordon 
>Subject: politiians
>
>Politicians and diapers should be changed regularly. and for the same
>reasons!

ROTFL!

I took the liberty to Cc this message to a few friends.  :-)

Mind if I use it in one of my .sig file?

Ciao

jfa







Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada
��DePompadour,�Soci�t�d'Importation�Lt�e
�����Limoges�fine�porcelain�and�french�crystal
��JFA�Technologies,�R&D�physicists�&�engineers
�����Instrumentation�&�control,�LabView�programming
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C



From CTIA_Daily_News at um2.unitymail.com  Fri Jul 17 16:20:54 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 17 Jul 1998 16:20:54 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 17, 1998
Message-ID: <199807172205.RAA30430@mailstrom.revnet.com>




=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.

WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
 






From StanSqncrs at aol.com  Fri Jul 17 16:44:08 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 17 Jul 1998 16:44:08 -0700 (PDT)
Subject: Politicians...
Message-ID: <2bc02f8e.35afe1a5@aol.com>


In a message dated 7/17/98 5:48:16 PM Central Daylight Time,
jf_avon at citenet.net quotes:

<< >Politicians and diapers should be changed regularly. and for the same
reasons! >>

It's the easy way out (and I mean DOWN and OUT)!  I mean, if we're simply
going to change them out everytime, why bother to figure out which ones aren't
evil/stupid (I mean, out of all those politicians, there's got to be 1 or 2!
I think. ;-) )?

See, if we just simply change politicians at every chance, then we throw the
baby out with the bathwater, so to speak.  The simple solutions aren't always
the best ones.

Stan,
http://members.aol.com/whtsametau/camel/index.htm






From gnu at toad.com  Fri Jul 17 17:11:31 1998
From: gnu at toad.com (John Gilmore)
Date: Fri, 17 Jul 1998 17:11:31 -0700 (PDT)
Subject: ZDTV and CNN coverage of DES Cracker
Message-ID: <199807180011.RAA02044@toad.com>


ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on
their "Silicon Spin" program today.

CNN took pictures earlier today, I don't know when they'll use them.

	John





From bill.stewart at pobox.com  Fri Jul 17 17:53:58 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 17 Jul 1998 17:53:58 -0700 (PDT)
Subject: FWD: new MIT SPKI software release
Message-ID: <3.0.5.32.19980717173912.00929100@popd.ix.netcom.com>


fredette at theory.lcs.mit.edu (Matt Fredette) writes:
==================================================
Subject: new MIT software release

A new release of the MIT SDSI/SPKI C software distribution is 
available.  Go to

http://theory.lcs.mit.edu/~cis/sdsi.html

and follow the software distribution links in the paragraph about 
SDSI/SPKI 2.0.  Note that you must be a US or Canadian citizen, etc., 
to get this software.  

The following binary builds are available:

sdsi20-0.4.0-sparc-sun-sunos4.1.4.tar.gz
sdsi20-0.4.0-sparc-sun-solaris2.5.1.tar.gz
sdsi20-0.4.0-i386-pc-solaris2.6.tar.gz
sdsi20-0.4.0-i386-unknown-netbsd1.1.tar.gz
sdsi20-0.4.0-mips-sgi-irix5.3.tar.gz

An Intel Linux build will hopefully be available soon.

These are all built from the source distribution:

sdsi20-0.4.0.tar.gz

As usual, many bugs were fixed in this release.  See ChangeLog in the source
distribution for the details.

More general notes from the 0.4.0 README:

Release 0.4.0
-------------

This code now requires (sequence )s to conform to the expected grammer
in the structure-06 draft, i.e., it supports the macro "def" and "ref"
mechanism, and, if threshold subject support is compiled in, the
"process-threshold" mechanism.  It will reject sequences that use
the old (do hash ) or old (do k-of-n) directives.

DSA support has been finished, and is compiled into the library by
default.  This means that SDSI2_FEATURE_STRUCTURE6_SIGS is defined by
default; since this changes the grammar for signatures to match what
is expected in the structure-06 draft, earlier signatures will break.
See the applicable blurb in the 0.3.0 notes of the README for details.

PGP support has been extended to handle what I believe to be the
majority of PGP 5.0 keyrings.  If your PGP private keyring uses IDEA
or CAST5 with MD5 or SHA1 to seal the secrets, sdsi2sh should be able
to read it.  PGP DSA keys are fully supported.

The SDSI distribution now includes MIT-written multi-precision integer
and DES libraries.  This means that you don't have to track down and
compile GNU MP and Eric Young's libdes if you don't want to.  If you
do still want to compile with one or both of these other libraries,
you can - see the main documentation for instructions on when you may
want to, and how.

The reduction code has been completely rewritten.  It's separated out
from sequences, in its own little internal API.  You step a reduction
with rules until you run out of them, and then you can get out the
conclusion that results from those rules.  It's possible to reduce
a whole (sequence ) into its equivalent (cert ), or to just reduce
two (cert )s into one.

The cache API has changed considerably, to present the face of a
generic S-expression cache.  sdsi2_cache_add_search_term is a single
function used for incrementally building a cache query, that works a
lot more intuitively than the old add_search_.._term functions did.
The actual cache format has not changed.

The ugly story of unparsing S-expressions, or filling a sdsi2Sexp, has
been completely retold.  It is now possible to allocate a new
sdsi2Stream, simply "push" canonical elements (like whole sdsi2Sexp *,
sdsi2ByteString *, integers, etc.) onto it, and then just call
sdsi2_sexp_parse to have it parse that into a new sdsi2Sexp.

Two new commands have been added to sdsi2sh: "load" and "save" allow
you to load a variable from and save a variable to a file.

Matt

-- 
Matt Fredette
fredette at bbnplanet.com, fredette at mit.edu, fredette at theory.lcs.mit.edu
http://mit.edu/fredette/www
"The first time the Rolling Stones played, three people came."







From philo at devoted.net  Fri Jul 17 18:01:12 1998
From: philo at devoted.net (philo)
Date: Fri, 17 Jul 1998 18:01:12 -0700 (PDT)
Subject: http://www.devoted.net/
Message-ID: <35AFF3E6.51E80BBC@devoted.net>









From COMPUTERTIME12 at yahoo.com  Fri Jul 17 19:12:47 1998
From: COMPUTERTIME12 at yahoo.com (COMPUTERTIME12 at yahoo.com)
Date: Fri, 17 Jul 1998 19:12:47 -0700 (PDT)
Subject: EARN A PENTIUM II 300 MMX WITHOUT 1 PENNY OUT OF POCKET..
Message-ID: <199807180215.LAA01415@naka0.midland.co.jp>




 GET A FULLY LOADED   266 mmx or 300 mmx Pentium II

or a

Pentium II 266 LAPTOP NOTEBOOK with $0 COST OUT OF POCKET !!! NOTHING DOWN !!! 100% FINANCING !!! A,B,C, or D credit, NO PROBLEM !!! 99.99% APPROVAL !!! YOU WILL RECEIVE THE FOLLOWING: COMPUTER PLUS: 2 yr's Internet Svc. 2 yr's Dist. Website 2 yr's Business Website 2 yr's Virtual Shopping Mall at NO COST !! PAID FOR TOTALLY, and not take one thin dime out of your pocket !!! Our Company pays off your Computer with the proven plan that we have in place. We will share that with you when we call you back. The company has been around for 4 1/2 years. And started this NEW program about 12 weeks ago and it is absolutely EXPLODING !!! Some people are paying their computer off in 1 HOUR with our plan in place. Take advantage of our group and we will show you how!!! --------------------------------- In the 2 Packages You get the following: * A 266mmx or 300mmx Pentium II * 32 or 64 Megs of Ram * 4 Meg Video Card w/ TV Output * 4.3 or 6.4 Gig HD * 3.5 Floppy Drive * 56k Flex-Fax Modem * 32x CD Rom * 16 Bit Soundcard * 60 or 200 Watt Speakers * 104 Keyboard & Mouse * 15" or 17" SVGA Color Monitor * LexMark Color Inkjet Printer * Microsoft Windows 95 * Plus additional Software FOR INFORMATION ...CALL TOLL FREE.. 1-888-588-3713 (24 hrs / 7 days a week) TOLL FREE NUMBER Fax on Demand 415.273.3995 (24hrs.) REMEMBER THIS: Just refer 5 and you earn $1500 in commisions PLUS......the company sends you a MONTHLY BONUS, which you can use to pay off your computer/lease balance , then.... with 5 more sales IT'S YOURS AT NO COST !!! Not a DIME OUT OF YOUR POCKET... .....................................................................................................................

From verify at nytimes.com Fri Jul 17 22:12:27 1998 From: verify at nytimes.com (New York Times subscription robot) Date: Fri, 17 Jul 1998 22:12:27 -0700 (PDT) Subject: Welcome to The New York Times on the Web Message-ID: <199807180512.BAA12197@content9a.nytimes.com> Welcome, cypherpunk6, Thank you for registering for The New York Times on the Web. **************************** ABOUT YOUR REGISTRATION **************************** Your subscriber ID is cypherpunk6 You selected your password at registration. Your e-mail address is cypherpunks at toad.com We encourage you to print this message and save it for future reference. If you have any questions about your registration we can find your account using the ID and e-mail address listed above. Unless you chose otherwise, your ID and password have been saved on your computer so that you do not have to enter them each time you visit our site. Please keep in mind that you can enter this ID and password on any computer to reach our Web site, so if you change computers or install a new browser, there is no need to re-register. If you forget your password, please do not re-register. You can retrieve your password in the Help Center by clicking "Help" anywhere on the site. For more information about the site and your registration, please visit the Help Center at: http://www.nytimes.com/subscribe/help/ ***************************************** ABOUT THE NEW YORK TIMES ON THE WEB ***************************************** The New York Times on the Web combines the quality news coverage, authority and integrity of The New York Times with the immediacy, utility and depth of the Internet. Our site includes daily contents from The Times, news updates every ten minutes from the Associated Press and throughout the day from New York Times editors, a low-cost 365-day archive of New York Times articles, and original reporting exclusive to the Web in CyberTimes. The Times on the Web also features: ** Up-to-the-minute sports scores and statistics ** Current weather conditions and 5-day forecasts for over 1,500 cities worldwide ** A searchable library of more than 50,000 book reviews ** Custom stock portfolios ** Searchable Real Estate and Help Wanted listings ** Subscription service to the Crossword Puzzle, Bridge and Chess columns Thank you for registering. Visit us again soon at: http://www.nytimes.com ***************************************** Please do not reply to this message. If you did not authorize this registration, someone has mistakenly registered using your e-mail address. We regret the inconvenience; please FORWARD this message to cancel at nytimes.com and we will remove it from our records. From lreed at west.cscwc.pima.edu Fri Jul 17 22:31:20 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Fri, 17 Jul 1998 22:31:20 -0700 (PDT) Subject: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C955B.4C2DE0E0.1@west.cscwc.pima.edu> Live At The CypherMore East - THEM...LIVE! - SAHMD!!! _____________________________________________________ Actually, the movie, produced in 1988, and released just in time to throw the Author into a hysterical state of Termial Paranoia, was called, "They Live, and still is. (called that, I mean). [EditWhore's Node: The reason the Author never bothers to go back and correct his spelling, syntax (whatever that is) and miscarriage-returns of linguistic justice, is that her mentor, who was as equally good a pitcher as she was a catcher, told her, "Never rewrite, the reader might be gaining on you."] It was a dark and normal night... Until the Author booted up SCO Xenix at 4 a.m. in a sleazy little motel room in ButtFuck, North Dakota. Then, as the Daemons, Zombies, Orphan Zombies and the dreaded Cron were released to wreak their havoc in ToshibaWorld, in the heart of the Author's 5200C portable computer, LadyLuck, not having a date for the evening, intervened to provide mitigating circumstances which would eventually become evidence in the Court Of Public Opinion as to the mitigating circumstances which needed to be considered before sentencing the Author to a lifetime of Hard Labor, trying to give birth to a new perceptive world-view paridigm in which WeTheSheeple felt perfectly comfortable returning a judgement of, "Guilty, by reason of insanity." (As well as a guilty verdict on the misdemeanor charge of, "I don't care if the people from the Justice Department *are* reaming you a new cornhole on my living room floor, I don't want you using that kind of language in front of my children.") For the Author, as his (or her...or their) mind began to break under the strain of trying to hold back the Forces of Evil that escaped from Bell Laboratories, hidden in the carry-on baggage of the Unix Operating System, the only hope of sanity seemed to lie in turning on the BoobTube (even though they visually bleep out the naked boobs on TV in North Dakota), and trying to defend HimOrHer self with the technological opiate of the asses...Gilligan's Island. It was not to be... Instead, despite the fact that TV goes off the air around 10 p.m. in the smaller northern states, the Author found himself finding himself foundering in a flow of Taoist synchronicity which goes far beyond the temporal concerns of everyday life, resulting in him living a schizophrenic existence, torn between Arizona and Saskatchewan, neither of which adheres to the Daylight Saving Time standard that decent, God-fearing Americans and Canadians hold sacred, whereupon the movie, "They Live" sprung on to the Midget Silver Screen sitting atop a faded yellow table with cigarette burns around the edges, completely out of visual harmony with the vile-green colored rug with a multitude of cigarette burns dotting its nearly threadbare surface. The Author found HimOrHerSelf battling the Mutant Monsters created by 'our engineers' talking to 'their engineers' (without ever managing to discover why your hard drive only crashes just before your job-performance review), as well as simultaneously drinking in the sights and sounds of a movie showing on a TV set which had not yet been plugged in--a movie in which a pair of "men who love men, every now and then" [WAS: Male Bonding In America - I Think Some People Are Going Just A Little Too Far] found themselves, on a dark and stormy night [(c) Snoopy], discovering a box of dark glasses which enabled them to see the scum- sucking aliens living in humanity's midst, without our knowledge. The Author, for the first time realizing the dire warning hidden in ZZ Top's classic musical offering, 'Cheap Sun Glasses,' decided that, given the fact that the theme of his last music album, "Please! Stop Me Before I Sing Again," had been embraced by the music-loving public to such a degree that he was hounded out of the industry, SheOrHe's only realistic course of action, in order to warn others about the frightening dangers to be found lurking within the heart of the Unix Operating System, was to use the Medium to proclaim the Message (even though, according to Marshal McClueHandLuke, they are identical twins, although in a microcosm-macrocosm sort of way, like Danny DeVito and Arnold Schwartzenager). Thus was born, "The Xenix Chainsaw Massacre - The True Story Of The InterNet - Part I." The rest is history... Well, not *all* of it is history, since we are currently writing some of it, now...which you are reading...now. And the rEvolution is NOW!, too, so... Lying Awake In Bed At 4 a.m. Burning Question #38679: "Was the key invented by a sorry, drunken asshole who could never keep track of the point he was trying to make?" Wait here, I'll be back... "Shit!" "Fuck! Godamnn it!" 'o' OK, like I was saying... MultiMedia... The Author, in 1989, had discovered and explored the first, true VirtualRealityMultiMediaExperience, in which HeOrShe could no longer distinguish between the Medium, the Message, the Meaning, the MeanderingMind, or the voices inside her head which told her that the Messages From Mars coming through the fillings in her teeth were FUD, disseminated by an insurance sales activist with a hidden agenda. Worried about the fact that some egoistical, elitist fuckwad might, at some point in the future, try to claim credit for the Author's discovery of MultiMedia, HeOrShe set Stanley's WayBack Machine to a point which corresponded to the exact Time-Space-Mind equivalent of the Nadir Point between alpha and omega, and could distinctly hear Tim C. May hollering, "I'm going to write about MultiMedia in the CypherPunks archives on the first day the list exists, and you will *never* get credit for the concept." The Author, realizing that the preceeding makes little sense, suddenly realized that all HeOrShe really wanted to point out in this chapter is that, despite the fact that it is a B-grade movie in which Meg Foster never shows her tits, the movie 'They Live' speaks a Truth which needs to be understood by any individual who professes an interest in journeying beyond an imaginary world-view in which he believes that buying the Jeep seen sitting on top of the mountain peak will really result in him getting to fuck the living shit out of the large-breasted blonde bombshell lying across the hood of the vehicle. (Or, alternatively, her thinking that purchasing New Lemon Joy Dish Detergent will really lead to her lifemate doing his share of the dishes, and becoming more romantic, instead of just humping her and then rolling over and going to sleep.) ONE-TIME OFFER!!! [NOT TO BE REPEATED IN THE FUTURE] Any 'True Story of the InterNet' reader who undertakes to watch, and believe the message of, 'They Live', is hereby Officially Absolved of any guilt they may feel in the future, over automatically deleting any post sent to the CypherPunks Disturbed Male LISP by the Author, despite any uneasy feeling they may have that HeOrShe, in spite of the obvious lunacy inherent the MeatSpace Manifestation of the maunuscripts, is truly from the GovernmentHomeForTheCriminallyInsane, and is here to Help (TM) them... From Saxgrim at aol.com Fri Jul 17 22:39:44 1998 From: Saxgrim at aol.com (Saxgrim at aol.com) Date: Fri, 17 Jul 1998 22:39:44 -0700 (PDT) Subject: d Message-ID: <4282906a.35b034bf@aol.com> d From aytsd9238 at sprynet.com Fri Jul 17 23:26:28 1998 From: aytsd9238 at sprynet.com (aytsd9238 at sprynet.com) Date: Fri, 17 Jul 1998 23:26:28 -0700 (PDT) Subject: Earn $100 every time OUR phone rings... Message-ID: <199807180626.XAA09707@toad.com> ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!! $100 goes to you for EVERY sale that the company closes! Does the idea of making at least $1,000 per week beginning your 2nd week of doing business excite you? How about never having to sell a thing to your customer and never having to talk to ANYONE to make money? I don't know how this could get any easier. EVERY aspect of selling or talking to someone is DONE COMPLETELY by the company! The number one home based business for the 2nd year in a row, Top Secrets is a member of the Better Business Bureau and the U.S. Chamber of Commerce. WHAT THIS BUSINESS WILL DO FOR YOU: * Handles all your calls, closes your sales, and sends you WEEKLY commission checks! * It pays you a $100 commission (that's over 50% of the total sale) for EVERY sale. CHECKS put $$$ in your pocket in less than your first week or two... Quick commission earnings build and maintain motivation. ALL YOU DO IS ADVERTISE the toll-free number and your ID number. * You can get STARTED TODAY. Just advertise the business toll-free number with your ID # and let this business CLOSE YOUR SALES every day... They do all the work and YOU GET PAID FOR IT! * You may advertise any way you choose: Bulk E-Mail, Flyers, Classifieds, Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000 E-Mails with a 1/10th of a percent (0.1%) sales rate at $100 per sale nets $10,000... not too bad. There is nothing else out there that will provide you with an immediate income beginning THIS WEEK with minimal effort. Before you call, I want you to think about the quality of the live operators handling your call. I am convinced you will not find a better team of closers for your own personal sales. You will clearly understand what I am talking about once you call. PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!! 1-800-811-2141 You will be asked for ID #56130 when you call. (Live operators are available from 8 AM-10 PM CST Monday through Saturday and will be able to answer any questions you may have.) Call one of the 24hr TESTIMONIAL lines at 888-703-5389, 888-446-6949, 888-446-6951 or 888-731-3457 (all toll free). From StanSqncrs at aol.com Fri Jul 17 23:48:18 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Fri, 17 Jul 1998 23:48:18 -0700 (PDT) Subject: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <9e46edbf.35b043a1@aol.com> This is an interesting, coincidence? ;-) In a message dated 7/18/98 12:58:15 AM Central Daylight Time, lreed at west.cscwc.pima.edu writes: << The Author, for the first time realizing the dire warning hidden in ZZ Top's classic musical offering, 'Cheap Sun Glasses,' ... >> << ... Worried about the fact that some egoistical, elitist fuckwad might, at some point in the future, try to claim credit for the Author's discovery of MultiMedia, HeOrShe set Stanley's WayBack Machine to a point which corresponded to the exact Time-Space-Mind equivalent of the Nadir Point between alpha and omega, and could distinctly hear Tim C. May hollering, "I'm going to write about MultiMedia in the CypherPunks archives on the first day the list exists, and you will *never* get credit for the concept." >> ROFLOL! What's coincidental? The latest tune that my band, Nobody's Business (in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in my band. Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs' series. ;-) Stan, Nobody's Business http://members.aol.com/stansqncrs/nobiz.html From lreed at west.cscwc.pima.edu Sat Jul 18 01:33:08 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 18 Jul 1998 01:33:08 -0700 (PDT) Subject: There ARE NO Coincidences... Message-ID: <009C9574.B7195CE0.13@west.cscwc.pima.edu> * From: StanSqncrs at aol.com This is an interesting, coincidence? ;-) In a message dated 7/18/98 12:58:15 AM Central Daylight Time, lreed at west.cscwc.pima.edu writes: << The Author, for the first time realizing the dire warning hidden in ZZ Top's classic musical offering, 'Cheap Sun Glasses,' ... >> ROFLOL! What's coincidental? The latest tune that my band, Nobody's Business (in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top. If it ain't coinicidence, I got a 'scarecrow' in my band. Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs' series. ;-) Stan, ~ ~ ~ ~ It's no coincidence, Stan...we've been keeping an eye on you. Toto ~~~~ p.s. - ou've got something hanging from your lip. p.p.s. - No...the *left* side... From RAEDS at email.msn.com Sat Jul 18 02:37:16 1998 From: RAEDS at email.msn.com (RAED SALAH) Date: Sat, 18 Jul 1998 02:37:16 -0700 (PDT) Subject: PLEASE SEND ME FREE STUFF Message-ID: <000101bdb22f$6838c580$2a4c2499@default> MY NAME IS BRENDA SALAH AND MY ADRESS IS PO BOX 218624 HOUSTON TX 77218 AND MY E MAIL ADRESS IS RAEDS at MSN.COM I WOULD LIKE TO START RECEVING FREE STUFF PLEASE E MAIL ME BACK AND LET ME KNOW HOW TO GET STARTED THANK YOU BRENDA SALAH RAEDS at MSN.COM From RAEDS at email.msn.com Sat Jul 18 02:39:45 1998 From: RAEDS at email.msn.com (RAED SALAH) Date: Sat, 18 Jul 1998 02:39:45 -0700 (PDT) Subject: MORE Message-ID: <000101bdb22f$c0e0b1c0$2a4c2499@default> MY NAME IS BRENDA SALAH AND I WOULD LOVE TO GET FREE STUFF MY ADDRESS IS PO BOX 218624 HOUSTON TX 77218 AND MY E MAIL ADDRESS IS RAEDS at MSN.COM THANK YOU From StanSqncrs at aol.com Sat Jul 18 02:56:16 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sat, 18 Jul 1998 02:56:16 -0700 (PDT) Subject: There ARE NO Coincidences... Message-ID: In a message dated 7/18/98 3:56:56 AM Central Daylight Time, lreed at west.cscwc.pima.edu writes: << It's no coincidence, Stan...we've been keeping an eye on you. >> That's why I suggest listening to I Robot by Alan Parson's Project. Stan From jya at pipeline.com Sat Jul 18 04:41:43 1998 From: jya at pipeline.com (John Young) Date: Sat, 18 Jul 1998 04:41:43 -0700 (PDT) Subject: Scanning the DES Cracker Message-ID: <199807181138.HAA10065@camel7.mindspring.com> >From the EFF Web site: "Cracking DES" has been published only in print because US export controls on encryption make it a crime to publish such information on the Internet, but the book is designed to be easy to scan into computers. John Gilmore has written that he is unable to provide the digitized text of the book sitting on his desk due to export controls, and that Chapter 4 of the book explains what EFF expects to happen. EFF will link to an offshore URL as soon as the volume has been scanned and posted. We'll commence scanning the book as soon as it arrives here next week and will provide the exportable parts to those working on the US-forbidden. From dumitru at ycaar.com Sat Jul 18 05:34:19 1998 From: dumitru at ycaar.com (Dumitru Tudor) Date: Sat, 18 Jul 1998 05:34:19 -0700 (PDT) Subject: Oi! Message-ID: <35B092AD.23F5B3DC@ycaar.com> We grew up with anger and violence... Is it a smart thing to use those things that destroyed our lives and planet to get what's right? I would really wanna hear what you think it's right. Lots of @narchy from, Pukie My E-mail:pukie at d3tudor.demon.nl From cwci at d-int.com Sat Jul 18 06:51:27 1998 From: cwci at d-int.com (cwci at d-int.com) Date: Sat, 18 Jul 1998 06:51:27 -0700 (PDT) Subject: VERY IMPORTANT !!! Message-ID: <032c64945061178POPSRVRES@popline.com> Dear Friend: This is an extremely IMPORTANT announcement for you! iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii IMPORTANT ANNOUNCEMENT IMPORTANT ANNOUNCEMENT ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' Your Future May Depend on it!!! iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii BUT FIRST, please read the following Editorial Excerpts from some important publications in the United States: New York Times: "In concluding our review of financial organizxations '''''''''''''''''''''''''''''''''''''''' to effect change in the 90's, special attention should be called to 'World Currency Cartel' organization based in California. The members of this organization are amassing hundreds of millions of dollars in the currency market using a very LEGAL method which has NEVER been divulged to the general public. While their purpose is not yet known, their presence has most certainly been felt". NBC Nightly News: "Members of the World Currency Cartel organization, ''''''''''''''''''''''''''''''''''''''''''''' who always keep Low Profile of themselves, are some of the most powerful and wealthiest people in this hemisphere". More Excerpts later, but first let us give you this "Important Announcement": ``````````````````````````````````````````````````````````````````````````````````````````````````````````` We are glad to announce that for the very first time, the World Currency Cartel organization will instruct a LIMITED number of people worldwide on HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY. We will transact the first conversion for you, after that you can quickly and easily do this on your own hundreds or even thousands of times each and every month. TAKE ADVANTAGE OF THIS "SECRET FLAW" ! ================================== It is even more explosive than we have yet disclosed. While currency does fluctuates daily, we can show you HOW TO CONVERT $99 INTO $580 as many times as you want. That means, you will be able to CONVERT $99 American Legal Currency Dollars for $580 OF THE SAME. You can do this as many times as you wish, every day, every week, every month. All very LEGALLY and effortlessly! It only takes about 5 to 10 minutes each time you do this. You can do this from your home, your office or even while travelling. All you need is an access to a phone line and an address. Best of all, you can do this from ANY CITY ON THIS EARTH!!! Again, we must reiterate, anyone can do this and the source is Never-Ending. For as long as the global financial community continues to use different curr- encies with varying exchange rate, this "SECRET FLAW" will exist. '''''''''''''''''''''''''''''''''''''''''''''''''''' As we have said earlier, we will do the first transaction for you and will also show you exactly how to do this on your own over and over again. The amount of exchange you would do each time is entirely up to you. Working just 2 to 10 hours a week, you can soon join the list of Millionaires who do this on a daily basis several times a day. The transaction is so simple that even a high school kid can do it! We at the World Currency Cartel organization would like to see a uniform global currency backed by Gold. But, until then, we will allow a LIMITED number of individuals worldwide to share in the Unlimited Profits provided for by the world currency differentials. We will espouse no more political views nor will we ask you to do so. We can say however, that our parent organization Diamond International benefits greatly by the knowledge being shared as we ourselves alongwith YOU benefit likewise. Your main concern surely will be, how you will benefit. As soon as you become a member, you can start making transanctions from your home, office, by telephone or through the mail and even while travelling. As said earlier, we will do the first transanction for you and will show you exactly how to do this on your own over and over again. No one can stop you from earning hundreds of thousands and even millions of dollars each year for as long as this "SECRET FLAW" exists. '''''''''''''''''''''''''''''''''''''''''''''''''''''''' Don't believe us, experience it for yourself! ================================ Unlike anyone else, we will assure you a great financial freedom and you will add to our quickly growing base of supporters and you may join the list of Millionaires being created using the "SECRET FLAW" in the world currency market. ============== DON'T ENVY US, JOIN US TODAY!!! iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii There is a one time membership fee of only $195.00. BUT, if you join us by AUGUST 10, 1998; which is our company's 2nd Anniversarry date, you can join us for only $35 administrative cost. Your important documents, instructions, contact name & addresses, phone numbers and all other pertinent information will be mailed to you immediately. So, take advantage of our Anniversarry date and join us today. If you are replying AFTER AUGUST 10, 1998; you must pay $195.00 for the membership fee. NO EXCEPTIONS and no more e-mail enquiries please! Upon becoming a member, you promise to keep all infos CONFIDENTIAL. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Should you choose to cancell your membership for any reason, you must return all documents for a refund within 60 days. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IMPORTANT: ***************** 1.....Write your name & mailing address VERY CLEARLY on paper 2..... Below your address, please write your E-mail address (Optional) 3..... At the top Left Hand corner, write the word "New Member" 4..... Attach a CHECK or M.O. for $35 plus $3 for postage & shipping (TOTAL = US$ 38.00) 5..... Please make the Check/M.O. payable to "Diamond Int." and mail to: DIAMOND INTERNATIONAL 9903 SANTA MONICA BLVD; SUITE # 405 BEVERLY HILLS, CA 90212. U.S.A. ( Outside U.S.A. Must add US$10 EXTRA for shipping). US$ FUNDS ONLY! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here are some more Editorial Excerpts: Wall Street : "A discreet group of Americans, operating under the guise of World Currency Cartel have recently begun making rumbles in the world finance market. While at this time, their game is not completely known, they certainly be watched by those making major moves in the currency contracts". Financial Week : "Watch them, monitor them, extract their knowledge and try to become one of them. That is the soundest financial advice we could give to someone". National Business Weekly : "While this reporter has been left in the cold as to its method of operation, we have been able to confirm that World Currency Cartel and its members are literally amassing a great furtune overnight". $$$$$$$$$$$$$$$$$$$$$$$$$$$$ E N D $$$$$$$$$$$$$$$$$$$$$$$$$$$$ From GayWeb at GayWeb.Net Sat Jul 18 11:54:07 1998 From: GayWeb at GayWeb.Net (GayWeb.Net) Date: Sat, 18 Jul 1998 11:54:07 -0700 (PDT) Subject: Request To Submit A URL! Message-ID: <419.435994.48982095GayWeb@GayWeb.Net> Hi Guys I love your site and wanted to see if I could get a link from your web site to our web site. If you would like to have your web site listed at our web site go to http://www.gayweb.net/GayLinks/submit.html and add your web site automatically! For Our Link Please use the information below or feel free to grab our banner at . GayWeb.Net - Web Hosting Services For The Gay Community! http://www.gayweb.net/ Thank You, The GayWeb.Net Staff - Staff at GayWeb.Net From eg_ckw at stu.ust.hk Sat Jul 18 13:56:41 1998 From: eg_ckw at stu.ust.hk (eg_ckw at stu.ust.hk) Date: Sat, 18 Jul 1998 13:56:41 -0700 (PDT) Subject: L I N K ! Message-ID: Please add my site to your pages links, below is the code: APHRODISIACS "REAL" (VIAGRA/GHB/TESTOSTERONE) - THE GREY MARKET WEB MALL Cut and paste this link onto your website. Also, please send us a link to your webpage using the same code. We then will immediately place it on our links page. Our Web-Site is currently recieving approximatley 1000-1500 hits per/day. Thanks, Dan Amato - President SAMSON powerlifting / Bodybuilding co. 1-888-256-6785 (Toll Free Phone Call) email - samson at samson-1.com web address - www.samson-1.com From Friend at nubiankg.com Sat Jul 18 14:36:42 1998 From: Friend at nubiankg.com (Friend at nubiankg.com) Date: Sat, 18 Jul 1998 14:36:42 -0700 (PDT) Subject: " COMPLETE HOME BUSINESS KIT!!" Message-ID: <199807181935.EAA25874@storage.pailing.net> EARN OVER $70,000 A MONTH IN YOUR OWN HOME BASED BUSINESS AND LEGALLY PAY VERY LITTLE TAXES!! This is NOT, I repeat, This is not MLM or Chainletter junk!!! Friend; Those are strong words, I know. But if you're not making at least a TENTH of this every month you need to pay attention because I have an IMPORTANT MESSAGE on how you can make what I'm earning and do it within the next 90 days!! For years I have spun my wheels in various Home Based Business Opportunities with little success. A few MONTHS ago I finally found the key to making bundles of money, right from my home, selling a product everyone in the world needs and wants... INFORMATION! I'm going to help you do the same if you JUST listen to learn how to make over $70,000 a month with one of Hottest Selling reports in the world today! 1) I will set you up in your own Home Based Business for only $50.00! 2) I will GIVE you one of the FASTEST selling products in the world you can reproduce YOURSELF for pennies! 3) I will show you how you can become a Self Publisher & sell one of the most Powerful & Provocative Reports ever written - right from your own home! 4) I will let you keep ALL the money you make selling this product! You don't need to spend thousands of dollars, bear enormous risk and work hundreds of hours a week to start this legitimate business from your home. In a matter of hours you can start working at HOME, from your KITCHEN TABLE, making from $50 to $1,000 a day!! Here is all you will need... #1. The Hottest Selling Publication In The World Today Called Offshore Special Report Number 5599. #2. A Copy Machine Or A Quick Copy Service That Can Duplicate OFS's Offshore Special Report. #3. A Quality Mailing List Or A Local Or National Publication to Run A SIMPLE Four Line Classified Ad! #4. A Mail Box To Collect The Hundreds Of Orders You Will Be Receiving Everyday - Six Days A Week! #5 This letter, which you obviously already have, just save it.. ______________________________________________________________________ The Key To Any Business Success Is To Have A Product Or Service Everyone In The World Needs And Wants. That Product Should Be Inexpensive To Produce & Easy To Ship. You Will Have That Product With OFS's Offshore Special Report Number 5599!! ______________________________________________________________________ OFS's Offshore Special Report Number 5599 will change peoples lives throughout the world by showing them how they can make and save money by removing themselves from the strict rules, regulations and tax burdens their government has imposed on them in the last few years. BRACE YOURSELF - most people are taken aback by what I am about to tell you regarding OFS's Offshore Special Report Number 5599. In OFS's Offshore Special Report Number 5599 You will find out that... UNFAIR & DISCRIMINATORY Divorce settlements are made obsolete in this report! RUTHLESS Creditors will CRINGE if they know you have read this report! BLOOD SUCKING Lawyers May Go Broke By You Reading This Report! HEARTLESS Tax agencies see RED when they read this report! SNEAKY Politicians use the information in this report everyday! Your GREEDY banker does not want you to read this report! This report is BLACKBALLED by Most Government Agencies! BACK STABBING relatives HATE this report! You will also learn & Or Have Access To... Ways POLITICIANS & THE RICH get even richer using TRUSTS and HOW you can do the same! Incorporate offshore - Completely private and away from your government's regulations! Your own secret offshore mailing address - no one will know your real address. Offshore private checking account - deposit money and pay your bills from offshore - no paper trails. Save up to 50% on printing & mail & have your sales material mailed from Jamaica - Are you in the mail order business? Here's a money saving opportunity no one else can offer! Offshore investors - Do you have a viable funding project? Offshore tax havens - legally delay or eliminate taxes - no one knows - not even your government! Offshore IBC's & Trusts - Asset protection from creditors and your government! Offshore Phone answering service - more privacy - more protection! Offshore Self-liquidating loans - if structured right, never needs to be paid back! High yield offshore investment opportunities - Find out how the rich make from 1% to 4% a week on their money - offshore and tax free - you can do the same! Offshore visa card regardless of credit - no paper trails - works in any ATM worldwide! Up to 100% financing on residential and commercial property - Hard to place mortgage sources! Bill consolidation regardless of credit rating - stop those harassing creditors within days using this credit source! Lines of credit up to $15,000 regardless of credit - these credit cards are major bankcards! Secret money - secrecy is a thriving industry - you will have access to these secret money sources! ______________________________________________________________________ With All This Valuable Information In Report number 5599, Do You See Why It's The Hottest Selling Report In The World Today? This Information Is Not Accessible Just Anywhere! Information Like This Can Not Be Found At Your Local Library. It Is Well Worth $50.00 - In Fact Its Well Worth Thousands Of Dollars By Showing People How They Can Save A Hundred Times That Amount In Taxes Alone! The Best Deal Of All Is That You Will Have FULL REPRINTS RIGHTS And The Permission To Sell OFS's Offshore special Report Number 5599. YOU Keep ALL The Money! ______________________________________________________________________ Information is the perfect product. It's easy to reproduce, easy to ship and easy to sell especially when it's as powerful as Report #5599. The market is unlimited in that you can sell Report #5599 to anyone, anyplace in the world. The potential is unlimited because there are billions of people throughout the world who need Report #5599 and are being introduced to Report #5599 this minute. Everyone...I mean everyone needs Report #5599.... People who have a J.O.B. and have "More Month Than Money" - You know "Just over broke" !! People who are self-employed - paying that "Self Employment Tax" and are prime candidates for Law suits from every direction! People who are sick and tired of frivolous law suits - Did you know that in the U.S. there are 2.67 lawyers for every 1,000 people? Most lawyers are HUNGRY and need to sue someone for any reason to survive! Professional people such as doctors, engineers, technicians, architects, stock- brokers, accountants,and YES even lawyers! - You know those people in the HIGHER THAN AVERAGE tax brakets! People who are getting married or are married and plan on living happily ever after - Now back to reality - the U.S. has a divorce rate that exceeds 60% every year! Partners who want to make sure their partnership is a true 50-50 deal now and in the future! People who live in a country that has strict rules and regulations limiting where and how they can run their business and manage their money! People who are retired and at the MERCY of their governments' rules concerning Social Security Income and Medical Benefits! People who WANT to retire but cannot afford to because of lack of income or the rules forced upon them by their government restricting them from receiving a decent income! People who are HIGH audit risks or have been audited by their governments' Dictatorial Tax Agency - You know "Guilty Until Proven Innocent"! People who are paying their government 40% to 60% in taxes and are sick and tired of doing so! People who are close to Bankruptcy and need to find a solution as soon as possible - 20% to 40% of the people in the United States are a paycheck away from Bankruptcy - Yes those people! People who want to make sure their children receive 100% of their inheritance without the government stealing it away! People who need credit and have been turned down through traditional sources, such as their local FRIENDLY bank! People who want to keep their business and personal affairs PRIVATE-Hard to do this day and age with all the computers! People who have the dream of financial independence and want to make thousands a day running their own Home Based Business! You must agree with me there is a tremendous market throughout the world; of people who are breathing and paying taxes which are prime candidates for Report #5599! ____________________________________________________________________ Since We Have Determined The Entire World Is A Prime Candidate For Report #5599 Let Me Show You How Easy It Is To Sell Report# 5599 working From Your Kitchen Table! ______________________________________________________________________ HOLD ON!! How Rude Of Me! I Have Been Talking To You From The beginning of this email, without Officially Introducing Myself! So let me officially introduce myself - I'm one of several OFS Independent Associates making FIVE DIGITS every month! I'll be your sponsor - I'm the person who you will pay the $50.00 to and receive Report# 5599! I'm the person who will change your life forever! I'm the person who wants to see you succeed because if you succeed - I succeed! I want to make sure YOU succeed and see YOU sell hundreds, even thousands of reports every week. The more you sell the more money I can make! Its' TRUE that you keep ALL of the $50.00 when you sell a report. You pay me NOTHING other than the initial $50.00 for the report - Not one single dollar - you keep it all. Sell only 10 reports a week and make $500 - You keep it all! Sell 100 Reports a week and you make $5,000 - You keep it all! Sell 500 Reports a week and make $25,000 - YOU KEEP IT ALL!!! Before I tell you how and why I make money every time you sell a report, let me show you how easy it is to advertise and sell "The Hottest Selling Report In the World" - OFS's Offshore Special Report Number 5599!. This report has been designed to be self-contained with all the marketing concepts on how to sell the report RIGHT INSIDE. In your copy of Report# 5599 you will have access to the following marketing strategies and tools... Sample of proven classified ads you can place in local or national publications that will make you FILTHY RICH! A POWERFUL photo ready copy of a postcard you can put YOUR name & address on and have the $50.00 sent directly to you - AUTOMATICALLY. I will show you how you can Print and Mail that Postcard - FIRST CLASS - for as little as Twelve Cents (U.S) Each! Once you send in your Certificate of Registration from Report#5599 you will also receive... Additional DYNAMITE Classified and Display Ads that will generate hundreds, even thousands, of responses guaranteed to fill your mail box with $50.00 orders! Places to advertise for as little as seven cents (U.S.) Per word reaching over 73,000,000 People! A co-op advertising program sharing the leads and sales generated from National Television Infomercials! A Photo Ready Copy of This ORDER PULLING Sales Letter for YOUR use to mail to the respondents of your ads! Duplicatable Copy of an Audio Cassette Tape of this ORDER PULLING Sales Letter! ______________________________________________________________________ Become An Offshore Broker And Make More Money Than Most Dream Of Helping Others Find And Save Money! OFS's Offshore Special Report Number 5599 has a variety of money making opportunities and the "Offshore Broker" is just one of them! ______________________________________________________________________ I'M NOT GREEDY - I JUST LOVE WHAT MONEY DOES FOR ME & MY FAMILY! As the person who introduced YOU to Report# 5599 I have the opportunity to make over-rides on every Report# 5599 you sell. You see, I'm not happy JUST making $50.00 on the report I sold you. I would like to retire in the near future, sit back and receive hundreds, even thousands, of dollars a week for my past efforts of selling Report# 5599. In Report# 5599 there are additional money-making opportunities by having people establishing what are called International Business Corporations, Asset Protection Trusts(among other Offshore Business Support Services) and I can receive commissions and over-rides having people buying these services whether I personally sell them myself or you sell them through the initial sale of Report# 5599. That's why I'm interested in YOUR success. I want you to become a MILLIONAIRE by selling thousands of reports. Here are a few of the additional money making opportunities contained in Report# 5599 from which I can make over-rides by becoming an "Offshore Broker"... => First, I make $50.00 on Report# 5599(I initally sold to you) in addition... => I can make up to $100 helping people set up an offshore checking account! => I can make up to $240 for every international business corporation established! => I can make up to $1,000 for every trust set up - Domestic or offshore! => I can make up to $50 for every self-liquidating loan manual sold! => I can make up to $100 for every offshore print & mail order! => I can make up to $100 for every offshore visa card established! => I can make up to $100 for everyone who receives a $15,000 Unsecured Line of credit through a Major Bank Credit Card! => If I feel really energetic I can set up and run a TRUST AGENCY in my area and have people sell TRUSTS for me (somewhat like an Insurance Agency)! The money-making potential is tremendous by hiring several people who work in my area. I'm your sponsor and because of my efforts in selling YOU Report# 5599, I have the opportunity to make Lifetime Residuals from your efforts in selling Report# 5599 to others! I'm truly amazed at the marketing concept offered through OFS's Offshore Special Report Number 5599. The concept is so simple and it is COMPLETELY DUPLICATABLE! By making sure YOU MAKE thousands of dollars a week I'm going to get FILTHY STINKING RICH off your success! If it seems like I am BRAGGING and RUBBING it in about how I'm going to make bundles of money from your efforts it's TRUE!! You should be as EXCITED as I am because Report# 5599 allows YOU to DUPLICATE MY EFFORTS! When you sell a report to others you will then be in my position - to make ALL the over-rides and commissions I have just talked about - on those who then sell Report# 5599! ______________________________________________________________________ The Following Questions & Answers are designed to answer most of the concerns you may have. This should give you enough information to determine if OFS's Offshore Special Report# 5599 is your tool for making thousands of dollars a week in a home based business... ______________________________________________________________________ Q. Do I have to personally sell the report & the other offshore business support services to people who respond to my ads? A. NO! This is really a two fold question. Let's talk about the selling of Report# 5599 first. All you have to do is place an ad, mail the postcards or send bulk email. If you place an ad send the respondent THIS SALES LETTER and let THIS SALES LETTER do the rest for you - no need to talk to anyone!! If you mail the postcards or use bulk emailing your job is done! The postcard will ask the respondent to send $50.00 to your mailing address. Email will work for you if you send it to as many people as you can. If you decide to become an Offshore Broker and qualify to receive over-rides and commission on the Offshore Business Support Services the PARENT COMPANY will do the selling for you if you wish. This is a "NO BRAINER" and can be as simple or as complicated as you want to make it... Talk to the people if you wish or don't - Report# 5599 sells itself! Q. How many hours a week will I have to devote to my business? A. One to sixty hours a week! Here's a question I will answer with a question...How much money do you want to make? Common sense says the more ads you run and the more mailings you do the more money you will make! The statistics show that for every 100 responses you receive from your ads, and you mail THIS SALES LETTER, you will sell five to ten reports making you $250.00 to $500.00 (US). Your ad responses will vary depending on the place you advertise and the circulation of the publication. The more ads you run or the more emails you send out the more time you will need to devote to your Home Based Business. Q. Just how much money will I need to start my home based business? A. $50.00! Yeah I know - You're thinking you will need money for ads and mailing. Well - I've had people start with $50.00 (U.S) and make ten copies of the report and sold them to their associates and friends giving them $500.00(US). That gave them enough money to start running ads and to buy stamps. In looking at all the money making opportunities offered in the world today I really don't think you can get started for any less than $50.00 and have a BETTER LEGITIMATE money-making opportunity than the one offered in Report# 5599! Q. If I have additional questions who will answer them for me? A. I will or the parent company will! No package of information, no matter how complete, can possibly answer every question that may come up. I do not want you to lose money seeking out the answers. I want you to succeed! You will receive a phone number in Report# 5599 where you can either reach me or someone from the parent company for any question or help you need! ______________________________________________________________________ Here's a valuable bonus for ordering within 5 days....Your's absolutely FREE!! ______________________________________________________________________ I have persuaded the parent company - Offshore Financial Services, Ltd. - to give you their OFS Offshore Business Journal - Volume I - FREE OF CHARGE - as a bonus for ordering Report# 5599 within 5 days of receiving this email. You will receive the Journal when you send in your "Certificate of Registration" found in the report. The information in this Journal is priceless and can NOT be found anywhere but RIGHT HERE!! Here's a sample of that information: Bonus #1 OFS's Offshore Business Journal >Your IRS returns are suppose to be private - Not so! > Funds through on-line computer services! > Raising capital without borrowing from the bank! > How to get medicines before they're approved by the FDA! > Airlines will handle your baggage with special care if you know the secret! > You can borrow money from your IRA. Just don't call it a loan > How to get free subscriptions to over 60 magazines! > Establish AAA credit in 30 days! > Why Americans are mad as hell! > Sources for quick cash loans. Bonus #2 Report #5599 Support Package. > How to reach over 73,000,000 people for as little as 7 cents per word! > How to set up voice mail and never talk to anyone who responds to your ads. > To use or not to use a mailing list? > How to receive free names to mail to. > How to mail your postcards & sales flyers "First Class" for a low as 12 cents each- includes printing! > How to collect $5 from people who want to receive this sales letter! Bonus #3 Bulk-Emailer's Dream Package. By ordering within the next 5 days, you will also receive a floppy disk packed full of online marketing tips from two of the nation's top electronic marketers. I have previously offered this disk for $79.95, but by purchasing Report #5599 through this special offer within the next 5 days, it will be yours for FREE!! I will also include another floppy disk with over 150 Hot Money Making reports that you can sell together or individually! Bulk-email has been proven to be the most effective way to market on the internet. By ordering within the next 5 days; I will include a program that collects names from aol chat rooms at a maximum rate of over 10,000 per Hour!! You will receive high response rates marketing to these fresh names that you have collected yourself. Now all you will need is a bulk-email program, you will receive a link where you can download a free fully working demonstration bulk- email program that will allow you to begin earning profits the day you receive my package. You will not need to be concerned with losing your ISP because I will show you exactly how to send hundreds of thousands of emails per day while cloaking your ISP's mail server and your identity at the same time!! STOP THE PRESSES!!, I'm not finished giving away Free Extras yet! I have just learned of a Brand New ISP that is offering FREE ACCESS!!! That's right TOTALLY FREE unlimited internet access!! If your Order is received via Fax within the next 24HRS I will tell you how to sign up for this free service which is a $240/yr value ORDER NOW!! With all that I will be providing you, your success is guaranteed. You will not receive this offer again; by ordering Report #5599 within the next 5 days all of the above information will be yours for a measly US$50.00. ORDER TODAY!! Why am I giving away so much for so little? Good question... It is my personal belief that any responsible hardworking person can achieve financial security given the proper opportunity and information.. The Rich have kept opportunities and information to themselves that would allow anyone of us to achieve unparalleled success easily. That is why I am giving away a solid product, plus all the information needed to successfully sell that product, for only US$50.00 to anyone with enough interest and patience to read this letter. Sincerely, YOUR SPONSOR OFS Independent Associate RISK FREE GUARANTEE If you are not completely satisfied after reading Report #5599 and its Support Package simply return them both within 120 Days for a full refund. No questions asked. You keep the floppy disks, Business Journal and Dream Package. You have NOTHING to risk and a FORTUNE to make. Here's your RISK FREE opportunity to change your financial situation forever!! {cut}========================================================== Special Report #5599 Order Form ___ Please rush me a copy of OFS's Offshore Special Report# 5599 and all Bonuses. I understand I have Full Reprint Rights and can sell Report# 5599 for $50.00 (U.S.) Keeping ALL THE MONEY! ___ I have enclosed a CHECK /MONEY ORDER for $50.00 Please mail the report to (PLEASE PRINT CLEARLY) Your Name: _______________________________________________________________ Address: __________________________________________________________________ City: ______________________________________________________________________ State: ______ Zip: ________________ Phone: (___) ______-___________ Fax: (___) ______-___________ Email Address ___________________________ Mail This form & The check or money order for US$50.00 to the Address below: Dynamic Communications P.O. Box 373-356 Decatur, GA 30037-3356 Fax: (770) 234-4241 Phone: (404) 274-8669 Or, if you prefer, you may also pay by faxing your credit card information or copy of your check to the number above along with the information requested on the order form. Please Note: If ordering by credit card be sure to include card type, number and expiration date. After dialing you will be prompted to press 2 for fax. Sorry, Report #5599 is too big for us to email it to you, we will send it Priority Mail within 24 hrs of receipt of your order. From stuffed at stuffed.net Sat Jul 18 14:41:35 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sat, 18 Jul 1998 14:41:35 -0700 (PDT) Subject: I had sex with Bigfoot/Married to the slob Message-ID: <19980718205409.6227.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/18/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From howree at cable.navy.mil Sun Jul 19 04:35:13 1998 From: howree at cable.navy.mil (Reeza!) Date: Sun, 19 Jul 1998 04:35:13 -0700 (PDT) Subject: Request To Be Phlamed In-Reply-To: <419.435994.48982095GayWeb@GayWeb.Net> Message-ID: <3.0.5.32.19980719203408.00838a50@205.83.192.13> At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote: >Hi Guys GO THE FUCK AWAY. NOW. From Life.Without.Debt Sun Jul 19 05:41:51 1998 From: Life.Without.Debt (Life.Without.Debt) Date: Sun, 19 Jul 1998 05:41:51 -0700 (PDT) Subject: No Subject Message-ID: <199807191241.FAA07929@toad.com> Get Out Of Debt For Life Program ****************************************************** If I have offended you in any way I apoligize. This list is meant for people who are interested in making money or business opportunities. Simply reply with Remove and our software will block you from further mailings!! **************************************************** Hello, I am the mailer of this invitation, and just one of the many people in the Easy Money, Compound Leveraging, Educational Program, who is determined to help YOU become financially independent! ..... Have you ever wished that you could find a money creating, mail order program that is simple enough, and cheap enough to promote, that all you need to do, is get in, tell a few friends about it and get Rich Quick, without leaving the comfort of your own home? Well, my friend, .................You have finally found it! I recently became involved in this plan, by responding to a flyer just like the one below this letter. I spent only $5 out of my pocket to get started, and began receiving envelopes with money inside them, just a few days after entering the program. ... I could not believe my eyes, at first, because I had not even had time to tell anyone about the program, so I dug through the pile of other mail order junk on my desk, and I found the information on the Life Without Debt Plan, that I had received the previous week and I Re-read every word trying to find a catch, because I was sure there must be one! Guess What,!!! The catch is there is no catch! ... I also called the person who mailed me the plan, to ask how this happened so fast! He explained the plan, as best he could, but said he did not know much, except that he to was receiving money in the mail almost daily, yet he had only started advertising, by mailing a few flyers each week. ..... He told me to advance to the next steps as instructed in the information kit, because that was what he had done, and my envelopes of money would have larger sums in them, from that point on! .. I advanced to the additional plans, and behold, believe it or not, the envelopes of money come to my mail box daily, and they get fatter and fatter, every single day, with more money in each envelope! .. I know the plan can work for YOU too! Give it a try! You have nothing to loose and everything to gain! ...Return your completed Form Below, and $5 cash, to the computer center as soon as possible, so the data entry folks can place some of the folks responding to my mailings under you! ..They only accept cash because they turn it around immediately and send it out to the people already in the program. They don't have time to deal with cashing checks and tracking down bad ones which is time consuming and costly. ......... If you need to contact me to ask questions, Email me at iglooy at postmaster.co.uk ... I will be happy to answer any question you have, About this fantastic opportunity, If I can, although I'm new to the program, and to tell you the truth, I don't care how it works, because I know it works, Even if I don't understand everything! Lord Knows, What would happen, if I knew how it works!! Sincerely, John Ball ---------------------------------------------------------------- NO SPONSORING REQUIRED!!!!! "Life Without Debt" Easy Money Educational Training Course For 1998 ----------------------------------------------------------------- WE SHOW YOU HOW TO: ***Compound $5 weekly into $780 weekly to start! ***Then we show you how to compound $25 into $3,900 per week! ***Compound Leverage Your Way to Complete Financial Independence! ***Eliminate Your Debts From Creditors and Banks! Simply print out and return this letter with $5 CASH ONLY, In an envelope. We will then mail our "Life Without Debt", INSTRUCTION GUIDE to you and place you into our $5 Easy Money Plan, to illustrate how the plan works! IF MONEY IS ALL YOU WANT, That's easy! This program is all about MONEY! It Appeals to the Masses.... *No Sponsoring Required! *Pays out 80% PLUS on all levels! *Teaches you how to take control of your finances And get out of debt FAST! Topics of the educational package Cover Money, Credit, Debt, Taxes, Federal Reserve, Corruption In Administrative Agencies of Government, Corruption in the courts, And the U.C.C. "UNIFORM COMMERCIAL CODE for THEFT BY THE GOVERNMENT" *SOLID, 9-year-old debt free company, Has an established Customer base of over75,000+! *Has an excellent support system to guide you, step by step Through the pay plans! *Best of all, you can GET STARTED on an Affordable "Shoestring Budget" of only $5 weekly! Then advance through the Entire system at your own pace. Let us HELP you get on an Extra income path without leaving Your "Comfort Zone" Get Started Today! Print out this letter, complete the details below and mail this letter along with $5 CASH ONLY to: Computer center P.O. BOX 1511 Grapevine, Texas 76051 NOTE: MEMBERS RESIDING OUTSIDE OF U.S.A MUST SEND $10.00 ....Please send CASH ONLY, as it is used to pay the upline daily, and ILLUSTRATE HOW the plan works! NO CHECKS! Your Name:______________________________________________________ Address:________________________________________________________ City:____________________ State:________ Zip______________ Phone#:________________ Mailers I.D.# 022 05 2198 1 John Ball ----------------------------------------------------------------- _________________________________________________________ From jya at pipeline.com Sun Jul 19 07:44:19 1998 From: jya at pipeline.com (John Young) Date: Sun, 19 Jul 1998 07:44:19 -0700 (PDT) Subject: `Vulis terminator' full of crap (Re: net.cop revs up again) In-Reply-To: <199807182302.AAA15438@server.eternity.org> Message-ID: <199807191444.KAA23892@dewdrop2.mindspring.com> This is fact, not the media kind: I've tried to reach Dimitri by phone a few times since Termination, indeed Mr. T. helped me find a working number (forwarded to his own). A lady sounding like Guy there took my name, number and request for DM to call. But he hasn't. He just keeps posting as Guy, as Tim, as Nuri, muliple Adams, Johns, Jims, Peters, anons, and so on, each of the imposters posing as others. Remember this fact, Tim/Dimitri were in cahoots to nuke the legacy toaderpunks from day one, pretending to be halves of evil twins. (Note the overlapping name spelling.) Still, shifting back to media, the five of us in Manhattan -- Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds more don't openly affinity) hate each other's guts with infinite passion as is the duty of citizens competing for dole here, especially since 20 millions of us are on the dole, thank you Mr. Roosevelt for legalizing taxing/extoriting/wall streeting the rest of the globe beyond the Hudson and Fire Island, from itzy-ritzy bankers to scum of the media sapoid. Primarily, though, our full-time role is to hide from each other and the vengeful planet, have our machines say things like, speak to my agent, my lawyer, my mate, then flip a switch to the voice of the referent saying things like, he's not in, he's traveling, he's away, his son's just been killed skiing, he'll get back, cackle like Freddie. Shifting back to fact: Dimitri's lady who took my name was: Dimitri, Guy, Perry, Duncan, Ray, any of Dimitri's manifold enemies and friends, any of you. Who knows who's here? Nothing I've seen proves cypherpunks exists: I've seen Ray twice and he wasn't the same. I've seen Duncan twice and he wasn't the same. Neither recognized me either. We've all introduced ourselves to Jim Kallstrom as one another, and did the same to several of Kallstrom's stand-ins. Mark this: "Perry Metzger" for certain is non-existent, it's only a mail drop, a chalk mark, a can by the road, a highly paid fictional security scam: Pay or plonk. Cooped cops and holed-up criminals do, up the kazoo. I say for a fact the crypto/cypherpunk/cops/spooks game's one bird doing a solo dance. Who that bird is, works for, remains to be reported reliably: an impossibility by definition. 100 to 1 it's a rogue bot, buried in a bridge caisson, powered by tidal flow or planetary rotation, unstoppable until earth freezes, burns or implodes to infinite deception. Dimitri was not terminated, can't be, he never was, like the rest of us highly classified phantasms. Adam Back got the story right, he's exchanging messages with a bot mirroring his inner evil, call that Tim, call it Dimitri, he'll call back as the One True Terminator you don't want to meet, ever, but will. From jdhays at castle.net Sun Jul 19 07:45:20 1998 From: jdhays at castle.net (John D. Hays) Date: Sun, 19 Jul 1998 07:45:20 -0700 (PDT) Subject: ZDTV and CNN coverage of DES Cracker Message-ID: <3.0.3.32.19980719114335.0079eb20@mail.castle.net> >Date: Sat, 18 Jul 1998 22:06:31 -0400 >To: John Gilmore >From: "John D. Hays" <@> >Subject: Re: ZDTV and CNN coverage of DES Cracker >In-Reply-To: <199807180011.RAA02044 at toad.com> > >At 05:11 PM 7/17/98 -0700, you wrote: >>ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on >>their "Silicon Spin" program today. >> >>CNN took pictures earlier today, I don't know when they'll use them. >> > > Congratulations to you and the EFF. I caught some of Silicon Spin. Everyone seemed to agree that DES was weak and the government is going about things all wrong. But CNN doesn't get it. > >To paraphrase: >"A popular method of scrambling data was dealt a blow today... by a specially built cracking machine... a BANKER was quoted as admonishing these efforts as reckless for it will only benefit _criminals_." > > I don't remember it verbatim but I remember the impression I got from CNN. Now, this was only a news brief, not a report or a panel, but it illustrates the ignorance (or bias) of big media. > > They never said "encryption". Instead referring to it as "method of scrambling data". Encryption is a geeky Big Word that CNN thinks normal people won't know. They completely ignored the social and political implications of cracking DES. Using encryption to secure your correspondence, for authentication, or to protect Freedom and Liberty are geeky Big Concepts that CNN thinks normal people won't understand. > > Now I don't expect an in-depth report on a complex issue in thirty seconds. But to completely ignore the real issues and give us a half assed uncited falsehood? Did anyone see any good coverage of the DES crack on CNN, ABC, NBC or any other big corporate news program? > > From lisa at yahoo.com Sun Jul 19 08:21:50 1998 From: lisa at yahoo.com (lisa at yahoo.com) Date: Sun, 19 Jul 1998 08:21:50 -0700 (PDT) Subject: HOT FREE PHONESEXrere Message-ID: <199807191527.PAA15081@uecnet.uecnet.com> hi baby! CALL +1-(767)-445-2199 For HOT HOT PHONE SEX!!! Get Off With Our Live Teen Sluts, HOT ORGY PHONE SEX! CALL OUR FREE PHONE SEX SERVICE NOW! 24 hrs / 7 Days NO CREDITCARD, 100% FREE!! Don't Make Me WAIT! CALL NOW! CALL +1-(767)455-2199 NOW! From chrisharwig at hetnet.nl Sun Jul 19 09:36:18 1998 From: chrisharwig at hetnet.nl (kryz) Date: Sun, 19 Jul 1998 09:36:18 -0700 (PDT) Subject: No Subject Message-ID: hQEMAw0xW9bpUfQRAQgAjPWC/fQ0S9OllvrvE3LXM2avlc0TyhJlu25PGZBV7Gva KsnbzE3dAh9fYc6oHg6CGAgYZDbVU/gK0s/v7j3Skri10L63A/YnxdqVd1LMJIzb 9ozXbZl+nAu5ocbEvOvs1YJGBLXkadHePzzpDEhW0ijDBJGeNnU8dlfnPhQZLTJj s+NcjTPE1bX0Vsz3Z6kG/Joo0xDLZz4lxq0LW98UFaCy3zHV0Zs0HimEIx7pd/kw hKiK8R7OU9lL/P8kOfNIF73ij8+bGV+aMj1zDLfHV2DMOin4qrmOy0LMqv5v36TX iMc7Q6XZfZLis7t817/Xvw5IvPzG1iSnhC9g/RV9HaYAAAEL/2lnKxiBaV3eyYsh rKaJ7DN4KRISePHuTCUgpyp1y1f2yH/6RkttlLqKGdcKu1seo9EDaliCr0BA5MXW rhwMoXVtCnZJY1htRZuOLOfCbFHIQ7eeBfhff8l3mWKHCrAsgNgXAVVtFNAVOgHY np9KdGOgcs7iRBVuoBNnFGCXDOXyCSxvwKbIIegCPwYXvt4FNkVY69gbKQbJyi0E hqDPU+ESRqlTzZ82RM8lvxRFfEbWJ4OgqQU2E4Y80gxCHUVcFJZ9nhvqm77pxvcO YCLLjtcLeyZd40a5xzMn8szFTx1J4EXsmlpmQ2mB0+4xdLTGmBmtwPQiR/fzsspT cnQCq1lpQMYygBMmmF8j ++U59 From lreed at west.cscwc.pima.edu Sun Jul 19 09:48:02 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 19 Jul 1998 09:48:02 -0700 (PDT) Subject: Leftist Nutly News - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9683.02D72A40.1@west.cscwc.pima.edu> Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!! __________________________________________________ The Royal Canadian Mounted Police have a major, major problem on their hands. They finally got their man, and now have absofuckinglutely no idea what to do with HimOrHer. Well...*two* major problems, actually. They've started believing their own press--a deadly step which leads down a long, torturous path of, in this case, mutually assured nuclear individual and group self-destruction. Uuhhh...make that 'two-and-a-half' major problems. (I forgot to 'carry the two,' realized that things didn't quite add up in the reader's mind, and realized that there is a natural-born corollary to the mathematically logical theorem I have proposed above, which I shall henceforth erudite to you.) [EditBore's (Left) Nut: The AuthWhore, ALegendInHisOwnSlime as a result of his earthly eruditions and epistles on everything under the sun (not to mention the son) as a result of his rather questionable contributions to the Bienfait Nutly News and The True Story of the InterNet manuscripts, also happens to be, by an amazing stroke of coincidence noted by Stan SequinWearer recently, a MathematicalLegendInHisOwnMind as the result of imagining that she is a respected member of an internationally recognized elit/e/ist group of renowned mathematical military genius members of a ThreeNumberedAgencyToBeDividedLater which is uncommonly known as the CypherPunks Distributed Nuts. In all modesty (since I am writing this myself, only as if in the third person--an old writer's trick...), the Arthur is indeed one of the formost authorities of our era on the 'New Age Math,' which is an Einsteinian Fusion of LogicAndReason with a BeerSteinIan QuantumLeap beyond any semblance of normal propriety and/or common-sense, in which one's traditional mathematical results on the BlackBoard are combined with a psychic reading of the results of mixing last night's pizza with a morning half-finished-stale-beer-with-a-butt-in-it, now residing in the WhitePorcelainBowl, in order to be able to offer firm proof to the President's Commission On Propping Up A Decaying American Educational System that the FoolsOn TheHill can safely legislate the value of Pi to be 3.0, in order to avoid discrimination against the Mathematically Challenged, without adversely affecting "NATIONAL SECURIT" , since all circles, save one, can be forced back into the shape that the Judo/ Christian God of Moses, Abraham, and Lot's wife, had intended for them, by a conscientiously applied plan of good oral hygene and the abandonment of any further pretense of paying the slightest bit of attention to the HumanRightsWhichBelong ToEveryIndividualOnTheFaceOfTheEarthAsANaturalBirthrightAnd NotAsAResultOfBeingAllegedlyBESTOWEDUPONTHEMByWordsWritten OnAPieceOfParchment. The Author, in HisOrHer latest work, "What Value of Pie Does A 500 Pound Gorilla Get For Breakfast?"--free to the first three million subscribers to this weekend's InterNet Pay Per View MultiMedia Extravaganza, where HeOrShe masturbates, for the first time, at the age of 93, for a virtually live audience of sicko's and perverts--explains that many of the underprivileged youth of today have pawned their calculators to buy crack-pipes, and their only education in mathematical sciences has come from their attorney's attempts to explain 'five to ten' to them.] Like I was saying, before I was so *rudely* interrupted... The second half of the second problem is that, not only are the RCMP in mortal danger of believing their own press, but they also face the even more mortal danger (A coward dies a thousand deaths--but more on *that* later...) of the reverse parallax corollary of their ArchieEnemy, the Bienfait Nutly Noose, being found believable, despite the OneManFullCourtPress's constant claims of conniving, conspiratorial lunacy fed by a wide variety of widely recognized atmospheric brainwave disturbances which are caused by such things as solar flare-ups, moon phases, and astroids approaching the earth with space ships hiding behind them (so it was a comet...so sue me!), resulting in HeOrShe having to fill in the parts of the MessagesFromMars that were not entirely legible due to the Voices screaming inside HisOrHer head. In short, the poor dumb bastards who bought into the Dudley DoRight Mythology (TM), only to find themselves becoming trained animals in a MusicalRide that embodied one Horse'sAss sitting atop another one and going in circles where the Music had no Magic... Well, let's just say that, somewhere deep inside, the poor buggers recognize that, no matter how many of them there are, or how many guns they acquire (while hiding the citizen's guns under a Rock), being trained to obey, instead of think, may prove to be their ultimate undoing. What I am getting at, here, is that there is undoubtedly not a single member of the RoyalHorseHumpers who has crossed my path in the last half-decade who has not taken one look at me and instinctively realized that I needed to be put down like a filthy dog, despite the admonishons of their superiors that the all-important Image (TM) must be maintained, for appearances sake. Now...it is too late. A member of a Canadian mainstream community cult known as the Estevanites, Brad Parker (no relation to himself), once replied, upon being asked his name by a member the Royal HorseHumpers, "Fuck ou! My name is Fuck ou!" Being, at the time, your AverageCanadianWhiteBoyPussy, it took me years to realize that, far from being a beligerant, ignorant fool, too stupid to forsee the consequences of his actions, Brad had astutely assessed the situation which he found himself in, and realized that being taken to jail, instead of being severly beaten and left lying in a back alley, was the superior option only when one did not have a friend who had promised to meet him at home with a case of beer after the bars closed. He made the right choice... {Let's have a big, big round of applause for broken, bleeding Brad, an inspiration to *serious* drinkers everywhere, who are not only in it for the pissing away of their money and the lack of glory (or even respect, for that matter).} Well, to make a long story even incredibly longer, the LittleFucker that the RCMP, Canadian Customs and Immigration and the Canadian Justice System threatened to ButtHole (TM) at the tender age of five ("If it threatens the life of a single child..."), finally wised-up, and became the BigFuckou! {Change the name on my warrants, boys and girls, because I have my Johnson so far up your butts that I'm going to be able to tell you *how* I fucked you and *why* I fucked you, and there's not a Dogammed thing you can do about it.} Details? ou want *details*? Gee, gang, I'm a little thirsty, and I think I'll take a break, have a couple of beers and relax. Having had the Government's Richard up my butt for a half-century, I don't think there's any big rush for me to get my nut, now that it's *my* turn... [ Important Announcement For Law Enforcement Agencies: "James Bell polls for *you*..." ] From stuffed at stuffed.net Sun Jul 19 10:57:34 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sun, 19 Jul 1998 10:57:34 -0700 (PDT) Subject: Tit's a victory: Twany Peaks not a boob basher/White House zombie sex Message-ID: <19980719170949.16692.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/19/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From attila at hun.org Sun Jul 19 12:29:13 1998 From: attila at hun.org (attila) Date: Sun, 19 Jul 1998 12:29:13 -0700 (PDT) Subject: Covert Access to Data and ID In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com> Message-ID: there is no such word as "can not" in terms of covert surveillance; however, if the method is to be universal, the gubmnt will need to 1. enforce drastic standardization of hardware systems if the logging functions are to be effective. this might Intel rather happy and Intel is the type of organization which would perform the function with glee, if they are not already developing it. for instance, I just installed a ATX-BX-AGP motherboard which consists of a "few" VLSI support chips for the SLot 1 processor: PCI, PCI to ISA, IDE, USB, and power management (5 chips, all Intel) plus adaptec SCSI and Intel's 100M ethernet. it would be easy enough to embed the keystroke function since the PC98 spec calls for total implementation of the USB controlled. 2. enforce drastic standardization of operating systems to support the hardware --which makes MickeySnot ideal in so much as they do not publish source code. my question would be whether or not Gate$ was doing the SIGINT or the government. embedding WIPO is a wet dream on the part of the same publishers which are trying to ram home the draconian M$ software license in the UCC revisions up for vote in Cleveland later this month. why M$? they are almost universal. I, for one, refuse to run _anything_ branded by Gate$ encroaching sloth --never have, never will. I can see the government trying to slip their code into freeBSD distributions --welcome to the anarchists... likewise, Linux, netBSD, BSDI, etc. and, I would say the government's interest is significantly more advanced for the known dedicated hackers, operating systems tweakers, and other assorted non-conformists who do not subscribe to M$. bottom line is a proprietary OS --and getting everyone to run it --good luck, other than by unenforcable fiat; there will be ways to circumvent any clamp although the feds will certainly thin our ranks. 3. provide some means of transparently piggy-backing the information (presumably in raw form) on the network. again, the cooperation of the operating system is required; not everyone is on line, and many connections are slow. if the data collection is limited to keystokes only, the data require- ment is relatively low, but the holding tank is still required. the alternative is to short range transmit the information and wire the neighborhoods with the receivers. one of their objective is to have everyone instantly "tappable". 4. establish data collection centers 60 million current net users --consider the data quantity 5. establish prescreen and select for analysis data processing consider the intelligence required 6. analysis software NSA may try to scan all international traffic in real time with key word recognition, etc. but keystroke, including dealing with editing, mistakes, corrections, etc, which confuse the input? bottom line: we aint there yet. however, a van outside in the street can pick up the signals from hundreds of machines. [ lost most of my recent files on a tape crash --there was a project at OxBridge which generated hash interferance which made scanning rather difficult - more effective than Tempest --can anyone refresh the pointer? ] there is no question the government expects intrusive technology. the burrow-critters are running on high-octane paranoia and they intend to preserve the status quo of governing without our consent. their historical means of controlling the news is running out of headroom; the internet gossip lines are faster than their reaction times. I certainly would not want to say the feds could not initiate and/or enforce any or all of the above requirements, but there is a point where even the American sloths will rise up and start the process of creating martyrs for the cause. a more probable approach is to limit the desemination of information by "known" opponents of government actions (trivial by blocking their network access once the control the ISPs; and maybe a few high profile trials with lead jacket incarcerations to scare off some of the less vociferous (dont say they cant jail us all). lastly, I look at it this way: for every measure, there is a counter- measure. if I can not determine the existence of SIGINT transmissions from my hardware/software, I'll be hanging up my spurs. after all, listening to gubmnt propoganda in both ears is redundent, who needs it? attila out... _________ On Wed, 8 Jul 1998, John Young wrote: >Dave Emery's remarks on government access to >keystrokes (proposed by the NYT as an alternative >to GAK) points to the probable increase of intrusive >devices to counter increasing use of encryption >and other privacy and anonymity measures. > >This topic comes up here now and then, with >mentions of a slew of methods to protect privacy of >data during transmission or storage. But the possibility >of logging the initial creation or manipulation of data is >not as often discussed, nor how to tie a person to >the data, as now being asked in legal and law >enforcement fora to identify, catch, convict and >jail computer culprits. > >That the NYT floated the idea surely means someone >is testing public response to an idea that seems to >be more intrusive than GAK: the logging of initial >data and any manipulation of it, prior to encrypting, >and maybe including a means to link the actions to >the user. > >If this is logging (and related retrieval) is done covertly, >encryption could thereby become a falsely reassuring >cloak of privacy. > >Dave thinks devices like these are surely in the works, >and he can say more about their sponsors, technologies >and implementations. > >One driving force, as he previously noted, is the desire >for devices to assure copyright protection, backed by the >WIPO treaty, which now being considered for approval. >See the House report on it at: > > http://jya.com/hr105-551.txt (141K) > >And the EFF and ACLU opposition to it: > > hr2281-opp.htm > >Other forces, though, are employers who want to snoop, >law enforcement, government, marketers, actually the >same groups who dislike privacy protection measures, >but often prefer to snoop covertly while loudly proclaiming >support for privacy. > >Thus, the more general question Dave has raised is how >widespread is the development and implementation of >technolgies for covert surveillance on the Web and in >desktop boxes -- happily spreading quietly while attention >is focussed on the very encryption which it will circumvent? > >And what are these devices, or what might they be, what >might be countermeasures and who might be working for >and against them. SDA must have insights to share. > >Over to Dave Emery and those more knowledgeable. > >For those who missed his earlier message we've put it, with a >follow-up at: > > http://jya.com/gaks-de.htm > > > __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From JackeI466 at aol.com Sun Jul 19 13:19:29 1998 From: JackeI466 at aol.com (JackeI466 at aol.com) Date: Sun, 19 Jul 1998 13:19:29 -0700 (PDT) Subject: send me the book Message-ID: send me the book (e/mail me back From honig at m7.sprynet.com Sun Jul 19 14:20:55 1998 From: honig at m7.sprynet.com (David Honig) Date: Sun, 19 Jul 1998 14:20:55 -0700 (PDT) Subject: IDEA chip evaluation? Message-ID: <3.0.5.32.19980719142031.007c2d60@m7.sprynet.com> Anyone actually received the IDEA chip eval board from ASCOM? How long does this take? honig at alum.mit.edu Speech is not protected simply because we write it in a language Federal Judge Gwin on the Bernstein case From ceoyoung at mail.atl.bellsouth.net Sun Jul 19 20:42:23 1998 From: ceoyoung at mail.atl.bellsouth.net (Rahsaan Young) Date: Sun, 19 Jul 1998 20:42:23 -0700 (PDT) Subject: magic codes Message-ID: <35B2BC74.3662@mail.atl.bellsouth.net> looking for magic codes for cellphones know of any please send From customerservice at amesperf.com Sun Jul 19 23:07:34 1998 From: customerservice at amesperf.com (Customer Service) Date: Sun, 19 Jul 1998 23:07:34 -0700 (PDT) Subject: Ames Performance Engineering: Catalog Message-ID: <199807200604.CAA13057@crossroads.monad.net> On Monday, July 20, 1998 at 02:04:27 you responded to our Catalog form. Thank you for requesting our catalog Regards, Customer Service mailto:customerservice at amesperf.com --------------------------------------------------------------------------- Ames Performance OnLine - http://www.amesperf.com From Masterweb at mail.kc.net Mon Jul 20 00:10:13 1998 From: Masterweb at mail.kc.net (Masterweb at mail.kc.net) Date: Mon, 20 Jul 1998 00:10:13 -0700 (PDT) Subject: AGGRESSIVE INVESTING Message-ID: <<199807160000.UAA01620@sdanet.org> Announcing - An exciting, new service that will provide you with information on dynamic new companies that have just gone public and could very well become tomorrows hot stocks. There is no cost or obligation - - all we need is your e-mail address. To start your FREE subscription call this toll-free 24 hour phone number now and leave your e-mail address on the tape: 800-935-5171 extension 3157 From lreed at west.cscwc.pima.edu Mon Jul 20 01:34:07 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 20 Jul 1998 01:34:07 -0700 (PDT) Subject: BackDoors - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9707.23105320.3@west.cscwc.pima.edu> I've Got BackDoors Coming Out My AssHole! - SAHMD!!! ____________________________________________________ I am not a sick, degenerate asshole who likes to beat up people in wheelchairs, although I have been known to kick the ass of a one-armed man, given the fact that he may well be the guy who murdered Richard Kimble's wife... Thus, I feel it incumbent upon myself to give an honest account of my life of crime, so that the Law Enfarcement Offals and Persecuting Attorneys who have, so far failed miserably over the years in bringing me to Officially Recognized Justice (TM), will have a fighting chance of throwing my sorry ass in a dark hole until Hell freezes over, by portraying me as the sorry, pathetic, psychotic, monstrous, criminal, scum-bag piece of shit that I am, in Reality (TM). First, however, I would like to insert an totally upaid advertisement for the DigitalRainbowRevolutionaryFamily gathering at the Plaza Hotel in Lost Wages at the end of July (I think). It's some kind of hacker's conference (I think), and they have a Spot The Narc (or somesuch) contest (I think) during the conference. I have all the details on a faded copy of an email to the CypherPunks list that I printed out, but all of my valueable research material is currently fused together, due to it being hastily thrown into the back of my truck, and then rained on, during my Fright From Fleedom Japanese Toulist Tlap that was inspired by my receiving indications that the abundant overgrowth that Government Authorities intended to mow down was not, as I had thought, in my back yard, but on my butt. [WAS: Stick Around, Pal, And our Ass Is Grass!] Anyway, despite the fact that I cannot even remember the proper name or date of the conference (although I have no problem remembering the name of the Plaza Hotel, since it is the home of the Penny Slot Machines which enable one to gamble feverishly for hours with the loose change they have scraped off the floor of their vehicle, after having lost all the money they got by pawning their grandmother's wedding ring), I have made arrangements, during my recent Soft Kmart Tour Of America, to have the winner of the conference's Spot The Snark contest awarded a highly polished and fully functional BackDoor into the Royal Canadian Mounted Police computer system. The award, to be presented by the Offical Mascot of the Spot The Snark contest, "Spot, the Snipe," unfortunately does not have the immense value that one might think, since it has been devalued by the recent proliferation of a large number of BackDoors into Canadian Government computer systems. Nonetheless, it will undoubtedly be the source of countless hours of entertainment for the lucky winner. The award to be presented in Lost Wages has officially been named the 'Jim Bell InterNetional Back Door Revenge Scholarship To The School Of Hard Knocks Cafe." It is an Army of Dog Scholarship meant to impress on the Controllers that PayBack, like Oppression, has now entered the Global Information Monitoring Age, and that the New Secret Squirrel Disorder is alive and well in ButtFuck, Canada. { If you can't fuck the one that fucked you, fuck someone that fucked someone else, and vice-versa, ad infinituum.} In short, any ShortLimpDickedPrick in ButtFuck, Canada, can no longer be certain that HisOrHer violation of both the laws of the land and the laws of human decency will go unpunished, or that the Anonymous Avenger will not be an entity totally unknown to them, from a distant place such as Seattle, with little known connection to the time and place of a monstrous crime against Monstrous Oppressors. And, on the other hand (which has warts), when strange things begin to happen in the Seattle Court computer system, strangely connected to the StrangeButTrue! persecrotchion of a StrangeBedFellow of the Author, James C. "The 'C' Stands For Dalton" Bell, the only thing that Sharon can guarantee in Stone, is that the obvious suspects at ASIX, the adopted parents of the Author's SparCard II, have absolutely nothing to do with the eerie laugh of Vincent 'Cate' Price echoing through their system, since the Army of Dog doesn't shit in it's own back yard (although it sometimes pees in its kitchen sink, when the oung is occupied). In honor of the Royal Rogers Stuffed & Mounted Police currently celebrating their 150th birthday, I recently decided to present them with the ultimate gift. Realizing that I was far from alone in my position of never being convicted of something I was actually guilty of (we may not be guilty of breaking the law, but we are all guilty of *something*--that's in the Bible, I think), I came to the conclusion that the perfect birthday present to the RCMP, on the occasion of being awarded their 150th consecutive 'Fascist Oppressor With The Best Public Image Award,' would be to hand them my head on a silver platter, enabling them to convict me on a charge of which I am completely innocent (from a technical, legal standpoint), and provide them with all of the information necessary to ensure my Public Labelization (I won a game of Scrabble with that word, once) as an Officially Recognized Monster, as seen on 'Cops,' '60 Minutes,' 'Canada's Least Wanted,' and 'World's Slowest Police Chases: The Return Of Beyond The Valley Of The Planet Of Al Cowling.' I had originally intended for my gift to the RCMP to be a professional, polished MultiMedia Entertainment Special, but, since the thieving fucks stole my Toshiba Tecra in order to attempt to shut me the fuck up, I am forced to hoist myself on my own petard in a strictly ASCII computer environment (without a spell checker or thesaurus, so there is little likelihood of my being able to discover, through inference, what a petard actually is, or whether I have spelled it ccoorreeccttllyy). Accordingly, the passages of the following chapters which will describe in perverse, grotesque and disgusting detail the nature of my crimes against sexual normality, will *not* be accompanied with graphic, color illustrations, leaving the reader to use their own imagination, or to pay $ .01 per minute by dialing 1-800-EAT-T0T0, to hear a heavy-breathing tape-loop which provides excellent background stimulation for the sexual imagination, as long as you can ignore the fact that it is the tape of the Author, a sex-pack a day chain-smoker, climbing a single flight of stairs. In the following chapter, the Author, still suffering under the delusion that someone, somewhere, is reading this tripe (besides college students attempting to gain extra credits in a summer session psycho-ology class titled, "An Analysis Of The Results Of Extensive Brain Damage Caused By MKULTA Experiments On The Half-Unwitting Author--Current Technology Cannot Detect Any Difference"), provides complete details of HisOrHer first annual major drug-deal, just as Canadian Authorities always suspected, but could never prove. Smoke 'em if you got 'em... [ou may leave a message for the Author, at the sound of the Bong.] From gendexer at technologist.com Mon Jul 20 06:27:16 1998 From: gendexer at technologist.com (gendexer at technologist.com) Date: Mon, 20 Jul 1998 06:27:16 -0700 (PDT) Subject: Fwd: GENDEX.NET TO REORGANIZE CIVILIZATION rev. 18 Message-ID: <199807201327.JAA14281@web02.globecomm.net> INTRODUCTION > > First there were pocket calculators, then personal memory > organizers (PMO's), and next fully operating computers the size of a > personal check book. > Now the latest device to join the personal electronic evolution > is a palm sized unit that fits easily in a shirt or purse pocket and > is unlike anything you've seen before. Called a GENDEX, it not only > keeps track of people data and personal appointments, it can also > track personal or business expenses and serve as a depository > and dispensary for real time monetary transactions over the Internet. > And for those with email, just have it forwarded directly to your > GENDEX. > What strikes you first about the GENDEX is its size - just > seven inches by 3.5" and 3/8" deep - small enough to be carried almost > anywhere - like an "electronic wallet". The second thing that you > notice is its unusual keyboard - again, unlike anything else you've > ever seen or used. > At first, the keyboard seems strange and undecipherable - > instead of the usual QWERTY layout in rows, the keys are arranged in a > circle on the small, one-finger keyboard, with the most common letters > in the inner circle. It's strange until you begin to use it. As you > catch on to the pattern, you begin to see the benefit of the > one-handed, one-finger layout, and most people quickly attain fairly > high data entry rates with very little practice. > But it's not only this unusual keyboard that make the GENDEX > different - and useful. Its the fact that the GENDEX can store, > receive, and transmit financial data and monetary units over any > financial network, including secure radio and Internet transmissions. > Imagine being anywhere, buying or selling anything, and being able to > complete the transaction with you hand-held personal bank. (In the > future, it will even include a bar code reader to scan in any item or > price!) > The GENDEX has been designed with the computer illiterate in > mind. The keypad is simple looking with a minimum of entry keys, and > every action and transaction is prompted for the next step. Just > "follow the bouncing ball" and it steps you through anything you want > to do with a minimum of learning time. > It's also designed to be used in any weather, dropped, sat on, > stepped on, etc. The unique patentable self locking case is > waterproof, shock proof, breakproof and, most importantly, idiot > proof...instead of reaching for your wallet, in the future, many > thousands of people will be reaching for their GENDEX. Programmed in > JAVA with user replaceable chip sets, the GENDEX is easily upgradable > as new features and uses come out. > The universally-usable GENDEX Java software will hopefully be > available by the year's end. Until then, you'll just have to stay with > using old fashioned credit cards, hand written checks, and nearly > obsolete cash and currency. To check out a live demonstration of the > GENDEX and its functions, visit the GENDEX website at http://gendex.net. > > > ORGANIZER LOGIC REACHES UNDENIABLY EASY TO USE STATE > > Gendex organizer logic is now the most idiotproof and clearly easy > to understand organizer logic in the world. Thanks to the efforts of > an entrepreneurial team, a logical prototype has been crafted in the > Java programming language and is open for testing at > http://gendex.net. This was finally accomplished after many years of > logic design by some clearly ingenious persons. > This new logic works with the seventeen key input and > classification system developed by DEXCOM over numerous iterations. > There are 4 main memory keys, 7 system keys, 4 arrow keys that move > the cursor or scroll the display, and YES & NO keys. Each of the main > memory keys opens with a table containing all the main functions you > can do in that division of the memory organizer. Each of the > functions, when selected, opens into a list of variations. These are > called TABLES, and there are four, AGENDA, PEOPLE, MONEY and NOTES. > Ease-of-use comes from consistent application of ENTRY, INDEX and > FIND system keys. HELP is ready to pop-up at any time to give the user > easy to understand directions and options. > By keying SYSTEM, Utilities like e-mail in/out, secure-unviolatable > memory storage upload, communications carrier select, edit > scratchpads, output port control, e-bank selection, proper > calculators, smart power monitors, thesaurus/dictionary, and language > translation are accessible within any memory function. > The demonstration on the website can be played with manually using > the selecting device and keying functional buttons. Soon a new control > panel will be added, so that the demonstration can be played > automatically by pressing the purposefully direct logic sequence keys. > The automatic links shall have a > player piano effect - eventually more than 111 functional logic > strings so that even the passive websurfer can instruct himself about > many things this unit does. > The logical prototype works in newest browsers, and there is a > download assist button on the website to bring the latest browser into > your own computer. > What is happening now in DEXCOM is a team of five time-investing > engineers are working toward completing a logical prototype. That is > leading to completion of a working software product. > The next step for the company will be to license the Gendex logic > system for use to the makers of the many hard-to-use and complicated > handheld and PDA systems already in user's hands. The first company > product is a software disk that adds the friendly usable gendex > functions to products like the H-P 620 handheld. > > > Interested Parties: > > DEXCOM USA Inc. is introducing its ultimate electronic personal memory > organizer (Gendex EPMO). Gendex keeps track of Agenda, Money, People > and Notes, and more. Gendex is the perfect vehicle for financial > networks sending money via secure data radio, and over the internet. > Gendex software will be available for purchase. It has all the > easy-to-use logical prompts, and on-line real-time help functions to > assist in all > forms of transactions and memory recording. No other product in the > market has all the ease of use and understandability built into it > that Gendex does. This is the breakthru. Nearly all the others are > expert systems requiring extensive training to use all functions. > Gendex hardware will be available before the year 2000. It is > waterproof, breakproof, and pocket sized. Its multichip module design > will be widely licensed for lowest cost to the consumer. The company > will brand name its own highest quality unit, and grade and distribute > components made by world class manufacturers working under our > lisences. Our designs utilize the latest technologies that can be made > accessible to mass markets. > On the website is a fully animated gendex shell opening; it also now > working logical prototype. > Price per privately issued share of DEXCOM USA Inc. stock just > quadrupled to $4, and is approaching IPO, with the potential for an > eight way stock split. > > > GENDEX.NET TO REORGANIZE CIVILIZATION > > NEVER BE LATE > The advanced timekeeping and AGENDA scheduling functions that make it > possible to schedule and remember one-time events, recurring events, > and even place events in someone else's schedule (if they don't > prevent you from doing so). This will eliminate a lot of potential > embarassment to those who may forget about where they said they would > be. > > TELEPHONES > Thanks to internet telephony, and the presence of speaker & microphone > on the unit, and headsets for the pocketsized gendex, both cellular > phones and home phones, and their networks, will have a lot less to > do. This is because internet telephony is practically free, even for > long distance calls. > > PAPER MONEY > The hazards and time consuming processes of making change will be > replaced with the ease of sending money optically to smart cash > registers and vending machines, parking meters etc., with optical > interfaces to money registrars with radio outputs. (Of course, 'users' > are subject to national banking laws.) > > ELECTRONIC FUNDS TRANSFER > People will be able to receive and pay bills, and send each other > money over secure data networks. Gendex has all necessary logic to > set-up and actualize transactions. > > CREDIT CARDS > Credit organizations will become E-BANKs using Gendex hardware and > software, because it cuts costs. Until then, Gendex hardware has the > power to directly write money to mag stripe cards. Ultimately, > Gendex.net will send a lot of plastic to the scrap heap. > > RIDECALL > Eliminates superfluous automobiles by providing people you like (based > on lifestyle) with rides to where they need to go, as you make money. > This is coordinated by Gendex.net. Meet new friends, too. > > MONITORING THE HONESTY OF YOUR LOCAL BANK > Those who maintaing their files in CONVENTIONAL BANK ACCOUNTS > MANAGEMENT will be able to keep track of interest they should be > paying you, ATM costs, other banking costs and penalties to monitor > accuracy of your local bank. > > TRADING AND SELLING OVER THE NET > Every kind of service or material goods will eventually be listed in > the Bought,Buy,Sell&Trade INDEX. Gendex logic will enable everybody to > sell or trade their goods and services, through Indexers who are > already specialists in their respective fields. These Indexers do not > work for gendex.net, rather they remain independant, while gendex.net > takes a very small commission each time electronic banks transfer money. > > FORMATS > Prompted data entry of frequently repeated questions, coupled with > radio access to remote data bases will eliminate clipboards and paper > forms used in all repetitive data entry used in professional purposes. > Gendex.net will create a library of tens of thousands of different > formats for use by government, industry, military, courts, medical, > and professionals in every walk of life. And these can be sent by > radio to the Thousands of typists working in data entry jobs will need > to find something else to do. > > TAX DEDUCTIONS > Every taxpayer who can write off business expenses will never lose > expense records, and find many advantages with Gendex' advanced > recording capabilities. > > PHARMACY.NET > Gendex prompted data entry and secure verification will eliminate the > problem of reading doctor's cryptic handwriting. From NOTES, doctors > specify treatments. A pharmacist in a van will come driving up to your > house to serve the prescription rendered by doctors. > > MEDICAL HISTORY > Whatever ails you, and when, and how, can be recorded so that after > you're dead, and they do the autopsy, they will have something to go on. > > TELEVISION INTERNET REMOTE CONTROL > Gendex EPMO hardware, with its highpowered bidirectional infrared > port, can replace the intelligent aspect of internet boxes designed to > bring internet via cable to people's living room televisions. > > SMART LOCKS ACCESS > In the future, metal door locks will be replaced with a glass plate > guarding an optically activated solenoid. This will enable smart > systems in buildings to record who passed thru a door, when, and/or to > execute decisions about who is authorized to pass. It can even require > remittance of money, or act as a time clock for workers. Gendex EPMO > hardware, with its bidirectional infrared port can handle all these > transactions. > > TRUCKERS LOGBOOK > Over the road drivers will be able to accurately maintain records of > how much time they spent driving, and what happened at points of > delivery. With GPS attachment, trucker will always know where he is. > > PROFESSIONAL TIME LOG > Consultants who charge in small increments for time spent advising > clients will benefit readily by the functions provided in this logic. > > SPEAKING TRANSLATOR > An issued unit of Gendex hardware or software will typically handle as > many languages in its interface as one chooses to download. > Ultimately, Gendex is intended to be able to handle all of input of > characters in the users language, translation to another language like > English or Japanese, and speaking that language via its speaker to > listening "barbarians". > > You may argue that all these things are happening anyway, and indeed, > some of them are. The difference here is that gendexes can be given > away free to customers by financial institutions, in exchange for > placing cash on deposit. > > > > WHAT MAKES US DIFFERENT > > The automatic logical demonstration on the website displays more than > 59 logical functions. Actually, the number which will be programed is > about 385, well organized and all totally accessible. Our "nearest > competitor" in hardware (really, predecessor) 3COM PALM PILOT has only > 4 logical functions. > Not only that, our hardware product exceeds all others because it is > pocketsized, waterproof, breakproof and most importantly, idiotproof. > Gendex hardware is an email machine that goes with you everywhere, > even underwater. It's application specific electronic design is user > serviceable and infinitely upgradeable. > Gendex hardware is designed with a microphone and a speaker to make > telephone calls free over the internet. There is also a headset that > attaches to the lower bidirectional optical ports. > Logically speaking, it is far easier to use Gendex than those > products which are not as well designed and thought out. Gendex > software has prompted data entry and on-line help, being designed for > the computer-illiterate, thus will replace QUICKEN and most any > organizer programs. > Gendex Software, and later hardware, includes prompted logic to > handle electronic money transactions for on-line banks, and the user > can make transactions safely. The palm Gendex is being designed with > completely integrated dataradio (like a pager) and complete TCPIP for > transmissions of email and e-money over private networks, the > internet, wherever he goes, with no fear of losing his money > (depending on what security software is available and what e-bank he > uses). > > > MAD VENTURE CAPITALIST WANTED > > No sane venture capitalist would ever invest in DEXCOM. > Sane venture capitalists believe that the publication of this website, > http://gendex.net, will awaken a giant sleeping gorilla. Its pretty > obvious that the moment DEXCOM begins to succeed, some giant Japanese > conglomerate or even Microsoft will create all sorts of knockoffs and > circumvent all of DEXCOM's patent rights, earned in 14 years on R & D > unsupported by all but the scantiest investments from people who > should have known better than to waste their money on this, and loads > of sweat equity. The very-innovative big established companies, with > their risk taking daredevil unconventional creative engineers, would > rather do it themselves, than license the technology, in order to get > it all for themselves. Even Microsoft knows, it can walk all over > little companies with complete impunity. The sane partners of any MAD > venture capitalist who would even consider investing in this little > startup, will wisely tell them that this is a considerable risk with > little possible outcome in the way of capital gains. Its pretty > obvious that there is no more to this website that meets the eye at a > superficial glance. Not worth considering more because the sane > venture capitalist sees that if its not a complete fake, that this > must be just another remake, just another failure in the field of > personal electronic organizers. It's a shame that so many > unsophisticated people believe that DEXCOM could succeed. While its > true that the little company continues to draw support from advance > orders for its units, coming from little, uneducated and > unsophisticated future customers, every savvy high class venture > capitalist knows that its not little buyers who make money for a > company in the long run, its the money that venture capitalists waste > on entrepreneurs with sure-fire conventional ideas that makes them > rich. Don't invest in DEXCOM - you will not regret it! > > Please return email to webmaster at gendex.net > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > _________________________________________________________ > DO YOU YAHOO!? > Get your free @yahoo.com address at http://mail.yahoo.com ----------------------------------------------------- Get free personalized email at http://email.lycos.com From jya at pipeline.com Mon Jul 20 06:44:24 1998 From: jya at pipeline.com (John Young) Date: Mon, 20 Jul 1998 06:44:24 -0700 (PDT) Subject: National Health ID Plan Message-ID: <199807201344.JAA30199@dewdrop2.mindspring.com> Lead story, The New York Times, July 20, 1998: Clinton Plans to Assign Codes, as Law Requires, to Create Giant Medical Database As legislation that would protect patient privacy languishes in Congress, the Clinton Administration is quietly laying plans to assign every American a "unique health identifier," a computer code that could be used to create a national database that would track every citizen's medical history from cradle to grave. The electronic code was mandated by a 1996 law and would be the first comprehensive national identification system since the Social Security number was introduced in 1935. Although the idea has attracted almost no public attention, it is so contentious that Federal health officials who were supposed to propose a plan for the identifier by February, have made little headway and are instead holding hearings beginning on Monday to solicit public comment. Proponents, including insurance companies and public health researchers, say the benefits would be vast. Doctors and hospitals would be able to monitor the health of patients as they switch from one insurance plan to the next. Patients would not have to wade through a cumbersome bureaucracy to obtain old records. Billing would be streamlined, saving money. A national disease database could be created, offering unlimited opportunities for scientific study. But opponents, including privacy advocates and some doctors' groups, say the code smacks of Big Brother. They warn that sensitive health information might be linked to financial data or criminal records and that already tenuous privacy protections would be further weakened as existing managed care databases, for example, are linked. They say that trust in doctors, already eroded by managed care, would deteriorate further, with patients growing reluctant to share intimate details. And in a world where computer hackers can penetrate the Pentagon's computer system, they ask, will anyone's medical records be safe? Full story: http://www.nytimes.com Mirror: http://jya.com/privacy-hit.htm ---------- There's also a short report on House Commerce Committee passage of the WIPO copyright act (which limits encryption testing) by setting temporary provisions for "fair use" for education with bi-annual review by the Commerce Department to extend or let lapse: Mirror: http://jya.com/wipo-hit.htm From billp at nmol.com Mon Jul 20 07:40:30 1998 From: billp at nmol.com (bill payne) Date: Mon, 20 Jul 1998 07:40:30 -0700 (PDT) Subject: USCA and Out of Order Message-ID: <35B3557F.152D@nmol.com> Monday 7/20/98 8:07 AM John Young Saw Payne/Morales v. NSA: Response to USCA Orders July 19, 1998 http://www.jya.com/whp071598.htm Thank you and your helpers for all of the scanning work. Morales and I talked on the phone last night about the next step. We are going to move on the criminal privacy act violation. http://www.jya.com/snlhit.htm Ninth Circuit judge Proctor Hug has not responded. However, Ninth circuit Senior Case Expiditer Gwen Baptiste returned my complaint. This, of course, has earned Baptiste a criminal complaint affidavit to be filed with Hug again. Morales was very insistant last night about the seriousness about the judiciary not doing their jobs. Reason is that improper handling of valid complaints can lead to frustrated citizens - some of who might resort to socially unacceptable expressions of displeasure towards the judiciary. Like ARTICLES RELATED TO OKLAHOMA CITY BOMBING seen at http://www.aci.net/kalliste/ Morales and I believe in using the law to fix the problem - now with some help from congress. A Washington DC DOI whistleblower pointed me to the book, Out of Order : Arrogance, Corruption and Incompetence on the Bench - Max Boot; Hardcover http://www.amazon.com/exec/obidos/ASIN/0465054323/o/ref=qid_900944492/002-2724971-2249850 I read the Forward by Bjork on Friday afternoon. I sure wish we could avoid unpleasantness I see coming by getting this matter SETTLED. Later bill Friday 5/1/98 9:48 AM Certified Return receipt requested Cathy A Catterson, Clerk Ninth Circuit Court of Appeals 121 Spear Street POB 193939 San Francisco, CA 94119-9800 415 744 9800 Dear Clerk Catterson: Purpose of this letter is to discover the REASON the criminal complaint addressed to Ninth circuit judge Proctor Hug Jr dated Wednesday 4/1/98 11:02 AM was returned to me WITHOUT COVER LETTER. I attach a copy of the envelope the above material was enclosed. Return address is CLERK, U.S. COURT OF APPEALS P.O. BOX 547 SAN FRANCISCO, CA 94101-0547 OFFICIAL BUSINESS PENALTY FOR PRIVATE USE, 300 Postmark is SAN FRANCISCO, CALIF APR 24 98 U.S. POSTAGE $2.62 METER 504753. The envelope is hand-addressed and stamped CONFIDENTIAL. Since no cover letter was enclosed to explain the return of what I believe is both a valid and lawful criminal complaint affidavit supported by WRITTEN EVIDENCE, some even in FILED court documents, I feel we must investigate to discover the REASON. All of the accused are federal employees or contractor employees. Possibility exists that return of the enclosed criminal complaint affidavit without cover letter stating the REASON may indicate violation of Title 18 � 1512. Tampering with a witness, victim, or an informant [(b)] Whoever knowingly ... corruptly persuades another person, or attempts to do so, or engages in misleading conduct toward another person, with intent to - ... (2) cause or induce any person to - (A) withhold testimony, or withhold a record, document, or other object, from an official proceeding; ... (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... shall be fined under this title or imprisoned not more than ten years, or both. (c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any person from - ... (2) reporting to a law enforcement officer or judge of the United States the commission or possible commission of a Federal offense ... or attempts to do so, shall be fined under this title or imprisoned not more than one year, or both. Clerk Catterson, you may be aware that under � 1512 (d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant has the burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful conduct ... Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to me. And report the REASON the criminal complaint affidavit was returned to me. I ask that you respond within 30 days. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 Wednesday 4/1/98 11:02 AM Certified Return receipt requested Proctor Hug Jr Chief Judge, Ninth Circuit 50 West Liberty Street Reno, NV 89501-1948 (702) 784-5631 784-5166 fax Dear judge Hug: Purposes of this letter-affidavit are to file criminal complaint affidavits against 1 judge Marilyn Hall Patel for not properly processing a criminal violation of the Privacy Act, 2 former Ninth Circuit chief judge J Clifford Wallace for not properly processing criminal complaint affidavits for a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone, b judge Fern Smith for not properly processing a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone. c Albuquerque FBI special agent in charge Thomas Kneir for sending FBI agents Kohl and Schum to my home in an attempt to intimidate me from exercising my civil rights. d Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel, for not forwarding a valid criminal complaint affidavit regarding a criminal violation of the Privacy Act to Patel. Brief history would be valuable for your understanding of this matter. Sandia has long been involved with the security of America's nuclear arsenal. As they announce on their website: "We are funded primarily by the U.S. Department of Energy to design all the non-nuclear opponents of the nation's nuclear weapons" http://www.sandia.gov/">http://www.sandia.gov/). This includes the cryptographic locks used to secure the nukes. NSA supplies the algorithms and implementation guidelines to Sandia. http://www.aci.net/kalliste/nukearse.htm In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU]. The MSCU was funded by the National Security Agency [NSA]. As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics. I wrote a book ISBN: 0125475705 Title: Embedded Controller Forth For The 8051 Family Author: Payne Cover: Hardback/Cloth Imprint: Academic Press Published: September 1990 http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 about the software technology we used for the MSCU. In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT]. NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason First, U.S. President Ronald Reagan informed the world on national television that the United States was reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district, where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof" referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East Berlin. http://www.aci.net/kalliste/speccoll.htm which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries. In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business. The director transferred me to break electronic locks for the Federal Bureau of Investigation. This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA. I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks. One lock I ordered was the Hirsch Scramblepad electronic lock. In about 1991 I was following progress of lawsuits in the district of Northern California, The first two cases to directly address the issue of intermediate copying both originated in California's Northern District Court. They are Atari v. Nintendo and Sega v. Accolade. In both cases, the district court found that intermediate copying was NOT fair use. [The New Use of Fair Use: Accessing Copyrighted Programs Through Reverse Engineering, Stephen B. Maebius, Journal of the Patent and Trademark Office Society, June 1993, 75, n6, p433] Judge Fern Smith presided in both cases. Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software. One chapter contains a computer program which copied a ROM BIOS to diskette. Smith's decisions made my intermediate copying program illegal. In a strong opinion she [Fern Smith] wrote in March 1991, when granting Nintendo's request for a preliminary injunction against Atari, she lambasted Atari's lawyers for thievery. I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry. I refused to engage in illegal activity for the FBI. The termination letter seen at http://jya.com/whpfiles.htm states This is to advise you that effective July 27, 1992, you will be terminated from Sandia National Laboratories. This action is the results of your flagrant attack on a valued Sandia customer and repeated insensitivity to security/classification requirement. These acts violate Sandia National Laboratories Code of Conduct, specifically the Personal Conduct section,, and the Safeguarding Information and Records Section. ... for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI. Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired. However March 22, 1997 I received copies of the enclosed 1 April 15, 1994 letter to EEOC director Charles Burtner from Sandia Diversity Leadership director Michael G. Robles. 2 July 27, 1997 Termination of Employment memorandum containing my signature. 3 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992. 4 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989. 5 September 6, 1995 letter from EEOC Investigator Larry J. Trujillo to Richard Gallegos. from Sandian Richard Gallegos. Sandia lawyer Harold Folley previously stated that no documents existed. The Privacy Act states (d) Access to Records.--Each agency that maintains a system of records shall-- (1) upon request by any individual to gain access to his record or to any information pertaining to him which is contained in the system, permit him and upon his request, a person of his own choosing to accompany him, to review the record and have a copy made of all or any portion thereof in a form comprehensible to him, except that the agency may require the individual to furnish a written statement authorizing discussion of that individual's record in the accompanying person's presence; The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements. The Privacy Act states (2) permit the individual to request amendment of a record pertaining to him and-- The statements in the SDRC are incorrect. I followed all Sandia procedures known to me. I did nothing wrong. I had no opportunity to defend myself. My rights guaranteed under the Constitution, Bill of Rights, Article XIV. Section 1. All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. have been violated. C My permission was never asked to release these records to Gallegos. As you may realize about the Privacy Act (b) Conditions of Disclosure.--No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains ... The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner, and Trujillo who (i)(1) Criminal Penalties.--Any officer or employee of an agency, who by virtue of his employment or official position, has possession of, or access to, agency records which contain individually identifiable information the disclosure of which is prohibited by this section or by rules or regulations established thereunder, and who knowing that disclosure of the specific material is so prohibited, willfully discloses the material in any manner to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and fined not more than $5,000. (2) Any officer or employee of any agency who willfully maintains a system of records without meeting the notice requirements of subsection (e)(4) of this section shall be guilty of a misdemeanor and fined not more than $5,000. I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel. Patel ignored my complaints. I return to the subject of breaking electronic locks for the FBI/ERF. Smith's two decisions were overturned on appeal. However, both cases have been overruled on appeal. In the ground-breaking Atari decision, the Federal Circuit held that intermediate copying was a fair use. The Sega decision, which was appealed to the Ninth Circuit Court of Appeals, similarly overruled the district court and held that intermediate copying may be fair use. Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated AFFIDAVIT OF GREGORY A. CONE Gregory A. Cone, being duly sworn, deposes and states: 1. I am employed by Sandia Corporation. I am an attorney admitted to practice law in the State of California and before the U. S. Patent and Trademark Office and concentrate on legal issues related to patent and copyright law. In that capacity, I am familiar with activities at the Sandia National Laboratories ("Sandia") as they related to what is sometimes referred to as "reverse engineering ." ... [I]t is the general view at Sandia that disassembly of "object code" under such circumstances constitutes a "fair use" of copyrighted software under 17 U.S.C. article 107 and is thus permissible. Sandia bases its view on Sega Enterprises v. Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir. 1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir. 1992). ... FURTHER, Affidavit sayeth naught. (signed) GREGORY A. CONE SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th day of August, 1993, by Gregory A. Cone." (signed) Mary A. Resnick Notary Public My Commission Expires: 2-7-94 Cone has the two citations reversed. The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015. Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to reverse engineer the Hirsch Scramblepad electronic lock. I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code. 708.1 Purpose, This part establishes procedures for timely and effective processing of complaints by employees of contractors performing work at sites owned or leased by the Department of Energy (DOE), concerning alleged discriminatory actions taken by their employers in retaliation for the disclosure of information relative to health and safety, mismanagement, and other matters as provided in 708.5(a), for participation in proceeding before Congress, or for the refusal to engage in illegal or dangerous activities." ... Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing. Title 18, Chapter 79, Article 1623 felony perjury. Article 1623 - False declarations before grand jury or court (a) Whoever under oath (or in any declaration, certificate, verification, or statement under penalty of perjury as permitted under section 1746 of title 28, United States Code) in any proceeding before or ancillary to any court or grand jury of the United States knowingly make any false material declaration or makes or uses any other information, including any book, paper, document, record, recording, or other material, knowing the same to contain any false material declaration, shall be fined not more than $10,000 or imprisoned not more than five years, or both. Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992. I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused. Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court. Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits. 1 Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury. Smith did not respond. 2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate. 3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith. 4 In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals. Smith for � 4. Misprision of felony Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both. for Smith's failure to properly process Cone's felony perjury and � 241. Conspiracy against rights If two or more persons conspire to injure, oppress, threaten, or intimidate any person in any State, Territory, or District in the free exercise or enjoyment of any right or privilege secured to him by the Constitution or laws of the United States, or because of his having so exercised the same; ... for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me. Knier for Conspiracy against rights for his complicity with Smith. 5 Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not responded. 6 August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit Court of Appeals writes me to tell me In the future, all correspondence should be addressed to the Clerk of the Court. Do not address any correspondence to any one specific judge of this court. 7 September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice. I ask Orozco to desist. 8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes Re: Complaint of Judicial Misconduct We have received your complaint of judicial misconduct. Pursuant to the Rules of the Judicial Council of the Ninth Circuit Governing Complaints of Judicial Misconduct or Disability, you complaint is being returned to you for compliance with the above rules. A copy of these rules is enclosed. To understand the purpose of the procedure and who may be complaint about please refer to Rules 1 and 2. 9 Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him Lawyer Wallace, I did not intend to file or did I file a complaint of judicial misconduct. Lawyer Wallace, I filed a criminal complaint affidavit as I have a right to as a citizen of the United States of America when the criminal acts are committed by government personnel, their contractors, Department of Justice and judicial personnel. 10 Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace Purpose of this letter is to inform you of consequences of your failure to perform your duties as required by law as magistrate judge. You are committing felony violations of law. and If I have not complied with all applicable rules, then I ask that you inform me of any non-compliance so that I can correct my criminal complaints and re-submit them. I satisfied the requirement of the Constitution and Rules 3 and 4, and issued written and sworn complaints that set forth the essential facts constituting the offenses charged against Smith, Kneir, and Cone. I also showed facts showing that the offenses were committed by Smith, Kneir and Cone and these individuals committed them. So I ask that you do your job and proceed with supervision of the arrest and prosecution of Smith, Kneir, and Cone for title 18 felony violations of law. 11 Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California, Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC. Robles did this without my written permission and without checking the accuracy of the information. The information contained in the SDRC report is false and defaming. 12 Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent. 13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing Purpose of this letter is to file a criminal complaint affidavit against Sandia National Laboratories [Sandia] Disciplinary Review Committee members and attendees G. H. Libman, R.A. Polocasz, D. B. Davis, M. E. Courtney, W. R. Geer, C. A. Searls, J. D. Giachino, R. L. Ewing, A. M. Torneby, R. B. Craner, C. W. Childers, E. Dunckel, D. S. Miyoshi, J. J McAuliffe, J. D. Martin, and R. C. Bonner for violation of the criminal penalties section of the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony violations of Civil Rights, Section 241, Conspiracy against right to citizens. for their roles in maintaining an illegal system of records. Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution. I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC. 14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel for violating � 1512. Tampering with a witness, victim, or an informant ... (C) prevent the communication by any person to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... (3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United States of information relating to the commission or possible commission of a Federal offense ... shall be fined under this title or imprisoned not more than ten years, or both. for writing on May 9, 1997 Dear Mr. Payne: We are in receipt of your recent letters. Please be advised that we do not issue warrants on criminal proceeding absent an indictment, information or complaint initiated by the United States Attorney. For this reason, and by copy of this letter, we are referring this matter to that office. Any future correspondence concerning these events should be sent to the United States Attorney and not to judge Patel. Thank you. Very truly yours, MARGARET D. THOMAS Judicial Assistant to the Honorable Marilyn Hall Patel cc: Joel Levin Criminal Section Assistant United States Attorney Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides: The complaint is a written statement of the essential facts constituting the offense charged. It shall be made upon oath before a magistrate. As you may be aware, An individual may "make a written complaint on oath before an examining and committing magistrate, and obtain a warrant of arrest." This is in conformity with the Federal Constitution, and "consonant with the principles of natural justice and personal liberty found in the common law." [United States v Kilpatrick (1883, DC NC) 16G 765, 769] You may also be aware, A complaint though quite general in terms is valid if it sufficiently apprises the defendant of the nature of the offense with which he is charged. [United States v Wood (1927, DC Tex) 26F2d 908, 910, affd (CA5 Tex) 26 F2d 912.] And for your edification, The commission of a crime must be shown by facts positively stated. The oath or affirmation required is of facts and not opinions or conclusion. [United States ex rel. King v Gokey (1929, DC NY) 32 F2d 93, 794] The complaint must be accompanied by an oath. [Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No 2126] A complaint must be sworn to before a commissioner or other officer empowered to commit persons charged with offenses against the United States. [United States v Bierley ( 1971, WD Pa) 331 F Supp 1182] Such office is now called a magistrate. A complaint is ordinarily made by an investigating officer or agent, and where private citizens seek warrants of arrest, the practice recommended by the Judicial Conference of the United States is to refer the complaint to the United States Attorney. However, further reference to him is rendered futile where a mandamus proceeding is brought to compel him to prosecute and he opposes the proceeding. [Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual for United States Commissioners 5 (1948)] Any attempt to bring criminal complaints to government authorities would, of course, be futile. I am a citizen of the United States and, judge Hug, you are the assigned magistrate. In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint should set forth the essential facts constituting the offense charged and also facts showing that the offense was committed and that the defendant committed it. And, As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough for the issuance of a warrant that a complainant shows it to be on the knowledge of the complainant. [Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d 1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289, cert den 344 US 877, 97 L Ed 679, 73 S Ct 172] So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you. CRIMINAL COMPLAINT AFFIDAVIT: J Clifford Wallace Essential material facts are: 1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. 2 Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered. Count 1 Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity. Therefore, Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit. Count 2 Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. Count 3 Wallace made no attempt to bring FBI agent-in-charge to justice for violation of � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. Count 4 Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of � 1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit. VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel Essential material facts are: 1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter. Count 1 Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore, Patel is charged with Title 18 � 4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits. VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 Judge Hug, I have been extremely patient with judges and clerks of the district of Northern California and Ninth Circuit. Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997. Nothing has happened as of April 1, 1998. I ask that you 1 issue warrants of arrest or 2 inform me why you cannot proceed to do what I request within 60 calendar days. Smith's case is particularly egregious. Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on January 24, 1997 in a second attempt to intimidate me. Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt. Sincerely, William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 VERIFICATION Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section 1746 that material factual statements set forth in this criminal complaint are true and correct, except as to any matters therein stated to be information and belief of such matters the undersigned certifies as aforesaid that the undersigned verily believes the same to be true. Date William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 505-292-7037 Enclosures Privacy Act criminal violation documents, 11 pages AFFIDAVIT OF GREGORY A. CONE, 4 pages May 9, 1997 letter from MARGARET D. THOMAS, 1 page 13 From sunder at brainlink.com Mon Jul 20 08:24:11 1998 From: sunder at brainlink.com (Ray Arachelian) Date: Mon, 20 Jul 1998 08:24:11 -0700 (PDT) Subject: `Vulis terminator' full of crap (Re: net.cop revs up again) In-Reply-To: <199807182302.AAA15438@server.eternity.org> Message-ID: <35B35FE8.51386FBD@brainlink.com> John Young wrote: > Still, shifting back to media, the five of us in Manhattan -- > Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds > more don't openly affinity) hate each other's guts with infinite Not quite. I've never lived in Brooklyn. Try again. :) > Nothing I've seen proves cypherpunks exists: I've seen Ray > twice and he wasn't the same. I've seen Duncan twice and > he wasn't the same. Neither recognized me either. We've > all introduced ourselves to Jim Kallstrom as one another, > and did the same to several of Kallstrom's stand-ins. I've seen John Young twice and he was the same. And IMHO, I've been the same person as far as I know. :) IMHO, JYA has seen me and can recognize me, so I'd say either he's been smoking/drinking something (or forgot to do so) when posting this, or it's Mr. oToT, or Dr. V pretending to be JYA. So yeah, the post I'm replying to isn't much like JYA. > Mark this: "Perry Metzger" for certain is non-existent, it's only > a mail drop, a chalk mark, a can by the road, a highly paid > fictional security scam: Pay or plonk. Cooped cops and > holed-up criminals do, up the kazoo. Total Bullshit. I've seen Perry more than thrice, once at a speech he gave for the Libertarian Party where Duncan also was, and also at PC Expo a few years ago, and at a few NYC Cpunx meets. Perry does exist. > I say for a fact the crypto/cypherpunk/cops/spooks game's > one bird doing a solo dance. Who that bird is, works for, > remains to be reported reliably: an impossibility by definition. Nobody gives a rats ass who the TLA spook 'bot, tentacle, or other happens to be. We all know and expect that this list is monitored heavily by many TLA's including the NSA, FBI, and IRS. There were several IRS subscribtions to my filtered list a while back. I guess they couldn't deal with all the flaming and decided to get info on the tax evaders without the flames... I suppose either the NSA and FBI know enough to have bought AOL or netcom accounts, or read the list unfiletered. IMHO, this is a well known fact, and I welcome them on this list. Let'em sniff all they want, there's very little here that goes on that isn't considered public knowledge anyway. Heck, who knows after reading much of Tim's posts, maybe their points of view will be swayed and maybe they'll figgure it out for themselves. Whatever. > Dimitri was not terminated, can't be, he never was, like the rest > of us highly classified phantasms. Adam Back got the story > right, he's exchanging messages with a bot mirroring his inner > evil, call that Tim, call it Dimitri, he'll call back as the One True > Terminator you don't want to meet, ever, but will. IMHO, I've never met Vulis, so I can't say for sure. It would interesting if Tim/Dimitry were the same, but I doubt it. For that to happen, Tim would need to know a lot about NYC and be here a lot. Although it would be possible for Tim (as you propose) to do "Dimitry", from my experiences of Dimitry, that's highly unlikely. Dimitry did quite a bit of social engineering of Earthweb to get info on me. He also tried several attempts at calling me at home and getting info. There was also an NYC meeting where someone very suspicious (i.e. almost demented) showed up on his behalf, and mentioned lots of stuff about Xenix and massacres.... So IMHO, "Vulis" had to be in NYC. A while back a few folks said they met him in person. I'll let them comment on his description. I will also add that I heavily complained to dm.com's upstream provider and didn't get too far. It's possible that by the time Guy had complined, that there were so many complaints against Vulis that psynet decided to yank the coor. Or, could be that Guy=Vulis. :) Whatever. Either way I don't give a rats ass. I've never met Tim, but have spoken with him since the early days of the Cypherpunks list, back when Vulis didn't exist. While I'm not saying that Tim isn't a 'nym, I am saying that he's got far more reputation capital than Vulis, or Guy. Based on this, I do not believe that Tim=Vulis. Again, that's my belief, and have no evidence for or against. -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From jlowry at bbn.com Mon Jul 20 08:51:20 1998 From: jlowry at bbn.com (John Lowry) Date: Mon, 20 Jul 1998 08:51:20 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: Message-ID: <3.0.3.32.19980720114859.009997f0@dave.bbn.com> Oh please ... As you point out, physics is not optional. This is predictable and was predicted. Yawn. I predict that 3DES will fall too - actual time it takes is left to the student. More interesting, how about a supposition that DNA computers will be able to factor interesting numbers within 5 years ? Does that make certain other algorithms into snake-oil ? At the heart of this is the idea that "strong" cryptography is a fixed and finite set over time and that a change in that set will result in a change in the policy restricting export. It doesn't necessarily follow. Lobbying is necessary. Perhaps all that happens is that DES now joins the crowd of exportable algorithms :-) One lesson I plan to observe - don't encrypt known plaintext unless you have to ! John Lowry At 04:20 PM 7/17/98 -0400, Robert Hettinga wrote: >-----BEGIN PGP SIGNED MESSAGE----- > >Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack. > >It seems that Gilmore and Moore's Law have just turned the >once-respected DES into cryptographic snake-oil. He keeps hurting >snakes like that, he's gonna get himself canonized. ;-). > > >Seriously. Many thanks to Mr. Gilmore for proving, once again, that >lobbying is pointless, and that physics is not optional. > >Outstanding. Marvellous. > >Cheers, >Bob Hettinga > >-----BEGIN PGP SIGNATURE----- >Version: PGP for Personal Privacy 5.5.5 > >iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH >OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR >Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK >Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9 >leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm >0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg== >=Zeyp >-----END PGP SIGNATURE----- >----------------- >Robert A. Hettinga >Philodox Financial Technology Evangelism >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' >The Philodox Symposium on Digital Bearer Transaction Settlement > July 23-24, 1998: > >For help on using this list (especially unsubscribing), send a message to >"dcsb-request at ai.mit.edu" with one line of text: "help". > > From CTIA_Daily_News at um2.unitymail.com Mon Jul 20 09:53:20 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Mon, 20 Jul 1998 09:53:20 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 20, 1998 Message-ID: <199807201639.LAA14590@mailstrom.revnet.com> ============================================= Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. WIRELESS IT '98, The Next Generation in Personal Computing & Communications October 12-14, Las Vegas, Nevada Call (202) 785-0081 for more information! ============================================= From rdl at mit.edu Mon Jul 20 10:32:50 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 20 Jul 1998 10:32:50 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...) Message-ID: <199807201732.NAA25239@denmark-vesey.MIT.EDU> [recipients list trimmed somewhat] I think it is always reasonable to be cautious, but there is a point where overcautiousness is counterproductive. Believing 3DES weak because DES is so strong that it has thusfar withstood more analysis than any other cipher and only falls to brute force is, I believe, one of these cases of excessive paranoia. Assumptions: * Brute forcing DES with a 56-bit key took $50k in materials in today's money. * 3DES with 3 keys is strong enough to resist everything weaker than a 112-bit brute force attack (due to the meet-in-the-middle attack) * Physics, as you say, is not optional. * The notation 2**56 is two raised to the fifty sixth power. At first approximation, doing the same thing to a 112bit 3DES problem would require 2**56 more chips. and thus 2**56 more money, to do in the same amount of time. My copy of gnu bc tells me this is "3602879701896396800000", or three and a half sextillion dollars. This is more than a billion times the current world industrial output. This is somewhat of a naive calculation, though. Those chips were not ideal. There's a general rule about chips doubling in transistor count (and for this application, performance) every 1.8 years. Assuming this rate of improvement, and let's say a random factor of a million for better design, and a fabrication improvement rate (due to buying all your raw-materials suppliers, them becoming more efficient, etc.) which together with Moore's law doubles performance every year (mostly for ease of calculation). Let's assume the target is to be able to complete the calculation within ten centuries. It is better to wait until this is possible before starting than to start and run a calculation for a billion years waiting for it to catch up, as few things are of value that far in the future, and also there is the time value of money to worry about. Let's also place a budget cap of $20t US today's money on the problem at the start of calculation. (2**56)*50000/1000000 == 3602879701896396 dollars today 1000*365/3 == 121660 gilmore-kocher periods in a 1000 years 3602879701896396/121660 == 2961433258175568 dollars today to crack in 1000 years log(2,2961433258175568) == slightly more than 51 years So, this *highly* optimistic calculation says that even if we are willing to assume an *incredible* performance speedup due to better technology and vertical integration that continues unabated (and exceeds reality), *and* we're willing to wait 1000 years for our answer, *and* are willing to spend $20t to build the machine, it is at least 51 years before you should start. This also doesn't take into account the incredible power consumption of such a machine -- about half a million times more than the gilmore-kocher machine. I assume their chips drew 5 watts each -- it would need 3 GW, which is a major nuclear facility with multiple reactors. Cost of power is *not* going down, so it's about $250 billion dollars a year in electricity, for 1000 years. This doesn't take into account the potential for a "technology refresh" throughout the 1000 year calculation period. It's a long enough period of time to make this significant. I'd say the odds of an analytic attack against DES or a fundamental breakthrough in quantum computing or something in 50 years, let alone 1050 years, are far higher than the chances anyone would go through this much trouble. While I agree that data intended to remain secure should be secured with something other than 3DES, it is for the potential of a breakthrough in algorithms, not speedup in brute force techniques, which is worrisome. Brute force techniques are basically public knowledge. A secret analytic breakthrough, however, could be completely black. The solution some people have come up with is multiple ciphers used in such a way as to be as strong as the strongest link. The increase in keysize is not a major issue for something intended to last this long. If you can get a cipher which has as its weakest point a brute force attack, you have won. If you can get a *system* which has as its weakest point a brute force attack on a 112 bit key, you've probably killed everyone in the world already several times over in a preemptive strike, especially everyone who ever had any knowledge of the keys or data. Humint, monitoring hardware, etc. are far more appealing than a brute force attack against any real system. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From rah at shipwright.com Mon Jul 20 10:51:22 1998 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 20 Jul 1998 10:51:22 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: Message-ID: At 11:48 AM -0400 on 7/20/98, John Lowry wrote: > Oh please ... Okay, I'll say it again: Yes, Virginia, DES is now officially Snake Oil. As much snake oil as if someone tried to sell a Ceasar cipher -- a perfectly good prechristian military messaging technology, mind you :-) -- for use in modern internet financial cryptography. So, Virginia, DES is DED. Game over. Kaput. Get used to it. > As you point out, physics is not optional. This is predictable and was > predicted. Yawn. Actually my point. It may have been predicted, but it has now happend. DES is now Snake Oil. BTW, try getting your gingivitis fixed before you go yawning in someone's face. ;-). > I predict that 3DES will fall too - actual time it takes is left to the > student. I see. In *your* lifetime? Splendid. I'd love to see *that* happen. And, of course, *you're* going to do it, Mr. Lowry? Yawn, yourself. > More interesting, how about a supposition that DNA computers will be able > to factor > interesting numbers within 5 years ? Probably not in your lifetime, bunky, no matter how many 5-gallon buckets of slime you can grow. Burden of proof's on you, here. My claim that DES is snakeoil is based on proven fact. Your claim that DNA can economically factor numbers fast has yet to be demonstrated, and I challenge you to prove otherwise with a straight face. > Does that make certain other > algorithms into snake-oil ? Anything that is broken, like DES now is, and is still claimed by others to be safe, and sold by them as such, is, in my book, snake-oil. > At the heart of this is the idea that "strong" cryptography is a fixed and > finite > set over time and that a change in that set will result in a change in the > policy restricting export. It doesn't necessarily follow. No, it doesn't follow, because that's not what I said. I said that because it is now demonstrably trivial to break DES messages, especially DES financial messages (the kind with *money* in them, for those in Loma Linda), DES is now Snake Oil. Just like the Ceasar cipher. > Lobbying is > necessary. Lobbying is only necessary for those who want to use force to maintain market share -- geographic, or otherwise. :-). Lobbying itself is the profession of con men who use the threat of government force to extort money from people who work, and give it to those who don't, in particular said con men. The only way to avoid government's propensity to dynasticize :-) is to innovate faster than they can regulate. In Loma Linda, they call it "progress", bunky. And, crypto has just progressed to such a point that formerly presumed peekware like DES has just been proven to be such, and is now, quite fairly, snake oil. Moore's law is not optional, At least in DES's case. Lobbying is not necessary if you change the world faster than they can control it. Gilmore, et. al., just proved that. Lobbying to change the "legal" keysize is a waste of time. Physics causes economics, which causes law, which causes "policy". It's never the other way around, regardless of the beltway's daydreams to the contrary. > Perhaps all that happens is that DES now joins the crowd of exportable > algorithms :-) I would claim that, your disengenous ":-)" aside (yeah, I know, pot, kettle, black), that any "exportable" algorithm is in fact snake oil. And Gilmore just proved it. > One lesson I plan to observe - don't encrypt known plaintext unless you > have to ! Wha? Security through obscurity? How exactly can you encrypt a message you don't know the contents of? Oh. I get it. Statist humor. (Yeah, I know about blinding, I just hate sophistry...) Feh. Cheers, Bob Hettinga ----------------- Robert A. Hettinga Philodox Financial Technology Evangelism 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The Philodox Symposium on Digital Bearer Transaction Settlement July 23-24, 1998: From rdl at mit.edu Mon Jul 20 11:16:12 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 20 Jul 1998 11:16:12 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...) In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU> Message-ID: <199807201816.OAA25266@denmark-vesey.MIT.EDU> Sigh. One should not do math before coffee. Let's try this again: If you assume 2^56 requires $50k and 3 days, and are willing to take 2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit key, and assume technology doubles in performance for this particular operation per year, then the calculation is easy to do. 112 - 56 - 16 - 8 = 32 If you wait 32 years, and have *incredible* performance gains in excess of what we have now (but which I think could be possible for worst-case crypto breaking chips, since they have relatively little in the way of communication, and have small units), and have a budget of 16 times what the DES cracker had (about $3b, which is totally reasonable), and are willing to wait about 2 years, you can brute force 3DES in the year 2030. There is still very little that is relevant in 32 years, and there is still a far better chance that some analytic attack will be discovered, a fundamental breakthrough in computation will happen, etc. before that time. 112 bits is below the "physical impossibility" point as far as key size goes (I like the calculation based on free energy in the universe in Applied Crypto). Chapter 7 in Applied Crypto is probably a far better analysis than mine, especially as it includes the caveat emptor section. Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit keys", at least for some systems, although I'd definitely prefer multiple ciphers separately keyed with long keys than n-DES for such long-term use. Calculating future key lengths really *is* a losing game. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From mkyleen at sturgis.com Mon Jul 20 11:37:30 1998 From: mkyleen at sturgis.com (Mkyleen) Date: Mon, 20 Jul 1998 11:37:30 -0700 (PDT) Subject: Persuasive speech topics Message-ID: <35B38D70.2590@sturgis.com> I can't think of anything fun to do a persuasive speech on, can you? From BUFFU at aol.com Mon Jul 20 11:39:42 1998 From: BUFFU at aol.com (BUFFU at aol.com) Date: Mon, 20 Jul 1998 11:39:42 -0700 (PDT) Subject: Nomination of Lyndon Larouche to the UNITED NATIONS OF THE FRINGE Message-ID: <267b60e9.35b38e90@aol.com> Hey Punks, As a United Nations OF the Cyber Fringe Member, I am asking for your input on giving Lyndon a nomination. So far his war crimes only include insanity and stupidity. Being as Presidential elections will be coming in the next few years, and I can't vote for my granpa again because he died. And Captain Kangaroo and Mr. Green Jeans arn't interested in being endorsed by anyone, that leaves us without a candidate. If we vote in Lyndon and his crew, we would have gophers during our UN meetings. I'm trying to get a web page for the UNOCF but until then I'm winging it. Consult all your Homies and let me know. Sincerely, Beth From new7898 at yahoo.com Mon Jul 20 11:59:44 1998 From: new7898 at yahoo.com (new7898 at yahoo.com) Date: Mon, 20 Jul 1998 11:59:44 -0700 (PDT) Subject: NEED MONEY NOW Message-ID: <74019590_23312217> THIS IS THE ONE!!! NEED MONEY NOW?? Turn a one time $39 investment into a steady stream of $20 bills paid directly to you, each and every Friday for the rest of your life!! (START NOW AND HAVE A CHECK IN YOUR HAND NEXT FRIDAY) NO SELLING INVOLVED! No stocking merchandise or inventory of any kind! Could you advertise a TOLL FREE number? That's all there is to it. Our system does everything else for you! SO SIMPLE A CHILD COULD DO IT! Why not call and see for yourself?! (Be sure and have a pen and paper handy) $$1-800-368-3561$$ (24 hours) USE ID # 18266 From jya at pipeline.com Mon Jul 20 12:15:29 1998 From: jya at pipeline.com (John Young) Date: Mon, 20 Jul 1998 12:15:29 -0700 (PDT) Subject: More on WIPO Copyright Amendment Message-ID: <199807201915.PAA03490@camel14.mindspring.com> To amplify the earlier NY Times report on the July 17 passage of the Krug amendment to the WIPO copyright act, which once banned encryption analysis, Reuters today says: The committee also approved an amendment allowing cryptography researchers to crack anti-piracy safeguards as part of their work. And an amendment was added allowing Internet users to disable such measures to prevent the collection of personal information. The Reuters report: http://jya.com/wipo-hit2.htm ----- Thanks to DM. From mgraffam at mhv.net Mon Jul 20 12:17:07 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 20 Jul 1998 12:17:07 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...) In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU> Message-ID: On Mon, 20 Jul 1998, Ryan Lackey wrote: > So, this *highly* optimistic calculation says that even if we are willing to > assume an *incredible* performance speedup due to better technology and > vertical integration that continues unabated (and exceeds reality), *and* > we're willing to wait 1000 years for our answer, *and* are willing to spend > $20t to build the machine, it is at least 51 years before you should start. Humrph .. your calculations came in just before I was gonna send mine out .. bc is a nice utility, ain't it? :) > While I agree that data intended to remain secure should be secured with > something other than 3DES, it is for the potential of a breakthrough in > algorithms, not speedup in brute force techniques, which is worrisome. Well, I disagree here.. unless the "something other than 3DES" is an OTP, of course. I don't see anything that looks better than DES, minus the key-size issue. DES has had the fiercest analysis done on it for the longest amount of time. If we are worried about a breakthrough in the algorithmics, then it seems to me we ought to use DES based on the fact that it has been analyzed longer, and has proved itself strong. We've covered the new vs. old algorithm debate here recently, so I'll shut up.. suffice it to say, I fall in line with the 'old' school. I don't find it useful to worry about possible new general cryptanalytic breakthroughs: it is basically impossible to defend against them. In the face of an attacker who has infinite secret cryptanalytic ability (within the bounds of what can be done brute-force wise) only an OTP would be useful, but we are talking long-term archival here.. I don't see how an OTP helps us. If we have a secure vault to lock the pads up in until either a) the heat death of the universe, or b) the Big Crunch then we may as well just put the plaintext in there and be done with it. As I see it, OTP are only workable in communications, and then obviously in a limited manner. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc I think that we should be men first, and subjects afterward. It is not desirable to cultivate a respect for the law, so much as for the right. Henry David Thoreau "Civil Disobedience" From KDAGUIO at aba.com Mon Jul 20 12:40:58 1998 From: KDAGUIO at aba.com (Kawika Daguio) Date: Mon, 20 Jul 1998 12:40:58 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: JohnGilmore...) Message-ID: If you listen to those in the exploitation community you might hear that 3DES provides less comparable security relative to DES than you know or have stated. Either way, however, it is more than sufficiently strong to secure any kind of traffic one might contemplate sending over a network. 3DES should work for a while, but I would prefer something more elegant and efficient. We have pushed 3DES forward as an interim standard, and are moving 3DES out into the world and the AES (128 and 256) forward to provide us another long-term solution. We told NIST that we hoped the AES could serve as a 20-30 year solution and are pushing algorithm agnostic standards to avoid similar obstacles to a transition in the far off future. One of the reasons we so aggressively pursued the negotiations over export control with the Administration and have pushed the AES, and our PKI is the collateral damage from the export control legislative debate. When the AES is finalized it will be followed closely by an ANSI X9 standard. Once these standards and infrastructure are established, the concerns about brute force attacks should be largely behind us. kawika daguio my views only >>> Ryan Lackey 07/20/98 02:16PM >>> Sigh. One should not do math before coffee. Let's try this again: If you assume 2^56 requires $50k and 3 days, and are willing to take 2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit key, and assume technology doubles in performance for this particular operation per year, then the calculation is easy to do. 112 - 56 - 16 - 8 = 32 If you wait 32 years, and have *incredible* performance gains in excess of what we have now (but which I think could be possible for worst-case crypto breaking chips, since they have relatively little in the way of communication, and have small units), and have a budget of 16 times what the DES cracker had (about $3b, which is totally reasonable), and are willing to wait about 2 years, you can brute force 3DES in the year 2030. There is still very little that is relevant in 32 years, and there is still a far better chance that some analytic attack will be discovered, a fundamental breakthrough in computation will happen, etc. before that time. 112 bits is below the "physical impossibility" point as far as key size goes (I like the calculation based on free energy in the universe in Applied Crypto). Chapter 7 in Applied Crypto is probably a far better analysis than mine, especially as it includes the caveat emptor section. Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit keys", at least for some systems, although I'd definitely prefer multiple ciphers separately keyed with long keys than n-DES for such long-term use. Calculating future key lengths really *is* a losing game. -- Ryan Lackey rdl at mit.edu http://sof.mit.edu/rdl/ From waters at ultimateprivacy.com Mon Jul 20 13:24:01 1998 From: waters at ultimateprivacy.com (Bryan Waters) Date: Mon, 20 Jul 1998 13:24:01 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...) In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU> Message-ID: <199807202023.QAA08696@omniwork.com> >I don't find it useful to worry about possible new general cryptanalytic >breakthroughs: it is basically impossible to defend against them. In >the face of an attacker who has infinite secret cryptanalytic ability >(within the bounds of what can be done brute-force wise) only an OTP >would be useful, but we are talking long-term archival here.. I don't >see how an OTP helps us. If we have a secure vault to lock the pads up >in until either a) the heat death of the universe, or b) the Big Crunch >then we may as well just put the plaintext in there and be done with >it. As I see it, OTP are only workable in communications, and then >obviously in a limited manner. > Are we talking long-term archival? I'm more concerned about someone grabbing communications in transit, storing them and throwing chips and mathematicians at it. If the government comes with the search warrant, then I should have already deleted the file if I didn't want it available. If someone wants to face security guards or a gun by my bedside they can steal the archive. It's the same rules as always. (except the theif must also have the math and chips). In the case of archive you have the protection of physical security and in most cases the knowledge of when it has been breached -- It's a lot friendlier than in communications where who knows what is going on between the sender and recipient. OTP is a pain, and is not effective for archival -- but it is the only way I've seen to protect communications in excess of ~30 years. Bryan Waters http://www.ultimateprivacy.com Director of Marketing Voice: 512-305-0505 Fax: 512-305-0506 Ultimate Privacy Corporation 3925 W Braker Ln #305, Austin, TX, 78759 From corvuscorvax at hotmail.com Mon Jul 20 13:39:45 1998 From: corvuscorvax at hotmail.com (Corvus Corvax) Date: Mon, 20 Jul 1998 13:39:45 -0700 (PDT) Subject: Request To Be Phlamed Message-ID: <19980720203908.28197.qmail@hotmail.com> > What some of them seem to want would appear to be _me_ (and you). Only because you'd look so absolutely luscious in leather, darling. Kiss kiss, Diva! von Future Prime ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From Craz8Grl at aol.com Mon Jul 20 16:21:14 1998 From: Craz8Grl at aol.com (Craz8Grl at aol.com) Date: Mon, 20 Jul 1998 16:21:14 -0700 (PDT) Subject: please respond Message-ID: Hello: My name is Enisa, I'm 13 years old. I write an online e-zine that for teens. We have over 150+ members. We just started a few days ago. We are looking for sponsors to sponsor our contests. These are some of the things we are able to do for you... * A banner on our page * Repeated mentioning in our newsletters * And anything else that you would like These are the things I would like in return: *2-3 prizes for our contest And nothing more. If you are interested please e-mail me so we can discuss this further. Please respond. Thank you for your time. Sincerely, Enisa http://members.aol.com/Craz8Grl/ From LrdWill at aol.com Mon Jul 20 16:27:53 1998 From: LrdWill at aol.com (LrdWill at aol.com) Date: Mon, 20 Jul 1998 16:27:53 -0700 (PDT) Subject: you got that PGP program? Message-ID: <99c9c87.35b3d24d@aol.com> you got it? From lreed at west.cscwc.pima.edu Mon Jul 20 16:49:22 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 20 Jul 1998 16:49:22 -0700 (PDT) Subject: If You Think I'm Crazy Now... - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C977E.807CD340.3@west.cscwc.pima.edu> If ou Think I'm Crazy Now ou Should Have Seen Me When I Was A Kid ~Geezinslaw Brothers SPACE ALIENS HIDE M DRUGS!!! _____________________________ From: MX%"chrisharwig at hetnet.nl" "kryz" To: MX%"bleed at west.cscwc.pima.edu" Subj: Re: Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!! I think you're a bit out of line. Wish you well and all of that. Strength that is. ---------- A "bit" out of line? I'm trying to be *way* out of line, but I guess I'm a failure at that, too . Children of the 60's can all remember where they were when they heard about JFK being shot. Many of them can remember where they were when they bought their first pound of pot, and most of them can remember where they were when they sold their first pound of pot (particularly if they got busted in the process.) I bought my first pound of pot in a public park in Edmonton, Alberta. I needed to sell it to get the money to pay a fine for drug possession, and I couldn't, in good conscience, pay it with money that I'd earned by working for a living at my regular job. Let me explain... It was the summer of 1969... [Debitor's Bad Note: If 90% of the events in the Author's life seem to have somehow occurred in 1969, this might be the result of the massive electroshock and hypnosis treatments HeOrSheOrIt underwent under the...care...of an MKULTA physician in Saskatoon, Saskatchewan, Abram Hoffer, who undoubtedly appears as only a minor, peripheral figure, if at all, in most literature on the subject...likely as a result of great care being taken by shadowy background figures to keep him out of the limelight, ala Kim Philby, due to the fact that the record of his 'personal history' seems to be unable to withstand close scrutiny once one begins to investigate the time periods preceding the end of WWII. Hhhmmmm...] Quit interrupting, Dogamnnit! Anyway, I was working in orkton, Saskatchewan and living with a sixteen year old high school student with no parents, no job, no source of income, who always paid his share of the rent, and always had better clothes and more spending money than me. [It turned out that he had two motto's in life. 1)Everything that isn't nailed down, is mine. 2)Anything I can pry loose, isn't nailed down...] The apartment we shared tended to be a hang-out for a variety of local high-school kids, who would invariably bring by any interesting characters passing through town on the couch circuit, who needed a place to crash for the night. One of these characters was Frank Skanks, an older fellow. The drug scene in orkton was basically a Virtual Drug Scene, where most people knew somebody who knew somebody who had once copped a bag of weed on a trip with their parents to Vancouver, and shared it with a few close friends on their return. Upon Franks arrival, however, things picked up, and a few of the local kids suddenly seemed to have access to a fair amount of smoking dope. There even seemed to be some acid floating around. I returned home one evening to find a bottle of wine in the fridge, and had several large glasses before 'the gang' returned from a trip to the Dairy Queen, whereupon they became dismayed to find that I had consumed such a large portion of a concoction they had prepared in accordance with Ken Kesey's directions in 'The Electric Kool-Aid Acid Test.' That seemed to explain the fact that I was able to pick up Messages >From Mars through the fillings in my teeth, which I had always had trouble doing before... I found it to be a fairly pleasant experience, even though I did feel a slight bit of guilt, knowing that I had inadvertantly setback the plans of a dozen or so people who had hoped to get high with the portion of Dr. Skank's Magic Elixir which I had unwittingly consumed. I didn't mind being 'dosed,' since I had already figured on trying LSD on the proverbial SomeDay. When my enlightened reverie was interrupted, however, by the sight of Frank Skanks teaching a group of thirteen-to-fifteen year olds how to tie-off and shoot up, my pleasant experience took on a rather sour note. When my efforts to put a stop to the proceedings failed, largely due to the rush of young children knocking me down in order to get a good place in the line that was forming, waiting for Frank to find one of his few remaining good veins, I decided that, in the interests of saving at least a single child, I would call on Dudley DoRight for help. I walked to the local RCMP station, dodging the dinosaurs and hobbits which seemed to be everywhere, in a multitude of colors, and proceeded to inquire as to whether they might be interested in helping to postpone a group of young teenagers' entry into the world of needles and spoons and basement rooms until a later age, when they might be in a position to make better judgements in that regard. After throwing me in a jail cell, and grabbing a wide variety of heavy weaponry, a quickly assembled RCMP assault force rushed out the door, to 'save the children.' I had the uneasy feeling that they were intent on saving them even if it meant killing them. I didn't get any sleep that night, undoubtedly as a result of the fact that I was 'tripping for twelve,' and I could hear a lot of muffled, semi-legible conversations taking place on the far side of the walls, or door. They didn't seem to make sense, and I assumed that it was because of my temporary residence of planets of another galaxy. The clearest verbal communication I heard, as the door to the jail cells was opened, was, "Wrong door!" I don't know who spoke those words, but I imagine that it was one of the Mounties in the company of Frank Skanks, who was staring at me with extremely wide eyes, and with excrement obviously filling his shorts in less time that it take to utter, "Can you say *cop*! Sure you can..." I was totally dumbfounded, as well as still extremely wasted, but I still managed to smile, and say, "Nice suit, Frank." before the door closed and the conference which had apparently just broken up was quickly reconvened. Being young and naieve, I thought that this was the end of the story, an interesting story I would someday be able to tell my grandchildren, after DNA testing showed my denials of paternity to be outright lies. What I didn't understand, at the time, was that my surprise at finding that the Great Canadian Hero, Dudley DoRight, was somehow involved in something which seemed to run contrary to the Official Movie Mythology, would soon be supplanted by total incredulity that the spot of shit I had observed on the end of Dudley's Dick would soon prove to be a massive amount of shit covering the RCMP members' members all the way to their pelvis, and dripping down off thier balls into their rubber boots. And the shit would smell an awful lot like mine... The Official Story was that, after performing a search of my apartment, and finding nothing, the RCMP returned with members of the force who were more 'experienced' in this area, who, lo and behold, found a single joint in a suit-jacket pocket. I was charged with possession of marijuana. Tiny, a member of the Apollos Motorcycle Club in Regina, who Frank had travelled into town with, had apparently told Frank to 'fuck off' when asked to introduce him to individuals throughout the province, with Frank paying travelling expenses and providing spending money during the trips. Tiny was willing to testify in court as to Franks apparent instigation of illegal activities on behalf of some entity who seemed to be funding him. A few days before the trial, we were pulled over by the Mounties, who took Tiny into their police car to have a chat with him. Upon his return, Tiny told me that it was suggested to him that if I got off on the charge, that they would have to find someone else to take the fall, and that he was next in line. Tiny assured me that he would still be there for the trial. Bye, Tiny... In order to convict me of possession of a single joint, the RCMP sent two Mounties to my hometown for a week or so to investigate me, as well as contacting everyone I have known since birth. Although my lawyer had assured me that the case would undoubtedly be thrown out of court as a result of the RCMP's tacit admission that a wide variety of individuals had been seen coming and going from my apartment between the first and second searches (while I was still in jail), I was convicted, receiving a criminal record and a $ 300.00 fine (at a time when other people were getting $ 50.00 fines and conditional discharges--no criminal record). Being a well-programmed True Believer in Truth, Justice, The Flag, The National Anthem, Dudley DoRight, Mom's Apple Pie, ad infinituum, it took me quite a while to fully understand that I had been screwed, blued and tattoo'd for the crime of...seeing something that I wasn't meant to see. Those who have found themselves subjected to my insane, inane, wild-eyed rants on the CypherPunks Disturbed Male LISP might be surprised to know that I didn't, at the time, get 'a bit out of line,' as might say. As a matter of fact, I pretty much retained my naievity, somehow convincing myself that this event in my life obviously had to be some kind of aberration of TheWayThingsAre (TM), or that the RCMP detachment in orkton had been taken over and subverted by the Body Snatchers, and that I should just mark it all up to having a BadHairDay. {I have not come by my cynicism easily, having had it pounded into me over the course of the years by a variety of members of our Officially Recognized Authorities who deemed that, once I had become an OfficiallyLabledBadGuy, I was fair game for anyone who was in need of 'someone doing something dirty, decent folks can frown on.'} Although I will freely admit that I remained, for the time being, an ignorant, well-programmed middle-class Canadian white boy, I am rather proud of the fact that I showed a spark of future promise as an individual capable of evolving into AManWorthyOfBeingCalledAMan, as Gurdjieff would say, by listening to the voice inside which told me that there was a line I could not cross and still retain any semblance of integrity and self-respect. I could not, in good conscience, allow these thieves to take my hard earned money, in payment of the court-ordered fine. I was met, after my conviction, on the steps of the courhouse, by a group of local teenagers, most of whom I did not know, who were aware that I had never smoked a joint in my life, and had decided that if I had to do the time, I might as well do the crime. The first joint I ever smoked was on the courthouse steps in orkton, Saskatchewan, after having been railroaded into a criminal conviction in order to prevent my being in a position to speak out about my inadvertantly gained knowledge of RCMP malefeasance. The first pound of weed I ever bought was in a public park in Edmonton, Alberta, which I sold in orkton, Saskatchewan, in order to pay a fine that resulted for conviction of possession of a drug I had not only never before done, but had never before seen. So, Constable McClean and Corporal Esau, swear out some new warrants and take me to court. I've already confessed... Sincerely, Mr. BigFuckou From schear at lvcm.com Mon Jul 20 17:14:02 1998 From: schear at lvcm.com (Steve Schear) Date: Mon, 20 Jul 1998 17:14:02 -0700 (PDT) Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...) In-Reply-To: Message-ID: >One of the reasons we so aggressively pursued the negotiations over export >control with the Administration and have pushed the AES, and our PKI is >the collateral damage from the export control legislative debate. When >the AES is finalized it will be followed closely by an ANSI X9 standard. >Once these standards and infrastructure are established, the concerns >about brute force attacks should be largely behind us. I think it likely, biological computation based brute force attacks will be available much sooner than many think. --Steve --------------------------------------------------------------------- reply to schear - at - lvcm - dot - com --- PGP mail preferred, see http://www.pgp.com and http://web.mit.edu/network/pgp.html RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9 RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D --------------------------------------------------------------------- From success26 at apexmail.com Mon Jul 20 02:20:33 1998 From: success26 at apexmail.com (success26 at apexmail.com) Date: Mon, 20 Jul 1998 17:20:33 +0800 Subject: Need Large Income Fast?? Message-ID: <46788335@merits494.net> Dear Prospective Entrepreneur; I have been an attorney for 26 years, but recently I joined a company which is only 3 years old, and is growing at a fantastic rate; in fact, after only 10 months old, it was featured in SUCCESS MAGAZINE, and it has been the #1 rated network marketing opportunity for the last three years. What makes this company and this opportunity I am offering you so great, is the fact that we (Marketing Executives) have "EXCLUSIVE" marketing rights in the United States to new miracle products that are providing dramatic benefits to people who have two of the worst diseases known to mankind. Americans who learn about and need our products, can only get them through us, and not from other companies, or the corner drug store. After getting into other companies in the last several years, and going from company to company, and product to product (mostly companies that failed, or had falsely advertised products), I finally found this company that is truly "CREDIBLE," has tremendous products, a great compensation plan, and, best of all, my customers are calling me back month after month. Since the products actually sell themselves, I'm NOT constantly on the phone, or forever hustling all my relatives and friends. Products that make people feel better (especially natural products that have no side effects, and do have a 60 day money back guarantee) cause people to call me every month, instead of me calling them. Our "exclusive" and "patented" all natural products have also gone through the double blind clinical studies and have produced unbelievable sales in foreign markets, and have only recently been introduced into the United States, so our timing is also perfect. If you are interested in trying our products and/or looking at this business opportunity, call me toll-free at 888-203-6668 and leave your name, telephone number, and/or your address if you want more information. You also can respond to this e-mail if you so wish. If you are ready to make some changes in your life, free up some time to spend with your family, and make some extra money, call me or e-mail me. WHAT HAVE YOU GOT TO LOSE? I made that same call a few months ago, and I promise, you will be happy to hear more about this tre- mendous company, its great products, and about how easy it will be for you to make that extra money. Thanks, Clyde Fontenot This message is brought to you from Clyde Fontenot, Attorney, 504 W. Main St., Ville Platte,LA.70586, 318-363-5535. From cons0005 at *algonquinc.on.ca Mon Jul 20 17:42:21 1998 From: cons0005 at *algonquinc.on.ca (Your Yashy) Date: Mon, 20 Jul 1998 17:42:21 -0700 (PDT) Subject: In-Reply-To: Message-ID: <199807210042.UAA17311@deathstar.comnet.ca> Priority: Normal To: "Ciferpunx" From: "kryz" Date sent: Tue, 21 Jul 98 00:12:26 -0000 (DST) > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: 2.6.2i > > s0mepeOplEarErEtarDeDanDsomeUsEtHeirHeAdD8ol2NI3s5E9ftasLOs0NBckLFwiHsZW > 9ogW6D+/Y7Uyx+dIGf45Fv6XTIjuMCIhvO44sg2QR84chTuHgrv2yRm2da9FcZUm > 6yM7dBk0iCJuj/nvtTXUZ/hT3X/6CUBr/9PyzvquECNqYX8ALmczfReY6s/SF4jA > zReU9IjbbX05MUDzMiNL54BrT71p4fZ+25oBDuzqZl8hRmVx16CjgxrEDbXoJZPU > ojTX/kNsQ60XZzIaww5eQS6p19TFIXt4op3lq8vBsieaLjzjdVjQsU3I4eR5J1z/ > Prp7836tlAggO3dbJflY3Ah1dB+oDTFb1ulR9BEABRGwAYe0G0NocmlzIEhhcndp > ZyBTYWxvcGV0dGUgMjUxMbABAw== > =mTz7 > -----END PGP PUBLIC KEY BLOCK----- > > > > HTTP://www.comnet.ca/~yashy 100 YashDollars to first person to try every link. (including links derived from links) p.s. SPAM PROOF Email address. Remove the "*" to reply. From Marketing at departs.co.il Mon Jul 20 17:44:05 1998 From: Marketing at departs.co.il (Marketing Dept.) Date: Mon, 20 Jul 1998 17:44:05 -0700 (PDT) Subject: De'Parts - The Parts locating highway... Message-ID: <19980720221402671.AAA450@www.departs.co.il@departs.co.il> To: General Manager. Purchasing Director Marketing Director. Re: Boost your sales to High-Tech industries. Dear Sir/Madam; * If you need to find parts or stock as fast as possible... You need De'Parts. * If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts. * If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts. Share your database with others, and join the De'Parts family at: WWW.DEPARTS.COM ********************************************** De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products. De'Parts enables you to publish and locate parts at the stroke of a key. Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need. Your parts or surplus stock could be just the solution for someone else's needs. De'Parts will help reduce your costs, improve inventory control and save valuable storage space. All members of the De'Parts network are able, free of charge: * To search our database; * To use our Email robot; * To submit Requests for Quotations (RFQ's); and * To download files. Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors. Publishing membership costs less than the price of an advertisement in your local newspaper. Just follow the steps below and you are on your way to a substantial increase in sales: 1. Log in to De'Parts and Register to the system. Be aware if You want to sale all your stock as a batch or to sell it Part by Part (It means that you may have to provide a quotation for each part). 2. Create a file to publish, include all your parts for sale, and follow the instructions that describe how to "Upload a File" in "Manage D.B.". 3. Upload your file to the system (Step 1 - to Publish the file as a batch. Step 2 - To publish and quote each part). 4. Check your Email frequently. For detailed information, please read the "About" section at: WWW.DEPARTS.COM Thank you for your time and we hope that you enjoy the advantages provided by our system. Wishing you a lot of success, S. Avishai V.P. Marketing De'Parts ------------------------------------------------------------------------------------------------- *** Take a part in De'Parts...the parts locating highway *** ------------------------------------------------------------------------------------------------- From Marketing at departs.co.il Mon Jul 20 17:44:08 1998 From: Marketing at departs.co.il (Marketing Dept.) Date: Mon, 20 Jul 1998 17:44:08 -0700 (PDT) Subject: De'Parts - The Parts locating highway... Message-ID: <19980720221916421.AAA603@www.departs.co.il@departs.co.il> To: General Manager. Purchasing Director Marketing Director. Re: Boost your sales to High-Tech industries. Dear Sir/Madam; * If you need to find parts or stock as fast as possible... You need De'Parts. * If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts. * If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts. Share your database with others, and join the De'Parts family at: WWW.DEPARTS.COM ********************************************** De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products. De'Parts enables you to publish and locate parts at the stroke of a key. Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need. Your parts or surplus stock could be just the solution for someone else's needs. De'Parts will help reduce your costs, improve inventory control and save valuable storage space. All members of the De'Parts network are able, free of charge: * To search our database; * To use our Email robot; * To submit Requests for Quotations (RFQ's); and * To download files. Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors. Publishing membership costs less than the price of an advertisement in your local newspaper. Just follow the steps below and you are on your way to a substantial increase in sales: 1. Log in to De'Parts and Register to the system. Be aware if You want to sale all your stock as a batch or to sell it Part by Part (It means that you may have to provide a quotation for each part). 2. Create a file to publish, include all your parts for sale, and follow the instructions that describe how to "Upload a File" in "Manage D.B.". 3. Upload your file to the system (Step 1 - to Publish the file as a batch. Step 2 - To publish and quote each part). 4. Check your Email frequently. For detailed information, please read the "About" section at: WWW.DEPARTS.COM Thank you for your time and we hope that you enjoy the advantages provided by our system. Wishing you a lot of success, S. Avishai V.P. Marketing De'Parts ------------------------------------------------------------------------------------------------- *** Take a part in De'Parts...the parts locating highway *** ------------------------------------------------------------------------------------------------- From stuffed at stuffed.net Mon Jul 20 17:57:26 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Mon, 20 Jul 1998 17:57:26 -0700 (PDT) Subject: World Exclusive: I was a lesbo virgin/Bigger balls are better Message-ID: <19980720234547.27548.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/20/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From lreed at west.cscwc.pima.edu Tue Jul 21 00:08:20 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Tue, 21 Jul 1998 00:08:20 -0700 (PDT) Subject: Canadian Shock Radio - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C97C4.5E586D60.1@west.cscwc.pima.edu> Canadian Shock Radio - SPACE ALIENS HIDE M DRUGS!!! ____________________________________________________ Lest anyone think that my rendidion of 'Dudley's Dick In D-Sharp" might be a bit of sour grapes on my part, let me state, for the record, that I hold no ill will against the poor, ignorant Nazis in the orkton division of the RCMP, since basically all they really did was to totally fuck up their own Karma, while giving me a valuable life-lesson which may well have been responsible for my making a very important and far- reaching decision later in my life. ears later, as a result of knowing what awaits TheManWhoKnowsTooMuch I decided to keep my fucking mouth shut about the people and events that I observed from my position on the ceiling, while looking down on my body and the rest of the room during a particularly intensive electro- shock experience. Something told me that I was, once again, inadvertently observing something that would result in 'measures' needing to be taken by the RecognizedAndRespectedMembersOfSociety (of which I was not one), in order to ensure that I did not share with others what I had seen while peeking under the skirt of the GreatWhoreWhoWasWearingNoPanties. One of the more disturbing things I perceived while listening to the rather enlightening conversations taking place among the gathered civilian and military medical personnel, was something that I have come to understand rather recently, as a result of research that was begun after something Tim May mentioned in one of his posts to the CPUNX list. I thought it odd, at the time, to observe my being given a long series of electroshocks in a single session, since it was my understanding that They (TM) just gave a person one, quick whack, and then hosed the shit off your sheets and wheeled you into another room to make way for the next lucky winner. Recent research, however, seems to indicate that this was a special technique pioneered in Canada by Dr. Ewen Cameron, MKULTRA's resident wanna-be-Nazi-doctor, in order to wipe his patients' minds (and identities) 'clean,' in order to prepare them for a rebuilding of their personality, through a technique called Psychic Driving (which turns out to be a kindlier, gentler form of Brainwashing--as long as you are only comparing it to bamboo-shoots under the fingernails and rats in cages placed over one's face). Of course, Dr. Cameron, who retired to great accolade, recognized as a Titan in Canadian Medical History, as opposed to being tried by an International Court and sentenced to be hung, like his predecessors at Dachau, was really only being used as an expendable shill to take the heat if the shit hit the fan over Rockerfeller Foundation funded CIA/ Military experiments obliterating the minds of women being treated for such devastating mental disabilities as 'menopause' and 'post-partum depression.' After all, one could hardly expect the CIA to risk exposure of the players in the Canadian MKULTRA scene whose pre-WorldWarII alleged 'histories' could not withstand close scrutiny. Accordingly, after the shit hit the fan, it was Dr. Cameron who fell off a cliff while 'climbing' , while my physician continued to practice...and practice...and practice... Delving into the history of CIA mind-control experiments cleared up a few things that had been somewhat of a mystery in regard to my medical treatment over the years, such as how I had ended up being treated with hypnosis and heavy doses of electroshock when I had originally gone to see the doctor in regard to a particularly nasty hangnail, and what the fuck all of those Navy people were doing two thousand miles from the ocean. I'm just kidding, of course... The fact is, I *already* knew *what* the fuck all of those Navy people were doing in Saskatchewan. They were there conferring with Dr. Hoffer's alleged 'research assistant,' MJ. What I *didn't* know, at the time, was *why*. I was not surprised to recently find out, after a modicum of research, that Ms. MJ Callbeck left the Navy as a nurse lieutenant, specializing in psychiatric nursing, receiving most of her postgraduate training at Allan Memorial Hospital in Montreal, from phychiatrists who were, to put it as delicately as possible...PostWar Refugees From Hitler's Nazi Germany. (With 'refugee' apparently being defined as a physician who had escaped trial and hanging at Nuremburg, as a result of having a wealth of information and 'practical experience' in areas that were of interest to American and Canadian intelligence agencies.) Ms. Callbeck became a 'research nurse' for a research team formed in Saskatchewan with huge grant from the CIA's Canadian funding front, the Rockerfeller Foundation, and was awarded a training grant to visit two U.S. research units funded by the CIA's American funding front, the Human Ecology Foundation, at Tulane University, in New Orleans, and the Psychiatric Institute in New ork. After MJ's return from the HeartOfMentalDarkness of the MKULTRA mind-control establishments in the U.S., she created a psychiatric researching nursing team to 'control' all clinical research for the team, and to ensure that research protocols would be followed. Ms. Callbeck's and Dr. Hoffer's careers were closely intertwined with Dr. Humphry Osmond, a British Naval doctor sent to Canada to look after British Naval Intelligence's interests in the North American mind-control research arena being fronted by the CIA, with their MKULTRA Project, and Captain Al Hubbard, the Johnny Appleseed of LSD, whose hallucinogenic pecker-tracks throughout the OSS and the Manhattan Project led to him receiving a Presidential Pardon from Harry Truman, as well as opening doors for him to a wide variety of employment with such agencies as the CIA and the Canadian Special Services. As a matter of fact, the chronolgy of the U.S. mind-control experiments moving beyond U.S. borders, to countries such as Canada, when publicity and legal technicalities (such as the murder of innocent victims who had been dosed with hallucinogenic drugs without their knowledge) became a bit of a 'sticky wicket,' was mirrored in Canada by the careers of Hoffer, Osmond, Callbeck and Hubbard, who seemed to be at the center of much of the 'progressive' psychiatric research funded by American and Canadian military intelligence agencies, but who always managed to somehow exit the scene just before the shit hit the fan, and, as a result, "not get any fon 'em." {e.g. - Just as Hubbard (who looks surprisingly like my step-grandfather, Ray Hubbard) managed to slip out the back door of the Hollywood Hospital in Vancouver, just as "the Canadian Medical Association was becoming increasingly suspicious of Hollywood Hospital in the wake of publicity surrounding MK-ULTRA" (with the Canadian Citizen's Commission on Human Rights doing a distincly audible "Hhhmmmm..." over discovering a CIA contract psychiatrist, Dr. Harold Abramson, being on the Board Of Directors of the hospital superintendent's Psychedelic Therapy Assn.), Dr. Hoffer always seemed to manage to call a 'slant-right' at the exact time that a hole in the line seemed to open up, closing behind him and leaving the more dispensable players behind to face a legal and media blitz(krieg) that was more interested in kicking ass and taking names, than who actually had the ball. Naturally, after 1966, when overt legal research into hallucinogenic therapy was stopped/banned, Dr. Hoffer, who was then Associate Professor (Research) Psychiatry, College of Medicine, University of Saskatchewan, suddenly deemed it time to go into 'private practice,' where his work/ research would not be subject to the scrutiny of his peers and his employers, who might take a dim view of any connection to what was now illegal research. Ms. Callbeck, Navy Lieutenant, MKULTRA research trainee, also found it a convenient time to depart the Research Unit at the University of Saskatchewan, and assist Dr. Hoffer in the research he was pursuing. As always, what one finds upon inquiry into JustTheFactsMa'am never seems to be quite as intruiging as what one *does*not* find... For instance, one would expect a person who held such an esteemed position as Director General Technical Assistance, United Nations, to include this accolade on his or her Curriculum Vitae, but Dr. Hoffer does not seem to have done so. As well, all research into the details of the position seem to lead nowhere, except when one makes personal inquiries through people who were involved with closely connected areas of the UN agency at the time, and, even then, when one begins to ask more detailed questions about the involvement-of/relationship-with Kurt Waldheim, etc., people's memories suddenly get much worse, and, by golly it seems that they can't seem to remember hardly anything at all, and think that maybe they were mistaken about what they already told you. Of course, when one looks under the dustbins of history, one invariably finds a few dustballs that remain, as a result of someone forgetting to do a thourough cleaning, and one finds such gems as a letter from The Commission For The Study Of Creative Imagination, with such notables/ suspects such as Hoffer, Hubbard, Osmond, Huxley. Smythies, on the Board of Directors (with Hoffer's UN position highlighted), making inquiries into the Urantia manuscripts which Hitler's Deaths Head troops found so enamoring. "Our little planet, Urantia, is poised on the brink of an enthralling epoch of social readjustment, moral quickening, and spiritual enlightenment -- the threshold of true civilization." {Of particular interest is the lack of any mention of Reptilian Nazis, even though it seems to be common knowledge that Jesus descended into the bowels of the earth during his three days of being incommunicado. Were there 'basement stairs' in his 'burial' cave?} Also curiously missing from all references to the history of psychiatry and/or hallucinogenic mind-control experimentation in Canada is mention of an individual whose name I encountered many times in Saskatchewan, and always in relation to communities which contained major mental health hospitals or facilities--Frank Skanks. The above, of course, is just the tip of the iceberg that one discovers upon doing a bit of research into known and documented human figures in the history of mental health research and practice in Saskatchewan. If one begins investigations into some of the more shadowy figures who are usually encountered only when viewing their electroshock treatments from the ceiling above, or by following them from one's doctor's office and eavesdropping on them during their lunch, etc., then things get, as Alice noted, "curiouser and curiouser..." Stan, you've still got something hanging from your lip... From yjia at sz.utl.com.hk Tue Jul 21 01:25:06 1998 From: yjia at sz.utl.com.hk (Jia Yan) Date: Tue, 21 Jul 1998 01:25:06 -0700 (PDT) Subject: where... Message-ID: <19980721071954.AAA9474@pc-230> Hi: Does anybody can tell me in which ftp site i can find the specifications about the CCITT's X.400 and X.500 protocol sets? Thanx! From nobody at REPLAY.COM Tue Jul 21 02:12:56 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 21 Jul 1998 02:12:56 -0700 (PDT) Subject: Thanks, phlamers! Message-ID: <199807210913.LAA13592@basement.replay.com> * To: cypherpunks at toad.com * Subject: Re: Request To Be Phlamed * From: Reeza! At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote: >Hi Guys GO THE FUCK AWA. NOW. ______________________ I would like to thank all of you who helped to test my new PresidentialDeathThreatRemailer by sending your flames to the above address, to be forwarded to the BlancHouse. [Please note that the PresidentialDeathThreatRemailer logs and forwards all headers with the messages.] I put the PresidentialDeathThreatRemailer into operation only after receiving assurances from Jim Bell's public defender attorney that I am legally free to help people exercise their right of free speech in this manner, and that it would not adversely affect my military career, as long as I was careful to forward only flames and death threats, while deleting any pictures of officers fucking the living shit out of non-coms. All donations to the PresidentialDeathThreatRemailer will be donated to the IRS Jalapeno Vaseline Fund. Reezone Ozone From whgiii at invweb.net Tue Jul 21 03:37:58 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Tue, 21 Jul 1998 03:37:58 -0700 (PDT) Subject: where... In-Reply-To: <19980721071954.AAA9474@pc-230> Message-ID: <199807211036.GAA07241@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <19980721071954.AAA9474 at pc-230>, on 07/21/98 at 04:25 PM, "Jia Yan" said: >Hi: > Does anybody can tell me in which ftp site i can find the specifications > about the CCITT's X.400 and X.500 protocol sets? > Thanx! Well this one was a real bitch to find. The CCITT is now the ITU: http://www.itu.ch The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm The X.400 specs are actually located under F.400 as this spec has been givien a dual designation of F.400/X.400 Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs, whatever that is in real money. X.500 is the same deal but it is only 20 Swiss Francs. The specs seem to be in postscript, adobe, and word formats. Engilsh, French, and Spanish versions available. They are set-up for online ordering and downloading. After you pay you are given a username and password to download the file(s). I think if you hunt around the site you may be able to pick up a copy of all the specs on a CD but no idea what it costs. Hopw this helps, - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html - --------------------------------------------------------------- Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981 -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/ 9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz EN5A3lFhayM= =WCIU -----END PGP SIGNATURE----- From lreed at west.cscwc.pima.edu Tue Jul 21 05:14:27 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Tue, 21 Jul 1998 05:14:27 -0700 (PDT) Subject: I95 - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C97EF.202780A0.1@west.cscwc.pima.edu> I(95)'m An Asshole - SPACE ALIENS HIDE M DRUGS!!! __________________________________________________ Been an asshole all my life... I suppose I should keep my obligation to be true to my word and provide the RCMP with details of my life of crime, in order to help the Canadian Justice system to compensate for the ignorant incompetence of Canada's National Internal Police Force. I guess it was kind of mean of me to 'confess' to a crime I committed over a quarter-century ago, on which the Statute Of Limitations has undoubtedly run out. So I'm a belligerant, smart-alec asshole...so sue me! Regardless, I feel obligated to give up the Real Goods this time, by confessing to a more recent crime for which I can undoubtedly be charged, tried and convicted, without anything remotely resembling True Justice standing in the way... Get out the warrant and lick your pen, Dudley, because I confess to being guilty of none other than...Accessory After The Fact To Grand Theft Auto! Less than two years ago, nonetheless! Personally, I think that Officer Besalt should get the honour of throwing the cuffs on me for this charge, since the actual perpetrator of the car theft was his good BumBuddyAidsInfestedDrugAddictedInformant, Ian Wasacase, on whose behalf Officer Besalt, a SorryScumBagPieceOfShit ThievingPrick (TM) robbed me at gunpoint in full public view, at the CoalDust Saloon, in Bienfait Saskatchewan. RCMP Officer AJ Besalt, a piece of Human Garbage who has the conscience and intellect of a Slug, not only seems incapable of feeling any sense of shame in dressing up in his neatly pressed uniform, with his shiny badge and shoes, and telling a judge, with a straight face, nonetheless, that, despite his incompetence in being able to produce the proper paperwork on a DogAtLarge charge that he commanded the plaintiff to appear in court on, under the threat of armed, physical violence, the case should be continued, with a new date set, in order for him not to feel like an incompetent moron for being able to handle a simple DogAtLarge case any better than he did an attempted DrugBust, ending up having to retrieve their government informant/agent's DrugBuyFrontMoney at gunpoint from a citizen who had committed no crime. Oh, pardon me...I would hate for anyone to get the *wrong* impression, here... OffalSir Besalt didn't actually mention the part about using a career criminal and police informant to attempt to frame a disabled person on a drug charge by using the threat of violence to get him to sell some of his medication in return for marked money. I guess he didn't want to take up the Court's valueable time with insignificant details. Lest the reader believe, Dog forbid, that I am stringing out my sincere confession in order to torture a poor, pathetic excuse for a human being by including facts and details that never quite seem to make it into the Offical Police Reports, I guess I had best get on with supplying the details of my HeinousCrime. I was very young as a child... OK, really, now... Ian Wasacase, former preacher , had come to Estevan to bestow his blessed presence on his brother, Gilbert, and his family. He had driven down with his NewImprovedDrugAddictedOldLady and a couple of friends who were apparently his apprentices in his life of crime. As overjoyed as Gilbert and his wife, Peggy, were to see Gilbert's beloved brother, Ian, they nonetheless that, in the interest of saving the life of several single children, their own, that it would be best if Ian and his SpoonFed Roadies were to depart, and thus not further endangering the lives of the family's children by shooting their AIDS infested blood all over the floor, walls and ceiling of the bathroom and the children's bedrooms. In consternation with the difficulty of getting the FamilyJunkie and friends out of his home, Gilbert offered to pay my expenses to make a trip to Regina, which he knew I needed to do anyway, in return for leading his brother to believe that I had a medical prescription that was waiting for me in Regina, which I would be interested in selling to pick up a little cash. It worked like a charm... Ian and the SpoonFed Roadies had their belongings packed and were waiting outside, by the vehicles, in 32-seconds flat. (A new world record!) Ian's old lady and two friends climbed into my motorhome, explaining that the heater in the car they had brought didn't work very well, and we proceeded down the highway, toward Regina, with me following Ian's car with my motorhome. Well, not exactly... It turns out that it wasn't Ian's car. It wasn't his old lady's car. It wasn't either of his friends' car. I pretty much figured that out when he pulled over by the side of the road, motioning for me to stop, and then turned onto a small snow-filled side road which received no winter maintenance, and proceeded to put the pedal to the metal, going up and over a railway crossing, and down the other side into a deep snowbank where the car would be hidden until spring thaw. My instincts were further confirmed when he appeared, walking back, with a hammer, a large screwdriver, and the license plates off the car. Did I inform the police of this? Did I turn him in? Nope...I'm AnAccessoryAfterTheFact. To tell the truth, being AnAccessoryAfterTheFact has, thus far, resulted in far less jail time than any of the attempts I have made during my life to provide information and/or assistance to those who are officially sworn to uphold the law. It always seems that those who perpetrate crimes are much more informed on the legal technicalities regarding crimes and criminal proceedings than those who happen to be standing nearby with their thumb up their ass, committing crimes only against themselves. In the end, it always seems to end up that the person who murdered a few hundred babies in their crib gets probation in return for turning State's Evidence against the person who wanders into the room and says, "Uuuhhh...I really don't think you should be doing this." Cynical? Moi? Eat my shorts...I'm talking about Real Life (TM) here, boys and girls, not about Matlock, OK? So, there you have it, Dudley. A full confession that can be used to convict me, coming from my own lips (so to speak, although I actually type with my tongue). No longer will you have to haul my ass repeatedly into court in vain attempts to convict me of crimes of which I am not guilty, as a result of sloppy investigative work and a propensity to ignore the fact that your witnesses are lying scumbag sacks of shit who would testify against their own mothers to get out of their own criminal charges. [EditWhore's Gnote: Since the confession, per se, is complete, members of Royal Canadian Mounted Police may want to forgoe reading the rest of my diatribe, since it will merely fill in a few small details regarding the incompetent, criminal and unconsionable actions of Officer Besalt.] Upon reaching Regina, after the commission of my Heinous Crime of AnAccessoryAfterTheFactToGrandTheftAuto, I decided that I would drop the GrandTheftAutoPerpetrator, et al, off at their place of residence, purporting to go pick up my medications and return, to make my fortune selling them my medications at outrageously low prices. Instead, I seemed to get stuck in the driveway behind their house, even though the snow was not very deep, and I had little trouble driving in. After going in the house to warm up and get a shovel, which it turns out they didn't have, Ian took my winter coat to go get a shovel, or some friends to help, or somesuch. He soon returned without the jacket, without a shovel, and without any friends. Since it was thirty or forty below zero and they had no phone, I quickly began to suspect that, since I obviously wasn't going anywhere, Ian & Company had come to the conclusion that a bird in the hand is worth two in the bush, and that once they were in possession of the medication I currently had, then they could look forward to a bright future in which there might actually be another bird out there somewhere, in the form of a prescription for further medication. Although I would be the last one to heap praise upon Ian for the choices he has made in his life, neither would I be the first to heap huge amounts of abuse on him for his character, or lack thereof. The reason for this is quite simple...he didn't kill me. Ian is a drug addict, with a ferocious habit to feed, and little stength of character left with which to attempt to avoid falling into total moral depravity. However, he chose to scam me, steal from me while I slept, and the like, over the course of several days, instead of just whacking me over the head with an axe and taking all of my medication. This small bit of self-restraint on his part allowed me to split my supply of medication into small stashes which I could allow him to find and steal at a rate suitable for keeping his habit in check, and buy me time for the temperature to rise to a scorching twenty below zero, at which time I made a break for a friend's house some distance away, and suffered only minor frostbite in the process. As far as Officer Besalt, RCMP, is concerned, however...Fuck That Sorry Criminal ScumSucking Piece Of Crap In His Dirty Little Asshole! Officer Besalt, too ignorant to realize who was grinding the organ, and who was dancing with the funny hat and the tin cup, brought Ian down to Estevan in an attempt to bust me for selling my medication. ou see, Ian had been working as an informant for the RCMP in other Saskatchewan districts, enabling the Mounties to arrest and convict a number of desperados, some of whose crime seemed to be wanting to kick Ian's ass for fucking their sisters while being AIDS infested, without telling them. {In all fairness to the Mounties, Ian's bragging about the people who he had screwed over as a police informant indicated that half of them were probably guilty of *something*...} Thus it was that Ian and his old lady appeared on my doorstep in the small hamlet of Bienfait, late one night, wanting to purchase some of my medication. He pulled a wad of money out of his pocket, and seemed fully prepared to make a buy... [Note by AnEditorToBeBustedLater: What it is essential to understand, here, is that any individual on the face of the earth, no matter how dim-witted, could immediately take one look at Ian, seeing him for the first time, and instinctively realize that no matter how desperate he was for a fix, even if he had a million dollars in his pocket, he would first try every scam in the world to steal whatever drugs a person had before he would finally break down and actually *buy* them in an honest, straightforward deal.] I stood there looking at the cash in his hand, mentally visualizing a picture of Dudley DoRight where the Queen's picture normally is, and immediately came to three quick conclusions: 1) The motherfucker *owed* me for the several hundred dollars that it took for me to replace my tires and get my motorhome mobile again. (Not to mention the thousand or so dollars of damage he did to the interior while tearing it apart, looking for drugs.) 2) Ian was only holding forth $ 40.00, out of the several hundred in his possession, obviously intending to purchase a couple of pills, stash the rest of the money in his sock, and pick up a couple of hundred bucks in spare change, over and above what the RCMP were paying him to help frame innocent people. 3) Since Ian was totally incapable of going more than a few hours without drugs, he undoubtedly had some in his possession (probably provided by the Dudley DoRight Pharmacutical Company), and that if I didn't do a deal with him, he might very well stash the forty bucks in my house on his way out, and turn over a few pills of his private stash as evidence against me. I don't like jail...never have...never will... Regardless, there was not a snowball's chance in hell that I was going to pass up an opportunity to fuck Ian out of forty bucks. I snatched the $ 40.00 out of his hand, and said, "OK! I'll meet you at the CoalDust Saloon in ten minutes. I've got the shit stashed outside." Ian knew I was scamming him, but he wasn't sure how. Neither was I, but I had ten minutes to figure it out... Basic Rules Of Life #238: If your's is the strength of ten, because your heart is pure, and you are working for the Forces of Light...never pull your scams in a dark alley. Dark alleys are for criminals, and the criminal with the badge and the gun invariably win the battle. Basic Rules Of Life #239: Criminals are afraid of the light...even criminals with badges and guns. "Sunshine is the best disinfectant." ~ Judge Louis Brandeis I went to the CoalDust Saloon, and used one of the twenties to buy a beer for myself and Ian. Ian wanted me to give him the drugs, and I told him to hold on for a minute. I walked over to the change machine by the Video Lottery Terminals and put the other twenty and the beer change in, turning them into loonies. I gave Ian ten of the Loonies. I proceeded to put the rest of the Loonies into a VLT machine and begin gambling. Ian asked me where the drugs were. I told him to fuck off. He looked hurt and hung around like a kicked puppy, while his old lady made a call on the pay phone. Officer Besalt walked through the door of the CoalDust Saloon a few minutes later. [eah, yeah, it's me again: The RCMP cover a lot of territory in a thinly populated area, around Estevan, and thus it takes them a considerable amount of time to respond to calls. It may take them several hours to respond to a traffic accident, or thirty minutes to an hour to respond to serious crimes late at night. If they walk through the door five minutes after being called, it is because they were sitting around the corner, and waited for four minutes before getting out of their vehicle and coming in.] Officer Besalt needed to get the Mountie's DrugFrontMoney back while pretending it was Ian's money. Lottsa luck... We discussed the situation, as I sat playing the VLT, and I quite simply told the OffalSir that Ian had offered me money to buy drugs from me and that I had taken it, since he owed me hundreds of dollars for having slashed my tires in order to hold me hostage and steal my drugs in Regina. Unfortunately, I didn't use the word 'taken.' I told OffalSir Besalt that I had 'snatched' the money from Ian's hand, whereupon both Besalt and I knew that he was now free to fuck with me if I did not return the money, since I had implied that Ian might not have relinquished the money totally voluntarily. Although I was between a rock and a hard place, not having the money, there *is* a Dog! I hit a minor jackpot that gave me forty bucks. As I waited for the barmaid to cash in my ticket and bring me the money, I made a point of going into great detail, loud enough for everyone nearby to hear, about how the person on whose behalf the RCMP Officer was shaking me down was a drug addict who was attempting to make a drug buy from me, and how I was unwilling to commit the crime, desiring only to receive the money that he owed me for slashing my tires and holding me hostage in severe winter conditions in the BigCity. "Sunshine is the best disinfectant." The Bottom Line: OffalSir Besalt is a sorry, scumbag Nazi piece of shit with no better morals or conscience than to try to use a lying, conniving criminal scam- artist who has provided countless Canadian youth with hard drugs while working as a paid RCMP agent/informant, to attempt to entrap a mentally disabled individual into committing a crime by selling his medications in order to prevent once again being victimized by a lifetime criminal. Oh, yeah...and *I* have never murdered anyone by giving them AIDS while being under the legal protection of the RCMP. _____________________ Non-Adobe PostScript: One of the more humorous aspects of the Ian Wasacase Saga was a news story in the Regina Leader Post in regard to the RCMP's ultra-secret informant/witness in the trial of four(?) men accused of armed robbery (and murder?). After describing the individual's identity being cloaked by his participation in the Witness Protection Program, the Leader Post, toward the end of the article, revealed Ian's name. Duuhhh... Ian is now serving hard time in a Manitoba prison as a result of a multitude of armed robberies he committed while working under the protective umbrella of the RCMP. {Undoubtedly hoping that his cellmates don't have a subscription to the Regina Leader Post.} Officer Besalt is serving hard time as a result of being trapped in the mind and body of an Ignorant Nazi Fuck (TM). {Undoubtedly too fucking ignorant to realize that he would be much better off being Ian Wasacase.} Attention Law Enforcement Agents: "Smoke 'em if you confiscated 'em..." From howree at cable.navy.mil Tue Jul 21 06:50:14 1998 From: howree at cable.navy.mil (Reeza!) Date: Tue, 21 Jul 1998 06:50:14 -0700 (PDT) Subject: Requests In-Reply-To: <19980720203908.28197.qmail@hotmail.com> Message-ID: <3.0.5.32.19980721224922.0084d980@205.83.192.13> At 01:39 PM 20 07 98 PDT, Corvus Corvax wrote: > >> What some of them seem to want would appear to be _me_ (and you). > >Only because you'd look so absolutely luscious in leather, darling. > >Kiss kiss, > >Diva! von Future Prime > Luscious in leather is something nice, BUT: "Luscious" does not suit me. Lusty, vigorous and virile, perhaps, but not luscious. DID YOU SEE THAT? IT was FREE SPEECH! On a UFO~! Reeza! From jya at pipeline.com Tue Jul 21 08:31:00 1998 From: jya at pipeline.com (John Young) Date: Tue, 21 Jul 1998 08:31:00 -0700 (PDT) Subject: NSA's Long Strong Arm Message-ID: <199807211530.LAA08035@camel8.mindspring.com> >From a series in Network World, July 20, 1998, "The Long, Strong Arm of the NSA," about the Agency's methods of enforcing export obedience with intimidation, delay and obfuscation: User manual: Dodging the rules By Ellen Messmer Network World, The National Security Agency (NSA) wrote the export rules on encryption. But from the point of view of corporations that want to ship U.S. software to their foreign offices, getting around the U.S. export rules is a top priority. And even for those who used to work at the NSA, it's still a challenge. "Well, I wrote those export rules when I was at the NSA," confessed Russell Davis, now chief of information technology security at SBC Warburg Dillon Read, a division of Swiss Bank Corp., which operates in 77 countries. Since joining the corporate life, Davis has used his knowledge of the NSA to find ways to work around the export system on behalf of his customer, the bank, which uses a lot of encryption-based security gear. "It took 17 months to figure out how to get crypto-based smart cards to Swiss facilities and elsewhere," Davis said. "But I wrote the rules on all this, and I know how to get around them." Would he ever consider using government- approved data-recovery? "Never," Davis declared. "My customers come first!" "Our customers just aren't going to buy these types of products," said Tom Carty, vice president of business development for GTE CyberTrust. He agreed the government is leading industry down a path to build products few users will willingly buy. --------- More at Network World: http://www.nwfusion.com/news/0720nsa.html (requires sign-up) Mirror: http://jya.com/nsa-lsa.htm Thanks to MO. From jya at pipeline.com Tue Jul 21 09:28:15 1998 From: jya at pipeline.com (John Young) Date: Tue, 21 Jul 1998 09:28:15 -0700 (PDT) Subject: Hooray Mondex In-Reply-To: <199807211516.LAA14338@homeport.org> Message-ID: <199807211628.MAA31959@camel8.mindspring.com> Here's a Chase-Mondex user's report from Manhattan's upper west side test bed: 1. We got about 20 of the first cards and sent them around the globe to crackers. None shared the fruits but a few came back with requests, see 2 : 2. By special request of sweettalking crackers who had heard about the first batch, we got a few more, and knowing these folks were honest, we loaded the cards with a few bucks from our bank account as they asked, "for testing." Days later we were broke. 3. Chase refilled our account and apologized for insufficient protection from electronic bandits. The bandits sent us 50% of what they stole: $12.00. Rudely wrote: get a job. 4. Recently, we got two of Citibank's cards with $5.00 each on them. Tried for days to get local merchants to take them, none would because they lacked a unique magnetic stripe they'd been advised to watch for, which, we later learned, once swiped could tap into global data banks on the user, clean their accounts, screw their records, erase the institutionalized mugging, leave an audit showing it was the irresponsible military-site crackers who did it. 5. We got $5,000,000 digi-cash for that info from SDA, who got it from the institutions running the Mondex banditry: those ACP recommends the Commerce Department grant license exceptions for the export of encryption products of any strength that have been determined to be "legitimate and responsible."[*] Happily Legitimate and Responsible ---------- * http://jya.com/acp-dier.htm From CTIA_Daily_News at um2.unitymail.com Tue Jul 21 10:38:10 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 21 Jul 1998 10:38:10 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 21, 1998 Message-ID: <199807211729.MAA16881@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV Call 202-785-0081 for more information. =========================================== From leo at supersex.com Tue Jul 21 11:10:43 1998 From: leo at supersex.com (Leo) Date: Tue, 21 Jul 1998 11:10:43 -0700 (PDT) Subject: you got that PGP program? In-Reply-To: <99c9c87.35b3d24d@aol.com> Message-ID: On Mon, 20 Jul 1998 LrdWill at aol.com wrote: > you got it? > Not since the penicillin shots, no. From stuffed at stuffed.net Tue Jul 21 12:38:20 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Tue, 21 Jul 1998 12:38:20 -0700 (PDT) Subject: Donkey Dick: Man tries penis swap with Donkey/Springer's 'love child' Message-ID: <19980721174201.1221.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/21/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From "cognitus" at earthlink.net Tue Jul 21 13:34:04 1998 From: "cognitus" at earthlink.net (Richard Storey) Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT) Subject: NSA's Long Strong Arm In-Reply-To: <199807211530.LAA08035@camel8.mindspring.com> Message-ID: <35B4FBC9.F5E75026@earthlink.net> John Young wrote: > > >From a series in Network World, July 20, 1998, > "The Long, Strong Arm of the NSA," about the > Agency's methods of enforcing export obedience > with intimidation, delay and obfuscation: At http://jya.com/nsa-lsa.htm, the first article is the most interesting. It demonstrates what I have always believed, that the state's reason for limiting encryption was mainly to pressure corporations, who are driven by profits, to adopt the state's desired encryption features. These NSA-approved products from American corporations should be seen as contaminated, tainted and poisoned. Would you purchase hardware or software that meets the government's export standards--approved by NSA? "Never," Davis declared. "My customers come first!" Richard Storey From mla39 at gte.net Tue Jul 21 13:46:27 1998 From: mla39 at gte.net (mla39 at gte.net) Date: Tue, 21 Jul 1998 13:46:27 -0700 (PDT) Subject: Put your subject line here Message-ID: <199807212040.PAA12975@smtp1.mailsrvcs.net> ___________________________________________________________ This Message was Composed using Extractor Pro '98 Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. E-Source is pleased to announce that they are a Channel Parnter with TAVA, developers of the Plant Y2KOne Software System. As a Channel Parnter, E-Source can reduce the costs and the risk associated with manufacturing plant conversions for the year 2000. Visit www.tava.com for a review of the product. Then contact E-Source directly at mla39 at gte.net for a technical visit or review. We have trained computer engineers ready to assist you on Y2K compliance issues. Mel Arendt EVP- E-Source mla39 at gte.net From yjia at sz.utl.com.hk Tue Jul 21 17:57:00 1998 From: yjia at sz.utl.com.hk (Jia Yan) Date: Tue, 21 Jul 1998 17:57:00 -0700 (PDT) Subject: where... Message-ID: <19980721234852.AAA14790@pc-230> Thank you very much! but i think i can work out sum better ones with the money. ---------- > From: William H. Geiger III > To: Jia Yan > Cc: cypherpunks at toad.com > Subject: Re: where... > Date: Tuesday, July 21, 1998 6:28 PM > > -----BEGIN PGP SIGNED MESSAGE----- > > In <19980721071954.AAA9474 at pc-230>, on 07/21/98 > at 04:25 PM, "Jia Yan" said: > > >Hi: > > Does anybody can tell me in which ftp site i can find the specifications > > about the CCITT's X.400 and X.500 protocol sets? > > Thanx! > > Well this one was a real bitch to find. > > The CCITT is now the ITU: http://www.itu.ch > > The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm > > The X.400 specs are actually located under F.400 as this spec has been > givien a dual designation of F.400/X.400 > > Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs, > whatever that is in real money. > > X.500 is the same deal but it is only 20 Swiss Francs. > > The specs seem to be in postscript, adobe, and word formats. Engilsh, > French, and Spanish versions available. > > They are set-up for online ordering and downloading. After you pay you are > given a username and password to download the file(s). > > I think if you hunt around the site you may be able to pick up a copy of > all the specs on a CD but no idea what it costs. > > Hopw this helps, > > - -- > - --------------------------------------------------------------- > William H. Geiger III http://users.invweb.net/~whgiii > Geiger Consulting Cooking With Warp 4.0 > > Author of E-Secure - PGP Front End for MR/2 Ice > PGP & MR/2 the only way for secure e-mail. > OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html > - --------------------------------------------------------------- > > Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981 > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3a-sha1 > Charset: cp850 > Comment: Registered_User_E-Secure_v1.1b1_ES000000 > > iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/ > 9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd > xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz > EN5A3lFhayM= > =WCIU > -----END PGP SIGNATURE----- From jf_avon at citenet.net Wed Jul 22 09:53:53 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Wed, 22 Jul 1998 09:53:53 -0700 (PDT) Subject: FLASH: Fwd: Modification to ITAR under way: Will it affect crypto too? Message-ID: <199807221424.KAA02460@cti06.citenet.net> Hi Cypherpunks. I fell on that text in the Canadian Firearms Digest, V2 #506 today. Maybe somebody will want to look into it to see what part of ITAR was modified and if it will affect crypto... Please feel free to forward to every possibly interested party. Ciao jfa ============================================================= Date: Wed, 22 Jul 1998 06:29:54 -0600 From: Rod Regier Subject: US Export controls saga update (http://www.pmdtc.org/oas.PDF) indicates that US State Dept. expects the current exemption of Canada from the ITAR export permit requirements for firearms and ammunition (and parts thereof) to be rescinded soon. When I spoke to a US State Department employee, they indicated they were being told it is going to happen in a few days. They gave me a Canadian government employee counterpart contact information (?Dept of Foreign Affairs?). I spoke with the Canadian government contact, and was pleasantly surprised for a change. I was told that Canada plans to contest this threatened action, since in part it could have wider trade implications outside the firearms and ammunition realm. This is certainly refreshing, since on the whole the current Canadian administration has generally leapt at any chance to put it to the Canadian firearms community. My contact expressed the belief that a change in Canada's ITAR permit exemption status by the United States cannot be accomplished solely by Executive branch action, but must be cleared thru the Legislative branch (Congress) too. If that is indeed the case, it is much less certain of approval, since the anti-gunners may control the US Executive branch, but they don't control US Congress at this time. - -- Rod Regier, Software Development bus: (902)422-1973 x108 Dymaxion Research Ltd., 5515 Cogswell St., fax: (902)421-1267 Halifax, Nova Scotia, B3J 1R2 Canada email: RRegier at dymaxion.ca corporate url: http://www.dymaxion.ca Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada ��DePompadour,�Soci�t�d'Importation�Lt�e �����Limoges�fine�porcelain�and�french�crystal ��JFA�Technologies,�R&D�physicists�&�engineers �����Instrumentation�&�control,�LabView�programming PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891� PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C From CompSec01 at aol.com Wed Jul 22 10:08:40 1998 From: CompSec01 at aol.com (CompSec01 at aol.com) Date: Wed, 22 Jul 1998 10:08:40 -0700 (PDT) Subject: Tempest computers Message-ID: <4da466f2.35b58852@aol.com> If you would like information about tempest monitors, computers, printers or secure fax machines, please contact me. Tempest tecnology prohibits the electronic monitoring of electromagnetic emissions from the above listed devices. This is the core of our business. Sincerely, Karen Azoff Computer Security Solutions, Inc. 6190 Grovedale Ct.,#200 Alexandria, VA 22310 ph. US 703 922-0633 fax US 703 922-0963 email; kte4mpest at aol.com From stuffed at stuffed.net Wed Jul 22 10:16:03 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Wed, 22 Jul 1998 10:16:03 -0700 (PDT) Subject: Losing it on the web/Man wins $90,000 by getting breasts Message-ID: <19980722153518.253.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/22/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From ZeroInt.at.birmingham.crosswinds.net Wed Jul 22 10:21:19 1998 From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt) Date: Wed, 22 Jul 1998 10:21:19 -0700 (PDT) Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks Message-ID: <35bb70fa.5628631@mail.zebra.net> Thought this might be of interest. On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh Sign~" said: >Nobody important wrote > >Hello people I will address this in an off topic way to many of you but you must learn about the >type of individual we have been dealing with. > >1.)Has plenty of time on his hands and may be something else in his had is you catch my drift. >2.)Thinks it is a cool thing to try to shut down servers and hack into systems. Use to have his own >web site but not now. >3.)Has use of library computers so he thinks he won't get caught. >4.)Mad at his Dad for not being there for him. Making him made at the world. >5.)Has been posting sollog crap trying to shut down servers that burned him. >6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his mentor. >7.)Has probably send hate mail to you and other members of the group using the anonymous remailers >rigging the response to finger the other member of the group. > > >Who's servers is he trying to shut down you ask. >www.theasi.com (Hacking (Don't get your info here a page cost you $9.95USA), sollog and other >bullshit) >www.theeunderground.net Ditto the above! >www.replay.com Anonymous remailers that he has been abusing like rubber gloves after hemorrhoid >surgery. You could send the stuff to abuse at replay.com but I think the little punk wants you to mail >bomb his account. or you could send your complaints to postmaster at nym.alias.net but you would play >into the little punks hand like I did. > >DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE: >whatshitten will be his name from this point on. >Solagged would be good too. >A profit prophet is what sollog is no predictions have ever come true. > >Just take my message and repost it under all of his post thank you! > > > > > From shamrock at netcom.com Wed Jul 22 10:30:05 1998 From: shamrock at netcom.com (Lucky Green) Date: Wed, 22 Jul 1998 10:30:05 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <199807221318.GAA03684@cygint.cygnus.com> Message-ID: <000801bdb583$b8b736c0$931daace@default> John, Do you plan on renting out the use of the cracker on a per-key basis and if so, how much do you anticipate charging for cracking a message? Thanks, --Lucky > -----Original Message----- > From: e$@vmeng.com [mailto:e$@vmeng.com]On Behalf Of John Gilmore > Sent: Wednesday, July 22, 1998 6:19 AM > To: John Lowry > Cc: Robert Hettinga; gnu at toad.com; cryptography at c2.net; > coderpunks at toad.com; cypherpunks at toad.com; e$@vmeng.com; > dcsb at ai.mit.edu; gnu at cygnus.com > Subject: Re: John Gilmore and the Great Internet Snake Drive > > > > One lesson I plan to observe - don't encrypt known plaintext unless you > > have to ! > > The EFF DES Cracker cracks more than just known plaintext (though it's > the easy case). It also cracks plaintexts whose likely byte values > are known (e.g. all alphanumeric), winnowing the keyspace down to a > size that software or humans can search. Such a search runs in very > close to the time required for an ordinary known-plaintext search. > See the book for details (www.oreilly.com). > > We successfully cracked a DES-encrypted Eudora saved-mail file > provided by Bruce Schneier during our debugging period. He gave us > the top byte of the key so we could focus on debugging rather than on > waiting to get to the right block of keyspace. The machine located > the key within that 49-bit keyspace after we fixed a few software > bugs. > > John > > > ---------------------------------------------------------------------- > Where people, networks and money come together: Consult Hyperion > http://www.hyperion.co.uk/ info at hyperion.co.uk > ---------------------------------------------------------------------- > Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce > http://www.c2.net/ stronghold at c2.net > ---------------------------------------------------------------------- > Like e$? Help pay for it! > For e$/e$pam sponsorship or donations, > ---------------------------------------------------------------------- > > From gnu at om.toad.com Wed Jul 22 10:40:12 1998 From: gnu at om.toad.com (John Gilmore) Date: Wed, 22 Jul 1998 10:40:12 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com> Message-ID: <199807221318.GAA03684@cygint.cygnus.com> > One lesson I plan to observe - don't encrypt known plaintext unless you > have to ! The EFF DES Cracker cracks more than just known plaintext (though it's the easy case). It also cracks plaintexts whose likely byte values are known (e.g. all alphanumeric), winnowing the keyspace down to a size that software or humans can search. Such a search runs in very close to the time required for an ordinary known-plaintext search. See the book for details (www.oreilly.com). We successfully cracked a DES-encrypted Eudora saved-mail file provided by Bruce Schneier during our debugging period. He gave us the top byte of the key so we could focus on debugging rather than on waiting to get to the right block of keyspace. The machine located the key within that 49-bit keyspace after we fixed a few software bugs. John From eureka at eureka.abc-web.com Wed Jul 22 11:27:06 1998 From: eureka at eureka.abc-web.com (Eureka Daily News) Date: Wed, 22 Jul 1998 11:27:06 -0700 (PDT) Subject: -> Eureka! Wed Jul 22 '98 Message-ID: <19980722075733.27465.qmail@eureka.abc-web.com> <<< No Message Collected >>> From eliner at departs.co.il Wed Jul 22 11:53:31 1998 From: eliner at departs.co.il (eliner at departs.co.il) Date: Wed, 22 Jul 1998 11:53:31 -0700 (PDT) Subject: De'Parts - The Parts locating highway... Message-ID: <199807202200.PAA16669@toad.com> To: General Manager. Purchasing Director Marketing Director. Re: Boost your sales to High-Tech industries. Dear Sir/Madam; * If you need to find parts or stock as fast as possible... You need De'Parts. * If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts. * If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts. Share your database with others, and join the De'Parts family at: WWW.DEPARTS.COM ********************************************** De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products. De'Parts enables you to publish and locate parts at the stroke of a key. Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need. Your parts or surplus stock could be just the solution for someone else's needs. De'Parts will help reduce your costs, improve inventory control and save valuable storage space. All members of the De'Parts network are able, free of charge: * To search our database; * To use our Email robot; * To submit Requests for Quotations (RFQ's); and * To download files. Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors. Publishing membership costs less than the price of an advertisement in your local newspaper. Just follow the steps below and you are on your way to a substantial increase in sales: 1. Log in to De'Parts and Register to the system. Be aware if You want to sale all your stock as a batch or to sell it Part by Part (It means that you may have to provide a quotation for each part). 2. Create a file to publish, include all your parts for sale, and follow the instructions that describe how to "Upload a File" in "Manage D.B.". 3. Upload your file to the system (Step 1 - to Publish the file as a batch. Step 2 - To publish and quote each part). 4. Check your Email frequently. For detailed information, please read the "About" section at: WWW.DEPARTS.COM Thank you for your time and we hope that you enjoy the advantages provided by our system. Wishing you a lot of success, S. Avishai V.P. Marketing De'Parts ------------------------------------------------------------------------------------------------- *** Take a part in De'Parts...the parts locating highway *** ------------------------------------------------------------------------------------------------- From lreed at west.cscwc.pima.edu Wed Jul 22 12:14:53 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Wed, 22 Jul 1998 12:14:53 -0700 (PDT) Subject: Arty Farcer - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C98E6.6753AF60.5@west.cscwc.pima.edu> Arty Farcer, Intelligence - SPACE ALIENS HIDE M DRUGS!!! _________________________________________________________ Professer Stephen Grossman, chief cognitator at Boston University's Department of Cognitive and Neural Systems, has created Thing1 and Thing2--robots which can adapt to their environment by mastering approach and avoidance behavior. He states, "The networks we're building here learn from examples and exhibit some capability for generalization beyond the training data we've put into them." Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that the "neural networks enable the robots to teach themselves...predict impending impacts, and use the same patterns to suppress movements that would cause collisions." It seems to me that the same technology could be used to instigate movements that would *cause* collisions... Let's say, for instance, that AMadScientistFromEstevanNamedEarlier had developed a program which could use data from the power usage of oil-well pumping stations to predict approaching mechanical failure, and enable the owners to schedule maintenance, thus saving the major cost of down-time and mechanical failures which were costly due to breakdown affecting more than the original faulty part. Let's also say that a Fucking Idiot who swatted a fly on top of his exposed hard drive, with a newspaper, fucking it up, mechanically, also discovered that he could 'fix' the internal arms of the hard drive by writing a program that made the skinny little internal arms of the drive work their way, over and over again, toward the faulty area, from alternating sides of the bad spot. Let's further speculate that the Fucking Idiot speculated that any computer part that could be mechanically 'fixed' by a repetitive program could also be mechanically 'fucked' by a repetitive program, and that the SickFuck had friends who knew everything there is to know about the internal workings of computer hardware peripherals, mean-time between failures, and all manner of little-known facts about good and bad design techniques in a wide range of computer hardware fields. Lastly, let's speculate that some very BadMenAndWomen with BigGuns had stolen the SickFucker's computer, and his nephew's computer, and that he had access to the ThievingPricks' computer systems. Thus, if it came to pass that the SickFuck could supply his friends with the details of the computer hardware and peripherals used by the BadMenAndWomenWithBigGuns, then his friends could write programs which would put extra strain on the known weak points of the system, drastically lowering the mean-time between failures. If the SickFuck had already tested his friend's programs on $ 50.00 used computers he had purchased in Regina, Saskatchewan, then they would have already been able to tweak the programs into little SickFuck Digital Roe&WadeBots which would be able to perform mechanical abortions at any stage of DigitalLabor, thus being able to control the failure rate in imperceptible increments over a wide range of systems, so that, over the course of a year, it would cost the BadMenAndWomenWithBigGuns millions of dollars by the time they figured out that the SickFuck had his Richard shoved up their asshole. If the SickFuck's friends in LostAlamo were BrilliantSickFucks, they might even take it upon themselves to develop a program capable of keeping track of how the maintainers of various computer systems would deal with different problems (e.g. 'fixing' vs. 'replacing') and create their little BrilliantSickFuckPrograms to learn how to force the computer maintainers to 'replace' the hardware shortly after they had spent their time and resources 'fixing' the hardware. Lastly, if the BrilliantSickFucks were very grateful to the SickFuck for providing them with information which would enable them to write what one would think would be incredibly complex programs in the space of a few short hours, the BrillianSickFucks might provide the SickFuck with simple device-drivers which could use such unlikely hardware as printers and programmable keyboards to automatically renew backdoors into compromised systems in the event the backdoor was found and removed. [Debitor's Note: T. Arthur, after working with the first version of M$ Word which made use of macro's, realized the potential for using them for distributing Ribbed Trojan Horses, and Digital Simplex Viruses. T. Arthur, being a nice fellow, took the time and trouble to phone M$ Support, wait on the line for 342 hours, and inform them that there was a possible problem with their program being able to transmit RTH's and DSV's. The M$ UnSupportive RepresentativeOfTheM$AttitudeAtTheTime, was gracious enough to take time out of his busy schedule to launch into a long and acidic beration of T. Arthur as a neophyte computer idiot who was unaware that everyone in the industry *knew* that "you can't get a virus from opening a text file." When T. Arthur related this incident to a group of LostBoys&Girls who were solving all of the problems of the computer industry, for all of eternity, using pitchers of Margueritas at the Holiday Inn Bar in Albuquerque to keep their GreyMatterCPU's from overheating, more than one of those gathered pointed out that T. Arthur's brain was running on 12-Volts/DC, because most of them had figured out the potential for the 'Macro Virus' (to be 'discovered' years later), "before the program's shrink-wrap had hit the floor."] Doc Watson, on a grand summer day in Austin, Texas, walked into the Armadillo Beer Garden while I was playing a song he wrote, 'Tennessee Stud,' which has a classic guitar riff, which everyone imitates. Doc complimented me on my rendition of his tune, noting that he was impressed with my unique 'interpretation' of his famous riff, and that he found it refreshing to hear someone doing something other than the standard autobot version. Being the TruthMonger, I was forced to admit to him that I had first tried to 'rip off' his licks from the album, but, being a really crappy guitar player, I was forced to improvise. It's the story of my life... Although it is True (TM) that I am TheWorld'sForemostComputerExpert, I am pretty much only 'expert' in very bizarre areas of computer hardware and software technology. (In the 'regular' areas of technology, I am only 'expert' in the sense of availing myself of tools, such as those that are produced by Peter Norton, that allow one to fix the most complicated of computer problems by following the instructions on the screen, and hitting the button.) I had the good fortune to learn about computers from a gentleman who helped design the Adam motherboards, and to learn about how computers and softwear 'think' by working with retarded and otherwise disabled children for many years. Thus I realize the flaw in the widespread notion that certain computers or programs are 'intuitive.' No...they are fucking retarded, OK? Aside from neural networks, and other forms of artificial intelligence, computers and programs are only 'intuitive' in a situational-specific way. A database program designed to help you balance your books is quite simply programmed to anticipate such things as your desire to use integers and decimals, etc. It is not 'intuitive' if you try to use it to program your breakfast schedule. Neither is a database program designed to help you program your breakfast schedule likely to be 'intuitive' as to whether you might want to eat 1.3 eggs, as opposed to offering you a window which allows you to choose between poached, fried or scrambled. To confuse the issue of what I am getting at, here, I would like to point out that, although I am 'learned' in the C-Programming Language, having studied it in various systems of higher education, I can't write a single fucking line of code... Offer me a million dollars to properly write and compile the standard 'hello.c' program, and a week of work will result in my coming up, best case scenario, a program which echo's, "Nice try, ShitForBrains." et, give me a backup tape-drive which is 'Supported' by SCO Unix, but which doesn't actually work, for myself or for anyone else on the face of the earth, and I can go through a thousand lines of source code to find and fix the problem (three years ahead of the SCO engineers who are 'talking to' Colorado Systems engineers, who will 'fix' the problem exactly one week before the model becomes obsolete). Another example which doesn't really connect to any of the other things I am talking about here (unless you already know what I am talking about, which *I* don't), is the fact that I found a lot of the early password programs to be easily breakable merely by noting how long it took the program to return results after checking various values input. Similarly, I couldn't help but notice that accessing certain 'hacking' websites on the InterNet results in a 'loading-time' which is way out of sync with the amount of data, etc., being transferred. (Or that some of these websites seem to result in a lot of hard drive activity which can only be noticed by paying attention to the 'sound' of the hard drive, since the hard drive light doesn't seem to go on, at all. Hhmmm...) My point? Read the original Sun Operating System Manuals...the Writing Device Drivers manuals, in particular. ou will be left with the distinct impression that AbsoluteSecurity (TM) is impossible! et, if you peruse later versions of the manuals, right up to the current versions, you might notice that they no longer leave the reader with the impression that AbsoluteSecurity (TM) is VaporWare. What has changed? Nothing... While resurrecting my Opus SparCardII after years of disuse, I found that the little-bitty BatteryGremlins that reside within the CPU chips had passed away from old-age. Thus I had to become an EEPROM expert over the next few days, in order to learn how to tell it to do things like remember its own name, etc. ("What's your name, Bob? Starts with a 'B' and ends with a 'B'...you've got five seconds, Bob.") I'm dense/stupid/ignorant/clueless, added to which, I am usually loaded while working on my computers late at night. Thus, I make a lot of mistakes. And I find out some of the most amazing fucking things! (e.g. In the DOS 3.3 days, before most of you were born, my Drunken Fingers (TM) discovered that 'dir *.' would list directories and files without an extension, although this didn't seem to be documented anywhere. I was pretty impressed with myself until I discovered that if my Drunken Fingers accidentally added a certain other keystroke to this combination, then something happened which did irreplaceable damage to a certain version of BIOS. I was once again impressed with myself upon finding that, although most programs would no longer run on the computer, database programs 'smoked' at about ten times the speed they usually ran. Why? Don't know...don't care.) What I'm really-really getting at, here, is this: Except e become as a little, drunken child... The reason that it is the teens and pre-teens that are hacking into 'secure' government and corporate computers is that they can't afford to take the $ 5,000.00 computer classes/seminars that 'teach' them what can, and cannot, be done. The reason I can roam at will through Canadian Government 'secure' computer systems is that I am a sorry, fucking asshole, whose Drunken Fingers know more about computers than my Drunken Mind ever will. The reason that Echelon can monitor and analyze all of the electronic communications on the face of the earth, is that they know that the nature of BIOS, EEPROM, Device-Drivers, etc., is such that, given even the slightest amount of influence over standards and procedures in the design and implementation of these things, they will contain series of MasterKeys which can open a variety of BackDoors, no matter how complex and well-designed the features of hardware and software that overlay the basic computer technology and processes. The reason that I can use RCMP printers to do my bidding on thier computer systems is that I don't make them do things that they are not supposed to do, thereby creating SoreThumbs that stick out where they shouldn't and exhibit signs of dysfunctional pain and suffering when new programs or updates are added to the mix, but rather, I ask them to do things that they are *supposed* to do, but haven't been asked in the manner which I ask them, because those who designed them only wanted them to do silly, useless tasks, like print words on a sheet of paper. Read This Again: Professer Stephen Grossman, chief cognitator at Boston University's Department of Cognitive and Neural Systems, has created Thing1 and Thing2--robots which can adapt to their environment by mastering approach and avoidance behavior. He states, "The networks we're building here learn from examples and exhibit some capability for generalization beyond the training data we've put into them." Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that the "neural networks enable the robots to teach themselves...predict impending impacts, and use the same patterns to suppress movements that would cause collisions." Now Think About This: If I can find ways to make/enable computer hardware and software perform a wide variety of tasks that was not envisioned by those who designed them, honestly being merely a semi-computer-literate dweeb without the sense Dog gave a Goose, then what is to prevent people who are learned and competent in computer technology and processes from adapting the capability and functions of computer technology and processes to ends which go far beyond the simplistic techniques which they have been programmed/trained to apply to the tasks they undertake? More importantly, if, with my own limited knowledge and computer literacy/competency, I can find ways to route around the damage caused by the secrecy/censorship of information that others are using to cause me problems in my life, then what are the possibilities for those who are involved in the design and implementation of computer technologies and processes, to design and develop hardware and software that can be modified/circumvented/paralyzed/compromised if their use becomes usurped by the Controllers in order to provide Power&Control to an Elite Segment of Society? There is currently a thread on the CypherPunks Mailing List which is discussing the Perjury of RecognizedAuthority being treated differently than that of Jane and Joe Citizen. Perusing Perry Mezger's post, I was impressed with the thoughtfulness and insight that he displayed on the issue, and the quality of questions he raised in regard to ethics and public attitudes in this area. Nonetheless, if you ask Tim C. May to check the archives, I think he will find that I previously dealt with this issue in a simple and a succinct manner. I stated, quite simply, that what I found most disturbing was not that our elected political representatives and a wide variety of government employees, public, private and corporate figures were in the habit of lying, but that they no longer even bothered to tell GoodLies (TM). The bottom line is that it doesn't matter whether you've wrecked daddy's car, or you are cheating on your spouse, the cost of telling the Truth grows faster than the interest you owe on a loan from a guy named 'Big Al.' The longer that the citizenry avoids confronting THE LIE, in order to prevent rocking the boat, since "Things aren't really that bad." (ET!), then the larger the weight of the BadLies will become, and the more they will become an 'accepted' part of our everyday reality. The longer that those involved in computer design and implementation deliver products which reflect only what they are asked to produce to meet certain, narrow goals, then the greater will become the end-user's reliance on, and vulnerability to, those who have the money and the power to set standards and influence the directions and goals of future computer use. In effect, what I am saying, is that if those involved in the design and the implementation of computer hardware and software technology, standards and processes are not able to "learn from examples and exhibit some capability for generalization beyond the training data...put into them," as well as to "predict impending impacts, and use the same patterns to suppress movements that would cause collisions," then they might as well pledge allegience to Thing1 and Thing2, because they will do whatever the GreatBeast programs them to do, and it will be little comfort to those crushed underfoot to know that those who fed the GreatBeast at the expense of WeThePeople were "just following orders." "They wanted to come for the Jews, and I wasn't a Jew, so I wrote the program..." Surprisingly, most of the people I know who are most concerned about designing hardware and software that resembles a two-sided coin which can be turned against its Masters, if they become rabid and frothing at the mouth, work for high-security government and corporate agencies who go to great lengths to implement 'access enhancement features' in their products. The common consensus among them seems to be that the average designer and programmer can implement sane and effective 'enhancements' to their products with very little effort, simply by being consious of the myriad of opportunities, that are constantly present, to 'add' certain features which lend themselves to include user-friendly control of the product. As well, they recognize that those who actually *do* the programming are often much more aware of what design features they can include that will allow other programmers to produce add-ons or tie-ins which will allow the end-user to be a participant in their software's functionality, as opposed to riding a one-way train whose ultimate destination will be Government and Corporate Auschwitz. I currently have what might be considered Unauthorized Access to a variety of computer systems, which could theoretically result in my being subject to a few million years in prison. However, thanks to the wisdom and foresight of a few Computer Angels who design and program high-security government and corporate systems, I was able to gain access by doing nothing more than simply give myself the same 'network privileges' as held by those who chose to make my computer a part of their network, in order to read my files and put in place programs of their choosing. {Ownership of my computer bestows upon me the right to set my privileges to whatever level I desire, and if that allows me the same privileges throughout a computer network I was linked to with the full consent of those in charge of it, then I can hardly be faulted for assuming that I have authorization to use the resources and information that is available on 'our' network.} The bottom line, as far as I am concerned, is that the InterNet, by definition, is an InterActive Medium. Those who choose to participate in the InterActivity of the Medium must be prepared to encounter individuals who wish to exercise their right to participate in the exchange of resources and information, as opposed to being a passive recipient of whatever the other party, in their egoistical imaginings of superior position and authority, wish to bestow upon them. Anyone who wishes to join their computer to mine in order to check for dirt under my fingernails had best wash the shit off of their dick before they do so... It is understandable that those who design computer hardware and software would take pains to provide their employers with a product which empowers them. However, if they ignore, or pass upon, available opportunities to empower the end-users, clients and customers of their employers, then the public becomes, not *beneficiaries* of the designers efforts, but *victims* of their efforts. The rEvolution is NOW! From CTIA_Daily_News at um2.unitymail.com Wed Jul 22 12:53:55 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 22 Jul 1998 12:53:55 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 22, 1998 Message-ID: <199807221801.NAA05529@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV Call 202-785-0081 for more information. =========================================== From mmttpx001 at hotmail.com Wed Jul 22 12:56:43 1998 From: mmttpx001 at hotmail.com (mmttpx001 at hotmail.com) Date: Wed, 22 Jul 1998 12:56:43 -0700 (PDT) Subject: Look At This Message-ID: <199807221950.AA02312@atina.ar>

AMERICA'S # HOME BUSINESS TELEMARKETING GOES MLM No Selling No recruiting Great Income Call Now, You have nothing to Lose I am making $1,000.00 per day, this is my second day Call 1 888 443 8971 ID# 2085

The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer

From ZeroInt.at.birmingham.crosswinds.net Wed Jul 22 13:02:45 1998 From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt) Date: Wed, 22 Jul 1998 13:02:45 -0700 (PDT) Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks Message-ID: <35b97056.5464309@mail.birmingham.crosswinds.net> Though this might be of interest On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh Sign~" said: Nobody important wrote Hello people I will address this in an off topic way to many of you but you must learn about the type of individual we have been dealing with. 1.)Has plenty of time on his hands and may be something else in his had is you catch my drift. 2.)Thinks it is a cool thing to try to shut down servers and hack into systems. Use to have his own web site but not now. 3.)Has use of library computers so he thinks he won't get caught. 4.)Mad at his Dad for not being there for him. Making him made at the world. 5.)Has been posting sollog crap trying to shut down servers that burned him. 6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his mentor. 7.)Has probably send hate mail to you and other members of the group using the anonymous remailers rigging the response to finger the other member of the group. Who's servers is he trying to shut down you ask. www.theasi.com (Hacking (Don't get your info here a page cost you $9.95USA), sollog and other bullshit) www.theeunderground.net Ditto the above! www.replay.com Anonymous remailers that he has been abusing like rubber gloves after hemorrhoid surgery. You could send the stuff to abuse at replay.com but I think the little punk wants you to mail bomb his account. or you could send your complaints to postmaster at nym.alias.net but you would play into the little punks hand like I did. DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE: whatshitten will be his name from this point on. Solagged would be good too. A profit prophet is what sollog is no predictions have ever come true. Just take my message and repost it under all of his post thank you! From lreed at west.cscwc.pima.edu Wed Jul 22 13:26:20 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Wed, 22 Jul 1998 13:26:20 -0700 (PDT) Subject: Robot Tears - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C98FD.02B18AC0.3@west.cscwc.pima.edu> Robot Tears - SPACE ALIENS HIDE M DRUGS!!! ___________________________________________ If you XOR digital copies of Brave New World, 1984, Terminator and Terminator 2, They Live, Mein Kamf and One Flew Over The Cuckoo's Nest, then you end up with copies of Part V, Part VI and Part VII of 'The True Story Of The InterNet': Part V - Tears Of A Robot Part VI - The Day The Screen Came Alive Part VII - Don't Crush That End-User, Hand Me The Pliars I have always been much more comfortable transmorgifying the effluvia excreted from my GreyMatter into ScienceLess Fiction than A Factual Treatise On A WorldWide Conspiracy To Promote The Belief In The Existence Of A WorldWide Conspiracy. As Trooper said, "We're here for a good time, not a long time, so have a good time, the sun doesn't shine every day." The reason that the general public is absolutely terrified of being confronted with the Truth (TM) and Reality (TM) is that they know that it is a Horrifying Beast capable of ripping their Perceived World View to shreds and destroying any hope they might have of attaining peace of mind and tranquillity of soul in this lifetime. What the average person doesn't realize, however, is that when you make the supreme effort to face the Truth, whatever it may be, you will find yourself laughing like a fucking banshee. our Body, Mind and Soul *will* be subjected to a violent, excruciating pain beyond human endurance, but your Spirit will laugh its ass off... When I first read about the InterNet being created by the military, in order for scientists, researchers, et al, to be able to freely exchange information in a secure environment, I recognized that they were doing so with the goal of being able to totally access the complete spectrum of educational and scientific progress and development. I took it as a given that their purpose in providing a communal forum for exchange of information was to have complete access to, and control over, that information. To me, this is as plain as night and day. I think it is ludicrous for supposedly intelligent individuals to have failed to recognized this fact until the presence of Echelon became public. Well, to be more precise, until Official Government Recognition of the reality of Echelon's wide- ranging presence became public. Of course, I had the advantage of having had the opportunity to become acquainted with the military's attitude toward, and plans for, the public and its individual citizens by finding myself at the forefront of their experimentation in monitoring and controlling the minds of the citizenry, as well as directing their thoughts, beliefs and attitudes according to their own desires and goals. My original insight into this arena of life came from a perspective of watching and listening, from the ceiling, the medical and scientific researchers who were below me, casually engaged in manipulating and modifying the physical tool which they seemed to believe held the secret to control of my mind. I gained additional insight into the aims of the Controllers by making a point of developing self-hypnosis tapes which I used to override the subconsious suggestions of Dr. Fogel, one of Dr. Hoffer's associates, before submitting to his hypnosis 'treatments.' If anyone finds some of the things I say a bit odd, then think about how 'odd' they would have sounded twenty-or-so years ago. I have recently read much of the InterNet literature on CIA and military mind-control experiments, etc., and found it quite humorous the lengths to which those providing information went to document and verify each and every instance of what they were describing, and the claims that they were making, yet still maintaining a subtle undercurrent of "No! Really! I wouldn't shit you! This stuff is *true*, I tell you! TRUE!!!" I find it equally humorous that so many of those who have obviously spent a great deal of time, effort and resources to uncover/discover the enormous extent of government research and experiments into mind- control somehow manage to keep from screaming "BullShit!" at the claims of those involved that they spend decades and millions of dollars in this area without making any progress, whatsoever, and that they just happened to have stopped all research and experimentation in mind-control the very Tuesday before a Congressional (or whatever) investigation decided it was not a good thing, and they shouldn't be doing it. And now, the IRS wants to be our best friend... When I taught for the Bartonian Metaphysical Society and the Institute of Applied Metaphysics, an agency of the Canadian government that was involved in PSI research at a university in Toronto used to plant 'spotters' in the classes, to target potential experimentation and research subjects. According to one of the spotters who had difficulty holding his liquor and his tongue at the same time, our Saskatoon group was considered 'untouchable' as a result of a visit by 'friends' of the organization that was funding their research. The evening after I read Robert Munroe's 'Journeys Out Of The Body,' I astral travelled. After reading a book on Lucid Dreaming, I did lucid dreaming. Upon reading Carlos Castenada's various works, I entered into many of the same experiences he wrote about. When my mother's persona/ soul went AWOL during her bout with cancer, I bought a book on Shamanism that told how to travel into the Underworld and retrieve a person's 'animal/animus' and place it back in their body, and I did so. This is my life...it is not a matter for belief/disbelief or debate. To me, my life and my capabilities are simply the way it is, and I don't consider them particularly extraordinary. To me, what is extraordinary is the fact that pedal-steel players can actually make wonderful music with those instruments. I tried like hell, and all I could make was noise. My only real purpose in telling you all of this is to impress upon you the fact that there is much more going on in the background of government, life, society, science, etc., than what is readily apparent, not only to the general public, but even to those who research secret government activity and projects from the outside, as well as many who work on them from the inside. Anyone the least bit familiar with the world of secret intelligence is aware that it is composed of concentric circles-within-circles, with each layer remaining mostly a mystery to the layers external to it. The CIA's involvement in mind-control research was merely the second inner layer, with the public/private research community being the outer layer. As mind-boggling and incredulous as the details of the CIA's involvement may seem, they are merely grunt-workers for inner layers of agencies and organizations who expand and develop the techniques and information that filters down into practical applications on both a macrocosmic and microcosmic level. To believe that the most essential research and development in military intelligence is being done by people that you can call or visit at the local CIA office is naieve, at best. The CIA, according to my understanding of the military personnel who were involved with the Saskatchewan Cabal of mind-research, are little more than heavy-handed amateurs whose chief asset is their willingness to get involved in projects which have the potential of blowing up in their faces and requiring complex damage control. It is my impression that the psychiatric butchery epitomized by Canada's Dr. Ewen Cameron is typical of operations that are delegated to the CIA, since the military prefers to experiment on their own personell and subjects with methods that are unlikely to destroy their minds, to no apparent purpose. Although the mind-wiping electroshock techniques used by Dr. Cameron were apparently used in my 'treatment,' it is my recollection that, rather than being wheeled into a room with some amateurish, inane, tape-loop used to 'reconstruct' my mind, there were a variety of psychological and medical professionals who spent a great deal of time involved in activity designed to restore/restructure what had previously existed, as well as creating a variety of new mental paridigms which were designed to be able to function in a fashion similar to the interlinkable modular structure of the C-Programming Language. To tell the truth, although the research and experimentation that I was subjected to was undoubtedly invasive and unethical, I could see it as being beneficial to the evolutionary human equation if it was done in an above-board manner, as opposed to being hidden in the private enclave of secret agencies, to be used with the goal of outside control of the minds and behavior of others, without their consent. Mind-control, as described in terms of the MKULTRA ET AL Projects, is actually only a single arm of secret-government efforts to monitor and control the citizenry. The ultimate goal of the research and experiments in this arena of human evolution is the combination of an interdisciplinary combination of methods, processes and techniques which will enable a globalization of control over humanity--affectionately known by wild-eyed conspiracy theorists as the New World Order. If I can restrain myself, for a few hours, from breaking into screaming fits of rage calling for the public execution of all members of the Royal Canadian Mounted Police, forthwith, I might just share with you some of the things that one learns when they read the file which was accidentally attached to an email from Kent Crispin, which contains a download of the complete hard drive of the top secret military facility at which he works. {Hey! Really! Do you think I would just make that up?} From ILovToHack at aol.com Wed Jul 22 13:43:52 1998 From: ILovToHack at aol.com (ILovToHack at aol.com) Date: Wed, 22 Jul 1998 13:43:52 -0700 (PDT) Subject: INTELLIGENT VIRUS Message-ID: ****************************************************************************** ************************** ****************************************************************************** ************************** THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT ****************************************************************************** ************************** ****************************************************************************** ************************** I was recently informed from sorces who choose to remain annomous about a viri that uses macafe's update tool to detect when it is found then it modifys its code and forms a new strain of the virus this pattern continues although it has only been tested through a clone of macafees server to 100 mutations it looks like it could be a big problem I will inform you of any more information i learn about it but for now "THE TRUTH IS OUT THERE" From juagarknight at msn.com Wed Jul 22 14:24:01 1998 From: juagarknight at msn.com (juagarknight at msn.com) Date: Wed, 22 Jul 1998 14:24:01 -0700 (PDT) Subject: Truth will make us free! Message-ID: <199807222123.OAA10856@toad.com> We are an American social activist group called Las Americas, and we need your help. It is time to end the lies that everyone publishes about the Chiapas situation. We have to stop the war now! We are tired of not being believed: the truth needs your help. The truth has to be told. Our main purpose is to show what is really going on in Chiapas. We want the world to know how neglected the people in Chiapas are. In order for us to accomplish this mission, we need to provide tangible proof of all the events. We need pictures, sounds and video testimonies. We all have some kind of photographic equipment we don't use anymore. Right now, send us any type of new or old recording material: * Cameras * Videos * Tapes * Cassettes * Film * Typewriters * All kinds of recorders All of these materials will be distributed to the indigenous communities so that they will be able to provide proof of their living conditions. The collected information will make up a huge and raw testimonial, which will convince even the skeptics that the war in Chiapas must end. We are tired of lies being said about Chiapas. We need your support for this effort. Take your chances, don't waste this great opportunity to participate and make a difference. Send the materials to: LAS AMERICAS Attn. President Ronald Granados 12501 East Imperial Highway Norwalk, CA 90650 You may also remit your suggestions and comments to our president. We thank you in advance for your generous contribution and please forward this e-mail to as many people as you can. P.S. If you are planning on making a personal visit, please find information enclose and don't forget to send us your testimonies!! http://www.adventours.com http://www.derechos.org http://www.globalexchange.org http://www.NONVIOLENCE.ORG From ptrei at securitydynamics.com Wed Jul 22 15:19:14 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Wed, 22 Jul 1998 15:19:14 -0700 (PDT) Subject: Thoughts on the demise of DES Message-ID: Well, I'm a happy camper. Single DES is dead as a credible cipher. I feel *very* vindicated. I called for the hit, RSA bankrolled it, and the EFF pulled the trigger. DESChall and Distributed.net did severe damage, but the Deep Crack machine was the fatal blow. While the possiblity of bruting DES has been discussed at various times in and out of cpunks for years (for example, see Adam Back's message of 17 August 1995), my involvement started 22 July 1996, when I proposed a DES crack as a follow on to the previous autumn's RC4-40 attack: ------------------------------ >Subject: Re: Borders *are* transparent >Date: Mon, 22 Jul 1996 10:32:47 -6 [...] >Any one up for a distributed brute force attack on >single DES? My back-of-the-envelope calculations >and guesstimates put this on the hairy edge of >doability (the critical factor is how many >machines can be recruited - a non-trivial cash >prize would help). >Peter Trei >trei at process.com --------------------------- This got a flurry of responses, mostly positive, including some in which Matt Blaze announced his intention to build a hardware DES cracker. ----------- Later that day, I had run some more numbers: >Subject: Re: Brute Force DES >From: "Peter Trei" >Date: Mon, 22 Jul 1996 16:55:17 -6 >[...] >The fastest general purpose, freely available des >implementation I'm aware of is libdes. by Eric >Young. With this, I can do a set_key in 15.8 us, >and an ecb_encrypt in 95 us/block. That adds up to >about 9,000 keytests/sec (this is on a 90 MHz P5, >running NT). [...] --------------- This looked much too slow, and discussion trailed off. I was still interested, and grabbed some x386 assembler by Phil Karn, and worked on optimizing it for the Pentium. It worked well. A few months later: http://infinity.nus.edu.sg/cypherpunks/dir.96.09.26-96.10.02/msg00567.html >Subject: Can we kill single DES? > From: "Peter Trei" > Date: Tue, 1 Oct 1996 16:27:18 -6 >[...] >Unlike many cypherpunks, I actually write code >(:-). I took Phil Karn's DES386 as a starting >point, and modified it to run effiiciently on the >Pentium. The code I've written will run 14 round >DES (all that is required for a key test app) at >254,000 crypts/sec on a 90 MHz Pentium. >[...] I had managed a better than 25x speedup. My biggest innovation was a new method of producing key schedules, which when applied for key search purposes was a hundred times faster than the canonical method [Perry doubled the speed by suggesting the use of Gray codes.] Later that month, I wrote to Jim Bidzos at RSA, suggesting a DES challenge, using my prototype's speed to demonstrate feasibility. He was interested, and the Symmetric Key Challenges were born. Soon other programmers (notably Svend Mikkelsen in Dennmark) substantially improved on my speed - by better optimization, and by clever shortcuts which allowed earlier rejection of bad keys. A major innovation was use of Eli Biham's 'bitslice' algorithm, which tested large blocks of keys in parallel. The speed of his initial implementation was doubled by the work of Matthew Kwan in Australia and Andrew Meggs, et. al. at distributed.net. By the end of the latest challenge, the fastest software search engines had speeds (in clock cycles per test) well over 100x as fast as my original 10,000 cycle/key estimate. Here's one more quote from the archives: >From: "Peter Trei" >Date: Fri, 7 Jun 1996 12:55:24 -6 [...] >Prediction: By the millenium, we'll have made >single DES look about as silly as 40 bit RC4 is >today. Written well before I started to think about a DES crack, this, at least, has come true. Peter Trei ptrei at securitydynamics.com Disclaimer: This has nothing to do with my work at my employer. From nobody at remailer.ch Wed Jul 22 17:20:52 1998 From: nobody at remailer.ch (Anonymous) Date: Wed, 22 Jul 1998 17:20:52 -0700 (PDT) Subject: INTELLIGENT VIRUS Message-ID: <19980723004604.645.qmail@hades.rpini.com> On Wed, 22 Jul 1998 ILovToHack at aol.com wrote: ... > THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT ... > I was recently informed from sorces who choose to remain annomous about a viri > that uses macafe's update tool to detect when it is found then it modifys its > code and forms a new strain of the virus this pattern continues although it > has only been tested through a clone of macafees server to 100 mutations it > looks like it could be a big problem I will inform you of any more information > i learn about it Oh, this is that virus I heard about which introduces typos and makes email incoherent! That's old news. AOL users were infected with that years ago. From gandalf at waverly.net Wed Jul 22 17:49:54 1998 From: gandalf at waverly.net (Ric V. Carvalho) Date: Wed, 22 Jul 1998 17:49:54 -0700 (PDT) Subject: PGP security? Message-ID: Hello all, A friend and I have been going around about the security of PGP. I believe it to be unbreakable at this point in time. I also recall recently reading an article which stated that to break a PGP encrypted message, using today's technology, unlimited computer core availability, unlimited $$$, it would take the lifetime of 200 Suns. What is the security of PGP? How secure is it? Are there backdoors that you know of? Does the govt. possess any kind of keys capable of opening a PGP encrypted message? Thanks in advance for your time and attention. -Ric Below is a message I received today concerning what my friend believes about PGP. Does anyone know anything to substantiate this claim? *************************Message Separator******************************** Hi again ric, PGP stands for "Pretty Good Privacy" (you know that).. but it called "PRETTY GOOD" because it has several back doors for LEO and government agencies... I have a masters degree in Electrical Engineering with a minor in Software design... I think I know a little about computers also. While at WVU, we routinely broke PGP messages in Under 2 hours. The government can open them with their key as fast as you can open them with yours. Just a fact... since it aint bullet proof, Camoflage your messages. -War From ILovToHack at aol.com Wed Jul 22 18:08:30 1998 From: ILovToHack at aol.com (ILovToHack at aol.com) Date: Wed, 22 Jul 1998 18:08:30 -0700 (PDT) Subject: INTELLIGENT VIRUS Message-ID: <8593e6bd.35b68ce8@aol.com> In a message dated 7/22/98 8:40:15 PM Eastern Daylight Time, nobody at remailer.ch writes: << On Wed, 22 Jul 1998 ILovToHack at aol.com wrote: ... > THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTENTIAL THREAT ... > I was recently informed from sources who choose to remain anonymous about a viri > that uses McAfee's update tool to detect when it is found then it modifies its > code and forms a new strain of the virus this pattern continues although it > has only been tested through a clone of McAfee's server to 100 mutations it > looks like it could be a big problem I will inform you of any more information > i learn about it <> This is a new version of the viri it makes your computer WIN98 or 95 shutdown every 5 minutes From jya at pipeline.com Wed Jul 22 18:36:01 1998 From: jya at pipeline.com (John Young) Date: Wed, 22 Jul 1998 18:36:01 -0700 (PDT) Subject: Netscape FOIA Docs Message-ID: <199807230135.VAA16726@camel7.mindspring.com> We offer the FOIA docs EPIC got on Netscape's presentation for export of cryptographic products which was cited in the July 20 Network World report on NSA's long, strong arm: http://jya.com/nscp-foia.htm From pooh at rboc.net Wed Jul 22 19:13:34 1998 From: pooh at rboc.net (Robert A. Costner) Date: Wed, 22 Jul 1998 19:13:34 -0700 (PDT) Subject: INTELLIGENT VIRUS In-Reply-To: <8593e6bd.35b68ce8@aol.com> Message-ID: <3.0.3.32.19980722221137.03a4f034@mindspring.com> At 09:07 PM 7/22/98 EDT, ILovToHack at aol.com wrote: >This is a new version of the viri it makes your computer WIN98 or 95 shutdown >every 5 minutes Sounds more like an operating system design feature to me. From billp at nmol.com Wed Jul 22 19:54:03 1998 From: billp at nmol.com (bill payne) Date: Wed, 22 Jul 1998 19:54:03 -0700 (PDT) Subject: NSA willfully and knowingly attempted to sabotage DOE/Sandia cryptographic projects Message-ID: <35B6A3FB.3CAD@nmol.com> Wednesday 7/22/98 8:39 PM Softwar Charles R. Smith follows the money trail of U.S. crypto policy. http://www.aci.net/kalliste/ 7707 Whirlaway Dr. Midlothian, VA 23112 TOLL FREE 1 - 877 - 639 - 1608 softwar at us.net http://www.us.net/softwar/ Smith I will send by snail mail a copy of July 6, 1998 FOIA request 951102002 response from Herbert Richardson for all investigative report authored at DOE in to my allegations that NSA willfully and knowingly attempted to sabotage DOE/ Sandia cryptographic projects. plus enclosures. I will phone later for your input on what I should do for further action. Other than appeal, of course. Some at Sandia got into a crypto battle with NSA. http://jya.com/whpfiles.htm Let's all hope for settlement before matters get WORSE. And matters are GETTING WORSE. http://www.jya.com/whp071598.htm bill From gustavoh at sysadmin.com.br Wed Jul 22 19:59:17 1998 From: gustavoh at sysadmin.com.br (Gustavo Henrique) Date: Wed, 22 Jul 1998 19:59:17 -0700 (PDT) Subject: pgp fingerprint Message-ID: <3.0.5.32.19980722235815.00b8e780@208.30.28.18> I've just started studying pgp and crypo and I have a doubt that maybe you can answer. Correct me if I'm wrong: the fingerprint was invented so you can check with the owner of the public key if his key is correct. Since the fingerprint is something small, you can check it over the phone or some other way. The question is: why people put their fingerprints on a mail signature ? Some one could have changed his public key and changed his message, so that fingerprint will match a wrong public key. Isn't it the same nonsense as putting the public key in an email message (without signing nor encrypting it) ? Thanks for the attention, Gustavo Henrique ============================================================= Gustavo Henrique Maultasch de Oliveira Sysadmin.com.br gustavoh at sysadmin.com.br http://www.sysadmin.com.br ============================================================= From freenow2000 at mailexcite.com Wed Jul 22 20:02:30 1998 From: freenow2000 at mailexcite.com (CF ASSOCIATES) Date: Wed, 22 Jul 1998 20:02:30 -0700 (PDT) Subject: ...Are You In Need Of A Lifestyle Change...? Message-ID: <419.435998.95964178freenow2000@mailexcite.com> Now for the first time ever you have the opportunity to join the most extraordinary and most powerful wealth building program in the world! Because of your desire to succeed, you have been given the opportunity to take a close look at this program. If you're skeptical, that's okay. Just make the call and see for yourself. My job is to inform you, your job is to make your own decision. If You Didn't Make $200,000.00 Last Year... You Owe It To Yourself And Your Family To Give Our Program Serious Consideration! Also, when you start making this kind of money within weeks, after joining our team, you will actually learn how you can preserve it and how to strategically invest it! I invite you to call me for more details at 1-800-781-7046 Ext 4766. This is a free 2 minute recording, so call right now! Prosperous regards, Michael Simmons This Is Not Multi Level Marketing/Serious Inquiries Only This is a one-time mailing. When you visited one of our webpages you indicated that you would be interested in this information, if not please excuse the intrusion and simply delete this message. Thank you From gandalf at waverly.net Wed Jul 22 21:23:37 1998 From: gandalf at waverly.net (Ric V. Carvalho) Date: Wed, 22 Jul 1998 21:23:37 -0700 (PDT) Subject: PGP 5.0 AND 5.5.5/ RSA/DSS SECURITY Message-ID: I have a question. I have been using PGP since version 2. I recently picked up the shareware version of PGP 5.0/5.5.5 I have both. I was wondering how secure DSS is? Also, I was interested in knowing if the RSA encrytion method used in 5.0 or 5.5.5 is in anyway different from say version 2.6.3 Is it looser, more penetrable? How vulnerable are these versions compared to the older versions? Thanks in advacne for your time and cosideration. Life, Liberty, Property, -Ric -- Alpha Group Web Site Http://www.mindspring.com/~warlord1 Encryption, use it or lose it! -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 5.5.5 for non-commercial use mQGiBDV+3r0RBADyO4SYGfbVJwFpjZTPcECSIcc/SugI0KeJwtd+tTP1bDm51ZPI fEMffihjXlM9EyuoWikMMs2CFy6+GFZUW3bHWMLoigYIxaRkqWcekDX3mLDwuQgc kwOpj2jEEh4TRMxJT5ceptgaiaupMpvE8PlnToPfSXScf4n+KHvk4wYJwQCg/6Ei we3UjLy5bCW3ZRvXQhH1LAMD/0FUgDP7f5gy4Y+qnBs8puW4whsBj68hpSAwZiju MzrsQLNmr+fQGI+4am5N7Tv/M1qXvui7450oPXZ6gdm+eVTxgFDK7B6sY41SEu9E 1MRmkJv94vSJ29hFOEOcvkzkiY9xCtdgnBbhxCv02kdQ1eMdse8c/iQLt90rWPsH Kr8vA/4lm8wAEse0+jkYABVcxUKmS3/x0hLJsRefkPs9iP3tvWbaSTkslROb8JeQ 5HShiaa9G1iZX1c+k/9H45M1gUF8ntePNuetye0glXl4PLg7biuELJiW/LLckLFq Y321Uo23ry3/jjVDcBdLSdPTxj3XPGT3Q9aYKEcdIUL41gN/d7QuUklDIFYuIENB UlZBTEhPIDA2LzEwLzk4IDxnYW5kYWxmQHdhdmVybHkubmV0PokASwQQEQIACwUC NX7evQQLAwIBAAoJEFgdjOHM9jayHPsAnR87+QizjB9z6h1UqfqMhxMoZMVGAJ48 xFitx87SAB46VtRFbOwE7Vhs3LkCDQQ1ft7HEAgA9kJXtwh/CBdyorrWqULzBej5 UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1 WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01ue jaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJ I8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaG xAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwAC Agf/Xx3jbZ0vSfL9V7t3d5DpkX7U6x4k28M4YkwGWLQS+Z9X2G1NLKbFkGltWlGl 7dt2lg9hN/YZRepuaD3Ufg4lle/vReOU7Y0/MldeEsVj8pYg9sSSrEORmUcb+zZA 3IxID7pd9wTS4X554WpODUMw57IyAht3Zp56ESaQOSwEKtymjgsG+UjBTijUIfr7 +Xd3HGQJ1CjFS+wt0wKnB+Qjv65u0moux5bOGPf5wtkRBqWLtqoVRtbf4L2CuaaP 4SNI+SI/ZoNjsGCbFwjH/KELZAFJVjHNXjhX2XVGM3Hod8IG0Cjb7v0itAdA6C2k Kj6N/4/4FrXjarqy9P4dUHqJYIkARgQYEQIABgUCNX7eyAAKCRBYHYzhzPY2smqz AJ0V1rFnJ49Dz5KibKFctlzvkH70TQCfbNY2Ns8F9qYuTT+4sNFsXsSjCgM= =Lykr -----END PGP PUBLIC KEY BLOCK----- "To see tomorrow's PC, look at today's Macintosh." --Byte Magazine " There can be no compromise on basic principles. There can be no compromise on moral issues. There can be no compromise on matters of knowledge, of truth, of rational conviction." -Ayn Rand "The government has no source of revenue, except the taxes paid by the producers. To free itself -for a while- from the limits set by reality, the government initiates a credit con game on a scale which the private manipulator could not dream of. It borrows money from you today, which is to be repaid with money it will borrow from you day after tomorrow, and so on. This is known as "deficit financing." It is made possible by the fact that the government cuts the connection between goods and money. It issues paper money, which is used as a claim check on actually existing goods-but that money is not backed by any goods, it is not backed by gold, it is backed by nothing. It is a promissory note issued to you in exchange for your goods, to be paid by you (in the form of taxes) out of your future production." -Ayn Rand From maxinux at bigfoot.com Wed Jul 22 22:37:45 1998 From: maxinux at bigfoot.com (Max Inux) Date: Wed, 22 Jul 1998 22:37:45 -0700 (PDT) Subject: pgp fingerprint In-Reply-To: <3.0.5.32.19980722235815.00b8e780@208.30.28.18> Message-ID: I dont quite understand your question, but in PGP 6.0, they will use pictures aswell.. It is all fakeable.. but verify all info somehow verify key-id, fingerprint, picture etc. -- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59 Or Kinky sex makes the world go round- Christie: Your in my sig too ^^ If Cryptography is outlawed, only outlaws will have cryptography ^^ On Wed, 22 Jul 1998, Gustavo Henrique wrote: > > I've just started studying pgp and crypo and I have a doubt that > maybe you can answer. > > Correct me if I'm wrong: > the fingerprint was invented so you can check with the owner of the > public key if his key is correct. Since the fingerprint is something > small, you can check it over the phone or some other way. > > The question is: why people put their fingerprints on a mail signature ? > Some one could have changed his public key and changed his message, so > that fingerprint will match a wrong public key. > Isn't it the same nonsense as putting the public key in an email message > (without > signing nor encrypting it) ? > > > Thanks for the attention, > > Gustavo Henrique > > ============================================================= > Gustavo Henrique Maultasch de Oliveira Sysadmin.com.br > > gustavoh at sysadmin.com.br http://www.sysadmin.com.br > ============================================================= > > From bill.stewart at pobox.com Thu Jul 23 01:16:06 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 23 Jul 1998 01:16:06 -0700 (PDT) Subject: PGP security? In-Reply-To: Message-ID: <3.0.5.32.19980723010758.00b9a920@popd.ix.netcom.com> The message from your friend is a purely fabricated troll; don't worry about it. At 06:41 PM 7/22/98 GMT, Ric V. Carvalho wrote: >A friend and I have been going around about the security of PGP. >I believe it to be unbreakable at this point in time. I also recall >recently reading an article which stated that to break a PGP encrypted >message, using today's technology, unlimited computer core availability, >unlimited $$$, it would take the lifetime of 200 Suns. Is that 200 Sun Microsystems Computers, or 200 of those big yellow things? :-) Some previous versions of PGP had some weaknesses. PGP version 1 had the cool "Bass-O-Matic" algorithm, before Phil learned cryptography; read his discussion of Snake Oil in the manuals. I think some of the early versions had weaknesses in their random number generators used for session keys, but I may be mixing that up with Netscape, which definitely used to have that problem. One of the current concerns is that the popular version 2.6.2 et al use the MD5 hash, which is starting to show some theoretical weaknesses, though none of them are known to be exploitable against PGP, but the newer versions prefer to use SHA-1 as a hash just in case. There was also a serious problem which allowed an attacker to create a public/private key pair with the same keyID as a target (much shorter key, so quick to create, and who checks key length?), so the newer versions use a different method for creating keyIDs that's hard to spoof. Early versions also used shorter KeyIDs, so it was possible to get a collision by brute force, so the keyIDs were made longer. Impersonating a KeyID makes it possible to fake signatures, and also possible to trick PGP or the user into trusting the wrong key, which is always bad. The secret key ring file has two current weaknesses, which matter if somebody can access your file (so don't let that happen!) One is that if you have wimpy passphrases, a dictionary attack can crack the record containing your private key, at which point you lose - so don't use a wimpy passphrase, AND do protect your secret keyring well. Another, less serious is that the file contains the user name in plaintext - so if you're trying to hide your secret identity, someone reading the file will see that you not only have keys for Clark Kent, but also for Superman; in some environments, this can be more dangerous than cracking the passphrase, because the guys with rubber hoses can get your passphrase once they know they want it. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From lreed at west.cscwc.pima.edu Thu Jul 23 01:45:35 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Thu, 23 Jul 1998 01:45:35 -0700 (PDT) Subject: TR3 - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9964.46C72D20.1@west.cscwc.pima.edu> Terminating Resistor III - SPACE ALIENS HIDE M DRUGS!!! ________________________________________________________ IMPORTANT NEWS FLASH!!! _______________________ I HAVE JUST LEARNED, FROM A RELIABLE SOURCE, THAT SECRET GOVERNMENT AGENCIES ENGAGE IN ACTIVITIES THAT ARE FORBIDDEN TO / ILLEGAL FOR THE AVERAGE CITIZEN TO ENGAGE IN! OK, so it doesn't come as a major surprise to anyone. Nevertheless, our world-view tends to be limited to, and shaped by, the information that we are 'allowed' to access. Even if we are aware of the fact that the government is undoubtedly going full-steam ahead in areas such as cloning research and merger of artificial intelligence with artificial life forms, we don't give much thought to the implications and possible consequences of exotic, secret research and experimentation, because we don't have enough information about what is going on behind closed government doors to make any judgements. The information that we *do* get about out-of-control government actions and policies invariably comes after-the-fact, or at a time that we are *told* is after-the-fact. ("We stopped doing that years ago. Joe doesn't work here, anymore. We got rid of the bad apples, and now it's just us GoodGuys left...") A friend of mine did computer work for an Arizona neurologist who put electrodes and steel plates in the skulls of monkeys, rabbits, etc., in order to do brain-mapping (one of the major areas of mind-control research), in order to study Parkinson's Disease. The neurologist was approached by a research foundation that was very interested in giving him a grant to work with children, instead of with animals. This has become an acceptable area of experimentation (a quick study of those involved easily links them to a variety of intelligence agencies). Their offer was refused as a result of the format and structure of the proposal obviously being geared more toward providing information and results that had more to do with learning methods to control aberrant behavior than with benefitting the proposed child subjects. After his refusal, his current grant was canceled, and he was again made the offer, which he accepted. Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental in helping the CIA to see the benefit of taking an 'interdisciplinary' approach to mind-control. Although Dr. Cameron's basic method was to combine a wide variety of medical, biological, psychiatric, anthropological, et al, methods using his own limited knowledge, in your basic VoodooLeeches methodology, the CIA and military intelligence agencies began consolidating the various arenas of mind/human-conditioning research and experimentation by helping to sychronize the research of a wide body of educational and research professionals in divergent fields of expertise. As a result of directing the focus and evolution of the majority of scientific and psychological research in North America through control of the funding mechanisms and access to research publishing, the American intelligence community has managed to merge the research community into an integrated tool for delivering the information and results desired by the Controllers for their own grand designs. John Lily, a respected cutting-edge researcher told the intelligence community to "Fuck off!" when they approached him with an offer to fund his research on the condition that it become secret/classified. Lily suddenly found most doors in the scientific community being slammed in his face, not able to even getting a job sweeping-up after conferences that he previously had been begged to attend. (In essence, he quickly found that he couldn't even get elected ScientificDogCatcher.) Not to worry, there were researchers standing in line to take Lily's pioneering mind-mapping research to new heights, using experimentation techniques on human subjects that Lily had too much compassion and integrity to use on dolphins. The "Dont ask...don't tell..." military policy on homosexuality in the armed services has long been an unspoken understanding in the research community, where the players long ago learned that making an issue of the ethics of the researchers down the hall throwing niggers off the roof, to see it they really do have thick skulls, could have negative reprecussions on their own position and funding. Many researchers find themselves doing what they consider to be needed and pertinent research in their projects on their own time, after they have satisfied the wants and needs of those funding their project. Of course, if you ask most researchers about the veracity of what I have just claimed, you will meet with sincere denials, and perhaps even genuine laughter. However, a relative of mine who is engaged in providing seminars on effective philanthropic fund-raising makes no bones about the fact that the success of his seminars revolves around teaching people to sell their souls while remaining blissfully ignorant of the fact that they are doing so. ("If murdering a thousand children in my research saves the life of a single child...") While I am not in any way suggesting that the majority of researchers are NaziMonsters, having allowed themselves to be maneuvered into a position where their research is driven by the goals of those funding it, their research in 'turning on the gas' is irrevocably linked to research by loosely connected entities who are being funded to research 'putting them in the ovens.' Intelligence agencies' interdisciplinary approach to developing the ability to monitor and control the minds, beliefs, attitudes, actions and behavior of the citizenry (in the interests of National Security, of course), has resulted in what has been openly known by many as the New Manhattan Project. Just as the Nuclear/Atomic Manhattan Project was an all-out, top priority effort engaging the premiere players in a variety of scientific fields, the New Manhattan Project involves a consolidation of research and activity spanning such diverse arenas as mind-control, emotional-manipulation, behavioral conditioning, citizen surveillance-monitoring-classification, and even encryption. The research and experiments in Artificial Intelligence and Human Intelligence are intricately linked. Neural Network models and implementations are based on understanding and imitating human "operant conditioning, the form of learning in which animals and humans learn the effects of their actions," as Professor Stephen Grossberg states. The Artificial Intelligence approach of Neural Networks is based on the processing of symbolic information, as opposed to numerical data. The Controllers have mastered the art of 1984'ish manipulation of the public mind through media control and spin doctoring, now able to gather the citizens into an angry torch-carrying mob, chasing the U.S.ConstitutionMonster back to the castle to defend themselves against the NewImprovedFourHorsemenOfTheApocalypse. (Any Congressman who is caught dorking a teenage girl and cheating on his taxes has a fighting chance of surviving if he can convince the electorate he is 'tough on crime,' or whatever the current TenSecondSoundByteFadOfTheDay is.) The Controllers efforts to control access to information are centered around their need to control the EmotionalSymbolism by which they have learned to lead the public around by our noses. The grand Artificial Intelligence push to "develop principled theories of brain and behavior and incorporating them into machines," as Brian Fitzgerald writes in 'Bravo New World,' is really part-and-parcel of the Controllers' designs to guide the future development of the InterNet into a WorldWideStickyWeb wherein the Medium is capable of manipulating the user into the position of controlled stooge, rather than a participant, by being able to monitor, log and analyze the user's basic operant conditioning, via his or her responses, thus being able to provide the user with only those options which will lead them in the direction that is desired by the Controllers. (An example is the feature of allowing the user to 'customize' the interfaces they are interacting through, according to their personal interests, with the AutoBot then serving up generous helpings of pointers and information beneficial to the provider, instead of a genuine cross- section of what is actually available on the InterNet.) {Interest #1 - Anarchy: Today we are providing you with Newt Ginrich's essay, entitled "What Anarchy Means To Me." Interest #2 - SPACE ALIENS HIDE M DRUGS!!! Manuscripts: Click on the provided link to read Ms. Manners Politically Correct Revision of the manuscripts, which are rated Family Entertainment by CyberNanny.} The federal government proclaimed the 1990's the Decade of the Brain. What they neglected to mention is that Military Intelligence has been put in charge of monitoring, analyzing and shaping the Brain... CNS (Cognitive Neural Systems) research and development has become a wholly owned subsiduary of the Air Force super laboratories, the Office of Naval Research, DARPA (Defense Advanced Research Projects Agency), the National Science Foundation, and the rest of the Usual Suspects. ou remember DARPA, don't you--those wonderful folks who gave us the InterNet which routes all communications through military channels? ou remember the Office of Naval Research, don't you--those wonderful folks who developed products and techniques for monitoring all of the communications on the face of the earth? Fitzgerald notes, in 'Bostonia,' that "Graduates of CNS work in a plethora of fields, including psychology, neuroscience, telecommun- ications, software engineering, economics, finance...medicine...and, of course, robotics. Strip away the thin veneer of reliance on the research being conducted by RespectableInstitutions and what you have is MKULTRA cross-breeding with Artificial Intelligence to produce a DemonChild whose NeuralNetworks are a fusion of GrayMatter and a DigitalThisIsWhereouAreGoingToGoToday AutoBot. Julia Schickedanz, an MIT professor, remarks on the fact that the professors involved in CNS research and development "specialize in seemingly unrelated areas of research." Right...and the New World Order will result in the globalization of "seemingly unrelated areas" of the world... Grossberg, speaking of the 'interdisciplinary' approach to the study and implementation of Artificial Intelligence, says, "such an approach is absolutely necessary to theoretically investigate fundamental issues of mind and brain processes." I am certain that it is just a 'coincidence' that two champions of the 'interdisciplinary' approach to research in the understanding of how the mind works and how it can be manipulated, Dr. Ewen Cameron, Canadian mind-butcherer, and Professor Grossberg CyBorg Creator, are each a Rockerfeller GoldenChild. Grossberg apparently spent decades and millions of dollars discovering what he could have learned by forking over a sawbuck for a book by the GrandaddyOfInterActiveMediaUnderstanding, Marshal McCluhan, 'The Medium Is The Message,' as he informs us, belatedly, "What we perceive depends on how the nervous system processes messages." And those wonderful folks who provided us with an interactive medium which they are capable of monitoring and controlling, are now involved in a priority funding of research which will enable the medium to be able to process/provide messages which are intricately linked with the structure and functioning of our own nervous system. More importantly, the ability of the computer to monitor our habits and the most infinitesimal details of our personal lives, when combined with a neural network capable of learning and adapting to our thoughts, our desires and our habits, essentially has the capacity to transform itself into a Mythological Siren of the Deep, luring us to our destruction, regardless of whether or not we know it to be an Illusion. (If you think I am overstating my case, here, remind yourself how easy it is for Charlie CorporateMonger to get JoeSixPack to provide every detail of his life in order to get a SuperMarketValueCard that gets him a nickle off on a can of beans. If they had a record of your visits to and file accesses on the BigBreastedBlonde Web Site, they would have a Swedish Masseuse bring you the card to fill out, and end up with your] wallet, your car and your house, as well, and you'd be eating your beans out behind the dumpster.) In essence, Artificial Intelligence researchers are attempting to find ways to incorporate the ability to understand and incorporate human behavior and response mechanisms into programmed machines/environments, thus rendering them capable of fulfilling functions which humans normally require decades of experience and application to acquire competence in. During my last entry into the U.S. through the Vancouver Customs port, my sister was horrified to learn that the devices in each lane were visually and auditorily monitoring those who passed through. License plates are auto-scanned and run through the computer to flag people of interest to Border Authorities (and I suspect that visual recognition technology of humans is also being used/tested). The vehicle in front of us contained your typical middle-class American family, and was passed through with only perfunctory attention being given to them, yet the Customs Officer thumped on the top and side of their car before waving them to proceed, as if checking to make sure that they didn't have a few hundred kilos of heroin stashed away. My sister was puzzled as to why he did that, whereupon I explained that he was not interested in *their* reaction, but in *mine*, since I was next in line, the computer had flagged me, and someone inside was undoubtedly listening to see if I told her, "Are you sure you hid the dope?" Some of the Artificial Intelligence AutoBots of the future will no doubt be MultiMedia HumanResponse LieDetectors. Rather than measuring your pulse, breathing rate and electrical tension, they will measure variations in your Personally Categorized Basic Neural Network Profile. Just as gun ownership can be denied today on the basis of a history of mental problems or criminal activity, certain activities, rights, or access to information, in the future, will be based on your meeting guidelines/profiles as judged by your interactions with AutoBots that are designed to analyze and categorize your mind and behavior. Grossberg maintains, "All conscious states are resonant states. And resonance can join cognition to emotion in a unified conscious experience." The implication of this is that the Artificial Intelligence that is being developed to work in parallel with the human brain and the elements of human behavior will be capable of becoming a 'partner' in our thoughts, emotions, and consciousness, and thus be an integral part of that which influences the direction and processes of our mind, psyche and behavior. Take a moment to think about the full import of the technology which will shape our future being shaped and directed almost wholly by Military Intelligence agencies and their associates. Advertising psychology and MKULTRA mind-control research are barely poor-cousins to the Cognitive Neural Systems technology that is being prepared to not only monitor, analyze and categorize even the most minute areas of our mind, emotions, psyche and behavioral patterns, but also to have the capacity to adapt *their* behavior to our own personal psychological structure and, as in the case of Thing1 and Thing2, "predict" our "impending impacts" with the desires of the Controllers, and direct us toward "avoidance behaviors" which will "suppress movements that will cause collisions" with the goals and designs of the Controllers. It can't be long before the Trilateral Commission is replaced by the Trilateral CPU... From howree at cable.navy.mil Thu Jul 23 04:01:26 1998 From: howree at cable.navy.mil (Reeza!) Date: Thu, 23 Jul 1998 04:01:26 -0700 (PDT) Subject: Iz thiz real? In-Reply-To: <009C9964.46C72D20.1@west.cscwc.pima.edu> Message-ID: <3.0.5.32.19980723200049.00867400@205.83.192.13> This reads as real, not the mindless rehashing of almost'was that typically characterizes the posts from "Linda Reed". Linda, are you sure you didn't eat the drugs, and imagine you were a space alien? Reeza! Text follows: > A friend of mine did computer work for an Arizona neurologist who put >electrodes and steel plates in the skulls of monkeys, rabbits, etc., in >order to do brain-mapping (one of the major areas of mind-control >research), in order to study Parkinson's Disease. > The neurologist was approached by a research foundation that was very >interested in giving him a grant to work with children, instead of with >animals. This has become an acceptable area of experimentation (a quick >study of those involved easily links them to a variety of intelligence >agencies). Their offer was refused as a result of the format and structure >of the proposal obviously being geared more toward providing information >and results that had more to do with learning methods to control aberrant >behavior than with benefitting the proposed child subjects. > After his refusal, his current grant was canceled, and he was again >made the offer, which he accepted. > > Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental >in helping the CIA to see the benefit of taking an 'interdisciplinary' >approach to mind-control. > Although Dr. Cameron's basic method was to combine a wide variety of >medical, biological, psychiatric, anthropological, et al, methods using >his own limited knowledge, in your basic VoodooLeeches methodology, the >CIA and military intelligence agencies began consolidating the various >arenas of mind/human-conditioning research and experimentation by helping >to sychronize the research of a wide body of educational and research >professionals in divergent fields of expertise. > As a result of directing the focus and evolution of the majority of >scientific and psychological research in North America through control >of the funding mechanisms and access to research publishing, the American >intelligence community has managed to merge the research community into >an integrated tool for delivering the information and results desired >by the Controllers for their own grand designs. > From marketinfo at imarket.cc Thu Jul 23 05:06:11 1998 From: marketinfo at imarket.cc (marketinfo at imarket.cc) Date: Thu, 23 Jul 1998 05:06:11 -0700 (PDT) Subject: Discover Your Family History - Rated "Cool Site of the Week" Message-ID: <199807221748.NAA26766@smtp.leading.net> Discover Your Family History - Rated "Cool Site of the Week" Come visit our website at, Free Search (if the above link is busy please use...) Free Search Do you know WHO your ancestors are and WHAT they did? Do you know WHEN your surname first appeared? Are you curious about WHERE your family roots originate? Now you can fill in the missing pieces of this puzzle. Join the satisfied multitudes who have discovered their complete Family Surname History. All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE. See if we've researched your complete family name history during our 25 years of professional research. Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color. Your family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors. Over 500 URLs on family and heraldic history. Please come visit our website at, Free Search (if the above link is busy please use...) Free Search Hall of Names International Inc. 1-888-My-Roots (1-888-697-6687) [remhon at yahoo.com] Come Visit. From lego at sbccom.com Thu Jul 23 07:59:57 1998 From: lego at sbccom.com (Todd Bowers) Date: Thu, 23 Jul 1998 07:59:57 -0700 (PDT) Subject: No Subject Message-ID: <19980723145638736.AAA266@oemcomputer> cool ..... i am 13 From billp at nmol.com Thu Jul 23 08:15:21 1998 From: billp at nmol.com (bill payne) Date: Thu, 23 Jul 1998 08:15:21 -0700 (PDT) Subject: allahu akbar crowd Message-ID: <35B7527E.B9@nmol.com> Thursday 7/23/98 9:06 AM John Young Nice to talk to you last night. I am concerned too about what may happen. http://caq.com/cryptogate So was Hans Buehler. He phoned me from Zurich to discuss his concerns several years ago. Getting things settled is up to congress. Rep McKinney and Sen Grassley are the contact points. Both got copies of the Swiss Radio International tapes. Buehler, later, on the phone seemed resigned to what may happen. Nothing he can do about it. But there is something congress can do about it. GET IT SETTLED! bill From Skoitch at aol.com Thu Jul 23 09:22:16 1998 From: Skoitch at aol.com (Skoitch at aol.com) Date: Thu, 23 Jul 1998 09:22:16 -0700 (PDT) Subject: W.A.Y. Message-ID: WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE? From mctaylor at mta.ca Thu Jul 23 10:34:30 1998 From: mctaylor at mta.ca (M Taylor) Date: Thu, 23 Jul 1998 10:34:30 -0700 (PDT) Subject: Pegasus email, internal DES encryption? Message-ID: <3.0.5.16.19980723142953.295f0d66@mailserv.mta.ca> I've been sent this requst indirectly, and thought it best to forward it to these lists, anonymously. I will forward any replies to the original sender. -M Taylor ------------------- Hi guys. Sorry that this is a little off topic, but I figure that here is my best chance to find this information, all other resources (save damned reverse engineering) having been exhausted. If you have used Pegasus mail before, you would know that it provides an internal encryption function. This is some form of DES, accourding to their web site, and is presumably < 40 bits, as they quite happily allow worldwide downloads of the binard from the US. However, actual details on which form of DES, and how they turn an input password into a key were not supplied. Now, my company decided that this encryption was just dandy for security, and that everyone should use it for all encrypted mail. This, along with their idiocies about passwords used have me quite annoyed - but that is *far* from the point of this. What I am wanting to do, so as not to have to give up my nice, efficient unix mailer, while retaining the abilitiy to work with others is implement (or locate an implementation of) the Pegasus encryption, and then do a little hacking and add that to my mailer. The main problem is: no idea what the format of the DES used is. So, if anyone could supply me with a simple answer to this question, I would be very apreciative. Thanks, xxxx From CTIA_Daily_News at um2.unitymail.com Thu Jul 23 11:44:32 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 23 Jul 1998 11:44:32 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 23, 1998 Message-ID: <199807231746.MAA01562@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com =========================================== From billp at nmol.com Thu Jul 23 12:11:15 1998 From: billp at nmol.com (bill payne) Date: Thu, 23 Jul 1998 12:11:15 -0700 (PDT) Subject: encryption devices, radiation-hardened devices , Forth and an INTELLIGENT UPS Message-ID: <35B789A8.CD9@nmol.com> Thursday 7/23/98 12:16 PM John Young I am looking at http://www.jya.com/cr072298.txt REASON we did the 8051 Forth at Sandia is that I was ORDERED by department manager Kent Parsons to port Forth from the 8085 to the 8051. Sandia built a radiation-hardened 8085 chip set. However, the 8085 took up lots of room and did not have timers, serial expansion, bit-addressable registers/memory, on-board UART, etc. Parsons helped convince Sandia upper management to build the 8051 as a rad-hard part. The guys doing the 8051 testing of the Sandia rad-hard part were writing SIMPLE machine language programs to test the part. Like hooking an LED to a port, flashing the LED, to see when it quit while being irradiated. We pointed out that running Forth itself exercises much of the 8051. In addition writing test code for the instructions and hardware not directly exercised by Forth was easy, in comparison to other software technologies. Either in high-level Forth or Forth assembler. I managed a contract for Jerry Boutelle, author of the Nautilus II metacompiler, to write test code for Sandia's 8051 rad-hard part. Then, of course, I wrote a SANDIA-APPROVED book about our port of 8085 FIG Forth to the 8051. http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 And we shared the source code and documentation with anyone interested in learning what we did. http://jya.com/f86/whpf86.htm http://jya.com/whpfiles.htm While writing this note, I am watching an 8051 Forth run the test code : XX 2 BASE ! 0 BEGIN DUP U. 1+ ?TERMINAL UNTIL ; to see how many 8051 machines still work. Let�s switch subject to A NEW INNOVATION in Uninterruptable Power Supplies. Yesterday I bought a CyberPower Power 98/250VA for all for $59.95! at Best Buy. http://www.cyberpowersystems.com/ Previously I looked at CompUSA at a APC 250 which had a rebate making the final cost $79.99. But NO MICROCONTROLLER and, thus, no brains. CyberPower has a MICROCONTROLLER in it. http://www.cyberpowersystems.com/products.cfm Here is what you get. 1 lead/acid battery 2 SERIAL PORT in the UPS 3 Three UPS sockets - one for a transformer 4 Three surge-protected sockets - one for a transformer 450 joule 5 3.5 diskette containing Win 3.xx/9x software 6 One 9 pin rs232 cable 7 One 6 foot rj11 cable 8 Two rj11 surge-protected sockets. Here is the idea. The UPS monitors the line voltage. When the line voltage fails, then the UPS switches to battery. The UPS then sends a message to your PC over the rs232. The CyberPower software then closes all open files then turns off your PC. I am only running our PC and 15 inch screen from the battery backed up supply. Modem and printer go to the surge-protected sockets. I pulled out the plug to the CyberPower Power 98/250VA and it switched over to battery. I noticed some lines across the screen. I attribute the lines to dc/ac conversion and voltage step-up. UNFORTUNATELY, I am using com1 for our mouse and com2 for our external modem. Therefore, I am not able to try the software yet. Alternative I have to fix this problem are get a 1 PS2 mouse and free-up com1 2 get another serial card for about $20. Green return receipt request card received today indicated that http://www.jya.com/whp071598.htm was received on Friday July 17, 1998 Let�s all hope this HORRIBLE matter gets settled soon so we can all move on to OTHER constructive projects. Later bill From carol.woolley at lmco.com Thu Jul 23 12:35:18 1998 From: carol.woolley at lmco.com (Woolley, Carol) Date: Thu, 23 Jul 1998 12:35:18 -0700 (PDT) Subject: crypto on extranet questions Message-ID: We are designing an extranet for our non-employees, customers, and partners to work on program information. All users will be authenticated by personal digital certificates that we will issue from our Netscape Certificate Server. It is my understanding that users from Canada, Italy, and Norway must have a certificate encrypted at 56 bit. Are you aware of any other restrictions/requirements? The crypto law survey mentions use of Trusted 3rd parties for Italy and Norway. Are there commercial companies that act as Trusted 3rd parties? look forward to hearing from you. carol carol.woolley at lmco.com From Ant6menace at aol.com Thu Jul 23 12:52:28 1998 From: Ant6menace at aol.com (Ant6menace at aol.com) Date: Thu, 23 Jul 1998 12:52:28 -0700 (PDT) Subject: Pipe bombs r better Message-ID: <3d259bf6.35b79455@aol.com> they rule! From listmaster at extensis.com Thu Jul 23 14:57:18 1998 From: listmaster at extensis.com (listmaster at extensis.com) Date: Thu, 23 Jul 1998 14:57:18 -0700 (PDT) Subject: Get the most of Quark 4.0 - with Extensis QX-Tools Message-ID: Announcing Extensis QX-Tools 4.0 for QuarkXPress 4.0 Now, get the most out of QuarkXPress 4.0 - with Extensis QX-Tools 4.0 http://www.extensis.com/qxtoolsp � Now available for Mac and Windows. � NEW! Convert EPS, PostScript, and PDF files into editable Quark Objects. � NEW! Create and apply styles to objects. � Improved! Re-scale groups of objects- without losing the option to undo. � Plus, 5 other must-have tools that get the most out of QuarkXPress 4.0 On July 10, 1998 QX-Tools 4.0 Won "Best of Show" at MacWorld. Here's what they've been talking about�. Extensis QX-Tools gets the most out of QuarkXPress 4.0 by putting your creative ideas to work - faster. QX-Tools 4.0 incorporates 8 different tools that use the familiar interfaces you already know. Spend your time designing, not learning new software. With NEW QX-VectorEdit, convert any PostScript file into an editable Quark object. Word tables, Excel charts, Illustrator, FreeHand, and PDF files now become Quark objects. Edit them, correct them, trap them or fix their colors - right in QuarkXPress. Once edited, assign the object to a layer with QX-Layers. Yes, layers ARE possible in QuarkXPress. Create, show, hide, reorder and assign any object to any layer in your document. Improved QX-Scaler lets you size and resize groups of objects - with precision- without ever losing the option to undo. Once applied, you can change any of the object attributes with NEW QX-ItemStyles. Create and apply item styles to OBJECTS- using over 50 different attributes. Now, quickly navigate through your documents with QX-Viewer, a full-color, multi-spread preview. Then, apply the same QX-ItemStyle to objects throughout your document for speed and consistency. With three other useful tools-QX-FineTune (tweak characters and objects), QX-Palettes (they're dockable!) and QX-Find-Change (search and replace for objects by attribute)-QX-Tools will put your creative ideas to work in QuarkXPress- in no time. Now, make QuarkXPress 4.0 work the way you REALLY want - with Extensis QX-Tools 4.0. SPECIAL OFFER: Order QX-Tools 4.0 NOW for only $149.95 To ORDER, download a free demo, or for more information, please visit: http://www.extensis.com/qxtoolsp Or call Extensis at (800) 796-9798 or (503) 274-2020. Extensis QX-Tools 4.0 is available for both Mac and Windows. Extensis QX-Tools 4.0 is compatible with QuarkXpress � 4.03. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PS. We have made every effort to ensure this message is being sent only to people who have expressed interest in Extensis products. If we have sent this to you in error, please accept our apologies and reply with REMOVE in the subject line for automatic exclusion from future communications. If you know someone who would like to be on our mailing list have them send an email to listmaster at extensis.com with ADD in the subject line and their email address in the body. P.P.S. This message is intended for North American customers. If you are located outside of North America and have received this message, please visit www.extensis.com/purchase/ to find the nearest local distributor in your country. From intl-sales at installshield.com Thu Jul 23 15:54:36 1998 From: intl-sales at installshield.com (InstallShield International Sales) Date: Thu, 23 Jul 1998 15:54:36 -0700 (PDT) Subject: InstallShield Important Download Information Message-ID: Hello, Thank you for visiting the InstallShield Website. We would like to let you know that you can contact us for information you may require about our company, our products or our websites. We also have an international network of resellers and distributors that maintain stock and can provide the software to you quickly. They offer the convenience of acquiring the product in local currency and support in your local language. In Czech Republic you can obtain products from the following company: Unicorn Distribution Rohacova 83 Praha, 3 130 00 Czech Republic Phone: +420 (2) 697 2202 Fax: +420 (2) 697 11 95 Email: jaros at unicorn.cz If you find that you are not happy with our resellers, please hit REPLY and let us know immediately. We are here to assist you in any way that we can to get the most from our products, our company, our partners and our website. Any comments, questions or concerns you may have are more than welcome. Just let us know if there is anything we can do for you. Once again, thank you for visiting the InstallShield Website. The password for the InstallShield5.1 evaluation is "AlbertCamus" Regards, International Sales Department intl-sales at installshield.com +1-(847) 517-8191 voice +1-(847) 240-9138 fax From ODL at odlink.com Thu Jul 23 17:24:55 1998 From: ODL at odlink.com (ODL at odlink.com) Date: Thu, 23 Jul 1998 17:24:55 -0700 (PDT) Subject: Grand Opening Computer Sale Message-ID: <989.283923.689449 ODL@odlink.com> We apologize if this electronic mail was an inconvenience, if you would like to be removed from future mailings please send your email address to remove at odlink.com If you would like to be emailed monthly on special closeout items send your email address to yes at odlink.com If you're a geek like me and want weekly updates send your email address to geek at odlink.com For more information email request to sales at odlink.com Check out our web site at www.odlink.com it's under construction but you will see where we are headed! SUPER SALE!!! AMD K6 233 MHZ COMPUTER CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE, S3 2MB VIDEO CARD, MOTHERBOARD, 233 MHZ CPU, 32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD Yamaha 3D soundcard LOTUS SMARTSUITE SOFTWARE ($149 value) MICROSOFT WORD 97 MICROSOFT WORKS 4.5 MICROSOFT PUBLISHER 98 MICROSOFT BOOKSHELF 98 ($199.00 value) All for the unbelievably LOW PRICE of $499.00 AMD K6 266 MHZ COMPUTER CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE, S3 2MB VIDEO CARD, MOTHERBOARD, 266 MHZ CPU, 32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD Yamaha 3D soundcard LOTUS SMARTSUITE SOFTWARE ($149 value) MICROSOFT WORD 97 MICROSOFT WORKS 4.5 MICROSOFT PUBLISHER 98 MICROSOFT BOOKSHELF 98 ($199.00 value) All for the unbelievably LOW PRICE of $539.00 AMD K6 300 MHZ COMPUTER CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE, S3 2MB VIDEO CARD, MOTHERBOARD, 300 MHZ CPU, 32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD Yamaha 3D soundcard LOTUS SMARTSUITE SOFTWARE ($149 value) MICROSOFT WORD 97 MICROSOFT WORKS 4.5 MICROSOFT PUBLISHER 98 MICROSOFT BOOKSHELF 98 ($199.00 value) All for the unbelievably LOW PRICE of $589.00 OFFICE DIRECT LINK, llc 531 W. Arapaho, Suite 101 Richardson, TX. 75080 phone (972) 680-1700 fax (972) 680-1698 From Gvtgrantz at sprintmail.com Thu Jul 23 18:09:56 1998 From: Gvtgrantz at sprintmail.com (Gvtgrantz at sprintmail.com) Date: Thu, 23 Jul 1998 18:09:56 -0700 (PDT) Subject: Free Government Grants Message-ID: <199807232351.IAA13191@JingXian.xmu.edu.cn> The US Government sets aside Billions of dollars each year in the form of grants and loans for entrepreneurs and the American public. Your tax dollars are not all spent by the Defense Department. A large percentage of your tax dollars are set up for domestic assistance to help individuals, entrepreneurs and businesses create jobs whether the company is large or small. Steven Jobs received government help with his company Apple Computers, Donald Trump, Ross Perot , Lee Iaccoca are just to name a few of the individuals who used this program to start billion dollar corporations. Each year the government gives out hundreds of millions of dollars to companies,individuals and entrepreneurs, homemakers and the likes. Currently, less than 2% of the population applies for grants and loans while a large percentage around 4 Billion remains unclaimed when it could help an entrepreneur, company or someone in need. Most Americans do not know these programs exist for their benefit. The government wants you to succeed in hopes of stimulating the economy. Take a look at some of the programs available. Direct Grants to $800,000 Direct Loans to $2,200,000. Over 300 grants for business and loans that are easier to obtain than conventional loans. All grants and some loans require no credit check and no collateral because you are actually borrowing your tax dollars set aside for business start-up and development. You live in the greatest country in the world "Only in America" You hear the term spoken but without comprehension. More immigrants call for assistance than US citizen,s they see the opportunity and if not first successful they try back when they become citizen,s. Are they successful? Eventually. The government means business ,to help you they have hired over 1500 professionals to help you if only you would call. The area of expertise falls under marketing, consultation,import,export and anything pertaining to business that might help you succeed. This could mean the difference in success or failure of your business. The business endeavor does not matter the government has the money and an expert to help you whether you are in farming, real estate, retail,daycare or any legal money making opportunity. If you are a tax paying citizen you owe it to yourself to take a look at these programs immediately. Just for ordering, you will receive: 1."How to Write a Business Plan" approved by the Chamber of Commerce, 2.The HUD Home Ownership Program ( Guarantee you will qualify for at least 5) 3.Government Auctions, 4.Education Grants 5.Free Credit Repair 6.Bad Credit Loans-Categories A,B,C and D 7.and lots of other freebies from the government All applications, SBA forms, All legal forms for business start-up are included.Organizations and Schools-Quantities of 10 or more deduct 15% To order by mail send check or money order for $19.95 plus $3.00 shipping and handling to: Government Publications 2120 L. St NW ste 210 Washington DC 20037 Info: (202) 298- 9673 -------------------------Cut Here--------------------------- Yes, I want to purchase your guide to government grants and loans for $19.95 plus $3.00 S&H (US Dollars). 30 day money back guarantee. All money orders shipped in 3 days. I've enclosed my: _____ Check _____Money Order _____Credit Card Information If paying by credit card: Please Circle: VISA or MasterCard or American Express Account #: __________ - __________ - __________ - __________ Exp. Date: ______________________ Signature: _____________________________________________ Today's Date: ______________________ Your Mailing Address: Name: ________________________________________ Address: ________________________________________ City: ________________________________________ State: ________________________________________ Zip: ________________________________________ E-mail: ________________________________________ Mail to: Government Publications ; 2120 L. St NW ste 210 ; Washington DC 20037 From lreed at west.cscwc.pima.edu Thu Jul 23 18:52:13 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Thu, 23 Jul 1998 18:52:13 -0700 (PDT) Subject: THEY - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C99F3.93CF4780.32@west.cscwc.pima.edu> Where Do THE (TM) Want our Mind To Go Today? - SAHMD!!! _________________________________________________________ "ou're not really an anarchist if you don't have your Anarchist Union dues paid up-to-date." ~Anna R. Christ, U.S. Government Department of Anarchy Czar Even those who dismiss, as ridiculous, the conspiracist theory that the entire world is controlled by a small, Secret Cabal of individuals, with me at its head, recognize that over the course of history, the media began encroaching on the traditional role of religion and community as the source of beliefs about the world around them, as well as increasingly influencing opinions and attitudes, and that the news media was originally controlled by a very small enclave of individuals with powerful financial and political connections. Thus, the front-page newspaper story about the completion of this or that railway was more likely to be accompanied by a picture of a Railway Czar chomping on a fat cigar as he drove the last spike, rather than a picture of 30,000 Dead Chincs, since the LittleellerFellers didn't get a lot of dinner invitations to the publisher's estate. Far from being a Secret Conspiracy, the control of the newpaper media by a few individuals was a well-established Open Conspiracy, regarded as SimplyTheWayThingsAre in an era when the money, power and connections of the OldBoyNetwork trumped poverty, insignificance and a cousin named Louie who could get you a good deal on a pair of used shoes. Regardless of the fact that the public knew that the news was a fixed game, even if there was a 'competing' newsrag from a different member of the RichAndPowerfulOldBoysNetwork, it was the only game in town, and those in control of the news that got reported were the ones who named the game and framed whatever debate took place. The newspaper publishers of yesteryear were, like todays car salesmen, masters of manipulating their customers into choosing between the 'models' of news/opinion/reality that *they* were offering. Even today, for all of the lip-service paid to 'competition' in the mainstream media, I doubt that there was a single person in America who bought copies of *all* the major mainstream newspapers in order to find the one with the headline, "Freedom Fighter Timothy McVeigh Takes A Bite Out Of Government Crime." In 1937, by which time America had more radios than indoor toilets, the Rockerfeller Foundation started funding early mind-control research into the social effects of new forms of mass media, such as radio, and their potential for effecting social control of the masses. The main headquarters for the research, which was carried out by several universities, was at the Office of Radio Research, at Princeton. It was headed by Paul Lazersfeld, an influential figure in a Marxist ThinkTank, the Institute for Social Research (I.S.R.), commonly known as the Frankfurt School. Interestingly, the goals of the Bolshevik Intelligentsi of I.S.R.--to undermine the Judeo-Christian legacy of Western Civilization through an "abolution of culture," and to determine new cultural forms which would increase the alienization of the population--were very similar in concept to the techniques that Canadian mind-butcherer, Dr. Ewen Cameron, would pioneer decades later in the field of psychiatry--creating 'Differential Amnesia' through electroshock mind-wiping, and recreating persona/ personality through the use of 'Psychic Driving'--with the main difference seeming to be that the Radio Project's Lazersfeld didn't have access to the technology to pump thousands of volts through the brains of the masses, so had to settle for giving them extended treatments with low- power radio waves, as well as using repetitive formatting instead of Dr. Cameron's "I am a good person who is going to assassinate the Prime Minister" tape-loops. At the time, Communism was Semi-Fashionable, not yet having been magically transformed, overnight, into the GreatEvil, and among the entities taking an interest in using the Comintern created thinktank to learn how to use Bolshevik techniques to put the masses in their back pocket were, besides the Rockerfeller Foundation, the Columbian Broadcasting System, several American intelligence services, and the International Labour Organization. As Michael J. Minnicino notes, in 'The New Dark Age,' "Despite the official gloss, the activities of the Radio Project make it clear that its purpose was to test empirically the (I.S.P.) Adorno-Benjamin thesis that the net effect of the mass media could be to atomize and increase lability--what people would later call "brainwashing." [EditWhore's Note: If you are incapable of making the connection between TV/Advertising and Hypnosis, because the programs and ads don't begin with, "ou are growing veerrryyy sleepy," or between TV/Advertising and Brainwashing, because a BigRat doesn't jump out of the TV and eat your face, then just try to equate TV/Advertising with your mother's attempts to convince you that broccoli tastes good, or the teacher who tried to trick you into thinking that Math was more fun than looking out the window and watching the dogs fucking in the schoolyard.] Frank Stanton, an industrial psychology Ph.D., later to become the President of the CBS News Division, President of CBS, and Chairman of the Board of the RAND Corporation, was the Radio Project's research director. Herta Herzog would later use the propaganda skills she developed as a Radio Project researcher to become the first director of research for Voice of America. The course of the whole developing radio industry would shortly be affected in a major way by the Rockerfeller/Intelligence/Broadcaster's Radio Project research into the use of the radio medium as a tool for Social/Mind Control. In a 1939 Journal of Applied Psychology quarterly edition, the Radio Project published their conclusion that Americans had become "radio minded" (think about that phrase...), and that "their listening had become so fragmented that repetition of format was the key to popularity," as Minnicino points out. "The play list determined the 'hits'...and repetition could make any form of music or any performer...a 'star.'" ("ou got your dead skunk in the middle of the road, dead skunk in the middle of the road...") ou Want Regular Vanilla, Or Vanilla Regular? [WAS - Beyond The Valley Of The Mountain Of The Planet Of The Apes / Parts 1 Through 2,987,746,376,802,413]: "Not only are hit songs, stars, and soap operas cyclically recurrent and rigidly invariable types, but the specific content of the entertainment itself is derived from them and only appears to change. The details are interchangeable." ~Theodor Adorno, Chief of the Radio Project's Music Section, and an instrumental, decades-long member of the Communist Institute For Social Research, to which we owe a debt of gratitude for ensuring that audio pictures of Chairman Rockerfeller would dominate our audio landscape, and that quotations from the BigBankBook of Chairman Rockerfeller would fall on our ears, day and night. [EditWhore's Note: Today, of course, Corporations are getting in on the act by turning arts and sports events into an advertising medium in their own right (e.g. The Nike Bolshoi Ballet Company, and the Ravage Realty Desert Golf Classic), not to mention Chairman Pepsi purchasing the rights to the high-school Proletariat from their bourgeois SchoolMasters.] Shut The Fuck Up And Give Me our Gut-Feeling About This Program: Next time that you're having a highly-intellectual discussion (drinking cafe-latte with your little pinkie raised), about the philosophical and conceptual themes of a given program, think about "Little Annie" aka the Stanton-Lazersfeld Pogrom ( <--meaninful typo ) Analyzer. It was designed to allow test-audience members to register the intensity of their likes-dislikes on a moment-to-moment basis during a program. This allowed the operators to determine which situations or characters produced a momentary, positive feeling state. Michael Minnicino notes that "Little Annie transformed radio, film, and ultimately television programming." He adds that Little Annie, in updated formats, is still what drives mainstream programming today. [Note From T. Arthur: Basically, Little Annie is the human equivalent of the Pavlovian drool-cup, measuring the flow of body juices when the DoggieFoodLight goes on, or you watch an ad for edible panties. The VoicesInsideMyHead that claim, "Everything since the BigBang has been plagarism," when translated from Analog Wave to Digital Format, say, "The only movie/program that really exists is 'The ogi Berra Story'...everything else is DejaVuReRunsAllOverAgain.] Our Story So Far: OK, so we got your small Non-Secret Cabal of NewsRag Czars going about their business of exercising their InGodWeTrust-Given Right to decide what people with less money should know and think. And then we got your Radio Media Medium starting to cut-in on the NewsRag Czar's RealityCreationRacket, as a result of there being more of them than indoor toilets, so as how people now get their RealityInput even when they ain't on the Crapper, making room for what they is reading by engaging in ExcessRealityOutput (A RetroTech version of GarbageIn- GarbageOut), and then wiping their OutputDevice with their InputDevice. And then we got your basic RichGuyFoundation using TaxDeductibleDollars to hire your basic GodLessCommies to figure out how the RichGuys can use the rEvolutionary New Commi-Tel Bolshevik Marketing System to get the Radio Proletariat to pony-up $ 19.95 (plus shipping and handling) for the SilverPlatter upon which their "new cultural forms" (Translation: ConsumerIsm) will be handed to them, making the RichGuy even richer (by using TaxDeductibleDollars, nonetheless--pretty tricky, eh?). And we got your WhiteReds telling us that if they play a CountryBlues song as many times as there is pictures of Stalin in Moscow, then, not only can they make some Drifter a star, but they can measure how many times JoeSixPack's blood rushes to his brain or his penis while he's thinking about how *his* baby done left him, too, and that if more blood is rushing back and forth when Luke the Drifter is singing the words 'baby' and 'yeah,' then they can take a song called, "Baby, Baby, eah- eah, eah, eah, Baby eah-eah," and get Joe SixPack's blood flowing in and out of his penis so fast that he'll need a Pavlovian Drool-Cup underneath his Pecker, and that they can have the song performed by some oungStud who they put on TV and have him wiggle his pelvis around like some BigDickedDarkie, and get the blood flowing back and forth in the women's private parts too, which would *really* result in "new cultural forms which would increase the alienation of the populace," because Daddy don't want his LittlePrincess (TM) getting her LittleNastyParts (TM) all juiced up by some WhiteNiggerLoverBoy. Oh...except I guess I haven't mentioned the part about TeleVision, yet. Anyway, you got to remember that the reason that your RunOfTheMillBasic GodLessCommie is Godless, is that if you're going to start a rEvolution, then you can't have your Proletariat all junked-out on Religion, or they are going to be too laid-back to help you torch the Palace. So you have to create your basic NewBarbarism, getting rid of anything that smacks of Universal Truth or Natural Law, and get people to trade in their old PopeMobile for a SnowmobileRacingAcrossTheTundra, with a BigTittedNun stroking Nietzsche's IceWeasle in glossy-color ads telling the Prolotariat that there's no need to stick to the straight-and-narrow path when you've got an off-road philosophical vehicle that can go BeyondGoodAndEvil in sex-seconds flat. This appeals to a lot of people who never had seconds on sex because they could only fuck once in the backseat of their PopeMobile, since it was supposed to be for making babies, and not for having fun, but they can play HideTheSalami as many times as they want on the seat of a snowmobile, with God-and-everybody watching (only there is not really any God). What is important to realize is that one of the main Keys to making the BullShitVic's Schtick work, has to do with shit-canning the creative act and making creativity historically-specific. [Author's Note: Although this is important, I don't really know exactly how to explain why it is so, since I don't really understand it and I am, in large part, merely plagarizing excerpts from 'The New Dark Age' by Michael J. Minnicino, on this point. I think Tim C. May and some of the other CypherPunks understand this crap, though, so maybe you could ask them about it...] But I *do* understand *why* it is important to Marxist rEvolutionaries to burn up and toss out all of the old writings and art, and stuff, in order to take control of the hearts and minds of the Proletariat, since it is like moving in with a NewOldLady, and she's got pictures of her old boyfriend around, and loveletters and stuff, and you don't want her thinking about him while you're sticking your dick in her. So, anyway... It's not like Rockerfeller ain't 'getting any,' since he's already a part of the OldBoyNetwork that's GangBangingReality with their OfficalNews /WorldView Schlongs, but Radio is the NewKidInTown and you don't want him stealing your chicks, so you're going to join up with his gang, too, and you figure it won't hurt to try and pick up a few new pointers on putting your MeatInMotion from Stalin's BumBuddies, since Stalin is, like, the JohnnyWadd of Social Control. So Stalin's BumBuddies tell you that first, you got to get Prolotariat Chicks a little tipsy and disoriented by culturing them with a little bit of Absolut, you set some new cultural forms (make their nipples hard) by sweet-talking them a bit, and then create a NewBarbarism by talking nasty to them. Of course, once you have the attention of their orfice, then you keep driving home your point, repeatedly, and if you can find the spots on their body that make them feel good or bad, and give them the proper combination of each, then you can whisper 'give me all your money' in their ear while they are in the throes of passion, and they will hardly notice, but they will *do* it. {Excuse me, but I've got to go have a smoke...be right back...} In reality, as the GodLessCommies from the Institute for Social Research undoubtedly explained to Rocky, after he had a shower, was that the same basic rules applied, whether you were using your real name or using an alias, such as Reverend Sun Moon, Jim Baker, Jim Jones, Dr. Cameron, or Richard Helms. As a matter of fact, one of the main reasons for the intensity of the Rockerfeller Foundation's interest in the use of Radio for Social/Mind Control was that one of Rocky's financial and political associates, Adolf Hitler, had begun 'stealing the show,' so to speak, with the vivacity of his powerful presence in the medium. Another factor in the Rockerfeller Foundations quest to learn the secret of using Radio as a tool of social and mind control was the emergence of Radio's younger cousin, Television, which showed promise of being able to surpass Radio's ClitLicking talents, and go straight for the G-spot. Theodor Adorno wrote, in regard to TeleVision, in 1944, "Its consequences will be quite enormous and promise to intensify the impoverishment of aesthetic matter so drastically that by tomorrow the thinly veiled identity of all industrial culture products can come triumphantly out in the open, derisively fulfilling the Wagnerian dream of the Gesamtkunstwerk--the fusion of all the arts into one work." (The New World ArtEr) In other words, TeleVision was seen by the I.S.P, the Rockerfellers, Military Intelligence Agencies, et al, FROM ITS VER INCEPTION, as a useful tool in using intellectually lame, but emotionally significant content, as an instrument of social control which could be used to significantly influence the minds/thought/beliefs/opinions of the public. (In other words, TV wasn't born 'retarded' by 'accident.') So, whether or not one believes in a single individual, or group of individuals, who is secretly running the world and controlling the whole of our reality, it seems that there are certainly a number of people who are *trying* to do so. The techniques of mind-control are nothing new--they are centuries old and are only being 'refined' in our time, through research and experiment- ation, to be applical over a wider range of geography than simply the local village, and over a greater spectrum of ethnicity than the members of closely related tribes. The future of TeleVision was set a half-century ago by people of wealth and power who had gone to great pains to research the best way to develop the electronic media as a tool of social control via mind control. Even the most cursory of checks indicates that members of Military Intelligence agencies were as 'thick as thieves' in the creation and management of the Television Industry. These people have had over a half-century to develop and refine their control of and use of electronic media to meet their own ends. Wouldn't it be terrifying if they had not only developed the means to put their witting and unwitting shills *anywhere* they wanted in our societies, corporations, governments and educational institutions, but also had a means to use their shills in every area of our life, in order to influence what we see, think and the way in which we perceive our world...? [WATCH THIS SPACE]ALIEN From ILovToHack at aol.com Thu Jul 23 19:11:10 1998 From: ILovToHack at aol.com (ILovToHack at aol.com) Date: Thu, 23 Jul 1998 19:11:10 -0700 (PDT) Subject: Pipe bombs r better Message-ID: <285f3dfa.35b7ec4c@aol.com> In a message dated 7/23/98 10:05:06 PM Eastern Daylight Time, ILovToHack writes: << << > they rule! In your ass, that is... >> pipe bombs rule how ever puting them there could be hazardous to your health # *i* __!__ I I Mr pipe bomb I I I I l_ _ _l To: chrisharwig at hetnet.nl Subject: Re: Pipe bombs r better From: ILovToHack at aol.com Date: Thu, 23 Jul 1998 22:05:06 EDT << > they rule! In your ass, that is... >> pipe bombs rule how ever puting them there could be hazardous to your health # *i* __!__ I I Mr pipe bomb I I I I l_ _ _l From bogus@does.not.exist.com Thu Jul 23 20:25:44 1998 From: bogus@does.not.exist.com () Date: Thu, 23 Jul 1998 20:25:44 -0700 (PDT) Subject: Creating Wealth In America Message-ID: <19980723359FAA6701@interbiz.chi.swissbank.com> Creating Wealth in America >From the desk of Robert Allen, The Author of 2 Mega Best-Sellers, Nothing Down and Creating Wealth in America San Diego, California 11:29 P.M. "I can't sleep until I get this off my chest." "I'm extremely frustrated". Odds are that nine out of ten people who receive this letter will discard it without a second thought. Yet, I know that I have discovered a secret that could change your financial life forever! And I'm willing to share it with you for FREE. Do you want to end your money pressures forever? Do you want to double your income? Do you want to build an extra stream of income quickly? If you answered yes, then let me show you how you can begin living your dreams, this year before it's too late. I'll get right to the point. As it says on the letterhead, my name is Robert Allen. I'm famous for My two #1 New York Times best-selling books. Nothing Down and Creating Wealth in America. There are lots of millionaires who credit their success to one of my books or seminars. So when I share this secret with you, I want you to know that I've done my homework. Here it comes. I have discovered what I believe is the perfect home-based business. Although I'm well known for real-estate investment books and seminars, this new business has absolutely nothing to do with real-estate. In fact, it's much easier and far less risky. It involves: -No employees -Little risk -Little start up cash -It's so simple, anyone can do it You could be earning $1,000 a week in as little as 90 days. One person I know went from zero to $3,000 a week in 60 days. That's $150,000 a year extra, hassle-free income! In my 20 years of research, I can honestly say, "I've never seen a faster, easier way to create a stream of income". I know this sounds too good to be true. Frankly, I didn't believe it myself at first. Finally, I agreed to check it out. As a test, I selected a small group of people and introduced them to this incredible opportunity. Almost immediately, many of them started earning profits. Within a week, many were earning incomes of $4,000 per month in net cash flow. Now, some of them are cashing checks for $3,000 a week. And this is just the beginning! Their earning potential could be unlimited! Would you like to learn how to do that? I'd love to show you how. But only if you're interested enough to make one telephone call. The number to call immediately is 1-888-310-6470. It's a 3-minute, 24-hour recorded message. This may be the answer you have been seeking. Warmly, Robert G. Allen P.S. I want to show you how to create extra streams of income quickly, Go to the phone and call now 1-888-310-6470. // From stuffed at stuffed.net Thu Jul 23 20:49:11 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Thu, 23 Jul 1998 20:49:11 -0700 (PDT) Subject: Exclusive: Sex & drugs in a tropical paradise/Russians paid in dildos Message-ID: <19980724020226.17637.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/23/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From nobody at replay.com Thu Jul 23 23:05:22 1998 From: nobody at replay.com (Anonymous) Date: Thu, 23 Jul 1998 23:05:22 -0700 (PDT) Subject: Todd Bowers: Dumbass Message-ID: <199807240605.IAA00062@replay.com> On Thu, 23 Jul 1998, Todd Bowers wrote: > > cool ..... i am 13 > > Actually, your being a complete dumbass overshadows your being 13. From frantz at netcom.com Thu Jul 23 23:31:53 1998 From: frantz at netcom.com (Bill Frantz) Date: Thu, 23 Jul 1998 23:31:53 -0700 (PDT) Subject: where... In-Reply-To: <19980721071954.AAA9474@pc-230> Message-ID: At 2:28 AM -0800 7/21/98, William H. Geiger III wrote: >The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm > >The X.400 specs are actually located under F.400 as this spec has been >givien a dual designation of F.400/X.400 > >Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs, >whatever that is in real money. > >X.500 is the same deal but it is only 20 Swiss Francs. Those prices are a lot better than the last X.25 spec I priced. My local paper says that 1 Swiss Franc is worth about 66 US cents ($0.66). That is about the same exchange rate as when I was in Switzerland last summer. As one of the world's more stable currencies, I would indeed consider the Swiss Franc to be "real money". ------------------------------------------------------------------------- Bill Frantz | If hate must be my prison | Periwinkle -- Consulting (408)356-8506 | lock, then love must be | 16345 Englewood Ave. frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA From update at annex.liveupdate.com Fri Jul 24 01:15:49 1998 From: update at annex.liveupdate.com (LiveUpdate News) Date: Fri, 24 Jul 1998 01:15:49 -0700 (PDT) Subject: Crescendo News - July 1998 Message-ID: <00bec2615081878ANNEX@annex.liveupdate.com> CRESCENDO NEWS - July 1998 Hello from the editors of the July 1998 edition of the LiveUpdate Crescendo Newsletter. You're receiving this email because you downloaded Crescendo in the past, and we want to keep you up to date with some of the exciting things that are happening at LiveUpdate. We hope you are enjoying Crescendo! These are some of the items included in this newsletter: * LiveUpdate launches real-time "SoundChat" chat service * Crescendo version 3.0 appears on Netscape's SmartUpdate site * Using Crescendo and Crescendo PLUS version 3.0 with Windows 98 * What is streaming MIDI, and why would I want it? * What would you like to see in future versions of Crescendo? * Subscribing / Unsubscribing ---------------------------------- LIVEUPDATE LAUNCHES REAL-TIME "SOUNDCHAT" SERVICE On July 21st, LiveUpdate opened the "SoundChat" General Discussion real-time chat Forum. This is the first of many free chat areas which LiveUpdate is providing to allow you to chat in real time with fellow Crescendo users around the world. Over time, we will be opening new rooms for surfers, webmasters, and musicians to congregate and discuss specific issues relating to player installation, adding music to your web site, MIDI file creation, and much more. We will also be hosting live events where you will be able to chat with world-class experts on these various topics. As an added bonus, chatters are now being given early access to our newest technology, Crescendo Forte. To sign up and start chatting, point your web browser to http://soundchat.com/chat. ---------------------------------- CRESCENDO VERSION 3.0 APPEARS ON NETSCAPE'S SMARTUPDATE SITE We are proud to announce that Netscape has chosen Crescendo as one of the few elite add-on components for inclusion in the new SmartUpdate area of the Netscape site. SmartUpdate is a free service that allows you to automatically download and install the latest versions of Navigator add-on components, now including Crescendo. The latest full versions of Crescendo and Crescendo PLUS will continue to be available from the LiveUpdate site at http://www.liveupdate.com/dl.html. ---------------------------------- WHAT IS STREAMING MIDI, AND WHY WOULD I WANT IT? "Streaming" is the ability to listen to music while it is being sent to you over the Internet. In much the same way that web images fill in as they are downloading, our patent-pending streaming MIDI technology starts playing and "fills in" the music as it downloads, allowing you to hear the music long before the entire MIDI file has finished downloading. In most cases, streaming MIDI music will start to play almost immediately. Crescendo PLUS is the only MIDI player available in the world that will stream all types of MIDI files from any Internet source. Crescendo PLUS is available for immediate purchase ($19.95) and download at the LiveUpdate on-line store (https://secure.liveupdate.com). If you are a web site author, and you would like to add streaming MIDI to your web site, we offer a product called "Crescendo StreamSite" which consists of a key for your web server that unlocks the streaming feature which is included in the free versions of Crescendo. The StreamSite key is completely compatible with all web servers, and doesn't require any intervention from your service provider. Installation of the StreamSite key involves uploading a single binary file to your web site, and can be easily completed in less than 5 minutes. Personal StreamSite keys are available for immediate purchase ($49.95) and download at the LiveUpdate on-line store. You can experience streaming MIDI without purchasing anything at all. Just download the latest version of the free Crescendo player and visit the Crescendo StreamSites listed at http://www.liveupdate.com/streamsites.html. These sites have all purchased StreamSite keys so that you can enjoy streaming MIDI as you visit their sites. ---------------------------------- USING CRESCENDO AND CRESCENDO PLUS VERSION 3.0 WITH WINDOWS 98 To the best of our knowledge, Crescendo and Crescendo PLUS are completely compatible with Windows 98. If Crescendo has worked for you in the but you are having trouble after installing Windows 98, we have found that re-installing Crescendo will most likely solve any problems you may be experiencing. If you still see problems after re-installing, send a message to helpdesk at liveupdate.com and we will try to help. ---------------------------------- WHAT WOULD YOU LIKE TO SEE IN FUTURE VERSIONS OF CRESCENDO? We are constantly looking for new ideas to be included in future versions of the Crescendo player. If you have any cool ideas of things you would like to see added to Crescendo, send them to feedback at liveupdate.com. Who knows - maybe your suggestion will makes its way into the next version of Crescendo! ---------------------------------- SUBSCRIBING / UNSUBSCRIBING Note: Messages from LiveUpdate to this list will not be sent any more frequently than once a month, and your information has not and will not be given to others or sold. If you wish to unsubscribe from this list, or if this message has been forwarded to you by a friend and you would like to subscribe to our newsletter, please send a message to newsletter at liveupdate.com. ******************************************* Spread the Music! From wioca62 at galaxylink.com.hk Fri Jul 24 06:53:01 1998 From: wioca62 at galaxylink.com.hk (jumiel) Date: Fri, 24 Jul 1998 06:53:01 -0700 (PDT) Subject: stop paying those inflated airfare prices Message-ID: <199807241044SAA15312@humkoipoio.hujk.saar.de> USA Today has reported that business fares rose approximately 20% in 1998. This is on top of a 15% gain from 1997. EXCURSION OR VACATION FARES CANNOT BE FAR BEHIND. Many people believe that they can find the cheapest airfares by surfing through the many on-line reservation systems available on the Internet. DON'T BE FOOLED These reservation systems are owned, operated and maintained by the airlines themselves and are often slow to be updated. They also don't include many of the deeply discounted fare programs offered by the airlines. How often have you called the Airlines or your local Travel Agent and asked them to give you their cheapest fare, only to find that the person sitting next to you has gotten his seat for much less. "The Insider's Guide to Cheaper Airfares" will introduce you to other ticketing alternatives and strategies that the Major Airlines don't want you to know. These sources offer deeply discounted seats that are on the same flights that airlines are charging other passengers twice as much. Among the Things this valuable book will show you are: *** How to get Airlines to notify you about discounts BEFORE they go public. *** Ticket strategies Airlines don't want you to know. *** How to save at least 50% on International Travel. *** Which reservation systems work best with which Hubs and Airlines. *** How to get domestic tickets for 40% to 60% off. Whether your goal is to go on that vacation of a lifetime or to bring a loved one home to the family, "The Insider's Guide to CheaperAirfares" will show you that reasonable airfares from anywhere in the country are easily and affordably within your reach. Why give all of your hard earned money to the airlines when you can spend that money on fun once you arrive? Our Book normally sells for $12.95 plus $2.00 for shipping and handling. But if you order by August 31, 1998 you will pay only $9.95 and we'll pay for shipping. That is a $5.00 savings. Send $9.95 (cash, check, or money order) Make Check Payable To: Travel Guide$ 16787 Beach Blvd. Suite #225 Huntington Beach, CA 92647 DON'T DELAY, SAVE ON YOUR NEXT TRIP TODAY =================Please Complete================== Yes Travel Guide$, I wish to take you up on your Special Offer, Please rush me "The Insider's Guide to Cheaper Airfares" today. I have filled out this form for you to help expedite my order. Name: Address: City: State: Zip: E-mail Address: (for order confirmation) Send Your Order for $9.95 Travel Guide$ 16787 Beach Blvd Suite#225 Huntington Beach, Ca 92647 ^^^^^^^ gend From 0_rcummi at funrsc.fairfield.edu Fri Jul 24 07:45:40 1998 From: 0_rcummi at funrsc.fairfield.edu (Bob Cummings) Date: Fri, 24 Jul 1998 07:45:40 -0700 (PDT) Subject: W.A.Y. In-Reply-To: Message-ID: On Thu, 23 Jul 1998 Skoitch at aol.com wrote: > > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE? > > Reason 1: You're from AOL Reason 2: You don't know where the caps lock key is Reason 3: You're looking on the cypherpunks list for music. Reason 4: You're from AOL From icollins at scotland.net Fri Jul 24 09:05:18 1998 From: icollins at scotland.net (Iain Collins) Date: Fri, 24 Jul 1998 09:05:18 -0700 (PDT) Subject: W.A.Y. In-Reply-To: Message-ID: <000d01bdb71c$6c3dd200$c7f3b094@webadmin.sol.co.uk> > > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE? > Try tidying up! Try asking your brother if be 'borrowed' them all! Try looking in a record store! Iain, PS: I'd like to ask how on earth so many people manage to subscribe to this list, solely in order to churn out stuff like this? How do they manage to use the e-mail software to actually send a message to this group? How do they remember to breathe? AGH!!!!!!!!! From CTIA_Daily_News at um2.unitymail.com Fri Jul 24 10:31:59 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Fri, 24 Jul 1998 10:31:59 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 24, 1998 Message-ID: <199807241706.MAA19229@revnet2.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com =========================================== From stuffed at stuffed.net Fri Jul 24 15:13:07 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Fri, 24 Jul 1998 15:13:07 -0700 (PDT) Subject: Sex was just blow good/Fart demolishes house Message-ID: <19980724200551.12388.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/24/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From lreed at west.cscwc.pima.edu Fri Jul 24 15:49:03 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Fri, 24 Jul 1998 15:49:03 -0700 (PDT) Subject: Is that real? Message-ID: <009C9AA3.421B6260.5@west.cscwc.pima.edu> X-URL: mailto:cypherpunks at toad.com X-Mailer: Lynx, Version 2-4-2 X-Personal_name: Linda Reeza X-From: obvious at forgery.eff Reeza, Stop hacking those military computer accounts, and quit backtalking to your teacher, or you'll never get out of grade 4... Yes, the passage of SAHMD, regarding putting electronic probes into the brains of children and other monkeys was Real (TM), as is almost every other 'example' used in the True Story manuscripts, although there is often small 'liberties' taken with the details, names, etc., for reasons of protecting someone's ass (usually mind) for disseminating classified material without proper authorization from an officially recognized law- breaker/news-leaker, or just because I'm drunk. It is often left as an ExerciseForTheReader, if they are interested, to do a websearch, or whatever, and see if they can uncover such details as, say, a person who might be named, lets say, for the sake of argument... E.B. Montgomery, who was engaged in giving MonkeyBrains direct electronic subscriptions to Wired Magazine, and who recently moved to Chicago, to continue his work on a new level. Linda Lou Reeza {The *real* owner of the military account that the little grade 4 troublemaker is hacking and posting through, as well as forging chapters of SAHMD under the alias, LREED.} From lreed at west.cscwc.pima.edu Fri Jul 24 16:16:47 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Fri, 24 Jul 1998 16:16:47 -0700 (PDT) Subject: mailto:cypherpunks@toad.com Message-ID: <009C9AA7.2778B3A0.8@west.cscwc.pima.edu> X-URL: mailto:cypherpunks at toad.com X-Mailer: Lynx, Version 2-4-2 X-Personal_name: Dog Day Afternoont From lreed at west.cscwc.pima.edu Fri Jul 24 19:53:04 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Fri, 24 Jul 1998 19:53:04 -0700 (PDT) Subject: A Thousand Points Of Fight Message-ID: <009C9AC5.59A235E0.9@west.cscwc.pima.edu> Breakthrough Texts Leaderless Resistance An Essay by Louis Beam "Leaderless Resistance" -- Part One [IMAGE] The concept of leaderless resistance was proposed by Col. Ulius Louis Amoss, who was the founder of International Service of Information Incorporated, located in Baltimore, Maryland. Col. Amoss died more than 15 years ago, but during his life he was a tireless opponent of Communism, as well as a skilled intelligence officer. [INLINE] Col. Amoss first wrote of leaderless resistance on April 17, 1962. His theories of organization were primarily directed against the threat of eventual Communist takeover in the United States. The present writer, with the benefit of having lived many years beyond Col. Amoss, has taken his theories and expounded on them. [INLINE] Col. Amoss feared the Communists. This author fears the federal government. Communism now represents a threat to no one in the United States, while federal tyranny represents a threat to EVERYONE. The writer has joyfully lived long enough to see the dying breaths of Communism, but may unhappily remain long enough to see the last dying gasps of freedom in America. [INLINE] In the hope that, somehow, America can still produce the brave sons and daughters necessary to fight off ever-increasing persecution and oppression, this essay is offered. Frankly, it is too close to call at this point. Those who love liberty, and believe in freedom enough to fight for it, are rare today; but within the bosom of every once great nation, there remains secreted the pearls of former greatness. [INLINE] They are there. I have looked into their sparkling eyes; sharing a brief moment in time with them as I passed through this life. Relished their friendship, endured their pain, and they mine. We are a band of brothers native to the soil, gaining strength one from another as we have rushed headlong into battle that all the weaker, timid men say we can not win. Perhaps not... but then again, perhaps we can. It's not over till the last freedom fighter is buried or imprisoned, or the same happens to those who would destroy their liberty. [INLINE] Barring any cataclysmic events, the struggle will yet go on for years. The passage of time will make it clear to even the more slow among us that the government is the foremost threat to the life and liberty of the folk. The government will no doubt make today's oppressiveness look like grade school work compared to what they have planned in the future. Meanwhile, there are those of us who continue to hope that somehow the few can do what the many have not. [INLINE] We are cognizant that before things get better they will certainly get worse as government shows a willingness to use ever more severe police state measures against dissidents. This changing situation makes it clear that those who oppose state repression must be prepared to alter, adapt, and modify their behavior, strategy, and tactics as circumstances warrant. Failure to consider new methods and implement them as necessary will make the government's efforts at suppression uncomplicated. It is the duty of every patriot to make the tyrant's life miserable. When one fails to do so he not only fails himself, but his people. [INLINE] With this in mind, current methods of resistance to tyranny employed by those who love our race, culture, and heritage must pass a litmus test of soundness. Methods must be objectively measured as to their effectiveness, as well as to whether they make the government's intention of repression more possible or more difficult. Those not working to aid our objectives must be discarded, or the government benefits from our failure to do so. [INLINE] As honest men who have banded together into groups or associations of a political or religious nature are falsely labeled "domestic terrorists" or "cultists" and suppressed, it will become necessary to consider other methods of organization, or as the case may very well call for: non- organization. [INLINE] One should keep in mind that it is not in the government's interest to eliminate all groups. Some few must remain in order to perpetuate the smoke and mirrors for the masses that America is a "free democratic country" where dissent is allowed. Most organizations, however, that possess the potential for effective resistance will not be allowed to continue. Anyone who is so naive as to believe the most powerful government on earth will not crush any who pose a real threat to that power, should not be active, but rather at home studying political history. [INLINE] The question as to who is to be left alone and who is not, will be answered by how groups and individuals deal with several factors such as: avoidance of conspiracy plots, rejection of feebleminded malcontents, insistence upon quality of the participants, avoidance of all contact with the front men for the federals - the news media - and, finally, camouflage (which can be defined as the ability to blend in the public's eye the more committed groups of resistance with mainstream "kosher" associations that are generally seen as harmless). [INLINE] Primarily though, whether any organization is allowed to continue in the future will be a matter of how big a threat a group represents. Not a threat in terms of armed might or political ability, for there is none of either for the present, but rather, threat in terms of potentiality. It is potential the federals fear most. Whether that potential exists in an individual or group is incidental. The federals measure potential threat in terms of what might happen given a situation conducive to action on the part of a resistive organization or individual. Accurate intelligence gathering allows them to assess the potential. Showing one's hand before the bets are made is a sure way to lose. [INLINE] The movement for freedom is rapidly approaching the point where, for many people, the option of belonging to a group will be non-existent. For others, group membership will be a viable option for only the immediate future. Eventually, and perhaps much sooner than most believe possible, the price paid for membership will exceed any perceived benefit. But for now, some of the groups that do exist often serve a useful purpose either for the newcomer who can be indoctrinated into the ideology of the struggle, or for generating positive propaganda to reach potential freedom fighters. It is sure that, for the most part, this struggle is rapidly becoming a matter of individual action, each of its participants making a private decision in the quietness of his heart to resist: to resist by any means necessary. [INLINE] It is hard to know what others will do, for no man truly knows another man's heart. It is enough to know what one himself will do. A great teacher once said "know thyself." Few men really do, but let each of us promise ourselves not to go quietly to the fate our would-be masters have planned. [INLINE] The concept of leaderless resistance is nothing less than a fundamental departure in theories of organization. The orthodox scheme of organization is diagrammatically represented by the pyramid, with the mass at the bottom and the leader at the top. This fundamental of organization is to be seen not only in armies, which are, of course, the best illustration of the pyramid structure, with the mass of soldiery (the privates) at the bottom responsible to corporals; who are in turn responsible to sergeants, and so on up the entire chain of command to the generals at the top. But the same structure is seen in corporations, ladies' garden clubs, and in our political system itself. This orthodox "pyramid" scheme of organization is to be seen basically in all existing political, social, and religious structures in the world today, from the Federal government to the Roman Catholic Church. [INLINE] The Constitution of the United States, in the wisdom of the Founders, tried to sublimate the essential dictatorial nature pyramidal organization by dividing authority into three: executive, legislative, and judicial. But the pyramid remains essentially untouched. [INLINE] This scheme of organization, the pyramid, is not only useless, but extremely dangerous for the participants when it is utilized in a resistance movement against state tyranny. Especially is this so in technologically advanced societies where electronic surveillance can often penetrate the structure, thus revealing its chain of command. Experience has revealed over and over again that anti-state political organizations utilizing this method of command and control are easy prey for government infiltration, entrapment, and destruction of the personnel involved. This has been seen repeatedly in the United States where pro-government infiltrators or agent provocateurs weasel their way into patriotic groups and destroy them from within. [INLINE] In the pyramid form of organization, an infiltrator can destroy anything which is beneath his level of infiltration, and often those above him as well. If the traitor has infiltrated at the top, then the entire organization from the top down is compromised and may be traduced at will. "Leaderless Resistance" -- Part Two [IMAGE] A recent example of the cell system taken from the left wing of politics are the Communists. The Communists, in order to get around the obvious problems involved in pyramidal organization, developed to an art the cell system. They had numerous independent cells which operated completely isolated from one another and particularly with no knowledge of each other, but were orchestrated together by a central headquarters. For instance, during WWII, in Washington, it is known that there were at least six secret Communist cells operating at high levels in the United States government (plus all the open Communists who were protected and promoted by President Roosevelt), however, only one of the cells was rooted out and destroyed. How many more actually were operating, no one can say for sure. [INLINE] The Communist cells which operated in the U.S. until late 1991 under Soviet control could have at their command a leader who held a social position which appeared to be very lowly. He could be, for example, a busboy in a restaurant, but in reality a colonel or a general in the Soviet Secret Service, the KGB. Under him could be a number of cells, and a person active in one cell would almost never have knowledge of individuals who were active in other cells; in fact, the members of the other cells would be supporting that cell which was under attack and ordinarily would lend very strong support to it in many ways. This is at least part of the reason, no doubt, that whenever in the past Communists were attacked in this country, support for them sprang up in many unexpected places. [INLINE] The effective and efficient operation of a cell system after the Communist model is, of course, dependent upon central direction, which means impressive organization, funding from the top, and outside support, all of which the Communists had. Obviously, American patriots have none of these things at the top or anywhere else, and so an effective cell organization based upon the Soviet system of operation is impossible. [INLINE] Two things become clear from the above discussion. First, that the pyramid form of organization can be penetrated quite easily and it thus is not a sound method of organization in situations where the government has the resources and desire to penetrate the structure, which is the situation in this country. Secondly, that the normal qualifications for the cell structure based upon the Red model does not exist in the U.S. for patriots. This understood, the question arises "What method is left for those resisting state tyranny?" [INLINE] The answer comes from Col. Amoss who proposed the "Phantom Cell" mode of organization which he described as Leaderless Resistance. A system of organization that is based upon the cell organization, but does not have any central control or direction, that is in fact almost identical to the methods used by the committees of correspondence during the American Revolution. Utilizing the Leaderless Resistance concept, all individuals and groups operate independently of each other, and never report to a central headquarters or single leader for direction or instruction, as would those who belong to a typical pyramid organization. [INLINE] At first glance, such a form of organization seems unrealistic, primarily because there appears to be no organization. The natural question thus arises as to how are the "Phantom Cells" and individuals to cooperate with each other when there is no inter-communication or central direction? [INLINE] The answer to this question is that participants in a program of leaderless resistance through "Phantom Cell" or individual action must know exactly what they are doing and how to do it. It becomes the responsibility of the individual to acquire the necessary skills and information as to what is to be done. This is by no means as impractical as it appears, because it is certainly true that in any movement all persons involved have the same general outlook, are acquainted with the same philosophy, and generally react to given situations in similar ways. The previous history of the committees of correspondence during the American Revolution shows this to be true. [INLINE] Since the entire purpose of leaderless resistance is to defeat state tyranny (at least in so far as this essay is concerned), all members of phantom cells or individuals will tend to react to objective events in the same way through usual tactics of resistance. Organs of information distribution such as newspapers, leaflets, computers, etc., which are widely available to all, keep each person informed of events, allowing for a planned response that will take many variations. No one need issue an order to anyone. Those idealists truly committed to the cause of freedom will act when they feel the time is ripe, or will take their cue from others who precede them. While it is true that much could be said against this kind of structure as a method of resistance, it must be kept in mind that leaderless resistance is a child of necessity. The alternatives to it have been shown to be unworkable or impractical. Leaderless resistance has worked before in the American Revolution, and if the truly committed put it to use themselves, it will work now. [INLINE] It goes almost without saying that Leaderless Resistance leads to very small or even one-man cells of resistance. Those who join organizations to play "let's pretend" or who are "groupies" will quickly be weeded out. While for those who are serious about their opposition to federal despotism, this is exactly what is desired. [INLINE] From the point of view of tyrants and would-be potentates in the federal bureaucracy and police agencies, nothing is more desirable than that those who oppose them be UNIFIED in their command structure, and that EVERY person who opposes them belong to a pyramid style group. Such groups and organizations are easy to kill. Especially in light of the fact that the Justice (sic) Department promised in 1987 that there would never be another group to oppose them that they did not have at least one informer in! These federal "friends of government" are ZOG or ADL intelligence agents. They gather information that can be used at the whim of a federal D.A. to prosecute. The line of battle has been drawn. [INLINE] Patriots are REQUIRED, therefore, to make a conscious decision to either aid the government in its illegal spying (by continuing with old methods of organization and resistance), or to make the enemy's job more difficult by implementing effective countermeasures. [INLINE] Now there will, no doubt, be mentally handicapped people out there who will state emphatically in their best red, white, and blue voice, while standing at a podium with an American flag draped in the background and a lone eagle soaring in the sky above, that, "So what if the government is spying? We are not violating any laws." Such crippled thinking by any serious person is the best example that there is a need for special education classes. The person making such a statement is totally out of contact with political reality in this country, and unfit for leadership of anything more than a dog sled in the Alaskan wilderness. The old "Born on the Fourth of July" mentality that has influenced so much of the Aryan-American Patriot's thinking in the past will not save him from the government in the future. "Reeducation" for non-thinkers of this kind will take place in the federal prison system where there are no flags or eagles, but an abundance of men who were "not violating any laws.". [INLINE] Most groups who "unify" their disparate associates into a single structure have short political lives. Therefore, those movement leaders constantly calling for unity of organization, rather than the desirable Unity of Purpose, usually fall into one of three categories: 1. They may not be sound political tacticians, but rather, just committed men who feel unity would help their cause, while not realizing that the government would greatly benefit from such efforts. The Federal objective, to imprison or destroy all who oppose them, is made easier in pyramid organizations. 2. Or, perhaps, they do not fully understand the struggle they are involved in, and that the government they oppose has declared a state of war against those fighting for faith, folk, freedom, property and constitutional liberty. Those in power will use any means to rid themselves of opposition. 3. The third class calling for unity, and let us hope this is the minority of the three, are men more desirous of the supposed power that a large organization would bestow, than of actually achieving their stated purpose. [INLINE] Conversely, the LAST thing federal snoops want, if they had any choice in the matter, is a thousand different small phantom cells opposing them. It is easy to see why. Such a situation is an intelligence nightmare for a government intent upon knowing everything they possibly can about those who oppose them. The Federals, able to amass overwhelming strength of numbers, manpower, resources, intelligence gathering, and capability at any given time, need only a focal point to direct their anger [ie Waco]. A single penetration of a pyramid style organization can lead to the destruction of the whole. Whereas, leaderless resistance presents no single opportunity for the Federals to destroy a significant portion of the resistance. [INLINE] With the announcement of the Department of Justice (sic) that 300 FBI agents formerly assigned to watching Soviet spies in the U.S. (domestic counter-intelligence) are now to be used to "combat crime," the federal government is preparing the way for a major assault upon those persons opposed to their policies. Many anti-government groups dedicated to the preservation of the America of our Forefathers can expect shortly to feel the brunt of a new federal assault upon liberty. [INLINE] It is clear, therefore, that it is time to rethink traditional strategy and tactics when it comes to opposing state tyranny, where the rights now accepted by most as being inalienable will disappear. Let the coming night be filled with a thousand points of resistance. Like the fog which forms when conditions are right, and disappears when they are not, so must the resistance to tyranny be. Leaderless Resistance first appeared in The Seditionist in 1992. The author, Louis Beam, is one of the most respected racialist leaders in the world (within racialist circles, that is), and has established his own homepage to distribute his work. _______________________________________________________________ Texts Archive: Breakthrough Texts From StanSqncrs at aol.com Sat Jul 25 00:42:12 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sat, 25 Jul 1998 00:42:12 -0700 (PDT) Subject: W.A.Y. Message-ID: <62deae62.35b98c1a@aol.com> In a message dated 7/24/98 10:12:55 AM Central Daylight Time, 0_rcummi at funrsc.fairfield.edu writes: << > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE? > > Reason 1: You're from AOL Reason 2: You don't know where the caps lock key is Reason 3: You're looking on the cypherpunks list for music. Reason 4: You're from AOL >> Tee, hee hee. I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ), it's from some media article. It described a incident that happened when someone complained about someone elses loud music - << Patrol officers had to bang on Joseph W. Wedemeyer's door for about 15 minutes before getting his attention, Capt. Robert Linardi said. They charged him with disorderly conduct. The next afternoon, Linardi said, Wedemeyer confronted his neighbor on the street. Linardi said Wedemeyer, who is white, called the neighbor, who is black, a racial epithet and said, "I'm going to kill you." ... >> That's the kind of music you're talking about, 'right'? I heard they were after Tom('s) DeLay(ed Resignation), but they missed. Direct hits to his brains and his heart, though! ;-) Stan From lreed at west.cscwc.pima.edu Sat Jul 25 03:32:48 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 25 Jul 1998 03:32:48 -0700 (PDT) Subject: Tarantula Day Afternoon - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9B05.95BB8AA0.5@west.cscwc.pima.edu> Tarantula Day Afternoon - SPACE ALIENS HIDE M DRUGS!!! _______________________________________________________ * To: Linda Reed--PCC West Campus CSC * Subject: Iz thiz real? * From: Reeza! * Sender: owner-cypherpunks at Algebra.COM __________________________________________________________________ This reads as real, not the mindless rehashing of almost'was that typically characterizes the posts from "Linda Reed". Linda, are you sure you didn't eat the drugs, and imagine you were a space alien? Reeza! __________________________________________________________________ As Carlos S. Thompson and Hunter Castenada would no doubt agree, keeping track of what Was/!Was (TM), when surfing a Digital Mind Wave on a hacked machine with both MultiMedia and MultiReality capabilities, can sometimes leave one confused as to where OneSelf (1) ends, and where the Other/GreatVoid (0) begins. Adding to the confusion is the fact that the normal True/False values returned by IfAndOrWhoTheFuckWantsToKnowConditionalParole Statements, is (1) for True, and (0) for False, making it very easy for graduates of the Richard Nixon School of Reality to believe that OneSelf is always right, while the Other is always wrong, and that thus, They (TM) are out to get you, and that if they succeed, They won't have Little Jimmy Hacker's Sack to kick around anymore. On the other hand, the recent proliferation of rattlesnakes and tarantulas showing up, out of the blue, on the doorstep of the abode in which I am currently residing, as well as underneath the desk from which I am currently canning the small squares of pink, digital flesh being marketed on the CypherPunks Disturbed Male LISP, leads me to believe that, unless I am picking up visions of pre-release Stephen King novels through the fillings in my teeth, then some part of what I am writing must be true enough to be pissing *someone* off... Regretfully, although I have been driving the tarantulas out into the desert and releasing them (next to the mayor's house), I have not checked to see if they actually contain little, tiny brain electrodes in their skulls, whereby they may be directed by remote control toward me, specifically, by the children of spooks who really haven't gotten the hang of the new technology, yet, and who seize the opportunity to grease the family income by putting their relatives on the payroll. Now, as far as the posts to the CypherPunks list purporting to be from thirteen year-old nymphomaniacs and pipe-bomb avacados, far be it from me to imagine, even in my deepest fits of raging paranoia, that these might be some cheap attempt at getting me to reply, given my past long, ramblind diatribes on young boys' hardware, and young girls' software, not to mention the silly allegations about Canada-wide warrants out for my arrest on Mad Bomber charges. As I will soon extrapolate (this is the *wrong* word to use, here, but it sounds so much like it has to do with leather, and bondage, that I couldn't help myself...) on, any Spook/LEA who took the time and trouble to run previous editions of my many public eruditions through their ComputerizedPersonalProfiling System would undoubtedly find that any entrapment aimed toward me, personally, should use bait which smelled like BitchInHeat sprayed on a NuclearSuitcaseMoustrap. [Not to mention, as I will explain in more detail, early next week, trolling for interest/information on the on-site preparation of anthrax-related types of substances which could be safely created without risk of self-exposure, if one were to have an interest in, let's say, for the sake of argument, wiping out all of the members of an enemy training camp, leaving nothing but a PileOfBones where a GangOfOppressors previously existed.] Of course, any wild-eyed conspiracy theory involving a group of individuals capable of monitoring the populace and having agents in place throughout society who were in a position to use detailed, effective personality profiles to control, fuck with or entrap an astounding number of individual members of the citizenry, would have to include hard evidence of research and experimentation in these areas. No problem... The OfficiallyDeclaredGoodGuys working for GodBlessAmerica SecretSpyAgencies, as opposed to SecretSpyAgencies of EvilForeign GovernmentsofDarkerSkinnedPeople, always seem to find themselves forced to, in order to develop the capacity to be here to help us, study, in detail, the techniques and methods of the most vile, depraved monsters on the face of the earth. Thus CIA brainwashing researchers such as psychologist John Gittinger, in order to prepare to 'help' us, needed not only to study the records of the Nazi medical butchers at Dachau, and the techniques of Communist Chinese brainwashing methods, but even to pore over ancient documents which went as far back as the Spanish Inquisition. [Note From The Author: I would be the last to cast aspirsions on Mr. Gittinger doing his job, any more than I would do so on the Allan Memorial Institute Staff Members who chased an escaping Lauren G. up Mount Royal, in her attempts to escape the mind- butchery of Dr. Ewen Cameron, and, after dragging back, "shot her full of sedatives, attached electrodes to her temples, and gave her a dose of electroshock," or, even cast aspersions on those nice folks at the Murrah Federal Building in Oklahoma City who were only doing their jobs--and if a few people get their minds destroyed, or children are burned alive in an agonizing, horrible death as a result of these people doing their jobs, who am I to complain, since things are OK for me...I'm eating regularly, TV has been pretty good this week, and I was only beaten by guys who looked a lot like Mounties, with a member of the Pima County Sheriff's Department looking on, a single time this week.] In order to put the efforts of our GodBlessAmerica SecretSpys to crack open the secrets of the BadMindControllers, as well as the minds of their own test subjects, into proper perspective, we must take note that, according to Harold Wolff, a professor of neurology and psychology at Cornell University, "The problem faced by the physician is quite similar to that faced by the Communist interrogator." John Marks explains that, "Both would be trying to put their subject back *in*harmony* with*his*environment*, whether the *problem* was headache or *ideological*dissent*." and that, "He felt he could help his patients by putting them into an isolated, disoriented state, from which it would be easier to create new behavior patterning." [EditWhore's Note: A quick perusal of the Mission Statements of a wide variety of groups, organizations and agencies, such as the Moonies, the Mafia, the CIA, the Political Party Machines, the American Psychiatric Association, our Mothers and Fathers, Teachers and Principals, were all trying to use 'Differential Amnesia/PsychicDriving' because they were from SelfDeclared Authority, and they were there to Help (TM) us...] [Note From T. Arthur: I, personally, have had so much Help (TM) during my lifetime, that I have had to have reconstrutive surgery on my ButtHole six times.] Anyway... The *BadNews*, for those concerned about the 'potential' for current InterNet/Computer Technology to be used in putting us all in little digital boxes (for future herding into little digital feeding pens, to eventually be heavily salted and spit out into snack-bowls on the counters of Reptilian Nazi bars, during Happy For*Some*OfUsHour), is that the work towards eventually being able to take polls of the *average* public mind, as well as making the public mind *average*, has been going on at a hectic pace for over a half-century, and that Computer/InterNet technology is merely icing on the cake for the Controllers who already know that the 'MineSweeper' game in Windows is even more fun when played in the MeatSpace of ThirdWorldCountries, using children as playing pieces, to guess where the mines are. ("OK, Raoul, now take two steps to the left...") In the late thirties and early forties, a variety of university educators/researchers were involved in the twin areas of devising ways to measure/categorize the populace and influence/program the citizenry, as well. General Donovan enlisted Harvard psychology professor H. Murray to devise a testing program to help sort through the recruits being rushed through the OSS. This systematic effort to evaluate an individual's personality, in order to predict his future behavior, would soon be used in large corporations, starting with AT&T. Around the same time, Erich Fromm's 1930's questionnaire, which had been devised to psychoanalyze German workers as being either "authoritarian," "revolutionary," or "ambivalent," was changed by Theodor Adorno to be used in a more politically correct manner, measuring the "democratic personality," rather than measuring the "revolutionary personality." (TroubleMakers, all of them...) The end-goal of this fixation on 'measuring,' of course, is to weed out the misfits, and to recognize which individuals would benefit from a 'reeducation' of their basic world view. Madison Avenue would fund much of the public-opinion survey development used to guage and measure different categories of the citizenry, while the Office of Radio Research at Columbia University would emerge from the MindControlCloset as the Bureau of Applied Social Research, with Cominterns' Lazersfeld turning his attentions to psychoanalyzing American voting behavior. Naturally, the first American President elected with the Madison Avenue and Social Research agencies in full control of the his campaign, was a military man, former General, Dwight Eisenhower. By the time that MassMindControl techniques were sufficiently developed to enable them to be used influence the election of our political leaders, MKULTRA resident psychologist, John Gittinger, had apparently learned enough about interrogation from his study of the Spanish Inquisition, Dachau, Communist China, etc., to create a unique system for assessing personality and predicting future behavior. His 'Personality Assessment System' (PAS), has not only been described as "the key to the whole clandestine business," but was quickly integrated into government, education, military, cororate and societal arenas as a means of determining the future, and the positions to be held, by those who had been categorized by the plethora of variations that were generated from Gittinger's work. One of the keys to Gittinger's PAS, was it's ability to reveal, with "uncanny accuracy," how well people were able to "adapt their social behavior to the demands of the culture they lived in." In essence, it was the perfect tool for weeding out the trouble makers and misfits who were incapable or unwilling to 'adapt' to whatever elements of society and culture which were deemed to be 'important' by those in charge of developing the tests. Gittinger was funded under the cover of the Human Ecology Found- ation, and CIA officials considered his work to be such a major triumph in mind-control technology, that they moved his base of operations to a CIA proprietary company, Psychology Assessment Associates, in Washington. They provided psychological services for American corporations overseas, with branch offices in Hong Kong, Europe, and throughout the Far East, enabling them to influence the nature and types of the 'personalities' that would move into positions of influence in American firms around the world. The Human Ecology Foundation literally inundated the research and educational community with hundreds of thousands of dollars in grants to expand the range of the PAS to include a wide variety of government, educational, corporate and social arenas, including a grant to the Educational Testing Service, which prepares the College Board Exams which decides who advances in the American system of higher education. David Saunders, in charge of the ETS's research, studied the correlation between brain (EEG) patterns and the College Board Exams results, as well as helping Gittinger apply the system to other countries and cultures. Gittinger, who was "building a unique database on all phases of human behavior" (Gee, I wonder what for...), was able to do a bang-up job in this area, as a result of the Human Ecology Foundation being able, as the project funder of most research in this area, to require the researchers to provide them with the gathered data. John Marks tells us, "Gittinger collected Wechslers of businessmen, students, high- priced fashion models, doctors, and just about any other discrete group he could find a way to have tested. In huge numbers, the Wechslers came flowing in, 29,000 sets, in all, by early 1970's, each one accompanied by biographic data." Gettinger particularly sought out results on deviant forms of personality--people who had rejected the values of their society or who had some hidden vice--since, although the PAS had become the darling of the psychological research community, it's chief purpose was to expand, into the public sector, the clandestine art of "assessing and exploiting human personality and motivations for ulterior purposes," as the CIA Inspector General said in 1963, while giving high marks to the PAS meeting the "prime objectives" of "control, exploitation, or neutralization," while recognizing that "These objectives are innately anti-ethical rather than therapeutic in their intent." As John Marks succinctly states, "In other words...the business of the PAS, like that of the CIA, is control." Those who are particularly enamored of themselves, due to how superiorly they performed on their College Entrance Exams, will be happy to know that, if they find themselves unemployed, they may well have a position waiting for them in Uruguay, where John Gittinger took a personal hand in using the PAS to help the CIA select members of an anti-terrorist police unit known for their incredibly brutal methods, including torture. A former CIA psychologist states, "If you put a lot of money out there, there are many people who are lacking the ethics even of the CIA." He adds that the U.S. has become an extremely control- oriented society from the classroom to politics to television advertising. John Marks notes, "Spying and the PAS techniques are unique only in that they are more systematic and secret." Another CIAMindControlJustifyingAngel, a Technical Services Section (capable of writing *real* 'poison pen letters') scientist speaks of the CIA 'behavioral research' being, as Marks describes it, "a logical extension of the efforts of American psychologists, psychiatrists,and sociologists to change behavior," with their motivation being to "manipulate their subjects in trying to make mentally disturbed people well, in turning criminals into law- abiding citizens, and in pushing poor people to get off welfare." The CIAMindControlJustifyingAngel cites these as examples of "behavior control modification for socially acceptable reasons which...change from time to time" in regard to the public's attitude. What the scientist fails to mention, is that virtually all of the research and experimentation in the above areas has resulted from the work being funded and directed by secret government agencies who *direct* the work into these areas. (e.g. - Psychedelic therapy being wholly instigated by the CIA and Military Intelligence, until they pulled the plug overnight, after their own needs had been met, at which time all of the doctors, patients and research subjects could GoFuckThemselves!) Not only are minimum-wage employees at the local Circle-K convenience store chosen by CIA proxy, but also an amazing number of current research subjects in experiments which, on the surface, seem to be perfectly legitimate. A great deal of this mind-control experimentation has been done under the guise of research on alcoholism and mental illness. For instance, one of the first external applications of John Gittinger's CIA/PAS work was the Hoffer-Osmond Diagnostic Test for Schizophrenia. Hoffer and Osmond had received a lot of CIA funding to do work with alcoholics, who were good subjects for mind-control work, as their was no real 'treatment' involved, which would only interfere with the true purposes of the experiments and research. Once the PAS made it possible for the CIA to efficiently and effectively test subjects for their suitability for MKULTRA mind- control work, the Hoffer-Osmond Diagnostic Test was miraculously born, wherein a wide range of people who would have ordinarily received varying diagnoses, were suddenly classified under the umbrella of Schizophrenia, which, lo and behold, CIA/Rockerfeller Foundation grantee physicians had discovered could be 'treated' with OrthoMolecular (Vitamin) Therapy, which, conveniently, would also not interfere with the methods and goals of the current mind- control experiments, since the MKULTRA was no longer interested in finding out the potential of mind-control techniques dependent on the subjects being whacked-out on heavy drugs. In the end, we are left with a disturbing picture of American Military and Government Secret Intelligence Agencies being the driving force behind the instigation of almost all modern research into a wide variety of Scientific Arenas which are coordinated under the universal umbrella of the Controllers, the goal being to have access to the information and tools necessary to herd us all into categories from which we can then be spit out into the system into a predesignated position in society, or just plain spit out... ou remember the BadNazis, don't you? ou know, the ones who were sentenced to be hung at the Nuremberg trials, for engaging in research that U.S. Military Intelligence immediately grabbed, in order to 'study'? Well, it turns out that many of the BadNazis were magically turned into GoodNazis, by the waving of a DeNazification Wand. And who was 'waving' this DeNazification Wand? The UsualSuspects, of course... Dr. Ewen Cameron, the man who butchered the minds of women who were suffering from nothing more than menopause or post-partum depression, was a DeNazification WandWaver. A variety of Commintern's I.S.P. were involved in deciding who got WavedAt with the DeNazification Wands, and who got Whacked by them, including I.S.P.'s Marcuse, Neumann and Kirchheimer, who wrote the Denazification Guide. Most amazingly of all, many of those chosen as being suitable candidates for DeNazification, were hand-picked for eligibility for entry into the U.S. under new identities, as part of Project PaperClip, by one of the main BumBuddies of the AngelOfDeath, Josef Mengeles. [Note from T. Arthur: Although the actual whereabouts of the AngelOfDeath have remained a matter of speculation and debate over the years, I have reason to believe, as a result of the information I received from attaching a 9V battery to the electrodes implanted in the skull of yet another Tarantula who emerged from under my computer desk, scant minutes ago, that Dr. Mengeles is currently living next door to me, with his rent being paid by the RCMP and the CIA. Those who wish to verify this information for themselves will be able to locate the Tarantula in Tucson, outside of the mayor's home, in about an hour.] While the Controllers continue to yank the mental and emotional chains of the general public, through use of OfficiallyRecognized BadGuys, and the 4HorseMen, etc., they seem to have absolutely no qualms about importing the Monsters into America and setting them up with the best of what the country has to offer, in order to further government interest in activities which have resulted in death sentences to those on the 'losing' end of various wars, as well as giving high-level positions to those capable of helping the GoodGuys to tweak the MindControl technology used by the Bad Guys, to exercise BadSocialControl, so that the GoodGuys can use that same technology to exercise GoodSocialControl. [I've got to go now. I just finished filling out the application for my Fresh Values Card, from Smith's, which gives me a nickle off on a can of beans for informing them which of my neighbors have Jewish blood coursing through their veins. (ou need to turn in five Jews, and I only know three, so I fudged on a couple of the entries...) - T. Arthur] Jews - Smoke 'em if you got 'em... From howree at cable.navy.mil Sat Jul 25 04:49:21 1998 From: howree at cable.navy.mil (Reeza!) Date: Sat, 25 Jul 1998 04:49:21 -0700 (PDT) Subject: Todd Bowers: Dumbass In-Reply-To: <199807240605.IAA00062@replay.com> Message-ID: <3.0.5.32.19980725214751.0087d210@205.83.192.13> At 08:05 AM 24 07 98 +0200, Anonymous wrote: >On Thu, 23 Jul 1998, Todd Bowers wrote: > >> cool ..... i am 13 >> > >Actually, your being a complete dumbass overshadows your being 13. > Not to mention you forgot to use 3l33t zp33l1n6. Reeza! From info at digfrontiers.com Sat Jul 25 04:49:43 1998 From: info at digfrontiers.com (Digital Frontiers Info) Date: Sat, 25 Jul 1998 04:49:43 -0700 (PDT) Subject: HVS Toolkit 25% Discount Offer Message-ID: <199807250327.WAA26488@digfrontiers.> Hi -- We would like to thank you for your download of an HVS Series demo. First, we apologize to those of you who received multiple copies of a recent mailing from us as a result of our email server meltdown. We've now implemented an email notification system that should prevent such woeful circumstances from happening again. If you don't wish to receive more information about Digital Frontiers special offers please reply to info at digfrontiers.com and ask to be removed. As a gesture of thanks and appreciation, we would like to offer you a 25% discount on our HVS Toolkit Pro, which includes the latest versions of the award-winning HVS ColorGIF, HVS JPEG and HVS Animator Pro, through August 30th 1998. HVS Tooolkit Pro regularly retails at $208 but you may purchase it for $156 (more than 50% off separate retail prices) for this limited time only. Because this offer is only available to demo registrants, it will not be available on our commerce server. Individual products are available at a 10% discount from our commerce server at http://www.digfrontiers.com/purchase.html as part of our summer sale. For product information, please visit http://www.digfrontiers.com, or reply to this email. To take advantage of the 25% offer, please email, fax or call us with the following information: First Name: Last Name: Billing Address: Email: (if faxed): Phone Number: Credit Card Type: Credit Card Number: Expiration Date: Platform: (Mac or Windows): Yes, I would like to order the HVS Toolkit Pro at $156. Please send me my download codes by to: Signature ( or type name): Digital Frontiers, LLC http://www.digfrontiers.com voice: 847-328-0880 fax: 847-869-2053 info at digfrontiers.com From howree at cable.navy.mil Sat Jul 25 05:27:59 1998 From: howree at cable.navy.mil (Reeza!) Date: Sat, 25 Jul 1998 05:27:59 -0700 (PDT) Subject: Iz that real? In-Reply-To: <009C9AA3.421B6260.5@west.cscwc.pima.edu> Message-ID: <3.0.5.32.19980725222452.00886100@205.83.192.13> At 03:50 PM 24 07 98 MST, Linda Reed--PCC West Campus CSC wrote: >X-URL: mailto:cypherpunks at toad.com >X-Mailer: Lynx, Version 2-4-2 >X-Personal_name: Linda Reeza >X-From: obvious at forgery.eff > >Reeza, > Stop hacking those military computer accounts, and quit backtalking >to your teacher, or you'll never get out of grade 4... > Dear Linda: I'm not hacking a military account. Sincerely, Reeza! ps- which school of mine did you sub in? From stuffed at stuffed.net Sat Jul 25 07:47:55 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sat, 25 Jul 1998 07:47:55 -0700 (PDT) Subject: My mom is a stripper/Sporty Spice killed my dog Message-ID: <19980725132052.8397.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/25/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From lreed at west.cscwc.pima.edu Sat Jul 25 09:07:15 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 25 Jul 1998 09:07:15 -0700 (PDT) Subject: Freddy Does Teleco Message-ID: <009C9B34.4F0CB5A0.2@west.cscwc.pima.edu> _________________________________________________________________ * To: Cypherpunks * Subject: [Fwd: Tarantula Day Afternoon - SPACE ALIENS HIDE MY DRUGS!!!] * From: Frederick Burroughs _________________________________________________________________ Linda Reed--PCC West Campus CSC wrote: > On the other hand, the recent proliferation of rattlesnakes and > tarantulas showing up, out of the blue, on the doorstep of the > abode in which I am currently residing, as well as underneath the > desk from which I am currently canning the small squares of pink, > digital flesh being marketed on the CypherPunks Disturbed Male > LISP, leads me to believe that, unless I am picking up visions > of pre-release Stephen King novels through the fillings in my > teeth, then some part of what I am writing must be true enough > to be pissing *someone* off... The abundance of black widow spiders, timber rattlers and copperheads here in the yeastern US doesn't bother me. It's the incessant patterned interference displayed on the TV, the fact that all the light fixtures and wall sockets are loose and missing screws, and all my new neighbors are young retirees wearing dark blue baseball caps (how'd they find this god forsaken snake pit?), that brother me so much. It's queer how much telephone maintenance is required in this rural setting. If there's as much maintenance in the rest of the service area as there is around my residence and place of employment, then why is the line quality so poor (constant clicks, echoes and tone changes)? Granted most of these telephone maintenance guys aren't doing anything when I pass them, they're all wearing dark glasses and seem to be listening for something in their air conditioned utility vans. _________________________________________________________________ Freddy, I find it interesting that shortly after taking up residence at a lady friend's house in Tucson, her phone went out and had to be 'fixed' by the local Teleco. Naturally, the guy who came to 'fix' the phone was, as you point out, wearing dark glasses, and, after messing with the box on the side of the house, declared that the problem was at the Teleco end, and that the phone would work after he returned downtown to finish 'fixing' the problem. Also interesting is the fact that there are two other residences which have feeds on the same line, and the only one that had a 'problem' was the one I am at. I took the liberty of popping open the Teleco box on the side of the house, and found a wiring scheme which is very creative in the way that it routes the transmissions. Tojohoto p.s. - Have you got the 10 kilos of heroin ready to ship? From k4t at beachaccess.com Sat Jul 25 10:38:56 1998 From: k4t at beachaccess.com (Kirk Fort) Date: Sat, 25 Jul 1998 10:38:56 -0700 (PDT) Subject: my thoughts for this list Message-ID: <01bdb7f2$32c9da60$f0763bcf@interpath.net> I have been getting this list for a few days. I subscribed to this list in the hopes I could learn something about crypto, in particular the GPG project. So far I have seen pretty much nothing about crypto or anything a person who is not high or crazy could understand. This list is so messed up its hillarious. I didn't want to add to the string of useless messages, but it doesn't look like anyone cares anyway. I will be monitoring the list for any signs of intelligent conversation. kfort From lreed at west.cscwc.pima.edu Sat Jul 25 11:04:11 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 25 Jul 1998 11:04:11 -0700 (PDT) Subject: Beans - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9B44.962BDA00.5@west.cscwc.pima.edu> Beans, Beans, They're Good For The Heart - SAHMD!!! ___________________________________________________ But they are very, very bad for the lungs. By popular request, as a result of a plethora of requests being forwarded to me by , even though I had no idea that so many subscribers to the CypherPunks list were aware of the true existence of the DevNullServer, I will expand a bit on the simplicity of the on-site creation of biochemical substances with the capacity to neutralize ExcessivelyAcidicAuthoritarians. Reading the literature on the production of such biochemical agents as Rincin, etc., one is struck by the need to go to great lengths to prevent being struck by the end-results of one's own experimentation in the creation of such substances. The need for outrageously complex security precautions in the preparation of biochemical agents makes the task prohibitive for those with limited access to funds and/or proper tools for the job. Or so it would seem... The fact of the matter is, if one pays close attention to the methods and processes of producing these agents, it quickly becomes apparent that eliminating the need for the transporting of these substances thereby eliminates much of the need for expensive and time-consuming safeguards against self-exposure to these deadly agents. In effect, if one can develop a mechanism to produce these biochemical agents at the site at which one wishes them to be released, then he or she can be relaxing on a beach at Honolulu while the little spores are busy taking care of business. MadBombers use timing mechanisms which delay the triggering of their products until they have had time to start making tracks toward the car that their government coconspirators have taken the rear license-plate off of. The spawning process of biochemical agents is a natural trigger- delay system which can be used to effectively create the desired substances while one is using the time to beat feat to an exotic island paradise. Spawning biochemical agents where 'a little goes a long way,' means that, once the mechanism kicks in, the results will be dramatic and far-reaching. Another advantage of on-site production is that dogs which are trained to recognize the scent of biochemical agents are unlikely to be trained to set off barking-flags over the scent of the basic ingredients used to create those substances. The down-side, of course, is that one cannot be certain that the desired substance will not be created/disseminated at a time when a local grade-school class is visiting the site as part of an LEA propagand exercise. However, if one is capable of taking the position that a government organization which consciously places a day-care center in a federal building known to be a soft-target for anti-government radicals, the responsibilty for their deaths falls on the government, then c'est la vie... Personally, I am of the opinion that any goverment that has no qualms about letting hundreds of poor, black men suffer the vile consequences of untreated syphilus, burning out the brains of average citizens to further the cause of mind-control research, expose unwitting citizens to radiation and hallucinogenic experiments without their consent, ad infinituum, can pretty much go fuck themselves if they attempt to decry those who attack them as Monsters, as a result of so-called innocents suffering as a result of the government's complacency and audacity in deeming themselves above retribution by those they are in the habit of so casually oppressing and persecuting. Anyone who wishes to attend the grand spectacle of the RCMP's Musical Ride, during the celebration of their 150th anniversary of keeping the average citizen from rising up against the rich and powerful, is welcome to do so. However, if they find their ass getting scorched as a result of the efforts of those being fucked in the ass by Dudley DoWrong taking it upon themselves to throw a serious fuck back towards whence it came, they should refrain from whining. Pardon me for sounding just a tad 'callous,' but I have had the opportunity to peruse private emails and memos between various members of Canada's Finest, and I find it rather disgusting that they can so casually discuss the probability of their attempts to pressure a mentally disabled person into 'cracking' resulting in HimOrHer committing physical destruction on the local schoolchildren (based on HisOrHer publication of a 'KILL THE CHILDREN!!!' Bienfait Nutly News Special), so that they will be able to step in as the GoodGuys who bring HimOrHer to Justice (TM), without suffering any personal losses in the process. Skeptical? Ask the RCMP to provide you with a copy of the files on the computer which they stole from me, after monitoring my website and emails, which made it clear that my computer fulfilled an essential role in researching my medical condition, and maintaining effective treatment for it. Once you receive the files, read one that is named 'warning.sog,' in which Bianca forwards a file purloined from a Canadian government computer system, which contains a discussion as to the desirability of putting pressure on me at a time when I am short on my medications. Do a text search on a file which suggests that, due to my Tourette Syndrome, it is inadvisable for LEA's to work me over for merely shouting and cursing, but that if I begin waving my arms around, they can consider themselves in danger, and do anything they desire to my sorry ass. Think I'm kidding? Thanks to the incredible ignorance of LEA's who believe that they are free to monitor the communications of the citizenry, while the reverse is illegal and unacceptable, I was afforded the opportunity to BeatFeet across the U.S. border the day before the Mounties appeared on my doorstep to steal my computers as punishment for speaking the Truth, and bury backup copies of my complete hard drive, which contain information which makes the above 'allegations' seem trite, by comparison. What I find hilarious is that copies of extremely culpatory and embarassing files/emails were forwarded to a variety of those from who they originated, yet monitoring of the ongoing investigation in this regard indicates that the FuckWads are as conscientious about fucking over the internal investigators as they are about fucking over the citizenry. Equally hilarious is the fact that whoever is in charge of running the Official RCMP WebSite seems to be unaware that any directory without an 'index.html' file, when accessed, gives the user access to *all* of the files in the directory, which makes them a very, very bad place to wittingly or unwittingly store sensitive files. In case you haven't already guessed, I am currently drunk, onery and mean. Any tarantula that bites me is in for a big surprise... From lreed at west.cscwc.pima.edu Sat Jul 25 11:05:21 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sat, 25 Jul 1998 11:05:21 -0700 (PDT) Subject: A Thousand Points Of Fight Message-ID: <009C9B44.CC4026A0.7@west.cscwc.pima.edu> Breakthrough Texts Leaderless Resistance An Essay by Louis Beam "Leaderless Resistance" -- Part One [IMAGE] The concept of leaderless resistance was proposed by Col. Ulius Louis Amoss, who was the founder of International Service of Information Incorporated, located in Baltimore, Maryland. Col. Amoss died more than 15 years ago, but during his life he was a tireless opponent of Communism, as well as a skilled intelligence officer. [INLINE] Col. Amoss first wrote of leaderless resistance on April 17, 1962. His theories of organization were primarily directed against the threat of eventual Communist takeover in the United States. The present writer, with the benefit of having lived many years beyond Col. Amoss, has taken his theories and expounded on them. [INLINE] Col. Amoss feared the Communists. This author fears the federal government. Communism now represents a threat to no one in the United States, while federal tyranny represents a threat to EVERYONE. The writer has joyfully lived long enough to see the dying breaths of Communism, but may unhappily remain long enough to see the last dying gasps of freedom in America. [INLINE] In the hope that, somehow, America can still produce the brave sons and daughters necessary to fight off ever-increasing persecution and oppression, this essay is offered. Frankly, it is too close to call at this point. Those who love liberty, and believe in freedom enough to fight for it, are rare today; but within the bosom of every once great nation, there remains secreted the pearls of former greatness. [INLINE] They are there. I have looked into their sparkling eyes; sharing a brief moment in time with them as I passed through this life. Relished their friendship, endured their pain, and they mine. We are a band of brothers native to the soil, gaining strength one from another as we have rushed headlong into battle that all the weaker, timid men say we can not win. Perhaps not... but then again, perhaps we can. It's not over till the last freedom fighter is buried or imprisoned, or the same happens to those who would destroy their liberty. [INLINE] Barring any cataclysmic events, the struggle will yet go on for years. The passage of time will make it clear to even the more slow among us that the government is the foremost threat to the life and liberty of the folk. The government will no doubt make today's oppressiveness look like grade school work compared to what they have planned in the future. Meanwhile, there are those of us who continue to hope that somehow the few can do what the many have not. [INLINE] We are cognizant that before things get better they will certainly get worse as government shows a willingness to use ever more severe police state measures against dissidents. This changing situation makes it clear that those who oppose state repression must be prepared to alter, adapt, and modify their behavior, strategy, and tactics as circumstances warrant. Failure to consider new methods and implement them as necessary will make the government's efforts at suppression uncomplicated. It is the duty of every patriot to make the tyrant's life miserable. When one fails to do so he not only fails himself, but his people. [INLINE] With this in mind, current methods of resistance to tyranny employed by those who love our race, culture, and heritage must pass a litmus test of soundness. Methods must be objectively measured as to their effectiveness, as well as to whether they make the government's intention of repression more possible or more difficult. Those not working to aid our objectives must be discarded, or the government benefits from our failure to do so. [INLINE] As honest men who have banded together into groups or associations of a political or religious nature are falsely labeled "domestic terrorists" or "cultists" and suppressed, it will become necessary to consider other methods of organization, or as the case may very well call for: non- organization. [INLINE] One should keep in mind that it is not in the government's interest to eliminate all groups. Some few must remain in order to perpetuate the smoke and mirrors for the masses that America is a "free democratic country" where dissent is allowed. Most organizations, however, that possess the potential for effective resistance will not be allowed to continue. Anyone who is so naive as to believe the most powerful government on earth will not crush any who pose a real threat to that power, should not be active, but rather at home studying political history. [INLINE] The question as to who is to be left alone and who is not, will be answered by how groups and individuals deal with several factors such as: avoidance of conspiracy plots, rejection of feebleminded malcontents, insistence upon quality of the participants, avoidance of all contact with the front men for the federals - the news media - and, finally, camouflage (which can be defined as the ability to blend in the public's eye the more committed groups of resistance with mainstream "kosher" associations that are generally seen as harmless). [INLINE] Primarily though, whether any organization is allowed to continue in the future will be a matter of how big a threat a group represents. Not a threat in terms of armed might or political ability, for there is none of either for the present, but rather, threat in terms of potentiality. It is potential the federals fear most. Whether that potential exists in an individual or group is incidental. The federals measure potential threat in terms of what might happen given a situation conducive to action on the part of a resistive organization or individual. Accurate intelligence gathering allows them to assess the potential. Showing one's hand before the bets are made is a sure way to lose. [INLINE] The movement for freedom is rapidly approaching the point where, for many people, the option of belonging to a group will be non-existent. For others, group membership will be a viable option for only the immediate future. Eventually, and perhaps much sooner than most believe possible, the price paid for membership will exceed any perceived benefit. But for now, some of the groups that do exist often serve a useful purpose either for the newcomer who can be indoctrinated into the ideology of the struggle, or for generating positive propaganda to reach potential freedom fighters. It is sure that, for the most part, this struggle is rapidly becoming a matter of individual action, each of its participants making a private decision in the quietness of his heart to resist: to resist by any means necessary. [INLINE] It is hard to know what others will do, for no man truly knows another man's heart. It is enough to know what one himself will do. A great teacher once said "know thyself." Few men really do, but let each of us promise ourselves not to go quietly to the fate our would-be masters have planned. [INLINE] The concept of leaderless resistance is nothing less than a fundamental departure in theories of organization. The orthodox scheme of organization is diagrammatically represented by the pyramid, with the mass at the bottom and the leader at the top. This fundamental of organization is to be seen not only in armies, which are, of course, the best illustration of the pyramid structure, with the mass of soldiery (the privates) at the bottom responsible to corporals; who are in turn responsible to sergeants, and so on up the entire chain of command to the generals at the top. But the same structure is seen in corporations, ladies' garden clubs, and in our political system itself. This orthodox "pyramid" scheme of organization is to be seen basically in all existing political, social, and religious structures in the world today, from the Federal government to the Roman Catholic Church. [INLINE] The Constitution of the United States, in the wisdom of the Founders, tried to sublimate the essential dictatorial nature pyramidal organization by dividing authority into three: executive, legislative, and judicial. But the pyramid remains essentially untouched. [INLINE] This scheme of organization, the pyramid, is not only useless, but extremely dangerous for the participants when it is utilized in a resistance movement against state tyranny. Especially is this so in technologically advanced societies where electronic surveillance can often penetrate the structure, thus revealing its chain of command. Experience has revealed over and over again that anti-state political organizations utilizing this method of command and control are easy prey for government infiltration, entrapment, and destruction of the personnel involved. This has been seen repeatedly in the United States where pro-government infiltrators or agent provocateurs weasel their way into patriotic groups and destroy them from within. [INLINE] In the pyramid form of organization, an infiltrator can destroy anything which is beneath his level of infiltration, and often those above him as well. If the traitor has infiltrated at the top, then the entire organization from the top down is compromised and may be traduced at will. "Leaderless Resistance" -- Part Two [IMAGE] A recent example of the cell system taken from the left wing of politics are the Communists. The Communists, in order to get around the obvious problems involved in pyramidal organization, developed to an art the cell system. They had numerous independent cells which operated completely isolated from one another and particularly with no knowledge of each other, but were orchestrated together by a central headquarters. For instance, during WWII, in Washington, it is known that there were at least six secret Communist cells operating at high levels in the United States government (plus all the open Communists who were protected and promoted by President Roosevelt), however, only one of the cells was rooted out and destroyed. How many more actually were operating, no one can say for sure. [INLINE] The Communist cells which operated in the U.S. until late 1991 under Soviet control could have at their command a leader who held a social position which appeared to be very lowly. He could be, for example, a busboy in a restaurant, but in reality a colonel or a general in the Soviet Secret Service, the KGB. Under him could be a number of cells, and a person active in one cell would almost never have knowledge of individuals who were active in other cells; in fact, the members of the other cells would be supporting that cell which was under attack and ordinarily would lend very strong support to it in many ways. This is at least part of the reason, no doubt, that whenever in the past Communists were attacked in this country, support for them sprang up in many unexpected places. [INLINE] The effective and efficient operation of a cell system after the Communist model is, of course, dependent upon central direction, which means impressive organization, funding from the top, and outside support, all of which the Communists had. Obviously, American patriots have none of these things at the top or anywhere else, and so an effective cell organization based upon the Soviet system of operation is impossible. [INLINE] Two things become clear from the above discussion. First, that the pyramid form of organization can be penetrated quite easily and it thus is not a sound method of organization in situations where the government has the resources and desire to penetrate the structure, which is the situation in this country. Secondly, that the normal qualifications for the cell structure based upon the Red model does not exist in the U.S. for patriots. This understood, the question arises "What method is left for those resisting state tyranny?" [INLINE] The answer comes from Col. Amoss who proposed the "Phantom Cell" mode of organization which he described as Leaderless Resistance. A system of organization that is based upon the cell organization, but does not have any central control or direction, that is in fact almost identical to the methods used by the committees of correspondence during the American Revolution. Utilizing the Leaderless Resistance concept, all individuals and groups operate independently of each other, and never report to a central headquarters or single leader for direction or instruction, as would those who belong to a typical pyramid organization. [INLINE] At first glance, such a form of organization seems unrealistic, primarily because there appears to be no organization. The natural question thus arises as to how are the "Phantom Cells" and individuals to cooperate with each other when there is no inter-communication or central direction? [INLINE] The answer to this question is that participants in a program of leaderless resistance through "Phantom Cell" or individual action must know exactly what they are doing and how to do it. It becomes the responsibility of the individual to acquire the necessary skills and information as to what is to be done. This is by no means as impractical as it appears, because it is certainly true that in any movement all persons involved have the same general outlook, are acquainted with the same philosophy, and generally react to given situations in similar ways. The previous history of the committees of correspondence during the American Revolution shows this to be true. [INLINE] Since the entire purpose of leaderless resistance is to defeat state tyranny (at least in so far as this essay is concerned), all members of phantom cells or individuals will tend to react to objective events in the same way through usual tactics of resistance. Organs of information distribution such as newspapers, leaflets, computers, etc., which are widely available to all, keep each person informed of events, allowing for a planned response that will take many variations. No one need issue an order to anyone. Those idealists truly committed to the cause of freedom will act when they feel the time is ripe, or will take their cue from others who precede them. While it is true that much could be said against this kind of structure as a method of resistance, it must be kept in mind that leaderless resistance is a child of necessity. The alternatives to it have been shown to be unworkable or impractical. Leaderless resistance has worked before in the American Revolution, and if the truly committed put it to use themselves, it will work now. [INLINE] It goes almost without saying that Leaderless Resistance leads to very small or even one-man cells of resistance. Those who join organizations to play "let's pretend" or who are "groupies" will quickly be weeded out. While for those who are serious about their opposition to federal despotism, this is exactly what is desired. [INLINE] From the point of view of tyrants and would-be potentates in the federal bureaucracy and police agencies, nothing is more desirable than that those who oppose them be UNIFIED in their command structure, and that EVERY person who opposes them belong to a pyramid style group. Such groups and organizations are easy to kill. Especially in light of the fact that the Justice (sic) Department promised in 1987 that there would never be another group to oppose them that they did not have at least one informer in! These federal "friends of government" are ZOG or ADL intelligence agents. They gather information that can be used at the whim of a federal D.A. to prosecute. The line of battle has been drawn. [INLINE] Patriots are REQUIRED, therefore, to make a conscious decision to either aid the government in its illegal spying (by continuing with old methods of organization and resistance), or to make the enemy's job more difficult by implementing effective countermeasures. [INLINE] Now there will, no doubt, be mentally handicapped people out there who will state emphatically in their best red, white, and blue voice, while standing at a podium with an American flag draped in the background and a lone eagle soaring in the sky above, that, "So what if the government is spying? We are not violating any laws." Such crippled thinking by any serious person is the best example that there is a need for special education classes. The person making such a statement is totally out of contact with political reality in this country, and unfit for leadership of anything more than a dog sled in the Alaskan wilderness. The old "Born on the Fourth of July" mentality that has influenced so much of the Aryan-American Patriot's thinking in the past will not save him from the government in the future. "Reeducation" for non-thinkers of this kind will take place in the federal prison system where there are no flags or eagles, but an abundance of men who were "not violating any laws.". [INLINE] Most groups who "unify" their disparate associates into a single structure have short political lives. Therefore, those movement leaders constantly calling for unity of organization, rather than the desirable Unity of Purpose, usually fall into one of three categories: 1. They may not be sound political tacticians, but rather, just committed men who feel unity would help their cause, while not realizing that the government would greatly benefit from such efforts. The Federal objective, to imprison or destroy all who oppose them, is made easier in pyramid organizations. 2. Or, perhaps, they do not fully understand the struggle they are involved in, and that the government they oppose has declared a state of war against those fighting for faith, folk, freedom, property and constitutional liberty. Those in power will use any means to rid themselves of opposition. 3. The third class calling for unity, and let us hope this is the minority of the three, are men more desirous of the supposed power that a large organization would bestow, than of actually achieving their stated purpose. [INLINE] Conversely, the LAST thing federal snoops want, if they had any choice in the matter, is a thousand different small phantom cells opposing them. It is easy to see why. Such a situation is an intelligence nightmare for a government intent upon knowing everything they possibly can about those who oppose them. The Federals, able to amass overwhelming strength of numbers, manpower, resources, intelligence gathering, and capability at any given time, need only a focal point to direct their anger [ie Waco]. A single penetration of a pyramid style organization can lead to the destruction of the whole. Whereas, leaderless resistance presents no single opportunity for the Federals to destroy a significant portion of the resistance. [INLINE] With the announcement of the Department of Justice (sic) that 300 FBI agents formerly assigned to watching Soviet spies in the U.S. (domestic counter-intelligence) are now to be used to "combat crime," the federal government is preparing the way for a major assault upon those persons opposed to their policies. Many anti-government groups dedicated to the preservation of the America of our Forefathers can expect shortly to feel the brunt of a new federal assault upon liberty. [INLINE] It is clear, therefore, that it is time to rethink traditional strategy and tactics when it comes to opposing state tyranny, where the rights now accepted by most as being inalienable will disappear. Let the coming night be filled with a thousand points of resistance. Like the fog which forms when conditions are right, and disappears when they are not, so must the resistance to tyranny be. Leaderless Resistance first appeared in The Seditionist in 1992. The author, Louis Beam, is one of the most respected racialist leaders in the world (within racialist circles, that is), and has established his own homepage to distribute his work. _______________________________________________________________ Texts Archive: Breakthrough Texts From dulac at ip.pt Sat Jul 25 11:53:23 1998 From: dulac at ip.pt (Dutra de Lacerda) Date: Sat, 25 Jul 1998 11:53:23 -0700 (PDT) Subject: Larry King In-Reply-To: Message-ID: <4.0.1.19980725194807.00f85580@mail2.ip.pt> At Saturday, you wrote: >Some whisper that Larry King is the incarnation of the frog, mentioned in >the book Some Like It Green, written by William Chutov. >Can this be true? I have bad dreams about it. >Please, help me out! Wrong assumption. Frogs are no aliens. Ergo IT (Larry) is no frog. Dulac. - - - Antonio Manuel Melo de Carvalho Dutra de Lacerda Morada : Rua Rodrigues Cabrilho, 5 - 5 Esq. 1400 Lisboa, PORTUGAL Telefone : +351-(1)-3013579 FAX & BBS : +351-(1)-3021098 From StanSqncrs at aol.com Sat Jul 25 17:42:22 1998 From: StanSqncrs at aol.com (StanSqncrs at aol.com) Date: Sat, 25 Jul 1998 17:42:22 -0700 (PDT) Subject: my thoughts for this list Message-ID: <8ef13d67.35ba7b33@aol.com> In a message dated 7/25/98 6:45:41 PM Central Daylight Time, k4t at beachaccess.com writes: << I have been getting this list for a few days. I subscribed to this list in the hopes I could learn something about crypto, in particular the GPG project. So far I have seen pretty much nothing about crypto or anything a person who is not high or crazy could understand. >> Both help to make a hacker, from what I understand. :-) << This list is so messed up its hillarious. I didn't want to add to the string of useless messages, but it doesn't look like anyone cares anyway. I will be monitoring the list for any signs of intelligent conversation. >> It may be because there are certain hackers getting inbetween those that want to actually say something, and the list. Fact is, I just unsubscribed from this list, but my e-mail apparently didn't make it to the server. Must be because I'm on AOL, 'right'? ;-) Stan, The MOST Important Page on the Net - http://members.aol.com/whtsametau/camel/index.htm From mix at anon.lcs.mit.edu Sat Jul 25 20:00:08 1998 From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer) Date: Sat, 25 Jul 1998 20:00:08 -0700 (PDT) Subject: my thoughts for this list + Message-ID: <19980726030004.11032.qmail@nym.alias.net> In a message dated 7/25/98 6:45:41 PM Central Daylight Time, k4t at beachaccess.com writes: << I have been getting this list for a few days. I subscribed to this list in the hopes I could learn something about crypto, in particular the GPG project. So far I have seen pretty much nothing about crypto or anything a person who is not high or crazy could understand. >> Both help to make a hacker, from what I understand. :-) << This list is so messed up its hillarious. I didn't want to add to the string of useless messages, but it doesn't look like anyone cares anyway. I will be monitoring the list for any signs of intelligent conversation. >> It may be because there are certain hackers getting inbetween those that want to actually say something, and the list. Fact is, I just unsubscribed from this list, but my e-mail apparently didn't make it to the server. Must be because I'm on AOL, 'right'? ;-) Here's another post that didn't seem to make it through- ====== In a message dated 7/24/98 10:12:55 AM Central Daylight Time, 0_rcummi at funrsc.fairfield.edu writes: << > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE? > > Reason 1: You're from AOL Reason 2: You don't know where the caps lock key is Reason 3: You're looking on the cypherpunks list for music. Reason 4: You're from AOL >> Tee, hee hee. I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ), it's from some media article. It described a incident that happened when someone complained about someone elses loud music - << Patrol officers had to bang on Joseph W. Wedemeyer's door for about 15 minutes before getting his attention, Capt. Robert Linardi said. They charged him with disorderly conduct. The next afternoon, Linardi said, Wedemeyer confronted his neighbor on the street. Linardi said Wedemeyer, who is white, called the neighbor, who is black, a racial epithet and said, "I'm going to kill you." ... >> That's the kind of music you're talking about, 'right'? I heard they were after Tom('s) DeLay(ed Resignation), but they missed. Direct hits to his brains and his heart, though! ;-) ===== Stan (StanSqncrs at AOL.com) The MOST Important Page on the Net - http://members.aol.com/whtsametau/camel/index.htm From gwb at gwb.com.au Sun Jul 26 02:39:57 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Sun, 26 Jul 1998 02:39:57 -0700 (PDT) Subject: One Nation August Newsletter Message-ID: <1.5.4.32.19980726083414.00743588@gwb.com.au> Issue 2.3, August 1998 ---------------------------------------------------------------------------- PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the mailing list please say "REMOVE" in the subject line and return this message in the body. ---------------------------------------------------------------------------- Dear One Nation supporter in NSW Pauline Hanson has just completed a whirlwind tour of Australia. The tour has been an enormous success - although this aspect of her rallies has been largely ignored by the media. You will have noted the coverage given to the protests and for this reason we would like to draw your attention to the following web pages. The first demonstrates the links between extremists within the Labor party and the violence perpetrated by protesters at One Nation meetings: http://www.gwb.com.au/gwb/news/onenation/left/meljul98.html The second looks at the organisation behind the student protests: http://www.gwb.com.au/onenation/school.html We would draw your attention to the new moderated on-line discussion forum which you are encouraged to join and participate in. This can be found at: http://plato.itsc.adfa.edu.au/politics/ Finally, to make your navigation of the large One Nation web site easier we have installed a theme based 'site map' which can be found at: http://www.gwb.com.au/onenation/site GWB Scott Balson Pauline Hanson's Web Master From lreed at west.cscwc.pima.edu Sun Jul 26 04:42:18 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 26 Jul 1998 04:42:18 -0700 (PDT) Subject: GodLess - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9BD8.781EFBC0.1@west.cscwc.pima.edu> GodLess Capitalists - SPACE ALIENS HIDE M DRUGS!!! ___________________________________________________ "Centralism is dead," says Hayek; however, according to Friedman, it is not so much centralism that is dead, but rather the futility, and subsequent genre, of centralism. Dialectic construction states that government is capable of truth, given that culture is distinct from sexuality. Gonzalo implies that we have to choose between the textual paradigm of discourse and dialectic cultural theory. It could be said that the primary theme of Fielding's essay on Saussurean semiotics is the failure, and hence the rubicon, of patriarchialist truth. "Class is part of the collapse of reality," says Lyotard. In a sense, the example of dialectic construction prevalent in JFK is also evident in Heaven and Earth, although in a more mythopoetical sense. Habermas promotes the use of the textual paradigm of discourse to attack colonialist perceptions of language. In the works of Vinge, a predominant concept is the concept of neocapitalist consciousness. But Lacan uses the term 'Saussurean semiotics' to denote the role of the observer as participant. The subject is interpolated into a structuralist paradigm of expression that includes truth as a totality. If one examines the textual paradigm of discourse, one is faced with a choice: either accept dialectic construction or conclude that expression must come from the masses, but only if the premise of semiotic theory is valid; otherwise, truth is part of the praxis of sexuality. Hughes holds that we have to choose between Saussurean semiotics and dialectic construction. Milhon's critique of the textual paradigm of discourse suggests that the task of the reader is social comment. --Herr Doktor Prof. T.C. May, Ing. See, I told you Tim May knew about that sort of crap. Now, Greg Broiles told me that he knew T.C. May, and I'm no Tim May, and I don't know all those fancy, intellectual words, but I've never found anything that couldn't be adequately described using the eight words you can't say on the InterNet, so I'm going to tell you all about why the GodLess Commies kicked the MindsOfTheMassesAsses so bad that that RockyFeller figured that if he could discover the secret of the BullShitVic Schtick, he could finally realize his dream of having more Dogamned money than the Pope. Marx and Stalin and Lenin and Chairperson Mao knew all about that 1984 stuff about controlling the people by controlling the language and symbolism. They also understood, like I explained before, that you don't want your NewOldLady looking at a picture of her old boyfriend while you're sticking your dick in her, so all of his crap, like his old love- letters and the shirts he left behind, has got to go. Even more, the GodLess Commies knew that it wasn't enough to just throw the OldBoyfriend's shit out, you had to 'deconstruct' your NewOldLady's memory of him, even if you had to wipe her fucking mind out with electroshock and make her listen to tape-loops. That RockyFeller kind of knew that, since he was doing the couch- circuit with all of the Movers&Shakers around the globe, no matter what their schtick was, but wasn't smart enough to figure out all of that stuff on his own, and besides, he was pretty busy counting his money, and that's why he paid the I.S.P.'s GodLess Commies to figure out the best way to put the BullShitVic Schtick up the butts of the masses via the medium of the media of Radiating Radio Waves. The Radio Project's GodLess Commies didn't have much money to count, so it didn't take them long to figure out the obvious, which is that you don't fuck with a winning game. So they figured that 'abolution of culture' could be accomplished by making intellectual content of the medium as close to zero as possible, and that they could 'determine the new cultural forms' of the listeners by Pavlovian repetition which would eventually lead to the listeners drooling on command. Of course, as always, the increasing 'alienation of the population' remained important, since people with a strong sense of belonging in a family, community, social structure, etc., still had a picture of their BoyFriend by their beside, figuratively speaking. The techniques to make people increasingly 'radio-minded' was to reach it's epitome in later years, with the invention of the TV-tray, which enabled families to abandon any pretense, whatsoever, of their family ties being stronger than their imaginary bond to Lucille Ball and Ricky Ricardo. [WAS: Fuck mom! I LOVE LUC!] It was no coincidence that one of Franklin Delanor Roosevelt's main avenues of application of Madison Avenue Plain Folk Imagery was his FireSideChats on the medium which had become a RichCommieFeller tool for seizing the hearts and minds of the masses. After all, FDR owed much of his power and success to Elanor knowing whose ear to blow into in the Eclectic Communist Community of the day. The main difference between the Bolshoi Political Ballet in Russia, and the Communist TakeOver Of America, was that there was no need to remove the heads of the politicians in power and the capitalist Money Mongers, because the politicians and the MoneyMongers *were* the head of the Commie/Fascist TakeOver Of America. * To: cypherpunks at einstein.ssz.com (Cypherpunks Distributed Remailer) * Subject: A Thousand Points Of Fight (fwd) * From: Jim Choate Forwarded message: > From: Linda Reed--PCC West Campus CSC > Subject: A Thousand Points Of Fight > federal government. Communism now represents a threat to no one in > the United States, while federal tyranny represents a threat to > EVERONE. An all powerful federal government IS communism. Communism is the political theory that property ownership and management must be centralized under a single authority. While our current state is moving more toward a fascist approach, private ownership & central mananagement, with the increasingly extensive federal management of private business & behaviour. See, I told you so... An Exercise For The Reader #487: Call up an international arms dealer and tell HimOrHer that you need some guns and tanks, and stuff, to start a war or a revolution, and that you don't have any money, but you'll pay HimOrHer after you win. Right... The Movers&Shakers (TM) don't fall for the old GoodLeader/BadLeader crap that is pushed to the public. They have a foot in the door of all of the major players backrooms and merely switch their 'allegiance' to one or another of the players once the final outcome of the game becomes obvious. Neither Lenin nor Hitler borrowed money from 'dad' to start their war/revolution. They got the money from the ever-present SugarDaddies who have adopted children scattered all over the globe. Likewise, SugarDaddy's BigKids in the Military and Intelligence Agencies may fight among themselves over who sits on SugarDaddy's knee, but when those outside the family start butting in, then the CIA and the Mafia, for instance, call a truce to take care of family business. SugarDaddy loves his GoodKids and BadKids equally... Neither do the BigKids in SugarDaddy's CorporateEmpires let petty little details like wars that their own children are fighting interfere with BusinessAsUsual. ("Be careful out there, son, we just sold the Nazis ball-bearings for their tanks, through Brazil of course, after you bombed their ball-bearing factories. "Here's some extra spending cash for next time you get leave. ou've earned it..") * To: Cypherpunks * Subject: Re: A Thousand Points Of Fight (fwd) * From: Frederick Burroughs * Sender: owner-cypherpunks at Algebra.COM Jim Choate wrote: > An all powerful federal government IS communism. Communism is the > political theory that property ownership and management must be > centralized under a single authority. While our current state is > moving more toward a fascist approach ,private ownership & central > mananagement, with the increasingly extensive federal management of > private business & behaviour. Indeed, Marx's final stage of classless society, "from each according to their ability to each according to their needs", implies a level of government management that was all but impossible during his lifetime. The technology required for this level of management now exists, and is being implimented. "Classless society" has been achieved, not by the dissolution of classes, but by the development of technology to a level that can assign each individual into his own class. Technology now allows the optimum utilization of each individual by the state. Loners can voice their objections at the US Capitol... Fast Freddy 'Son of Speed' Burroughs illustrates that paying the extra few bucks for a priority connection to the ClueServer pays off, in the long run. He recognizes that somewhere, in an underground bunker, a Reptilian Nazi is humoring his ScaleOfTen buddies by using the latest in secret lavoratory developed technology to create a cross-clone being that has the MindOfMarx, the BallsOfHitler, and the LipsOfGeorgeBush, which are intoning, "We *have* the technology!" All this shit was in 'The Xenix Chainsaw Massacre' in 1989, but hardly anybody knew what the fuck was being talked about. (I could insert quotes that illustrate this, except I don't have any copies of it, since ThievingFuckingMountieCriminalPricks stole my computers, which is why I am in the middle of fucking them so bad that they will never be the same, afterwards. I was minding my own business, sitting at home telling the Truth over the InterNet, when they decided they just had to fuck with me, so fuck them in thier dirty, crimininal little assholes...) Anyway, what TXCSM said, in a nutshell, was that the success of TotalWorldDomination being achieved by the Controllers was merely dependent on development of the right tools, and tweaking them, and that TV and the InterNet were the right tools. WebWorld & The Mythical Circle of Eunuchs was just written as a fun look at a possible FutureTimeLine&SpaceWave, since The Xenix Chainsaw Massacre had already said everything that needed to be said, if one chose to listen. InfoWar was written mostly as a cross-communication tool between Circle of Eunuchs Gorilla Cells, keeping one another updated on each other's progress. Space Aliens Hide My Drugs is just a rambling, nonsensical diatribe that results when you finally snap, and decide that any Reptilian Nazi that fucks with you is going to be repaid in Spades, perhaps even Aces&Eights, since I am playing with a deck that is a little *too* full, if you know what I mean. Regardless, to get back to answering the question that Declan, GodLessSchill of the TrilateralCPU, asked, about why I send this crap to the CypherPunks...it is because those who make this list their home instinctively know what I have been preaching since 1989--and no doubt some of them have been preaching it since long before that--the InterNet is going to be the Final Frontier of the Battle for Freedom and Privacy between the Controllers and the Citizenry. The CypherPunks understand: "THE (TM) *have* the technology." WeTheSheeple have been getting their asses kicked on the Frontiers of Rights & Freedoms, without even seeming to realize, for the most part, that they are in a fight. Fresh From The ClueServer: Even the Nazis didn't start the CattleCars openly rolling to the Auschwitz Spa & Resort until they were in a position of total control. It is *not* OK that the government is taking away our rights and freedoms, as well as our means to defend ourselves against them, because they are *our* government, because they are the GoodGuys, because they have GoodIntentions, because they are only FuckingUsALittleBit(ForNow), because we are *comfortable* and ThingsAren'tReallyAllThatBad(et)... Think about what *you* have done, personally, to guarantee the continuation of your rights and freedoms. Think about whether you deserve any rights or freedoms. (es, *deserve*...they ain't, contrary to popular opinion, free for the taking...) Think about why the government continues a WarOnDrugs which has been completely ineffective in stopping drug use, in the least, and has only resulted in the imprisonment of more of our citizens than the most evil of dictators that the RoyalWe point our fingers at, as well as high crime rates, and the wholesale slaughter of our youth. Could it be because the government knows exactly what they are doing, and *desire* these results? Good Guess!!! The same goes for the majority of the ills and evils that are part and parcel of the road that our political leaders have led us willingly down. They are no more a mistake than the technology of Radio and TeleVision being directed towards mindless drivel, mass hypnosis and social control programming. While WeTheSheeple sell our souls, our independence, our rights and freedoms, for the comfort and security of being spoon-fed our reality, while being 'protected' from the GreatEvils that the Controllers have promoted or invented in both our MeatSpace and our MindSpace, They (TM) have been busy little beavers, butchering minds and lives in a quest to gain an extra inch, here or there, in the battle for the minds of all of humanity. I want you to all rise from your chairs, open your windows, and scream, as loud as you can, "I've got a DICK, and I'm not afraid to use it!" Well, OK, maybe that's not such a good idea, but you know what I'm talking about, eh? Anthrax - Smoke 'em if you got it... From nobody at nsm.htp.org Sun Jul 26 05:05:25 1998 From: nobody at nsm.htp.org (nobody at nsm.htp.org) Date: Sun, 26 Jul 1998 05:05:25 -0700 (PDT) Subject: noneRe: read please..... In-Reply-To: <55592c1.35ba9c3b@aol.com> Message-ID: <19980726120503.1157.qmail@nsm.htp.org> On Sat, 25 Jul 1998 23:02:18 EDT AT666IND at aol.com wrote: >HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL BASEBALL >PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR??? At last!! Something on-topic for cypherpunks! And in k-RaD caps too. AOL fucking rocks man! Where's Toto? From stuffed at stuffed.net Sun Jul 26 05:16:39 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Sun, 26 Jul 1998 05:16:39 -0700 (PDT) Subject: Nympho Spice/I was bonked on the golf course Message-ID: <19980726104909.1894.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/26/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From jya at pipeline.com Sun Jul 26 06:04:54 1998 From: jya at pipeline.com (John Young) Date: Sun, 26 Jul 1998 06:04:54 -0700 (PDT) Subject: Jim Bell Rage Message-ID: <199807261304.JAA14297@camel14.mindspring.com> Received from anonymous July 26, 1998: The Columbian (Oregon), No date. Written by John Branton, Columbian staff writer Eleven months in prison - and counting - haven't muzzled James Dalton Bell's rage about what he calls government "black operations" against him. "This story has more government misbehavior than Watergate", Bell wrote in a recent letter to The Columbian. He added in a phone call"I'm in a little bit of danger. These people don't want me talking to you." Bell is the 39-year-old McLoughlin Heights man who wrote an Internet essay, "Assassination Politics", that proposed the bounty-driven murder of "government slimeballs". The former electronics engineer hadn't spoken to The Columbian for about a year, until recently. He was released from federal prison in April. Bell served 11 months after pleading guilty to using false Social Security numbers and obstructing the Internal Revenue Service by trying to intimidate agents and stink bombing their Vancouver office. Bell returned to his parents' home this spring but was free only about two months. Currently, Bell is back in a federal prison in Seattle, awaiting a July 31 hearing on charges that he violated his probation conditions. He's alleged to have refused a court-ordered mental-health evaluation and search of his parents' home. Who is this man, many people have asked, who lives in our midst when he isn't in prison - and if the IRS is to be believed, dabbled with things such as nerve gas, botulism toxin and sodium cyanide? IRS agents say Bell published a "hit list" of agents' home addresses on the Internet for his anti-government "patriot" friends, and discussed contaminating water supplies with a buddy. Is IRS Inspector Jeff Gordon correct in comparing Bell to Timothy McVeigh and Theodore Kaczynski and saying the IRS interrupted him in plans to commit murder? No, says Bell. "They knew I wasn't planning to kill federal agents", Bell said this month. "They were scared because I had written something that shows a way to eliminate government. They were afraid I could convince the public that I could replace existing government for no more than a 10th or 20th of its current cost." His wariness of the federal government is understandable - they put him in prison. But his words reveal a view of governmental duplicity like the fictional world of X- Files agents Mulder and Scully. "Paranoid would be a good word", said Bell's federal probation officer, Matthew Richards. Bell, asked why he doesn't obey his court- ordered probation terms to stay out of prison, made a reference to the political imprisonment of Nelson Mandela, South Africa's president. "I believe that when the federal government decided to spy on me, simply because of my political opposition to their tyranny and terrorism, it dramatically diverged from what the average American citizen would be inclined to tolerate", Bell wrote recently. Beginning in late 1995 or early 1996, Bell said, federal agents read his "Assassination Politics" essay, posted on the Internet. The essay described a computerized system to ward "untraceable digital cash" to anyone who correctly predicted the exact time of a federal agent's murder. In Bell's words, "Imagine for a moment that, as ordinary citizens were watching the evening news, they see an act by a government employee or officeholder that they feel violates their rights, abuses the public's trust or misuses the powers that they feel should be limited. What if they could go to their computers, type in the miscreant's name, and select a dollar amount. If 0.1 percent of the population, or one person in a thousand, was willing to pay $1 to see some government slimeball dead, that would be in effect, a $250,000 bounty on his head." Alarmed, Bell says, federal agents used two homes near his parent's home, one on Corregidor Road and the other on Mississippi Drive, for a clandestine and possibly illegal surveillance operation. Agents supposedly installed thousands of dollars worth of sophisticated equipment, possibly using microwave technology, to spy on Bell. "None of that occurred", said federal probation officer Richards. "Absolutely not true", said the owner of one of the houses. "I wouldn't let the feds in my house." Bell said he suspects the agents bugged his phone illegally - and followed him when he got out of prison briefly in April. "We never bugged his phone", Richards said. "No tailing whatsoever". Once, Bell said, he spotted someone following him and turned the tables on them. Bell followed the car to Rixen's Enterprises, 2700 N. Hayden Island Drive, which he suspects is a secret front for a federal "black operation". "No spooks here", said the owner, Jim Rixen, 40, who said he deals in heating systems for boats and recreational vehicles. "I've had this company for 13 years. You can ask anybody on this island. You're more than welcome to come here and go through everything I've got. He might have followed some customer of mine here. I've never heard anything about it." In his upcoming hearing in the U.S. District Court in Tacoma, the government will charge Bell with additional - so far undisclosed - probation violations, Richards said. If Bell has any actual evidence of illegal practices by the government, that would be the place to bring it up. =end of article= From lreed at west.cscwc.pima.edu Sun Jul 26 11:30:17 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 26 Jul 1998 11:30:17 -0700 (PDT) Subject: TruthChapter - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9C11.75915C20.5@west.cscwc.pima.edu> TruthChapter -- SPACE ALIENS HIDE M DRUGS!!! _____________________________________________ OK, so it's a slow day and you don't have much going on. our sister is out of town for the weekend, your dog is on the rag and your Visa is maxed-out. Thus, sex is not a viable option for killing a little spare time (now a felony). So what the hell... ou're going through the posts to the CypherPunks list and you notice that the asshole who forged posts to the list in your name (claiming that fucking two nine year-olds is just as legal as fucking an 18 year-old) has spammmed yet another chapter of the rambling, semi-coherent saga "The True Story Of The InterNet" to the list. ou've read bits and pieces of the manuscripts (on company time), every now and again (more out of boredom than because of any socially or coupon redeeming content), and it bothers you that the Author has taken concepts, themes and issues that are important to you and put a bizarre, insane/inane twist on them that somehow degrades and defiles them, in spite of the fact that he sometimes supplies a remarkable amount of documented facts and viewpoints from 'respectable sources' in support of his vague claims and wild-eyed theories. ou take great care to avoid being 'caught' reading the manuscripts by others and you wouldn't dream of admitting in public that you view them as anything but mindless trash, but you keep finding yourself thinking about some of the underlying views expressed by the Author of the manuscripts. ou've begun to realize that what troubles you about the 'True Story Of The InterNet' manuscripts is reflective of what bothers you about the InterNet, in general, as a Medium/Message--the ongoing battle between order and chaos that reins supreme within a Virtual Reality where Jane and Joe Average can avail themselves of the same technology as Established Authority (TM) in the battle for your attention. Ms. Information Highway is a Eunuch who embodies the divergent and seemingly contradictory yin/yang qualities that would result from a cross-cloning of Walter Cronkite and the BlondeBimbo that everyone tells the jokes about. It's like the 'science' of UFOlogy...the 'experts' in the field often provide a well-documented trail of facts and figures from recognized sources and authorities. The problem, of course, is that the facts and figures are used to 'prove' a wide range of Plausible Theories (TM) ranging from highly-evolved beings with a superior intelligence to humans, to Reptilian Nazis living deep within the bowels of Mother Earth who are cultivating SurfaceDwellers such as ourselves to provide a FoodFarm for Alien GreyHound Tourists passing through on their way to another galaxy. The Problem (TM) posed by the InterNet is Taoist in Nature. The Total Access To All Information which is inherent in the Physical Manifestation Of Virtual Reality which we know as the InterNet opens a Dangerous Door Of Perception leading to an environment within which we have the possibility of being...free! The Freedom represented by Unrestricted Access To Information comes from having the ability to exercise one of the most basic of all human qualities, which is to 'seek' knowledge in our quest for an expanding evolutionary wisdom. The Freedom is to be able to Search for Knowledge according to one's own personal predilictions and desires, and to Choose from All Available Information/Knowledge what one will use as tools in building one's Perceived Reality. In a world where we have become accustomed to being spoon-fed the information, perceptions and viewpoints which comprise our Perceived Reality (by Officially Recognized Authority), we suddenly find ourselves faced with the possibility of using the technological tools of the InterNet to direct our Attention/Perception along vectors of our own choosing, rather than being subjected to forced herding into the fenced pastures and feeding pens designed by the Controllers to keep us in an environment which is the most suitable and convenient for their purposes. The Freedom is freedom from a Reality created and governed by Official Government Pamphlets handed to us in every area of our life. The Freedom is the freedom to peruse the colored charts and diagrams provided by the Pentagon to lead us through a maze where Gulf War Syndrome is an imaginary being that is always just around the corner, and then to direct our attention to the private WebSite of a Gulf War Vetran who provides the details of his personal experience in regard to the war and its effect on his or her life and health. The Freedom is the freedom to read the wildly rambling, nonsensical diatribes contained in the 'True Story Of The InterNet' manuscripts and say, "Bullshit! I'm going to check these wild-eyed claims out for myself." The Freedom is freedom to chaff and winnow the original Seed Of Knowledge in a manner that suits your desires, and to seek out InterNet venues and personas which make your Quest for Knowledge more complete or efficient. The Freedom is the freedom to change the direction or the parameters of your Quest for a specific reason, or on a momentary whim, solely to view your Perceived Reality from the outside, in order to get a more objective view of the WorldReality you have constructed. It is in this spirit that the 'TruthChapter' is being dedicated. TruthChapter FAQ ---------------- 1. What you are currently reading is *not* the TruthChapter. 2. The Author has not written, and has no intention of writing, the TruthChapter. 3. The Author is full of shit! Regardless of the ultimate level of personal and professional ethics that the Author brings to the manuscripts that pass through his or her space-time continuum of MuseDom, his or her attitudes, facts, figures, beliefs, values, etc., are completely irrelevant to your path in life, except to the extent that you, personally, evaluate and apply the concepts and ideas expressed for your consideration. 4. Writing the TruthChapter is *your* job! This is true whether you choose to participate in the activity which is described below in 'An Exercise For The Reader', or whether you choose to curl up in bed with Playboy, Time, The Wall Street Journal, Beer and Bloating In Lost Wages, or A Physically Manifested Expression Of Mind To Be Named Later. ============================= TruthChapter FAQ Intermission Make some popcorn, grab a beer, and think about the following... At some point in 'InfoWar - Part III of the True Story Of The InterNet', there was a statement, quote, or some reference documented reference to the Fact (TM) that, during a period when violent crime statistics showed a significant 'decrease' in violent crimes, that public perception viewed violent crime as being very much on the 'increase' (and a 'growing' problem). The reader of the manuscript has no way of personally knowing whether the Author is passing along real, existing facts and/or information in this regard, whether he or she is lying in order to promote a private agenda, or whether the Author dreamed or imagined the 'information' during drunken drug-withdrawal seizures. The same concept holds true even if you can verify through personal research that the fact/information came from an established, respectable, documented source. (i.e. - "Oswald acted alone." / "We, the jury, find OJ Simpson 'not guilty'." / "We, the 'civil jury', find OJ Simpson 'guilty'." / "We, the Court Of Public Opinion, made up our minds long before the trial began." / "The Mormon Tabernacle Choir acted alone..." ) My point? The Author makes no bones about being a drunken, insane, drug-addicted, infantile pervert. The fact that past and present Presidents, Dictators, Titans of Industry, Media Moguls, Religious Leaders, Politicians, etc., etc., ad infinitum, choose to claim that they smoked pot but didn't inhale, that they drank liquor but never swallowed, that they had sex but didn't cum... Well, the bottom line is, "ou pays your money, you takes your chance." Although the reality of the time-space continuum requires that we develop structures and processes by which we can navigate life's diverse paths, delegating many of our daily thoughts, feelings and activities to pre-programmed reactions and responses that are based on our previous experience and analysis of life, we can never truly escape the reality that 'Life is a crapshoot' and that failure to exercise our capacity for conscious awareness results in our becoming submerged in a robotic humanity/persona which leaves us vulnerable to automatically travelling along the path of least resistance. Our being Real (TM) is not a question of 'truthfully' answering our employer's question in regard to our opinion on the Vietnam war, whether our employer is the Pentagon or the Peace Coalition. Gurdjieff once said that in one's inner life, one is free to say, 'The King is shit!', but in one's outer life, it is often wise to say, 'All hail the King!'. Our being Real (TM) is mostly a question of being aware of the difference between our inner and our outer lives. My definition of a 'truthful' person is one who does not lie to others more than he or she lies to oneself, except as necessary. As far as when it is 'necessary' to lie, and what it is 'necessary' to lie about...that is a matter of personal conscience for every individual. It is dependent on one's personal wisdom and understanding, as well as on their beliefs and values in life. (i.e. - It is up to each individual to decide whether they are comfortable with lying when the Gestapo ask if they are hiding Jews in the attic.) In a world where there is increasing pressure to conform completely to a constantly narrowing societal paridigm, it is important to resist sinking into a primordal swamp of group consciousness that submerges our individual creative spirit, or spark of life. I regard it as an absolute anathema to the human spirit that opinions of OJ's guilt or innocence is split so radically along racial lines, far beyond what differences in social exposure and experience alone would dictate among people of thought and reason. Everyone who was present when Nicole Simpson and Ronald Goldman were murdered, raise your hand... Although it is encumbent upon us, in our daily lives, to judge ourself and our life based on the best possible information, to the best of our ability, we too often tend to do so from a perspective of a biased, angry mob outside of the courtroom, than from a perspective of a juror sworn to high standards of objectivity in viewing our own life and our personal knowledge/belief systems. The tragedy of the OJ trial was that the blatant racism, corruption and lack of professional ethics of those who are employed to be objective, unbiased investigators made it impossible for an objective juror to place a man's fate in the hands that gathered the evidence. The tragedy of life's trials is that there is so much intrigue and subterfuge in our environment, as a result of private and group agendas driven by human weaknesses and character defects, that it is now a monumental task to analyze and evaluate the information we receive, in order to feel confident in our ability to structure our beliefs and pre-programmed reactions and feelings in a manner that will allow us to feel our spiritual integrity has remained intact during the process. The point I am leading up to is that it is difficult, yet exceedingly important, to overcome our human foibles and our tendency to become robotic Sheeple in the present societal environment which puts great pressure upon us to abandon freedom of thought and spirit, in the interest of the comfort of conformity. We live in a society where we are required by law and custom to nod our belief and approval when our elected political leader says, "Read my lips...no new taxes!", even though there is not a person on the face of the earth who doesn't understand it is a meaningless lie. It doesn't matter whether it is the political arena, the religious arena, the media, the press, the justice system, or whatever--The Lies Flow Like Water! We have become so numbed by the assault on the Truth that it is an easy task merely to fall into a deep slumber where we cease resisting the constant attacks on our inherent sensibility and our desire for increased knowledge and wisdom. Gurdjieff posited that it is 'impossible' for a human to 'consciously do evil'. Although the truth of this is most easily seen in the group descent into unthinking madness that was epitomized by the rise and fall of the Third Reich, I believe that it is equally true in the smaller areas of daily life, where we learn to robotically 'fool' ourselves, often in the interests of survival, into believing that it is Right, instead of merely Expedient, to believe that requiring certain ethnic groups to sit at the back of the bus is 'the way it is', instead of consciously maintaining awareness that it is Wrong, if that is our true personal feeling and belief. It is my belief that Right & Wrong (TM) have little or no meaning without a Conscious Objective Awareness that can only result from an individual having the freedom to explore all of the information and experience that life has to offer, without unreasonable, intrusive censorship from various elements of their environment. Which brings us back to...the TruthChapter... ============================= TruthChapter FAQ (continued) ---------------------------- 5. The Medium Is The Message... The information that comes into our range of perceptive attention is shaped, shaded and molded in a manner dependent upon the medium of communication by which it is transmitted. This is true whether the Information is transmitted by genetics, analog or digital emmissions, is a moving and flowing energy, or is captured in a static, stable form. Fish find their way back to their birthplace by a different method than humans because of the difference in the mediums by which they receive the necessary information. 6. Salmon don't have to show a passport to an armed fish representing the Stream Government. Salmon don't have to have approval of the Church of Salmon in order to spawn. Salmon don't get a ticket for swimming on the wrong side of the stream, or for swimming too fast. Big fish eat little fish...in one gulp. They don't nibble them to death with Fish Taxes. They don't drown them at the stake for believing the earth is round. Fish are not as 'smart' or 'creative' as humans--they do not mentally build Empires out of Imaginary Sand Castles In The Sky and then eat each other in an argument over what color to paint the walls. 7. If Salmon could write, they would probably write a FAQ with Facts, instead of embellishing the information with vague, semi-rational references that seem to be putting a confusing spin on their World Of Perceived Reality for no other reason than fear of falling off if it ceases turning. OK, so instead of using the TruthChapter FAQ to provide you with accurate, unbiased information with which to construct your own WorldView (TM), I ended up getting a little carried away, using my Substance Abuse Enhanced Creativity (TM) to try to suck the reader into a WorldView constructed by myself for the sole purpose of making it the Reader's turn to buy the next round of drinks. Although you might regard this as merely another 'proof' of my freely admitted diabolicallity (don't bother looking it up in the dictionary), it is my contention that you are only fooling yourself if you are of the belief that you can take the facts/opinions of *anyone* at face value, without asking questions such as: "Had Saint Peter already signed a BookDeal with a Bible publisher before authoring the Epistles which he asks us to take as fact, based on Faith?" "Did Moses have inside information that there were vast reserves of oil in the Promised Land?" "Did Job belong to an S&M cult?" "Was St. John the Divine 'on something' when he had his 'Revelation' ?" "When Jesus performed his 'miracles', did he work with scantily clad, sexy assistants, in order to divert the attention of the crowd?" The point I am trying to make is that, even in the arena of religious belief, there is a difference between Faith and a Lobotomy. Likewise in the arenas of Politics, Family, Business, Sports and Relationships. For example: "WaterGate FAQ" by Richard Nixon "Curfew Time FAQ" by our Mom & Dad "MicroSoft FAQ" by Saint William Gates "Sports FAQ" by Jimmy the Greek & Marge Shott "Relationship FAQ" by A Pregnant Woman Who Claimed To Be On The Pill And Now Demands ou Marry Her "TruthChapter FAQ" by A Cheap Drunk To Be Named Later In the interests of using the True Story Of The InterNet manuscripts as a vehicle to increase the Reader's ability to analyze and evaluate the proffered 'information' in a manner that utilizes the evolving technological tools of the medium by which the manuscripts are being disseminated, the Author is making freely available the information with which he was planning to generate/construct a chapter with the title, 'son of The Mother Of All Chapters'. By providing the Reader with the information gleaned from the InterNet for constructing the 'son of The Mother Of All Chapters', as well as revealing HisOrHer's secret designs and hidden agendas culminating in the final, manifested form of the chapter, the Author is offering you, the highly esteemed Reader of the 'True Story Of The InterNet', an opportunity to InterActively Participate in the process of the construction of your personal News & Entertainment Paridigm. The reality of the time-space continuum dictates that we must apply our time and resources in gathering and analyzing the information by which we construct our WorldView in a manner that best utilizes the tools at our disposal to shape, color and mold available information, including taking advantage of the MiniPre-Fab Realities that are offered to us by our fellow RealityBuilders. Although Manufacturing Reality can be done with greater quality control and efficiency through the sharing of our individual Reality Products, basic economics dictates that there are often HiddenCosts associated with believing RealityAdvertising claims that something is 'free', in the overall scheme of things. There is little difference between being a HeatedSpoonFed Heroin Addict and in being a SpoonFed News/Information/ Entertainment Junkie. Once you are hooked, the price goes up, and you end up on Information Welfare and still having to steal your own integrity in order to pay an increasing price for a diluted/cut product, in order to feed your habit/need with an inferior product. The TruthChapter is being presented as an opportunity to explore the possibility of weaning yourself to a realistically supportable level of addiction to incoming information in order to strike a balance between suffering the pangs and arrows of outrageous fortune, in the course of your evolution, and becoming Irrevocably Comfortably Numb through overuse of the current OpiateOfTheMasses. Despite the fact that the inspiration for the process of completing 'son of The Mother Of All Chapters' was largely the result of the Author having his computers and notes stolen by Officially Recognized Authorities (TM), as well as HimOrHer descending into a depressing, primordial pit of dysfuntional drug withdrawal, this does not, in reality, automatically preclude the possibility that the LoftyGoals professed by the Author in regard to the purpose of the TruthChapter *could* be true... An Exercise For The Reader: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Read 'Son.doc' in order to familiarize yourself with the all-too-predictable paranoid conspiracy theory slant that the Author had planned to put upon the information gathered for the assembly of the 'son of The Mother of All Chapters'. The Son.doc attachment is an incomplete preliminary summary/first-draft of the 'son of The Mother Of All Chapters', as envisioned by the Author. 2. Read 'ThePlot.txt' in order to get the general gist of the Spin that the Author had planned to put on the analysis and evaluation of the information that had been gathered. 3. Read 'FDR.doc' and 'FDR2.doc' to familiarize yourself with the building blocks with which the Author had planned to construct 'son of The Mother Of All Chapters', as well as HisOrHer notes regarding HisOrHer personal knowledge and experience that could be added to support HisOrHer's personal WorldView. 4. Write the fucking chapter yourself! 5. Disseminate the chapter to whomever you please, in any manner you please. (e.g. - snailmail to your mom, email to the CypherPunks Distributed Mailing List, or as an email reply to those who bless you with 'Make $$$ Fast!" UCE/Spams.) "The Answer To Noise, Is More Noise!" ~ CypherPunks Chief SpokesPerson #238 Fuck the Author! Fuck Time Magazine, The Wall Street Journal, America's Most Wanted, Paul Harvey and A 'No Loitering' Sign To Be Named Later! Write your own goddamn chapter and tell it the way that *you* see it. Fuck TruthMonger! *BE* the TruthMonger. Put your own accurate or inaccurate spin or twist on the 'son of The Mother Of All Chapters' information base. Add to it with items gleaned from your own research, or from your own personal accumulated knowledge and experience. Throw all of the provided information out and completely write the chapter from scratch, with the same theme or a different theme. Write the chapter, type the chapter, or just think about how you would approach writing the chapter in order to make manifest the expression of the knowledge and wisdom that you have to share with your fellow Prisoners Of A Group Reality as to how to best break the Chains Of Free Thought wrapped around our brains by the Reality Police. Don't use your physical tools merely to receive and to retransmit Noise. Create Noise! If anyone complains or criticizes your Noise, fuck 'em! ou're the TruthMonger! ou're the Author of 'son of The Mother Of All Chapters'. Don't lose any sleep over the whining of ignorant pissants who are unable or unwilling to accept the fact that your world is flat, and that's the way GoDoG intended it to be. Intelligent people, like oursleves, know the world is flat. That's the Truth (TM). From lreed at west.cscwc.pima.edu Sun Jul 26 11:42:43 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 26 Jul 1998 11:42:43 -0700 (PDT) Subject: Son Message-ID: <009C9C13.311F2A20.13@west.cscwc.pima.edu> Son of Mother Of All Chapters -- SPACE ALIENS HIDE M DRUGS!!! _________________________________________________________ July, 1948: The moment has come when the costumes, the grease paint, the falsely colored scenery, the technicolored spotlights and all the other artifices of makeYDup should be put aside and, in the interest of truth, the solid facts about the play and the players revealed to the people. ~ The Roosevelt Myth, Preface to the Popsvox PublishingR edition Dec. 7, 1941 The Lake of Life has started to turn over. The bottom is rising to the top, the top is descending to the bottom, and everything is becoming the opposite of what it seems to be. ~ Vice-Admiral B. D'Shauneaux, USN ~~~ ~~~ Version 1.7, Rev B: Saturday morning, March 4, 1933...the conquering Democrats poured into the city... Only a week before an assassin's bullet had barely missed Roosevelt. It struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with Al Smith, had opposed Roosevelt's nomination...and died a few days later. Version 2.7, Rev. 3: On February 1, 1933, in Miami, Florida Giuseppe Zangara fired five shots a President-elect Franklin D. Roosevelt, who was making an impromptu speech while sitting in an open car that had stopped momentarily. Although none of the shots hit President Roosevelt, Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit four other people, including a Secret Service agent. Version 3.9, Rev. 2-B: On February 15, 1933, Zangara attended a speech given by Roosevelt at Bayfront Park in Miami, Florida. When Roosevelt had finished his talk and was preparing to leave, Zangara pulled out a pistol and opened fire. Zangara wounded five people who had been near the president-elect, two of them seriously. Most critically injured was Chicago Mayor Anton Cermak, who was struck by the bullet in the chest which then lodged in his spine. Version 4.9, Rev. 8C: The parade car moved slowly down the street as President-elect Roosevelt and Mayor Cermak smiled and waved. The car stopped and President-elect Roosevelt gave a speech while sitting on the back of the car. A man named Guiseppe Zangara pushed through the crowd. He fired five shots at the President-elect. The bullets hit four people and Mayor Cermak. Version 15.6, Rev. 7: On March 6, Mayor Cermak died from complications stemming from the shooting. The same day Zangara was indicted by a grand jury and charged with first degree murder in the death of Cermak. His trial began on March 9 and ended on March 11 with a guilty verdict and a death sentence. The prisoner was transported to the Florida State Prison at Raiford, where he was executed on March 20, 1933. Version 18.9, Rev. 5D: Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His body was taken back to Chicago and buried in the Bohemian National Cemetery. Guiseppe Zangara was executed in the electric chair on March 21, 1933. That was only 13 days after Mayor Cermak died. Version 32.9, Rev. 12: Consider the case of Guiseppe Zangara, who was executed in 1933 for the attempted assassination of President-elect Franklin D. Roosevelt in which Chicago Mayor Anton J. Cermak was fatally shot. Zangara pleaded guilty in state court on March 10, was sentenced to death, and was executed on March 20 -- an interval of 10 days! Version 82, Rev. 5Q: After Roosevelt had delivered a speech in Florida on February 14, 1938, Guiseppe Zangara, an unemployed bricklayer, fired six shots from a handgun at Roosevelt from twelve yards away. The president-elect, who was sitting in an open car, was uninjured but five other people were shot, including Chicago mayor Anton Cernak, who was killed. Version 95, Rev. 8: On February 15, 1933, Guiseppe Zangara rose early... From lreed at west.cscwc.pima.edu Sun Jul 26 11:43:08 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 26 Jul 1998 11:43:08 -0700 (PDT) Subject: The Plot Message-ID: <009C9C13.3FFFC220.15@west.cscwc.pima.edu> The Plot of son of ?ThePlatypus ------------------------------- Gathered information reveals: 1. US Presidents and important political figures count on the Secret Service for protection. Secret Service agents are in the employee of the MoneyMongers who rule the US Treasury Department. Thus, if the MoneyMongers don't approve of a powerful individual's political policy and actions... 2. Presidents and other political figures seem to die at particular junctures of time wherein they have already served their purpose to the Controllers. (Note: 'die' either physically or politically. i.e. - FDR croaking shortly after getting Truman elected as the hand-picked replacement of shadowy figures. 3. Ronald Reagan and FDR were both 'front men' for their wives, and/or those in their wives shadowy background. FDR, through the efforts of Elanor and her cohorts, was paid A QUARTER OF A MILLION DOLLARS in order to enter the New ork governor's race. 4. Accounts of the life and times of FDR inevitably contain a generous sprinkling of references to Luck! (e.g. - Fortuitous Circumstances as opposed to PART OF AN EVIL PLOT B THE SECRET CONTROLLERS WHO RULE THE WORLD FROM BEHIND THE SCENES!!!) 5. Hitler and his Evil Empire was no more a 'fluke of nature' than Lenin and his Evil Empire. The 'infiltration' of the American political scene by a wide variety of people with socialist or communist beliefs and agendas was not some mysterious, unplanned 'accident'. The rise of Eugenics, with the resulting implications of a Master Race embodied in genetic control, was a worldwide phenomena promoted by intellectuals and leaders in all nations, not just in the nation which gave Eugenics a 'bad name' by instituting the end result of a Planned Society a little too fast to prevent disturbing the average persons natural pace of increasing moral compromise. 6. Neither Oswald nor Hitler 'acted alone.' Try starting a World War without the backing and support of the MoneyMongers and the PowerBrokers. Lots of luck... 7. After Pavlov discovered biological mechanisms for the control of when dogs drool, his research did not come to a halt. Political and Military Czars who had a hand in developing and researching brainwashing techniques epitomized by 'The Manchurian Candidate' did *not* decide it would be wrong to use the techniques, just to increase their money and power. oung boys in the throes of publerty do *not* refrain from imagining what their large-breasted teacher would look like, naked, after reading 'The Invisible Man'. 8. Viewing the life and times of FDR (and probably any other political/religious leader) is *scary* if one lets their mind contemplate the 'possibility' of deep, dark conspiracy theories being True!! Why? Because one can construct a Dark Theory that makes as much (if not *more*) sense than the Standard Authorized View Of History And Reality promoted in educational materials, government pamphlets and corporate advertising. (i.e. - The Allies burned a few Jews, but they didn't inhale...) 9. Nobody acts alone...Anonymous acts secretly. From jf_avon at citenet.net Sun Jul 26 12:54:09 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Sun, 26 Jul 1998 12:54:09 -0700 (PDT) Subject: Computing with DNA... Message-ID: <199807262009.QAA21570@cti06.citenet.net> Hi everybody! Have a look at Scientific American August 1998 for an article by L. Adleman (of RSA fame) about how he solved a computationnally gigantic problem in less than a second with a few drops of stinking liquid :-) Unfortunately, the article is not available from www.sciam.com, so you'll have to buy the paper version of the magazine. *FASCINATING* Also, have a look at http://cwis.usc.edu/dept/News_Service/chronicle_html/1995.10.23.html/Supercomputing_with_DNA_.html Ciao jfa Jean-Francois Avon, Pierrefonds (Montreal), Canada Unregistered Firearms in the hands of honest citizens: Liberty's Teeth Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice He who beats his sword into a ploughshare will get coerced to plow for those who don't... PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From marlin1374 at juno.com Sun Jul 26 14:21:39 1998 From: marlin1374 at juno.com (marlin1374 at juno.com) Date: Sun, 26 Jul 1998 14:21:39 -0700 (PDT) Subject: Did I get the right email address? Message-ID: <199807262120.OAA22954@mail1.eni.net> "SHOW ME THE MONEY!"............Not a problem! I am about to share with you a unique opportunity to start a very successful business or take an existing one to new heights. By taking advantage of the following breakthrough knowledge in marketing trends, you will soon discover the art of . . . "How to Really Make Money on the Information Superhighway!" Some of you may already be marketing a product online. Maybe you are even making a sizeable profit! Whatever the case may be, no matter how successful you are right now, my guess is that your bank account is still not overflowing and MORE MONEY with LESS WORK peaks your interest. FACT 1 : ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE A SIZABLE PROFIT ON THE INTERNET. FACT 2 : FEW PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT. FACT 3: THESE PEOPLE ARE CRAZY!! Seriously friends...Why would people want to pass up an extremely valuable money making opportunity? Many people think that Marketing on the Internet takes more time than any human being can spare. "There is so much to learn" some say. "I can't even find the time to check my E-mail, how will I ever learn enough about the internet to make money?" others quote. The fact is that in many cases this us true, there is a wealth of information on the internet about how to "market" this and how to "sell" that. Unless you know what to look for, it can become an endless maze of dead ends and wasted time. Now think about this... WHAT IF? I could provide YOU with an incredible Marketing Package that encompasses all the "How To" information you need to be a success on the Internet. This phenomenal package includes DETAILED Internet SECRETS (we don't hold anything back, its all here folks!!), which explains in detail how to Profit from the Internet Explosion. Whether you have a business of your own or you want to start one. It's filled with over 45 packed pages revealing the secrets about electronic marketing so many other online marketers DON'T want you to know. I thought that might interest YOU. Let me explain. <><><><><><><><><><><><><><><><><><><><><><><><> Right now there are over eighty million people surfing the Internet. By the year 2000, that figure is expected to more than double. With so many people using the Internet, smart "net"repreneur's are taking advantage of what this new (in terms of true commercial application) and exciting medium has to offer. The Internet presents one of the best ways to make money that has ever been introduced. On any given day you have the opportunity to present your message to more than eighty million people! That's right... EIGHTY MILLION people. That is more people than one multi million dollar advertisment reaches at the Super Bowl. This is the reason so many businesses are scrambling to make their presence known on the Internet. Not only does the internet let you reach these people, it lets you pitch these people on your product or services. That means it gives you the abillity to sell..sell..sell!! it also gives you the resurces you need to MAKE EXCELLENT MONEY. And we do mean excellent money!!! CONSIDER THE POSSIBILITIES: You wake up each morning at your leisure and put on a pot of coffee. As you sip on your cup of hot "brew" you saunter over and turn your computer on. Then, as your monitor glows from dim to bright, you find that you have inquiries from all sorts of people requesting what you have to offer. Later, after you have finished reading your inquiries, you stroll out to your mailbox. You find it is filled with letters from people from all across the world! What's even better though, is that the letters are FILLED WITH MONEY; cash, checks, and money orders. Then, after tallying up the totals, you find that you have made anywhere between $200 to $1,000 and it isn't even one o'clock in the afternoon. Think of it: NO boss, NO traffic, and NO annoying Co-workers. Wouldn't it feel great to wake up in the morning knowing you are going to be making excellent money but don't have to leave your house to do it!?! Wouldn't your life be far less complicated? The truth is, you can be one of those who become financially independent via the Internet. AND THE BEST PART IS...IT DOESN'T REQUIRE A LOT OF MONEY!! What it does require is the knowledge of how, what, and where to do it. That is where we can help. Here at Natural Instincts, we provide you with the knowledge of how to begin earning substantial income from your computer via the "information superhighway". We can remember how overwhelming the Internet seemed when we were first introduced to it. We realized the marketing and profit potential the Internet holds, but really had no idea how to pursue it. In our thirst for answers and knowledge, we purchased everything we could find that had information on the How, What, and Where. We spent thousands of dollars, but we now know what works and what doesn't. No where, in all of our searching, could we find a complete packet of information for all of our questions. That is why we decided to write this report. We have compiled every proven method and secret that we have learned along the way into one complete, easy to understand report. This PROVEN REPORT makes believers of skeptics! Sound too good to be true? That's what others have said. That is, until they received their reports and saw for themselves just how easy it is to make money on the net! Check out these satisfied customers... Hi NI, I received your report and free bonuses last Saturday and wanted to congratulate you on a job well done. I read through your report "How To Profit From The Internet" and I'm very impressed. I have bought other books and manuals about Online Marketing, Direct Marketing, E-mail, Mail Order, etc. Yours is the only one that explains the subject in an easy to understand language. I finally found the secrets I've been looking for. Once again, Great Job! Sincerely, John Strand - Satisfied Customer My father has always told me, "remember, Michele, there is no free lunch in life. You get out of life what you put into it." Through trial and error and a somewhat slow frustrating start, I purchased your report and finally figured out how to start a very profitable business from my home. Your report is great, you give the average person the tools and secrets to succeed. I know my dad is very proud of me now. I can't thank you enough =) Michele B from Oregon Good Morning, I hope this finds you well. I received your program yesterday after- noon and read it cover to cover. You have put together a very valuable resource indeed. I have finally found the program that tells all! Your program has given me the tools I need to succeed. Your program could truly end up being the best $39.95 I ever spent! Your the best, I'm making your manual into my internet Bible!! Thanks a million! Best Regards, Mary W Florida To whom it may concern- I'm usually the first person to write a negative criticism about a product, being a "consumer Advocate" columnist for a well respected newspaper. To tell you the truth, I ordered your product to do an expose on Internet scams. But, as I was reading through your manual, I discovered what truly valuable information your company has put together, and for an affordable price. It is very rare for a "complaint columnist" to give a good review, but for the first time, I need to tell you that your manual you have put together is OUTSTANDING!!! I have wanted for the last few years to start a business on the Net, but have been deathly scared of taking that step to get started. But then I discovered your manual and put the tips and secrets to work. I haven't been able to keep up with the orders, and it's only my second month!!! I can't wait to see where I will be in six months! Thank you, Rick Johnson Alabama This is a wonderful opportunity, we urge you to take advantage of it. You won't find too many people that will give away ALL of their secrets!! The majority of the rich people today have copied what someone else is or has been doing. That is what we are offering you now--a chance to copy our success!! It is very easy and we ARE for REAL! Here's a little more incentive to check this out... ~IF YOU ORDER WITHIN 3 DAYS~ We will send you: **** FREE $400 Bulk e-mail Software **** **** FREE $200 Check by phone, fax, E-mail Software **** **** FREE $10 Calling Card **** ----PLUS---- We will send you a list of over 100 major search engines ready to surf on the Internet or to place a free link to your web page. Also, you will receive a list of 98 of the best inexpensive newspapers to advertise in (U.S. orders only). The list is complete with papers name, city, phone number, circulation and frequency (Daily or Weekly). We will also include five free BONUS reports that include these topics: � How to Protect your PC from Viruses � How to get 300+ Quality Prospect to E-mail you Weekly � Tips and Secrets to Advertising with the major Online Services � What's wrong with the World Wide Web � Tax Advantages for the Home Business Owner. You will find that these five reports by themselves are worth thousands of dollars to you. These bonuses alone are worth several times the cost of the report. We will also give you a secret list of over 1500 of the best Web sites where you can place a FREE advertisement. This is a list we use every day to run our business and we are giving it to you! Imagine what a great offering we are giving you for FREE! And we're not through, if you order RIGHT NOW, we will give you 15 FREE "How to Reports" that you are free to market and sell on the Internet or through mail order for $15-30 each. They are 45-60 informational packed pages each. A great way to start your own Net based business! The topics are; 1) Earn Extra Dollars with a Home Based Answering Machine 2) How to Buy a Car with Bad Credit 3) How to Make Thousands of Dollars Winning Contests 4) U.S. Government Auction Sales 5) An Insider's Guide to Finding and Obtaining Grant Money 6) Home Based Business for Fun and Profit 7) How to Get a Job Fast 8) How to Make Money Without Leaving Your House 9) How to Turn the Hobby of Photography into Thousands 10) Making Money at Garage Sales, Swap Meets, and Flea Markets 11) How to Get Paid for Watching TV 12) Getting Your Start in Theater, Television, and Movies 13) Wills or Trusts? The Case for Living Trusts 14) How To Find Work with the Federal Government 15) How to Write Almost Anything and Get Paid for it! 50,000 EMAIL ADDRESSES FOR FREE That's right, we will give you our BEST private list of 50,000 email addresses. This list of addresses has been put through our remove and undeliverable lists so that it is fresh and responsive. We are constantly adding and taking addresses out of it. It is absolutely the best 50,000 email addresses you will ever get your hands on, BAR NONE! (please note: we are only giving this bonus to the first 50 people, so Don't Wait!!!) So you are probably thinking to yourself, this is wonderful, but how much? $149.95, $99.95 maybe even $79.95? You may have seen other companies marketing "How To" information on the Internet and charging these prices. People are actually buying these packages at these prices. Why? People want to know how to market a product or service the "Right" way on the Internet. "How to Profit from the Internet" could easily sell for any of the above prices. However, we feel that we would rather help those who may not have the ability to pay such a price in order to be successful. That is why we are offering "How to Profit from the Internet" at the low price of $39.95. That's right, that was not a typo...$39.95. I have sold this package at much higher prices in the recent past and will be forced to raise my prices in the very near future. One of the things you will learn in my course is to constantly test your market. I am currently in the price testing phase of this marketing campaign. On Augast 15th, 1998, I will be raising the price of this package back up to $49.95 and eventually up to $79.95 to test the upscale market. If you act quickly, you have the opportunity to get these materials today for the unbelievable low price of $39.95. Still skeptical??? Lets put that to rest right now. We will make this completely risk free for you. If you are not 100% satisfied with the information you receive, and believe that you cannot use it to start a successful business or increase your current business profits, return it within 30 days and we will refund your money. No questions asked!! Are we nuts? No, it just shows how confident we are that you'll be delighted with the information you'll have...just like the others who are already using the information and making money. You will be surprised how quickly you can be earning money on the Internet! So, if you are seriously interested in learning how to acquire wealth by being online, ACT NOW!! This won't last for long! Print out this form and mail it to the address below, with your $39.95 cash, check, money order or credit card information. Natural Instincts 4676 Commercial St. SE Suite 201 Salem, Oregon 97302 Thank you =) ****Please print out the order form and mail it along with your payment**** ************************************************************************ ORDER FORM ************************************************************************ NAME______________________________________________________ ADDRESS___________________________________________________ CITY_______________________ STATE__________ ZIP__________ Website Address____________________________________________ Deliver "How to Profit from the Internet" to the following email address: E-MAIL ADDRESS____________________________________________ (please note, all orders must include an email address incase we encounter a problem with processing. The 50,000 email addresses will be sent to you by email) Area code and Phone number: Day time __________________ Evening: ________________________ [ ] If you prefer to have the report on disk, please check here. Please include an additional $3.00 for shipping and handling, thank you. (If you reside outside the United States, please include $2.00 extra) Please check one of the following: [ ] I'm ordering within 3 days, please send my FREE software, $10.00 calling card, 15 How to Reports, "How To Profit From The Internet" and FREE BONUSES including 50,000 email addresses for the unbelievably low price of $39.95 today. [ ] I'm not ordering within the first 3 days of receiving this letter, so I agree to pay $39.95 for "How to Profit from the Internet" by itself, less the bonus package. [Internal code 138702A] This code must be on order form to be processed!!! Payment Method: [ ] Check [ ] Cash [ ] Money Order [ ] Credit Card, please make sure to include the mailing address above! [ ] Visa [ ] MasterCard [ ] American Express [ ] Discover Name of Credit Card: _____________________________ Name as it appears on Card: _________________________________ Card Number: __________________________________ Expiration Date: _____ / _____ Signature of Card Holder: _________________________. ************************************************************************ "In mail-order work, anyone with imagination, determination, and a willingness to study and experiment may have very little difficulty getting started. A number of the most successful one-man operations obtain an income as high as $40,000 to $100,000 a year." - U.S. Department of Commerce ************************************************************************ THE MARKET IS HERE - TODAY! TAKE ADVANTAGE OF IT!!!!! After you receive your report, I'll answer any questions time permits via email. I'm looking forward to helping you succeed! From loanuorao22 at msn.com Sun Jul 26 16:21:57 1998 From: loanuorao22 at msn.com (loanuorao22 at msn.com) Date: Sun, 26 Jul 1998 16:21:57 -0700 (PDT) Subject: NEED TO KNOW HIS OR HER BACKGROUND Message-ID: <199807272706BAA10623@public.opgk.krakow.pl> INFORMATION SERVICES......... Your Source For Information LOCATE DEADBEAT DADS,JUDGEMENT DEBTORS,LOST LOVED ONES,OLD FRIENDS Business & Individuals in the USA Assets SEARCHES (CHECKING & SAVINGS ACOUNTS) STOCKS BONDS AND SAFE DEPOSIT BOXES Local, State, National & International Information needed varies, sometimes just a name. Helpful information would be Last Known Address, Social Security Number, Date of Birth and any other information you feel would be of use. Provide us with everything you have and let the Professionals at Information USA do the rest. Information SERVICES has the most competitive prices in the industry! Call today for a free price quote. Other Services Available *Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments *National Real Property *Business Credit Reports *Corporate Profiles *National Bank Asset Information *Stocks & Bonds & Mutual Fund Search *Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce *Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports *Pre-Employment Background *Verify Education *Verify Professional License *Verify Employment Call for additional Services Information SERVICES Call Toll Free 1-888-370-9112 Ask for Ken Wagner Visa, MasterCard & Discove From users1 at comports.com Sun Jul 26 18:31:17 1998 From: users1 at comports.com (users1 at comports.com) Date: Sun, 26 Jul 1998 18:31:17 -0700 (PDT) Subject: Dear Prospective Entrepreneur Message-ID: <199807270113.SAA23863@helix.pathology.ubc.ca> Dear Prospective Entrepreneur; I have been an attorney for 26 years, but recently I joined a company which is only 3 years old, and is growing at a fantastic rate; in fact, after only 10 months old, it was featured in SUCCESS MAGAZINE, and it has been the #1 rated network marketing opportunity for the last three years. What makes this company and this opportunity I am offering you so great, is the fact that we (Marketing Executives) have "EXCLUSIVE" marketing rights in the United States to new miracle products that are providing dramatic benefits to people who have two of the worst diseases known to mankind. Americans who learn about and need our products, can only get them through us, and not from other companies, or the corner drug store. After getting into other companies in the last several years, and going from company to company, and product to product (mostly companies that failed, or had falsely advertised products), I finally found this company that is truly "CREDIBLE," has tremendous products, a great compensation plan, and, best of all, my customers are calling me back month after month. Since the products actually sell themselves, I'm NOT constantly on the phone, or forever hustling all my relatives and friends. Products that make people feel better (especially natural products that have no side effects, and do have a 60 day money back guarantee) cause people to call me every month, instead of me calling them. Our "exclusive" and "patented" all natural products have also gone through the double blind clinical studies and have produced unbelievable sales in foreign markets, and have only recently been introduced into the United States, so our timing is also perfect. If you are interested in trying our products and/or looking at this business opportunity, call me toll-free at 888-203-6668 and leave your name, telephone number, and/or your address if you want more information. You also can respond to exclusive at apexmail.com. If you are ready to make some changes in your life, free up some time to spend with your family, and make some extra money, call me or e-mail me. WHAT HAVE YOU GOT TO LOSE? I made that same call a few months ago, and I promise, you will be happy to hear more about this tre- mendous company, its great products, and about how easy it will be for you to make that extra money. Thanks, Clyde Fontenot This message is brought to you from Clyde Fontenot, Attorney, 504 W. Main St., Ville Platte,LA.70586, 318-363-5535. From CEr1942929 at aol.com Sun Jul 26 20:26:55 1998 From: CEr1942929 at aol.com (CEr1942929 at aol.com) Date: Sun, 26 Jul 1998 20:26:55 -0700 (PDT) Subject: Brother Message-ID: <41c2b3b5.35bbf35d@aol.com> I am trying to find my brother, "Allen Thomas Taylor" I am not sure what year he was born but I think it was l922, l923. We have the same Father, "Alva Thomas Taylor", my name is Christine (Taylor) Ernest, I was born l935, in Mt. Vernon, Mo.. I have not seen my brother in 60yrs. The last I heard he was working for the civil service in Washington, DC, and got married in Maryland. Any information I would appreciate. Thank you Sincerely Christine Ernest From bbt at mudspring.uplb.edu.ph Sun Jul 26 21:13:48 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Sun, 26 Jul 1998 21:13:48 -0700 (PDT) Subject: enc.... In-Reply-To: Message-ID: Is it cheaper to install an encryption software than an encryption hardware? Will encryption reduce the speed of my pc? A virus uses encryption to hide itself (correct?), but will the files in a pc be safe from virus when encrypted? why? (Correct me if I'm wrong) It is easier to crack (let us say) a 56 bit technique than a 64 bit (correct ?). =============================================================================== You give the words you have spoken, it is not lended and are not taken back. It is like what The Corrs sung "...your forgiven not forgotten...." bbt at mudspring.uplb.edu.ph bbt at peak-two.uplb.edu.ph metaphone at altavista.net From cory4321 at yahoo.com Sun Jul 26 21:42:14 1998 From: cory4321 at yahoo.com (Cory) Date: Sun, 26 Jul 1998 21:42:14 -0700 (PDT) Subject: enc.... Message-ID: <19980727043530.4083.rocketmail@send1d.yahoomail.com> "Bernardo B. Terrado" wrote: > A virus uses encryption to hide itself (correct?), > but will the files in a pc be safe from virus when encrypted? why? a virus can be encrypted or it could leave itself open. usaually the first. it all depends on the combination of what virus and encryption software you use. Many times a virus will infect by waiting for you to open a file (run, copy, move) when it sees a file open it will add itself to the end and then move the start of the program to the virus. When the program is executed it jumps to the virus who loads itself into memory and then jumps seamlessly to the beginning of the program, unperceptibly( if done right) If your files are encrypted by a program that stays in memory and lets programs run like normal a virus will run like normal. If you have an uninfected file PGPed when you extract a copy it will become infected like a normal file however the pgp file will not be infected. If the encryption is built into the program and has a checksum you will be notified if it is infected but if it just runs a decryption routine and then starts the program then it could be infected before the decryption routine. in general if you can read/write a file so can a virus. If you are worried about infection, get an uninfected copy and make a detached pgp .sig then run it on your computer in a batch file so pgp checks the signature before it runs. if pgp fails the sig. your program is infected each virus is unique and acts differently, remember they are just written like normal programs. If you are indepth interested, search for a virus authors page. Anti-virus people are vague so you don't figure out how to make one but a virus author will probably have guides on how to make a virus. This gives you intimate knowledge of a virus's abilities. _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From jf_avon at citenet.net Sun Jul 26 23:09:10 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Sun, 26 Jul 1998 23:09:10 -0700 (PDT) Subject: short comment from Adleman on DNA computing, DES and RSA Message-ID: <199807270624.CAA29170@cti06.citenet.net> Hi Cypherpunks and e$-ers. After having read Adleman's Sci Am article, I couldn't help but ask him... :-) The following message is re-posted with his permission Ciao jfa ==================BEGIN FORWARDED MESSAGE================== From: Len Adleman To: Jean-Francois Avon Subject: Re: Your article in Scientific American and RSA Thank you for the kind words regarding the Sci Am article. I have thought about using DNA for breaking cryptosystems. It does appear convievable that a code like DES could be broken. However, because RSA can simply increase the size of keys to overcome whatever computing power DNA provides, I do not think it represents a threat to RSA. We of course have a long way to go to see whether we can actually get DNA to live up to its potential. If you are unfamiliar with quantum computation I think you might enjoy reading about it - it, at least in theory, could represent a threat to RSA. I believe that you can find info on the www. -Len Jean-Francois Avon wrote: > Greetings. > > Your article in SciAm blew my mind! > > I bought the magazine after having seen it because of my interest/inquietude > of new computing ways that could break RSA (and similar public key) encryption > schemes. > > The most fantastic thing is that I bought the magazine after having browsed > the article but without even having read who was the author of the article! > [laughs] > > Now, here is my question, which you *surely* figured out: can a method could > be devised (using DNA computing) that would decrease the security of RSA? And > if yes, what would it imperil ( keys, individual cyphertext, etc?) > > I could not see a trivial way of effecting multiplication and division, but > then, maths have never been my forte... ;-) > > Any comments? > > Highest regards > > jfa ===================END FORWARDED MESSAGE=================== Jean-Francois Avon, B.Sc. Physics, Montreal, Canada DePompadour, Soci�t� d'Importation Lt�e Limoges fine porcelain and french crystal JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming PGP keys: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From lreed at west.cscwc.pima.edu Sun Jul 26 23:50:54 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Sun, 26 Jul 1998 23:50:54 -0700 (PDT) Subject: FDR.doc and FDR2.doc Message-ID: <009C9C78.E5ED3900.9@west.cscwc.pima.edu> It seems that the forementioned files never made it to the list (at least as echoed by infinity.nus.sg), as a result of being filtered out somewhere along the way due to their excessive size. Realizing that this was likely the result of filtering for the benefit of list members, so that they would not be stuck with wasting their resources downloading large amounts of tripe by] spamming assholes, I consulted John Gilmore as to what action to take on this matter. John informed me that one thing he learned from Dimitri was that, "The Spammer interprets filtering as common-sense, and routes around it." Accordingly, I have broken the files down into FDR1.txt --> FDR8.txt, so that the lack of AOL'ers competent enough to seriously piss off list members would not lead to VeteranAryan CypherPunks forgetting about the GoodOldDays (TM), when we had Sandy Sandfort to kick around for attempting to put a stop to this kind of bullshit. Sincerely, "Flame me, I dare you!" From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:16 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:13:16 -0700 (PDT) Subject: FDR1 Message-ID: <009C9C7C.0C6CD880.1@west.cscwc.pima.edu> As to the President, it is an account of an image projected upon the popular mind which came to be known as Franklin D. Roosevelt. It is the author's conviction that this image did not at all correspond to the man himself and that it is now time to correct the lineaments of this synthetic figure created by highly intelligent propaganda, aided by mass illusion and finally enlarged and elaborated out of all reason by the fierce moral and mental disturbances of the war. The moment has come when the costumes, the grease paint, the falsely colored scenery, the technicolored spotlights and all the other artifices of makeYDup should be put aside and, in the interest of truth, the solid facts about the play and the players revealed to the people. July, 1948 Preface to the Popsvox PublishingR edition Someone once said that Washington DC is a place where history is taken for granted and granite mistaken for history. The new FDR "memorial" is notable for what it forgets. John T. Flynn, active columnist and author throughout the Roosevelt years and beyond, made an enormous contribution to accurate reporting and genuine understanding of the New Deal. Unfortunately, Flynn's work has been out of print for decades while the politically correct elite have not only preserved the myth, they have now literally cast it in stone. Do not despair. The technology of the information age provides a remedy. Flynn is back, facts, footnotes and all, and in an electronically enhanced form unimagined in the age when journalists scribbled on notepads with pencil stubs. As a MicrosoftR WindowsR help file, it can be searched, annotated, printed out . . . or even read, page by pungent page. Even better for students, editorialists or online newsgroup debaters, the electronic version is only a mouse-click away when a citation is needed. No more flipping through paper texts in search of a passage about the Democratic National Committee or the $3,000.000 income Eleanor took down as First Lady. Find what you want when you want it. Add your own annotations and memory joggers. Tools are the human heritage, as are words and ideas. This revived book is produced for the Historical Research Foundation in New ork whose mission is the conservation of truth in history. - Ed. Saturday morning, March 4, 1933...the conquering Democrats poured into the city, hastening to take over after so many hungry years in the wilderness. {Hitler/1933?-sog} Only a week before an assassin's bullet had barely missed Roosevelt. It struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with Al Smith, had opposed Roosevelt's nomination. he got the bullet intended for Roosevelt {BIG Assumption - sog}and died a few days later. Later, as Roosevelt's train sped from New ork to Washington carrying himself and his family, word came to him that aboard another train carrying the 65YDyearYDold Senator Thomas J. Walsh and his bride of two days, the aged groom dropped dead in his Pullman drawing room. He was speeding to the capital to be sworn in as Attorney General. Two weeks before the lameYDduck Congress had turned a somersault and voted the amendment to the Constitution ending Prohibition. FortyYDone legislatures were in session waiting eagerly for the chance to approve the wet amendment and to slap taxes on beer and liquor to save their empty treasuries. The country, the states, the towns needed money YD something to tax. And liquor was the richest target. "Revenue," said one commentator, "unlocked the gates for Gambrinus and his foaming steed." first of all, let me assert my firm belief that the only thing we have to fear is fear itself." "The means of exchange are frozen in the streams of trade." "et our distress comes from no failure of substance. We are stricken by no plague of locusts3,300,000,000 YD in addition to all the other specific appropriations for government, into his hands to be spent at his sweet will in any way he desired. The great purse YD which is the greatest of all the weapons in the hands of a free parliament to oppose the extravagances of a headstrong executive YD had been handed over to him. The "spendthrift" Hoover was in California at his Palo Alto home putting his own affairs in order, while the great Economizer who had denounced Hoover's deficits had now produced in 100 days a deficit larger than Hoover had produced in two years. Roosevelt had no wish to stem the panic. The onrushing tide of disaster was sweeping the slate clean for him YD at the cost of billions to investors and depositors. The greater the catastrophe in which Hoover went out of power the greater would be the acclaim when Roosevelt assumed power. For this drastic decision there could be, of course, but one excuse, namely that Mr. Roosevelt had a definite plan and that such a plan could be better carried out with a full disaster. What, then, was his plan? We shall see presently.4 the crisis had assumed a terrifying aspect. To this was added the fear of inflation and of irresponsible and even radical measures by the new President. One of these, of course, was the agitation which went on behind the scenes for the nationalization of the whole banking system. Men close to the President-elect were known to be for this. Then Glass asked Roosevelt what he was going to do. To Glass' amazement, he answered: "I am planning to close them, of course." Glass asked him what his authority was and he replied: "The Enemy Trading Act" YD the very act Hoover had referred to and on which Roosevelt had said he had no advice from Cummings as to its validity. Glass protested such an act would be unconstitutional and told him so in heated terms. "Nevertheless," replied Roosevelt, "I'm going to issue a proclamation to close the banks." After delivering his inaugural address, Roosevelt issued a proclamation closing all banks. They decided that the action must be swift and staccato for its dramatic effect; that the plan, whatever it might be, must be a conservative one, stressing conventional banking methods and that all leftYDwing presidential advisers must be blacked out during the crisis; and finally that the President must make almost at the same time a tremendous gesture in the direction of economy. w it is difficult to believe that it could ever have been uttered by a man who before he ended his regime would spend not merely more money than President Hoover, but more than all the other 31 Presidents put together YD three times more, in fact, than all the Presidents from George Washington to Herbert Hoover. This speech was part of the plan Moley and Woodin had devised to sell the banking plan in a single package with the great economy program. To the great audience that listened to the fireside chat, the hero of the drama YD the man whose genius had led the country safely through the crisis of the banks YD was not any of the men who had wrestled with the problem, but the man who went on the radio and told of the plan he did not construct, in a speech he did not write. Thus Fate plays at her ageYDold game of creating heroes. a Great Man attended by a Brain Trust to bring understanding first and then order out of chaos. Actually there are no big men in the sense in which Big Men are sold to the people. There are men who are bigger than others and a few who are wiser and more courageous and farseeing than these. But it is possible with the necessary pageantry and stage tricks to sell a fairly bright fellow to a nation as an authentic BIG Man. Actually this is developing into an art, if not a science. It takes a lot of radio, movie, newspaper and magazine work to do it, but it can be done. {FDR/Hitler - sog} For the farmer the New Deal would encourage cooperatives and enlarge government lending agencies. But the greatest enemy of the farmer was his habit of producing too much. His surplus ruined his prices. The New Deal would contrive means of controlling the surplus and ensuring a profitable price. As for business the New Deal proposed strict enforcement of the antiYDtrust laws, full publicity about security offerings, regulation of holding companies which sell securities in interstate commerce, regulation of rates of utility companies operating across state lines and the regulation of the stock and commodity exchanges. Roosevelt in his preelection speeches had stressed all these points YD observing the rights of the states so far as to urge that relief, oldYDage pensions and unemployment insurance should be administered by them, that the federal government would merely aid the states with relief funds and serve as collection agent for social insurance. First of all, his central principle YD his party's traditional principle of war upon BIG government YD was reversed. And he set out to build a government that in size dwarfed the government of Hoover which he denounced. The idea of a government that was geared to assist the economic system to function freely by policing and preventive interference in its freedom was abandoned for a government which upon an amazing scale undertook to organize every profession, every trade, every craft under its supervision and to deal directly with such details as the volume of production, the prices, the means and methods of distribution of every conceivable product. This was the NRA. It may be that this was a wise experiment but it was certainly the very reverse of the kind of government which Mr. Roosevelt proposed in his New Deal. Enforcement of the antiYDtrust act was a longtime pet of his party and it was considered as an essential instrument to prevent cartels and trusts and combinations in restraint of trade which were supposed to be deadly to the system of free enterprise. The New Deal had called loudly for its strict enforcement. et almost at once it was suspended YD actually put aside during the experiment YD in order to cartelize every industry in America on the Italian corporative model. {Fascism! - sog} First, and most important, was the NRA and its dynamic ringmaster, General Hugh Johnson. As I write, of course, Mussolini is an evil memory. But in 1933 he was a towering figure who was supposed to have discovered something worth study and imitation by all world artificers everywhere. The NRA provided that in America each industry should be organized into a federally supervised trade association. It was not called a corporative. It was called a Code Authority. But it was essentially the same thing. These code authorities could regulate production, quantities, qualities, prices, distribution methods, etc., under the supervision of the NRA. This was fascism. The antiYDtrust laws forbade such organizations. Roosevelt had denounced Hoover for not enforcing these laws sufficiently. Now he suspended them and compelled men to combine. In spite of all the fine words about industrial democracy, people began to see it was a scheme to permit business men to combine to put up prices and keep them up by direct decree or through other devious devices. The consumer began to perceive that he was getting it in the neck. . A tailor named Jack Magid in New Jersey was arrested, convicted, fined and sent to jail. The crime was that he had pressed a suit of clothes for 35 cents when the Tailors' Code fixed the price at 40 cents. The price was fixed not by a legislature or Congress but by the tailors. The NRA was discovering it could not enforce its rules. Black markets grew up. Only the most violent police methods could procure enforcement. In Sidney Hillman's garment industry the code authority employed enforcement police.8 They roamed through the garment district like storm troopers. They could enter a man's factory, send him out, line up his employees, subject them to minute interrogation, take over his books on the instant. Night work was forbidden. Flying squadrons of these private coatYDandYDsuit police went through the district at night, battering down doors with axes looking for men who were committing the crime of sewing together a pair of pants at night. But without these harsh methods many code authorities said there could be no compliance because the public was not back of it. "Mob rule and racketeering had a considerable degree displaced orderly government."9 On May 27, 1935, the Supreme Court, to everybody's relief, declared the NRA unconstitutional. It held that Congress at Roosevelt's demand had delegated powers to the President and the NRA which it had no right to delegate YD namely the power to make laws. It called the NRA a Congressional abdication. And the decision was unanimous, Brandeis, Cardozo and Holmes joining in it. But of course he had imposed it not as a temporary expedient but as a new order and he boasted of it. He had done his best to impose the dissolution of the antiYDtrust laws on the country. Curiously enough, while Wallace was paying out hundreds of millions to kill millions of hogs, burn oats, plow under cotton, the Department of Agriculture issued a bulletin telling the nation that the great problem of our time was our failure to produce enough food to provide the people with a mere subsistence diet. Oliphant was a lawyer whose reformist addictions overflowed into every branch of public affairs. A devout believer in rubber laws, it was easy for him to find one which could be stretched to include rubber dollars. We are thus continuing to move toward a managed currency." Roosevelt's billions, adroitly used, had broken down every political machine in America. The patronage they once lived on and the local money they once had to disburse to help the poor was trivial compared to the vast floods of money Roosevelt controlled. And no political boss could compete with him in any county in America in the distribution of money and jobs. The poll indicated that Long could corral 100,000 voted in New ork State, which could, in a close election, cost Roosevelt the electoral vote there. Long became a frequent subject of conversation at the White House. Dr. Carl Austin Weiss, a young physician, eluded the vigilance of Long's guards and shot him. " A monument stands to the memory of this arch demagogue in the Hall of Fame of the Capitol building in Washington and his body rests in a crypt on the state capitol grounds YD a shrine to which crowds flock every day to venerate the memory of the man who trampled on their laws, spat upon their traditions, loaded them with debt and degraded their society to a level resembling the plight of a European fascist dictatorship. The Treasury and the Department of Justice went into action and before long there were income tax indictments against at least 25 of the Long leaders and henchmen. When little men think about large problems the boundary between the sound and the unsound is very thin and vague. And when some idea is thrown out which corresponds with the deeply rooted yearnings of great numbers of spiritually and economically troubled people it spreads like a physical infection and rises in virulence with the extent of the contagion. The spiritual and mental soil of the masses near the bottom of the economic heap was perfect ground for all these promisers of security and abundance. They had cooked up for themselves that easy, comfortable potpourri of socialism and capitalism called the Planned Economy which provided its devotees with a wide area in which they might rattle around without being called Red. But the time would come when they would approach much closer to their dream of a planned people. We shall see that later. He was a man literally without any fundamental philosophy. The positions he took on political and economic questions were not taken in accordance with deeply rooted political beliefs but under the influence of political necessity. NRA and the AAA. This was a plan to take the whole industrial and agricultural life of the country under the wing of the government, organize it into vast farm and industrial cartels, as they were called in Germany,as they were called in Italy, and operate business and the farms under plans made and carried out under the supervision of government. As for the Reds, they did not move in heavily until the second term and not en masse until the third term, although the entering wedge was made in the first. And then the point of entry was the labor movement. This thing called revolutionary propaganda and activity is something of an art in itself. It has been developed to a high degree in Europe where revolutionary groups have been active for half a century and where Communist revolutionary groups have achieved such success during the past 25 years. It was, at this time of which I write, practically unknown to political and labor leaders in this country and is still unknown to the vast majority of political leaders. He vetoed that but had an arrangement with the Democratic leadership that they would pass it over his head. Thus the President could get credit for trying to kill it while the Democrats would get credit for actually passing it. Their chief reliance was upon the charge that the President had usurped the powers of Congress, attacked the integrity of the courts, invaded the constitutional prerogatives of the states, attempted to substitute regulated monopoly for free enterprise, forced through Congress unconstitutional laws, filled a vast array of bureaus with swarms of bureaucrats to harass the people and breed fear in commerce and industry, discourage new enterprises and thus prolonged the depression, had used relief to corrupt and intimidate the voters and made appeals to class prejudice to inflame the masses and create dangerous divisions. Their chief reliance was upon the charge that the President had usurped the powers of Congress, attacked the integrity of the courts, invaded the constitutional prerogatives of the states, attempted to substitute regulated monopoly for free enterprise, forced through Congress unconstitutional laws, filled a vast array of bureaus with swarms of bureaucrats to harass the people and breed fear in commerce and industry, discourage new enterprises and thus prolonged the depression, had used relief to corrupt and intimidate the voters and made appeals to class prejudice to inflame the masses and create dangerous divisions. . From the moment the gavel fell to open that wild conclave to the knock of the adjourning gavel everything that was said and done or that seemed to just happen was in accordance with a carefully arranged and managed scenario. The delegates were mere puppets and answered to their cues precisely like the extras in a movie mob scene. the South had both arms up to its shoulder blades in Roosevelt's relief and public works barrel. National politics was now paying off in the South in terms of billions. When Alf Landon talked about Roosevelt's invasions of the Constitution, the man on relief and the farmer fingering his subsidy check replied "ou can't eat the Constitution." As to the public debt he said we borrowed eight billions but we have increases the national income by 22 billions. Would you borrow $800 a year if thereby you could increase your income by $2200, he asked. That is what we have done, he answered, with the air of a man who has easily resolved a tough conundrum. And though the figures were false and the reasoning even more so it was practically impossible for a Republican orator to reason with voters against these seemingly obvious and plausible figures. The President's victory was due to one thing and one thing only, to that one great rabbit YD the spending rabbit YD he had so reluctantly pulled out of his hat in 1933. This put into his hands a fund amounting to nearly 20 billion dollars with which he was able to gratify the appetites of vast groups of people in every county in America . Without the revival of investment there could be no revival of the economic system. The system was being supported by government spending of borrowed funds. Roosevelt's unwillingness to compromise now angered his own supporters who were being forced to carry this unpopular cause. In the end he had to assure Robinson that he would have the appointment, and then to crown Roosevelt's difficulties, Robinson was stricken with a heart attack in the Senate and died shortly after, alone in his apartment. The Treasury made a practice of keeping tricky books and producing phony results. It had merely shifted relief payments to other accounts. They were, in fact, larger than the year before. Then he revealed the extent of his plans YD they would have to step up spending, forget about balancing the budget and get along with a two or three billion dollar a year deficit for two years. Then a conservative would come into office. That administration would do what Roosevelt had been promising he would do YD quit government spending. And then the whole thing would go down in a big crash. Then he revealed the extent of his plans YD they would have to step up spending, forget about balancing the budget and get along with a two or three billion dollar a year deficit for two years. Then a conservative would come into office. That administration would do what Roosevelt had been promising he would do YD quit government spending. And then the whole thing would go down in a big crash. What could he spend on? That was the problem. There is only a limited number of things on which the federal government can spend. The one big thing the federal government can spend money on is the army and navy. The depression which assaulted our unprepared society in 1929 was by no means a mysterious phenomenon to those who had given any attention to the more or less new studies in the subject of the business cycle. It was, first of all and essentially, one of those cyclical disturbances common to the system of private enterprise. That economic system has in it certain defects that expose it at intervals to certain maladjustments. And this was one of those intervals. Had it been no more than this it could have been checked and reversed in two or three years. But this cyclical depression was aggravated by additional irritants: 1. The banking system had been gravely weakened by a group of abuses, some of which arose out of the cupidity of some bankers and others out of ignorance. 2. A wild orgy of speculation had intruded into the system stimulated by a group of bad practices in the investment banking field. 3. A depression in Europe arising out of special causes there had produced the most serious repercussions here. The great, central consequence of these several disturbances was to check and then almost halt completely, the flow of savings into investment. All economists now know what few, apparently, knew then YD that in the capitalist system, power begins in the payments made by employers to workers and others in the process of producing goods. And this must be constantly freshened by an uninterrupted flow of savings into investment YD the creation of new enterprises and the expansion of old ones. If this flow of savings into investment slows down the whole economic system slows down. If it is checked severely the whole economic system goes into a collapse. throughout Hoover's term one of these YD the ruthless operation of gamblers in the stock market with the dangerous weapon of short selling YD continued to add at intervals spectacular crashes in the market which intensified the declining confidence of the people. But Hoover had against him, in addition to those natural, international and social disturbances, an additional force, namely a Democratic House of Representatives which set itself with relentless purpose against everything he attempted to do from 1930 on. It had a vested interest in the depression. and generally to do all those things he had denounced in Hoover without the slightest foundation for the charges. It was always easy to sell him a plan that involved giving away government money. It was always easy to interest him in a plan which would confer some special benefit upon some special class in the population in exchange for their votes. He was sure to be interested in any scheme that had the appearance of novelty and he would seize quickly upon a plan that would startle and excite people by its theatrical qualities. He did not dream of the incredible miracle of government BANK borrowing. He did not know that the bank lends money which it actually creates in the act of making the loan. When Roosevelt realized this, he saw he had something very handy in his tool kit. He could spend without taxing people or borrowing from them, while at the same time creating billions in bank deposits. Wonderful! Roosevelt discovered what the Italian Premier Giolitti had discovered over 50 years before, that it was not necessary to buy the politicians. He bought their constituents with borrowed money and the politicians had to go along. Those who, in their poverty and helplessness, refused to surrender their independence, paid for it. A man in Plymouth, Pa., was given a whiteYDcollar relief job before election at $60.50 a month. He was told to change his registration from Republican to Democratic. He refused and very soon found himself transferred YD transferred from his whiteYDcollar job to a pickYDaxe job on a rock pile in a quarry. There he discovered others on the rock pile who had refused to change their registration. This was in America, the America of the men who were chanting and crooning about liberty and freedom 365 days a year, who were talking about democracy and freedom for all men everywhere. These primaries of 1938, of course, were the scenes of the great Roosevelt purge, when distinguished Democratic senators and congressmen were marked for annihilation. It had already become a crime for a Democrat to disagree with the administration From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:35 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:13:35 -0700 (PDT) Subject: FDR2 Message-ID: <009C9C7C.1770AB80.5@west.cscwc.pima.edu> They were eager for America to get into a war if it came. But they felt the people had to be drawn along a little at a time. They wanted the President to frighten the people a little as a starter. But he increased the recommended dose. The reaction was so violent that they felt it put back by at least six months the purpose they had in mind YD rousing America to a warlike mood. However, following the Panay incident, Mr. Hull began to churn up as much war spirit as possible and through the radio and the movies frantic efforts were made to whip up the anger of the American people. There never has been in American politics a religion so expansively and luminously righteous as the New Deal. >From the beginning to the end it was constant in one heroic enterprise YD war to the death upon evil, upon greed, poverty and oppression. It had, in fact, one monstrous enemy against which it tilted its shining spear seven days a week and that was SIN. If you criticized the New Deal, you were for sin. There is no vast sum of money in holding office. The riches are in the perquisites, the graft, legal and illegal, often collected by men who do not hold office but who do business with those who do. Some Democratic chieftains of the newer stripe began to drift into vice rackets of various sorts. It was this Tammany at its lowest level which surrendered to the New Deal and became finally the political tool of Mr. Roosevelt in New ork. From an oldYDfashioned political district machine interested in jobs and patronage, living on the public payroll and on various auxiliary grafts, some times giving a reasonably good physical administration of the city government, some times a pretty bad one, some times very corrupt, some times reasonably honest, it became a quasiYDcriminal organization flying the banner of the Free World and the Free Man. Cermak fought Roosevelt's nomination at Chicago, and went to Miami in February, 1933 to make his peace with Roosevelt where the bullet intended for Roosevelt killed him. {Who fired the shot? - sog} d before the House Committee Investigating UnYDAmerican Activities. Frey, in a presentation lasting several days, laid before the Committee a completely documented account of the penetration of the CIO by the Communist Party. He gave the names of 280 organizers in CIO unions It was the Communists who were engineering the sitYDdown strikes and who instigated and organized the Lansing Holiday when a mob of 15,000 blockaded the state capitol and 2,000 of them, armed with clubs, were ordered to march on the university and bring part of it back with them. At the Herald Tribune forum in New ork City about this time the President delivered one of the bitterest attacks he had ever made on a government official. It was against Martin Dies for investigating these Communist influences in the sitYDdown strikes. Sidney Hillman would become not only its dominating mind but Roosevelt's closest adviser in the labor movement and in the end, though not himself a Democrat, the most powerful man in the Democratic party. Sidney Hillman28 was born in Zargare, Lithuania, then part of Russia, in 1887. He arrived here in 1907 after a brief sojourn in England. it is entirely probable that Hillman, while not a Communist, was at all times sympathetic to the Communist philosophy. He was a revolutionist It is certain that the Russian revolution set off a very vigorous flame in Hillman's bosom. In 1922 he hurried over to Russia with a plan. He had organized here what he called the RussianYDAmerican Industrial Corporation with himself as president. Its aim was to operate the "textile and clothing industry of Russia." Hillman's corporation sold to labor organizations at $10 a share a quarter of a million dollars of stock. The circular letter of the corporation soliciting stock sales among labor unions said: "It is our paramount moral obligation to help struggling Russia get on her feet." Hillman went to Russia to sell the idea to Lenin. He cabled back from Moscow: "Signed contract guarantees investment and minimum 8 per cent dividend. Also banking contract permitting to take charge of delivery of money at lowest rate. Make immediate arrangements for transmission of money. Had long conference with Lenin who guaranteed Soviet support." Hillman was never an outright exponent of Communist objectives. He was, however, deeply sympathetic to the Communist cause in Russia and to the extreme leftYDwing ideal in America, but he was an extremely practical man who never moved upon any trench that he did not think could be taken. He never pressed his personal philosophy into his union and his political activities any further than practical considerations made wise. He was a resolute man who shrank from no instrument that could be used in his plans. He was a cocksure, selfYDopinionated man and he was a bitter man, relentless in his hatreds. He had perhaps one of the best minds in the labor movement YD sharp, ceaselessly active and richly stored with the history and philosophy of the labor struggle and of revolutionary movements in general. When Lewis and Dubinsky at a later date would leave the CIO, Hillman would be supreme and would reveal somewhat more clearly the deep roots of his revolutionary yearnings that had been smothered for a while under the necessities of practical leadership. There is no doubt that Hillman was one of the first labor leaders to use the goon as part of his enforcement machinery. Why should LaGuardia want to scuttle the investigation of a notorious murder? Why should the President of the United States refuse to deliver Lepke to Dewey and thus save him from going to the chair? Why save the life of a man convicted as the leader of a murder syndicate? Who was the leading politician supposed to be involved? Who was the nationally known labor leader? The murder for which Lepke was convicted and wanted for execution by Dewey and shielded by Roosevelt was, as we have seen, that of Joseph Rosen. Rosen was a trucking contractor who was hauling to nonYDunion factories in other states for finishing, clothing cut under union conditions in New ork. He was put out of business by Lepke in the interest of a local of Hillman's Amalgamated and Rosen was threatening to go to the district attorney and tell how this was done. But for some reason there rose to the surface at this time a lawless element, some of them criminal, some of them lawless in the excess of their revolutionary zeal, some of them just plain grafters. And these elements constituted the most powerful section of those groups that were supporting the President. This was in no sense the Army of the Lord, as it was so widely advertised. He wanted ambassadors from their own countries to tell them that other governments were "looking to Roosevelt as the savior of the world," as he put it himself. Farley admits this was done and says it was a mistake and that he said so at the time. With the rise of the New Deal, however, a vast army of persons appeared on the payroll of the federal government and because some of the payrolls were flexible and had no connection whatever with the Civil Service, it was a simple matter for the government to use this ancient but now enormously enhanced tool to control votes in particular localities. The story of the third term campaign which we shall now see is the story of dealing with all these groups, and the feasibility of doing so successfully was enormously enhanced by the fact that in September, 1939, just about the time the active work for the coming convention was under way, Hitler marched into Poland. {Just happens to fit right in with Planned Government/Economy - sog} On July 17, 1940, Franklin D. Roosevelt was nominated for the presidency for the third time. The prologue to this event was supplied by Europe. When the convention met, Willkie seemed the most unlikely of these candidates, but his strength grew. Dewey was eliminated on the fourth ballot and on the sixth, in a contest between Taft and Willkie, the latter was nominated in one of the most amazing upsets in convention history. The Democrats believed that Willkie would make a formidable opponent. But from the moment he was nominated the result of the election could no longer be in doubt. Charles McNary, Republican leader in the Senate, was nominated for the vice presidency. The joining of these two men YD Willkie and McNary YD was so impossible, they constituted so incongruous a pair that before the campaign ended McNary seriously considered withdrawing from the race. There was a moment in that convention when one voice was lifted in solemn warning, the full meaning of which was utterly lost upon the ears of the delegates. Former President Hoover, in a carefully prepared address, talked about the "weakening of the structure of liberty in our nation." He talked of Europe's hundredYDyear struggle for liberty and then how Europe in less than 20 years surrendered freedom for bondage. This was not due to Communism or fascism. These were the effects. "Liberty," he said, "had been weakened long before the dictators rose." Then he named the cause: "In every single case before the rise of totalitarian governments there has been a period dominated by economic planners. Each of these nations had an era under starryYDeyed men who believed that they could plan and force the economic life of the people. They believed that was the way to correct abuse or to meet emergencies in systems of free enterprise. They exalted the State as the solvent of all economic problems. These men shifted the relation of government to free enterprise from that of umpire to controller. Directly or indirectly they politically controlled credit, prices, production or industry, farmer and laborer. They devalued, pumpYDprimed and deflated. They controlled private business by government competition, by regulation and by taxes. They met every failure with demands for more and more power and control ... societies oneYDfourth socialist, threeYDfourths capitalist, administered by socialist ministries winding the chains of bureaucratic planning around the strong limbs of private enterprise. Mr. Hoover then undertook to describe the progress of this baleful idea here in a series of headlines: Vast Powers to President; Vast Extension of Bureaucracy; Supreme Court Decides Against New Deal; Attack on Supreme Court; Court Loaded with Totalitarian Liberals; Congress Surrenders Power of Purse by Blank Checks to President; Will of Legislators Weakened by Patronage and Pie; Attacks on Business Stirring Class Hate; Pressure Groups Stimulated; Men's Rights Disregarded by Boards and Investigations; Resentment at Free Opposition; Attempts to Discredit Free Press. e State Planned and Managed Capitalism Roosevelt executed a political maneuver that beyond doubt caused great embarrassment to the Republicans. He announced the appointment of Henry L. Stimson, who had been secretary of State under President Hoover, as Secretary of War, and Frank Knox, candidate for vice president with Landon in 1936, as Secretary of the Navy. He was laying his plans cunningly to have himself "drafted." The movement began some time in 1939 and the leaders in it were Ed Kelly of Chicago and Frank Hague of New Jersey. The debacle was the plan Roosevelt was engineering to literally put the party out of business by inducing its leaders not to contest his election. Commentators like Dorothy Thompson and H.V. Kaltenborn and other proYDwar writers were calling on the Republicans not to contest the election. And Roosevelt schemed to induce the presidential candidates of the party in 1936 to become Secretaries of War and Navy respectively in his cabinet. Wallace He has been pictured as a vague and impractical mystic, half scientist, half philosopher, with other ingredients that approach the pictures in the comic strips of the professor with the butterfly net. Wallace brought men like Tugwell into the Department as his UnderYDSecretary of Agriculture To understand what made this thoroughly dangerous man tick it is necessary to look at another widely advertised side of his nature YD his interest in mysticism. Some time in the 'twenties, a gentleman by the name of Nicholas Constantin Roerich appeared on the American scene. Roerich was a highly selfYDadvertised great philosopher on the Eastern Asiatic model. He gathered around himself a collection of admirers and disciples who addressed him as their "Guru" YD a spiritual and religious person or teacher. He dispensed to them a philosophic hash compounded of pseudoYDogism and other Oriental occult teachings that certain superior beings are commissioned to guide the affairs of mankind. Roerich wrote a long string of books YD "In Himalaya," "Fiery Stronghold," "Gates Into the Future," "The Art of Asia," "Flame in Chalice," "Realm of Light." Logvan and Logdomor were the names by which Horch was known in this mystic circle. stories in English language newspapers in China indicated that Roerich applied to the 15th U.S. Infantry in Tientsin for rifles and ammunition and that the expedition had mysterious purposes. He cried out in ecstasy in a speech: "The people's revolution is on the march and the devil and all his angels cannot prevail against it. They cannot prevail because on the side of the people is the Lord." Now he was fighting not George Peek and Hugh Johnson and Harold Ickes. He was fighting the devil and the bad angels. And he had on his side the lord, Franklin D. Roosevelt, and the good angels YD the Democrats and the CIO and, in good time, he would be joined by Joe Stalin and Glen Taylor, the singing Senator from Idaho. He would begin making world blueprints YD filling all the continents with TVAs, globeYDcircling sixYDlane highways, world AAAs, World Recovery Administrations, World Parliaments and International Policemen. This was the man chosen for Vice President by Roosevelt who had warned that his health was not too good and who forced this strange bird upon his party in the face of a storm of angry protest. . One of Roosevelt's early acts in foreign affairs was to recognize Soviet Russia. Three months later YD February 28, 1934 YD Elliott went into a deal with Anthony Fokker to sell the Soviet government 50 military planes for a price which would leave a commission of half a million dollars for Elliott and the same for Fokker It is estimated that she has received during the 15 years since she entered the White House at least three million dollars YD which is not very bad for a lady who had no earning power whatever before she moved her desk into the Executive Mansion, a lady whose husband spent a good deal of time denouncing the greed of men who made less for directing some of the greatest enterprises in America.17 Nevertheless, in spite of these defiances of all the amenities, all the laws imposed by decency, all the traditional proprieties and all that body of rules which highYDminded people impose upon themselves, the Roosevelt family, through a carefully cultivated propaganda technique not unlike that which is applied to the sale of quack medicines, imposed upon the American people the belief that they were probably the most highYDminded beings that ever lived in the White House. Behind this curtain of moral grandeur they were able to carry on in the field of public policy the most incredible programs which our people, unaccustomed to this sort of thing, accepted because they believed these plans came out of the minds of very noble and righteous beings. Why did the President permit his wife to carry on in this fantastic manner and why did the Democratic leaders allow her to do it without protest? ou may be sure that whenever you behold a phenomenon of this character there is a reason for it. The reason for it in this case was that Mrs. Roosevelt was performing an important service to her husband's political plans. There were never enough people in the country belonging to the more or less orthodox Democratic fold to elect Mr. Roosevelt. It was necessary for him to get the support of groups outside this Democratic fold. In the election of 1944, Governor Dewey got nearly half a million votes more on the Republican ticket than Roosevelt got on the Democratic ticket, but Roosevelt was the candidate of two other parties YD the American Labor Party of the Communists and the Liberal Party which was a collection of parlor pinks, technocrats, pious fascists and American nonYDStalinist Communists. These two parties gave him over 800,000 votes and it was this that made up his majority in New ork. The same thing was true in Illinois, in New Jersey, Connecticut, Massachusetts, and other large industrial states, although the fact was not so obvious because the radicals operated inside the Democratic party where they could not be so easily identified. It was in this field that Mrs. Roosevelt performed her indispensable services to the President. It was she who fraternized with the Reds and the pinks, with the RedYDfascists and the technocrats and the crackpot fringe generally, gave them a sense of association with the White House, invited their leaders and their pets to the White House and to her apartment in New ork, went to their meetings, endorsed their numerous front organizations Finally in 1899 when she was 15 years old she was sent to a school called Allenwood, outside of London. It was a French school kept by an old pedagogist named Madame Souvestre who has taught Eleanor's aunt in Paris before the FrancoYDPrussian war After Roosevelt was stricken with infantile paralysis in 1921, she suddenly found herself for the first time in her life in a position approaching power on her own feet. While she, with her rather stern sense of formal responsibility, made every effort to bring about her husband's recovery, she also saw the necessity of keeping alive his interests in public affairs and his contacts and she set herself about that job. She had already fallen into acquaintance with leftYDwing labor agitators and she brought these people as frequently as she could to her imprisoned husband where they proceeded to work upon a mind practically empty so far as labor and economic problems were concerned. The moment a person of Mrs. Roosevelt's type exposes herself to these infections, the word gets around radical circles, whose denizens are quick to see the possibilities in an instrument of this kind. During Roosevelt's term in Albany she was extensively cultivated by these groups, so that when she went to Washington in 1933 they had easy and friendly access to her. I think it must be said for her that at this point YD in 1933 YD the country, including its public men, were not too well informed about the peculiar perils involved in Red propaganda activities. The Reds seized upon three or four very popular American democratic cults YD (1) freedom of speech, (2) the defense of the downtrodden laborer YD the forgotten man, (3) the succor of the poor. They also began to penetrate the colleges in both the teaching staffs and the student bodies through their various front organizations dominated by Reds. The first attempt to expose these designs was made by the House Committee on UnYDAmerican Activities. The attacks upon Martin Dies and the Dies Committee, as it was known, were engineered and carried out almost entirely by the Communist Party. But the Communist Party itself was powerless to do anything effective and it used some of the most powerful and prominent persons in the country to do its dirty work {Does this not also apply to all other organizations/religions? - sog} oung Communist League and a group of workers including William W. Hinckley (Roosevelt/Cremac - Reagan/Brady -- 2 Hinkleys? - sog} . Here was the wife of the President of the United States, a separate department of the government, using the White House as a lobbying ground for a crowd of young Commies and Pinkies against a committee of Congress.19 At this very moment, Joe Lash was living in the White House as Mrs. Roosevelt's guest, while Joe Cadden and Abbot Simon were occasional boarders there. . Joe Lash had been the leader of the movement in the American Student Union. Lash worked in collaboration with the Communist Party. After this, the American Student Union became a mere tool of the Red organization in America. the assembled young philosophers gave the President and Mrs. Roosevelt a hearty Bronx cheer. And now, of course, Mrs. Roosevelt felt they were Communists, although she had rejected all of the overwhelming evidence before that. Booing the President suddenly turned them into Communists. . A member of Congress, and ardent New Dealer, visited the White House one morning. While there he saw Abbot Simon of the national board of the American outh Congress, come out of one of the bedrooms. He couldn't believe his eyes. He asked the White House usher if he was mistaken. The usher assured him he was not, that this little Commie tool had been occupying that room for two weeks and sleeping in the bed Lincoln had slept in. These are probably not more than 80,000 or 90,000 in number, if that. But there are several hundred thousand, perhaps half a million, men and women in America, but chiefly in New ork and the large eastern industrial states, who string along with the Communists without being members of the party. The President's father was a sixth generation Roosevelt who played out decently the role of a Hudson River squire. He was a dull, formal and respectable person moving very narrowly within the orbit set by custom for such a man. By 1900, however, the name Roosevelt had become a good one for promotional purposeyYYYY".Y~Y~^Y~SoY~Y~ Y-YYY~Y|Y~Y~cY~Y.Y*YDRY~YxYqY}Y~'YfY~YyY~Y~Yx Y/Y,Y+Y~Y(AAAAYYYYEYEEIIIIDNOOOOYxOUUUYY~YaYY YaYYYYY YYY Y !Y Y Y~Y$YY"YoYYvYmYY#YYypYs, because it had become illustrious by reason of Theodore Roosevelt who belonged to a very different branch of the family. On Franklin D. Roosevelt's mother's side there was certainly nothing distinguished in the blood. Her father was a crusty old China Sea trader and opium smuggler. The family had much of its fortune in soft coal mines Roosevelt was born and grew up in the midst of a baronial estate, surrounded by numerous acres and many servants and hemmed about with an elaborate seclusion. What sort of boy he was we do not know, save that he was carefully guarded from other boys and grew up without that kind of boyhood association usual in America. The only books that really interested him were books on the Navy, particularly old books such as appeal to a collector. He did amass a considerable library in this field. It is to be assumed he read many of them. But the history of the Navy and its battles is not the history of the United States or of Europe or of their tremendous and complex political and social movements. They never elected anybody. They offered the nomination to young Roosevelt and he took it reluctantly. But this was an auspicious year for the New ork Democrats. In 1912, with the Republicans split in the great TaftYDRoosevelt feud, the Democrats swept the country and Roosevelt, though in bed throughout the campaign with typhoid, was reelected State Senator. When Wilson entered the White House and someone suggested it would be a good idea to have a Democratic Roosevelt in the administration, Franklin Roosevelt was offered the post of Assistant Secretary of the Navy, When the First World War ended he was 36. Apparently his service in the Department was satisfactory, though I have never seen anywhere any authentic evidence about it one way or the other. Actually he was not very well known and had absolutely no record of his own to justify the nomination. But luck dogged his heels. {Luck/good fortune/auscpicious circumstances/ad infinitum - sog} Then in August, 1921 Roosevelt was stricken with infantile paralysis, which put an end to his career in politics for the next seven years. During his Harvard days, shortly after his marriage, he and his bride took a trip to Europe YD a regular tourist's wandering from city to city. He had not been in Europe since save twice when he went as Assistant Secretary during the war on a naval inspection tour for about a month, and at the end of the war on another tour in connection with the demobilization of naval forces in Europe. et somehow his promotion managers whipped up the myth that he possessed some kind of intimate and close knowledge of Life up to this had been a long succession of gifts from Lady Luck, whose attendance he had come to think of as a settled and dependable affair. And she had failed him. The visitation of the terrible sickness had perhaps effaced from his character the assumption of superior fortune that made him hold his head so high In his efforts at recovery he had gone to Warm Springs, Ga., and spent several years there. But Warm Springs became the subject of one of the most curious deals in the nomination of a man to high office he said "one of the reasons he could not stand for governor was because he had put a great deal of his personal fortune into Warm Springs, and he felt he should stay and manage the enterprise so that it would eventually become a paying proposition." "Confirming my telephone message I wish much that I might consider the possibility of running for governor." Roosevelt then gave two reasons why he could not: (1) "our own record in New ork is so clear that you will carry the state no matter who is nominated" and (2) "My doctors are definite that the continued improvement in my condition is dependent on avoidance of a cold climate" and "daily exercise in Warm Springs during the winter months." He added: "As I am only 46 years old I owe it to my family and myself to give the present constant improvement a chance to continue ... I must therefore with great regret confirm my decision not to accept the nomination."31 {Roosevelt trying to 'back out' of his role as schill... -sog} Mrs. Roosevelt was in Rochester as a member of the Women's Committee for Al Smith. So were Ed Flynn and John J. Raskob, recently named chairman of the National Democratic Committee to manage Al Smith's campaign for the presidency. {...but Elanor is in deep. - sog} But Flynn told Smith that he believed Roosevelt could be induced to accept, that his health treatments were not the real reason for his refusal, that the real reason was the financial obligations he had outstanding at Warm Springs, that he was facing a heavy personal loss but that if this could be gotten out of the way he might yield. Smith told Flynn to tell Roosevelt they would take care of his financial problem. "I don't know how the hell we can do it, but we'll do it some way," he said.32 Flynn suggested that the problem be put up to Raskob. This was done. Smith asked Raskob to telephone Roosevelt. Raskob thought it over but decided to talk to Mrs. Roosevelt about it. He asked Mrs. Roosevelt for her frank opinion. She replied that if her husband were to say his health would permit him to run then Raskob could rely on it and that the real reason was the financial problem at Warm Springs. Everybody got the impression that Mrs. Roosevelt wanted her husband to run. Raskob then asked him to say frankly what they amounted to. Roosevelt replied: "Two hundred and fifty thousand dollars." Raskob then brought the whole matter to a head by saying: "All right. our nomination is important in New ork State. I am in this fight to get rid of Prohibition which I believe to be a terrible social curse and I think the only way to do it is to elect Al Smith. I am willing therefore to underwrite the whole sum of $250,000. ou can take the nomination and forget about these obligations. ou can have a fundYDraising effort and if it falls short of the total I will make up the difference." Roosevelt was a little flabbergasted at the offer. {Elanor was not? - sog} Roosevelt was built by propaganda, before the war on a small scale and after the war upon an incredible scale, into a wholly fictitious character YD a great magnanimous lover of the world, a mighty statesman before whom lesser rulers bowed in humility, a great thinker, a great orator YD one of the greatest in history YD an enemy of evil in all its forms. In his first administration someone was responsible for a very effective job of selling Roosevelt to the public. But over and above this some cunning techniques were industriously used to enhance the picture. For instance, Mrs. Roosevelt took over the job of buttering the press and radio reporters and commentators. They were hailed up to Hyde Park for hamburger and hot dog picnics. They went swimming in the pool with the Great Man. They were invited to the White House. And, not to be overlooked, it was the simplest thing in the world for them to find jobs in the New Deal for the members of their families. *** sog *** The most powerful propaganda agencies yet conceived by mankind are the radio and the moving pictures. Practically all of the radio networks and all of the moving picture companies moved into the great task of pouring upon the minds of the American people daily YD indeed hourly, ceaselessly YD the story of the greatest American who ever lived, breathing fire and destruction against his critics who were effectually silenced, while filling the pockets of the people with billions of dollars of war money. The radio was busy not only with commentators and news reporters, but with crooners, actors, screen stars, soap opera, comedians, fan dancers, monologists, putting over on the American mind not only the greatness of our Leader but the infamy of his critics, the nobility of his glamorous objectives and the sinister nature of the scurvy plots of his political enemies. The people were sold first the proposition that Franklin D. Roosevelt was the only man who could keep us out of war; second that he was the only man who could fight successfully the war which he alone could keep us out of; and finally that he was the only man who was capable of facing such leaders as Churchill and Stalin on equal terms and above all the only man who could cope successfully with the ruthless Stalin in the arrangements for the postYDwar world. *** sog *** The ordinary man did not realize that Hitler and Mussolini were made to seem as brave, as strong, as wise and noble to the people of Germany and Italy as Roosevelt was seen here. Hitler was not pictured to the people of Germany as he was presented here. He was exhibited in noble proportions and with most of those heroic virtues which were attributed to Roosevelt here and to Mussolini in Italy and, of course, to Stalin in Russia. I do not compare Roosevelt to Hitler. I merely insist that the picture of Roosevelt sold to our people and which still lingers upon the screen of their imaginations was an utterly false picture, was the work of false propaganda and that, among the evils against which America must protect herself one of the most destructive is the evil of modern propaganda techniques applied to the problem of government. {Eugenics was in vogue here, as well as Germany, and would have formed the science of the future *immediately* if Hitler had not been linked to its 'final outcome', giving it a bad name. - sog} There was really nothing complex about Roosevelt. He was of a wellYDknown type found in every city and state in political life. He is the wellYDborn, rich gentleman with a taste for public life, its importance and honors, who finds for himself a post in the most corrupt political machines, utters in campaigns and interviews the most pious platitudes about public virtue while getting his own dividends out of public corruption one way or another. e NRA Act provided an appropriation of $3,300,000,000 which the President was given to be spent for relief and recovery at his own discretion. He now had in his hands a sum of money equal to as much as the government had spent in ten years outside the ordinary expenses of government. He decided how it should be spent and where. If a congressman or senator wanted an appropriation for his district, instead of introducing a bill in Congress, he went up to the White House with his hat in his hands and asked the President for it. All over the country, states, cities, counties, business organizations, institutions of all sorts wanted projects of all kinds. Instead of going to Congress they went to the President. After that congressmen had to play along with the President or they got very little or nothing for their districts. This was the secret of the President's power, but it was also a tremendous blow at a very fundamental principle of our government which is designed to preserve the independence of the Congress from the Executive. In the same way, blankYDcheck legislation led to the subservience of Congress and the rise of the bureaucracy. Under our traditional system, Congress alone could pass laws. The executive bureau merely enforced the law. But now Congress began to pass laws that created large bureaus and empowered those bureaus to make "regulations" or "directives" within a wide area of authority. Under a law like that the bureau became a quasiYDlegislative body authorized by Congress to make regulations which had the effect of law. This practice grew until Washington was filled with a vast array of bureaus that were making laws, enforcing them and actually interpreting them through courts set up within the bureaus, literally abolishing on a large scale within that area the distinction between executive, legislative and judicial processes. Many of these bureaus were never even authorized by Congress. Even the Comptroller General of the United States, who audits the government's accounts, declared he had never heard of some of them. They were created by a new method which Roosevelt exploited. Instead of asking Congress to pass a law, set up a bureau and appropriate money, the President merely named a group of men who were authorized by him to organize a corporation under the laws of the states. This done, there was a government corporation instead of a bureau and a group of corporation directors instead of commissioners. The Reconstruction Finance Corporation was given a blanket appropriation by Congress and authority to borrow money. It borrowed twenty or more billions. The RFC would buy the stock of a new corporation and lend it money YD ten, fifty or a hundred million, billions in some cases. Thus the President bypassed Congress and the Constitution and engaged in activities as completely unconstitutional as the imagination can conceive, such as operating business enterprises in Mexico and Canada. By means of the blankYDcheck appropriations, the blankYDcheck legislation and the government corporation, there is no power forbidden to the government by the Constitution which it cannot successfully seize. And if these techniques are permitted to continue the Constitution will be destroyed and our system of government changed utterly without a vote of the people or any amendment to the Constitution. Roosevelt by his various hit or miss experiments all designed to get power into his hands, prepared a perfect blueprint for some future dictator of the modern school to usurp without very much difficulty all the powers he needs to operate a firstYDclass despotism in America. Having changed the Neutrality Act, given a million army rifles to England and increased the army to 1,500,000, the President took the next step YD he handed over to Britain 50 destroyers belonging to the American navy without authority of Congress. Those men and women who formed the various committees to induce this country to go into the war approved these moves. They were honest about it and logical, because they were saying openly we should give every aid, even at the risk of war. But the President was saying he was opposed to going to war and that he was doing these things to stay out of war. I do not here criticize his doing these things. I criticize the reason he gave, which was the very opposite of the truth. At the time he did these things, 83 per cent of the people month after month were registering their opposition to getting in the war. After the 1940 election, in fact early in 1941, the President's next decision was the LendYDLease proposal. Senator Burton K. Wheeler declared that this was a measure to enable the President to fight an undeclared war on Germany. The truth is that the President had made up his mind to go into the war as early as October, 1940. To believe differently is to write him, our naval chiefs of staff and all our high military and naval officers down as fools. The answer must be that Roosevelt lied to the people for their own good. And if Roosevelt had the right to do this, to whom is the right denied? At what point are we to cease to demand that our leaders deal honestly and truthfully with us? There must be a thorough philosophical inquiry into the limits within which this convenient discursive weapon can be used. It has been generally supposed that our diplomats are free to lie to foreign diplomats, also that in war and on the way into war we are free to lie ad libitum to the enemy. The right of the President YD and maybe certain lesser dignitaries YD to lie to our own people and, perhaps, in certain defined situations, to each other ought to be explored and settled. Thus it may be used impartially by the representatives of all parties. It does not seem fair to limit the right of lying only to good and truthful men. (TruthMonger Lives!!! - sog} President and the Prime Minister issued what they called a Joint Declaration. The most important parts of that document were the first three paragraphs: "First, their countries seek no aggrandizement, territorial or otherwise. "Second, they desire to see no territorial changes that do not accord with the freely expressed desires of the peoples concerned. "Third, they respect the right of all peoples to choose the form of government under which they will live and they wish to see sovereign rights and selfYDgovernment restored to those who have been forcibly deprived of them." From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:56 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:13:56 -0700 (PDT) Subject: FDR3 Message-ID: <009C9C7C.2368A280.7@west.cscwc.pima.edu> There was no reason for meeting at sea save the purely spectacular features which Roosevelt always loved. The dramatic effect of the meeting was very great. It made a thunderous radio story and massive headlines. But, as was so characteristic of Roosevelt, the great declaration of principles was a mere incident of the meeting. The purpose was wholly military. Three weeks after Pearl Harbor, Roosevelt sent for all the representatives in America of these occupied countries and said to them: "Be assured, gentlemen, that the restoration of the countries occupied by Germany and suffering under the Axis yoke is my greatest concern, which is shared in like degree by Mr. Churchill. We promise that all will be done to insure the independence of these countries." Churchill was present. He turned to the Polish Ambassador and said: "We will never forget what glorious Poland has done and is doing nor what heroic Greece and Holland have done in this war. I hope I need not add that Great Britain has set herself the aim of restoring full independence and freedom to the nations that have been overrun by Hitler." These reassurances were to be repeated many times with varying oratorical flourishes. And as for the "Atlantic Charter," which was nothing more than a screen to hide what had actually been done at Placentia Bay, a handsome copy of it was made, bearing the names of Churchill and Roosevelt, and placed on exhibition in the National Museum in Washington, where crowds viewed it with reverence as one of the great documents of history. . On November 27, just ten days before the attack, the President told Secretary Stimson, who wrote it in his diary, that our course was to maneuver the Japanese into attacking us. This would put us into the war and solve his problem. The Board of Economic Warfare was created to control the export of all materials seeking private export and to look after the procurement of all materials essential to the war effort, except arms and munitions. Vice President Wallace was named chairman of the Board of Economic Warfare (BEW). There was an element of "cloak and dagger" in this institution. It was at war with Hitler and Hirohito in the markets of the world. It bought things we needed. But it also bought, where necessary, things we did not need in order to preclude the enemy getting them. This was called "preclusive" buying. It issued thousands of export licenses every day. It was quite a bureau and it bulged with bureaucrats. At the top, next to Wallace, was a somewhat cheaper edition of Wallace YD an authentic New Deal bureaucrat, if there ever was one. He was Milo Perkins, executive director. Perkins was a man with a soul YD one of those souls that keeps making a lot of noise inside his body. He went in for art and music and finally Theosophy. The New Republic said of him that "for nine years at nine every Sunday morning, he donned his priestly robes, took along his sons and acolytes and preached to a congregation of fifty people." By 1943 the BEW had 200 economic commandos in the field fighting Hitler in the market places of the world and around 3,000 in Washington directing their weird operations Although this outfit spent $1,200,000,000, no law ever authorized it, and the Senate never confirmed the appointment of Wallace or Perkins. The President "grabbed the torch" and created it by edict. Of course, a great legion of economic soldiers had to have a chief economist. How they picked him I do not know. But these two great geopolitical warriors YD Wallace and Perkins YD came up with a gentleman named Dr. Maurice Parmalee, born in Constantinople. Parmalee wrote another book labeled "Bolshevism, Fascism and the Liberal Democratic State." In this he renders it feasible to introduce a planned social economy much more rapidly than has been the case in the U.S.S.R. ...The superficial paraphernalia of capitalism can be dispensed with more quickly than in the Soviet Union." But the doctor had strayed into much lighter fields of literature. He had also written a book called "Nudism in Modern Life" which is secluded in the obscene section of the Library of Congress. In it the doctor revealed his interest in a science called Gymnosophy, a cult of the old gymnosophists who it seems were ancient Hindu hermit philosophers who went around with little or no clothing. "these gymnosophist nudist colonies furnish excellent opportunities for experiments along socialist lines ... Customary nudity is impossible under existing undemocratic, social and economic and political organization." A new chief economist was brought in YD Dr. John Bovingdon. Bovingdon was no fool. He went to Harvard and graduated with honors, which is more than Mr. Roosevelt did. But he, too, was one of those free spirits of the wandering winds who had managed to live for a while in the Orient, three years in Europe and England, two years in Russia and for smaller terms in 22 other countries. His Harvard class reunion book said he "engaged in art activities, painting on fabrics, poetry, dancing, acting, consultant on the Moscow Art Theater, oneYDman commercial monodrama programs, weaving, sandalYDmaking" and so on. In 1931 the police in Los Angeles raided a Red pageant for a Lenin Memorial which Bovingdon was staging. The experience shook Mr. Bovingdon terribly and he went to Russia. He got a job in Moscow as a director of the International Theatre. He worked as a journalist in the world of free Russian speech, wrote radio scripts and plays. He decided to return to the United States to make us understand Russia. In January, 1938, he appeared in Long Beach, California, at the town's first "Communist Party celebration on the 14th anniversary of Lenin's death." By what curious movement of the stars did these weird ideological brothers turn up on posts of the greatest importance in the councils of the New Deal? As fast as one was pushed out another moved in. It could not be by chance, since this happened in practically every important bureau. {Can you say 'conspiracy?...sure you can... - sog} These two strange birds were not isolated cases. The UnYDAmerican Activities Committee gave Wallace a list of 35 Communists in the BEW. That information was merely brushed aside with some insulting smear against the Committee. It mattered not what the New Dealer touched, it became a torch to be grabbed, it became an instrument for use in his adventures in social engineering, and after June, 1941 when Hitler turned on his partner Stalin, these bureaus became roosting places for droves of Communist termites who utilized their positions as far as they dared to advance the interests of Soviet Russia and to help "dispense with the superficial paraphernalia of capitalism" in this country under cover of the war. By no means a basically bad person, he was congenitally incapable of resisting the destructive personal effects of power. *** sog *** >From the four corners of the land, as well as from the pink and Red purlieus of New ork and Chicago and every big city, came the molders of the Brave New World. *** sog *** They put their busy fingers into everything. They dictated women's styles, the shapes of women's stockings; they told butchers how to carve a roast; they limited the length of Santa Claus' whiskers in department stores. At one time there was an almost complete breakdown of food distribution throughout the United States. The paper work required of an ordinary small merchant was so extensive that it was practically impossible to comply with. These rules and regulations became so irksome that people ignored them. Then the OPA set up a nationwide network of courts before which citizens could be hauled up and tried for breaking laws enacted by OPA bureaucrats. If convicted, they could, under OPA rulings, have their ration cards taken away from them YD sentenced to starve. One may talk about the profits of war, but there were in truth little profits for honest men because the government YD and rightly YD during the war drained away in drastic taxes most of the profits. In the financing and supervision of the war effort from Washington practically every fiscal crime was committed. And the plain evidence of that is before us in the bill for the war. Few realize how vast it was. For the mind, even of the trained financier, begins to lose its capacity for proportion after the figures pass beyond the limit of understandable billions. The war cost I reckon at 363 billion dollars. Chapter Eight - The Thought Police 1. If there is one department of human struggle which the radical revolutionist understands and loves it is the war that is waged on the mass mind; the war that is carried on with poisons distilled in the mind to produce bias and hatred. It would be strange indeed if we did not find some of the practitioners of this dark art from New ork and some of the offYDscourings of Europe's battered revolutionary emigres numerously entrenched in that thoroughly unYDAmerican institution during the war which was known as the OWI YD the Office of War Information. It began with a thing called the Office of Facts and Figures. a drove of writers and journalists whose souls were enlisted in the great crusade to bring on the Brave New World of the Future. It was in fact an agency for selling Roosevelt's Third New Deal and Roosevelt himself to the people under the guise of "maintaining public morale" and conducting "psychological warfare." , OWI spent $68,000,000 and had 5,561 agents scattered all over the world. But OWI had other tasks than selling America to the Arabs. It was also busy selling Russia to the Americans. The chief of the Foreign Language Section of OWI was a young gentleman 28 years old who had spent his entire life on New ork's East Side, who spoke no foreign language and yet had the decision on whether news should be released to Europe or not. Anybody who disagreed with his high admiration for our Soviet ally was labeled a fascist. There was another child wonder YD 23 years old YD who was the Russian expert of the OWI and who saw to it that nothing went out that was displeasing to the objectives of our noble ally YD including grabbing ugoslavia. OWI's broadcasts to Poland ended not with the Polish national anthem but with a song adopted by the Polish emigres in Moscow who were known as Stalin's "Committee of Liberation." The expert in charge of the Polish section was actually born in Poland, but left there and spent the rest of his life in France where he was notorious as a Communist. He fraternized with the Vichy government while Hitler and Stalin were pals, but when Hitler invaded Russia he came to America and quickly became OWI's expert in explaining American democracy to the people of Poland.51 The deputy director of the Pacific and Far Eastern Area was a British subject until he got a government job in Washington in 1942. While running this important bureau for OWI, he wrote a play which was produced at Hunter College. Burton Rascoe, reviewing it, said: "Its most conspicuous purpose is to idealize the Red Army in China, to defame the Chungking government under Chiang KaiYDshek and to ridicule the political, social and educational ideas of the vast majority of the American people."52 The men, material, cable and wireless time used up by OWI were immense. It ran 350 daily radio programs and had a daily cableYDwireless output of 100,000 words. It was the world's largest pamphlet and magazine publisher and a big movie producer, sending shorts to every country in the world. It sent out 3,500 transcribed recordings a month and turned out 50 movie shorts a year. The content of most of this material was pure drivel. All of this work was not just naive. OWI printed 2,500,000 pamphlets called "The Negro in the War,"54 with pictures of Mr. and Mrs. Roosevelt, the Negroes' friends, in preparation for the fourthYDterm campaign. It printed a handsome volume called "Handbook of the United States"55 and gave a British firm the right to publish it. This gave a history of America, with the story from Leif Ericson's discovery up to 1932 in four and oneYDhalf pages. The rest of the history was devoted to Roosevelt and his New Deal. This was in 1944 and a national election was coming and England was jammed with American soldiers who could vote. It had a department that supplied the pulp paper magazines with direction and suggestions on how to slant mystery and love stories. Western story writers were told how to emphasize the heroism of our allies YD you know which one. Writers were told to cast their soap operas with silent, dogged Britons, faithful Chinese and honest Latins. They must portray Japanese as having set out to seize our Western seaboard and the sly and treacherous characteristics of the Jap must be contrasted with the faithfulness of the Chinese. They suggested that Sax Rohmer's Fu Manchu be turned into a Jap instead of a Chinese. When the war began the government, recognizing the need for protecting our military operations from leaks through careless or uninformed press reporting, organized the Office of Censorship headed by Byron Price, an able official of the Associated Press. To this bureau was given the power to monitor all communications. It set up a censorship organization which all publishers and broadcasters voluntarily cooperated with. It worked admirably and Mr. Price won the unstinted approval of the press for his capable and tactful, yet firm, handling of this difficult problem. No other government agency had any authority whatever to engage in this activity. And it was never intended that anybody should have the power to attempt to interfere with the rights of citizens to discuss with freedom all political questions, subject only to the obligation not to divulge information that would aid the enemy or defeat our military operations. Nevertheless, the OWI and Federal Communications Commission (FCC) took upon themselves the power to carry on the most extensive propaganda among, and the most dangerous interference with, the foreignYDlanguage broadcasting stations. Of course the ordinary American official was hardly aware of the opportunities this kind of thing gave to those who had political or ideological axes to grind. It was important to see that nothing subversive and nothing that would adversely affect the war effort was used. And for this purpose the Office of Censorship was admirably equipped and managed. But the FCC decided that it would take a hand, not merely in monitoring the stations but in literally directing and controlling them. The OWI similarly arrived at the same conclusion. It also set up a division for dealing with the problems of the foreignYDborn through radio. Mr. Eugene L. Garey, chief counsel of the Congressional Select Committee Investigating the FCC, speaking of these conditions said: "From the record thus far made it appears that, in one foreign language broadcasting station in New ork City, the program director, the announcer, the script writer, the censor, and the monitor of the ItalianYDlanguage programs are all aliens or persons owing their positions to the Office of War Information, with the approval of the FCC. "The situation thus portrayed is not peculiar to this single station, or to this one city. Information in our possession indicates that the same situation prevails generally in the foreign language stations throughout the country. Every such key position in each of the three radio stations presently under investigation are found to be similarly staffed. These staffs select the news, edit the script, and announce the program. The program, in turn, is censored by them, monitored by them, and is presented under the direction of a program director of similar character. "From these apparently unrelated facts the picture must be further developed. "OWI had the men and the material. It had the proper dye to color the news. It also had the desire to select and censor the news. What it lacked was the power, or perhaps more accurately stated, even the color of power, to carry their designs into effect. Hence the need to enlist the Federal Communications Commission in its purpose. "True it is that the Federal Communications Commission had no such lawful power, but the Federal Communications Commission did have the power to license and hence the power to compel obedience to its directions. The record now shows their unlawful use of this power. "Working together in a common purpose, the Federal Communications Commission and the Office of War Information have accomplished a result that compels pause YD and presents the solemn question of 'Whither are we going?' "A division called the War Problems Division was created by the Federal Communications Commission, and a staff of attorneys began to function. "This division was not a regulatory body. It was not formed to instruct, or supervise, or to correct. It was formed for the avowed purpose of unlawfully liquidating all of the radio personnel in the foreignYDlanguage field that did not meet with its favor. A real gestapo was created and a lawless enterprise was launched. "It is suggested that we accept this unlawful situation as a benevolent expedient of the moment, but no such purpose as we find here disclosed, however benevolently cloaked, can justify the practices we find. All tyranny begins under the guise of benevolence. "The voices of these aliens go into our homes, and the unwary are led to believe that they speak with authority and official approval. They even censor our Christmas and Easter religious programs, and tell us what music we may hear. The FCC is alarmed about whether we will react properly to news furnished by our national news agencies. Apparently we can still read the news in our press, but we can only hear what these aliens permit us to. What next medium of communications will receive the benevolent attention of these misguided zealots? Obviously, the press. "These interpreters of our national policy YD these slanters of our news YD these destroyers of free speech YD are alien in birth, alien in education, alien in training and in thought. "And still these are the people who are permitted to mold our thoughts YD to tell us what America's war aims and purposes are. These people are in position to color, to delete, or to slant, as they see fit, in accordance with their own peculiar alien views and ideologies. "Persons are being accused of being proYDfascist, and that without proof and without trial. Persons suspected of being proYDfascist, and without proof, have been removed from the air and replaced by wearers of the Black Shirt ... "If the radio can thus be controlled in August, 1943, there is nothing to prevent the same control from slanting our political news and nothing to prevent the coloring of our war aims and purposes when peace comes."57 In the presence of a government which had enlarged its power over the lives and the thoughts and opinions of citizens and which did not hesitate to use that power, the whole citizenry was intimidated. Editors, writers, commentators were intimidated. Men whose opinions did not conform to the reigning philosophy were driven from the air, from magazines and newspapers. While American citizens who were moved by a deep and unselfish devotion to the ideals of this Republic YD however wrongYDheaded that may be in the light of the new modes of "freedom" YD were forced into silence, the most blatant and disruptive revolutionary lovers of the systems of both fascism and Communism and that illegitimate offspring of both YD Red fascism YD were lording it over our minds. All this was possible for one reason and one reason only YD because the President of the United States countenanced these things, encouraged them and in many cases sponsored them, not because he was a Communist or fascist or held definitely to any political system, but because at the moment they contributed to his own ambitions. When a nation is at war, its leaders are compelled by the necessities of practical administration to use every means at hand to sell the war to the people who must fight it and pay for it. As part of that job it is usual to include the leader himself in the package. He is therefore portrayed in heroic proportions and colors in order to command for his leadership the fullest measure of unity. War, as we have seen, puts into the hands of a leader control over the instruments of propaganda and opinion on an everYDincreasing scale. In our day the press, the radio, the movies, even the schoolroom and the pulpit are mobilized to justify the war, to magnify the leader and to intimidate his critics. The citizen who is hardy enough to question the official version of the leader and his policies may find himself labeled as a public enemy or even as a traitor. Hence as the war proceeds, amidst all the trappings which the art of theater can contribute, it is possible to build up a vast fraud, with an everYDmounting torrent of false news, false pictures, false eulogies and false history. After every war many years are required to reduce its great figures to their just proportions and to bring the whole pretentious legend back into focus with truth. the public was treated to the royal spectacles off the coast of Newfoundland aboard the Augusta, at Quebec, Casablanca, Moscow, Cairo, Teheran and finally at alta. Eloquent communiques pretended to inform the people of what had been agreed on. We now know that these communiques told us little of what had happened; that the whole story lay, for long, behind a great curtain of secrecy; that much YD though not all YD has now been painfully brought to light and that what stands revealed is a story very different from that heroic chronicle of triumphs with which we were regaled at the time. As Roosevelt saw it, Stalin was his great target. He began by completely deceiving himself about Stalin. First of all, he decided he must cultivate Stalin's good will and to do this he convinced himself he must sell Stalin to our people. Accordingly the instruments of propaganda which he could influence YD the radio and the movies and to a considerable degree, the press YD were set to work upon the great task. Under the influence of this benevolent atmosphere the Reds in New ork and their compliant dupes, the fellowYDtravelers, swarmed into Washington and presently were sitting in positions of power or influence in the policyYDmaking sections of the government. Joe Davies had been induced to go to Moscow, wrote his notorious "Mission to Moscow," a jumble of obvious fictions which were later transferred to the screen several times exaggerated and shot into millions of minds in movie houses. We know now from the election returns of 1944 that the Reds had in their hands enough support to have turned the tide against Roosevelt. In New ork State, for instance, Roosevelt won its 47 electoral votes by a majority of 317,000. But he got 825,000 votes from the Red American Labor Party dominated by the Communists, which had also nominated him, and the American Liberal Party made up of the pinks, which also nominated him. Without these votes he would have lost the state. He dared not defy these two powerful groups. On the other hand, he was in a very deep hole with the votes of the Polish, Lithuanian, Serbian and other Baltic and Balkan peoples living in America who were citizens. He had betrayed the Poles, the Serbs and the Baltic peoples. But he had managed to keep it dark. Somehow he must avoid any publication of the truth until after the election. They made a decision at Quebec which has up to this moment paralyzed utterly the making of a stable peace in Europe and is pregnant with consequences so terrible for the future that the mind draws away from them in consternation. Secretary Hull said: "This was a plan of blind vengeance ... It failed to see that in striking at Germany it was striking at all Europe." The proposals "that the mines be ruined was almost breathtaking in its implications for all Europe." Beyond all this, of course, was our dignity as a civilized people. The barbarians could sweep into enemy countries and ravage their fields, burn their cities and murder their leaders. This is a job from which a civilized people must recoil if they have not lost their souls. Roosevelt agreed to the Morgenthau Plan to destroy German industry and to reduce Germany to a country primarily agricultural and pastoral. Secretaries Hull and Stimson did not know anything about it until four days after it was done. e the contents of the Morgenthau Plan leaked to the papers and Roosevelt became alarmed at the violence of the reaction, a fine evidence of the fundamentally decent nature of the majority of Americans. In the end the President was persuaded to get out of this appalling agreement so far as destroying the mines of the Ruhr were concerned. But Stimson declares "the same attitude remained," and the whole world now knows of the frightful wreckage that was carried on in Germany and the blow to the economy of all Europe that was delivered in the name of "blind vengeance" and immortal hatred. The administration was now the hopeless prisoner of these demanding and ruthless radical labor leaders, who had shown their ability to elect or defeat the Democratic party, who had filled all the departments and bureaus with their agents and who had insinuated their experts into the CIO labor unions and their propagandists into the radio, the movies and all the great instruments of communication and opinion YD a fact which Mr. Roosevelt's successors would have to face when the war ended. What had become of the Atlantic Charter? On December 20, 1944, the President at a press conference was asked about the Charter which he and Churchill had signed. His reply literally bowled over the correspondents. There was not and never had been a complete Atlantic Charter signed by him and Churchill, he replied. Then where is the Charter now, he was asked. He replied: "There wasn't any copy of the Atlantic Charter so far as I know." It was just a press release. It was scribbled on a piece of paper by him and Churchill and Sumner Welles and Sir Alexander Cadogan. It was just handed to the radio operator aboard the British and American warships to put on the air as a news release. Further inquiry revealed that Stephen Early had handed it out on his own with the signatures of Churchill and Roosevelt attached. And over on the wall of the National Museum in Washington, beautifully framed and illuminated after the manner of an ancient document YD like Magna Carta or the Declaration of Independence YD was the great Atlantic Charter itself, with the signatures of Roosevelt and Churchill. Daily visitors stood before it as before some great historic document. John O'Donnell, of the New ork Daily News, asked the curator where he got it. He answered that it came from the Office of War Information. They had "loaned" the precious document to the National Museum. By inquiry at the OWI YD that prolific fountain of phony news YD O'Donnell learned that OWI had gotten it up and affixed the names of Roosevelt and Churchill. They had printed 240,000 copies of it. O'Donnell went back to the Museum with this information. And lo! the great Charter was gone. An attendant told him it had been ordered off the wall twenty minutes before. Thus ended the story of this wretched fraud. The fake document which was never signed and was nothing more than a publicity stunt to conceal the real purposes of the Atlantic meeting had been slain by its chief sponsor and, of course, all its highYDsounding professions, after Teheran, had become as sounding brass or a tinkling cymbal. On January 20, 1945, Roosevelt was sworn in as President of the United States for a fourth term. Three days later he left Norfolk on the heavy cruiser Quincy for what was to be his last act in the hapless drama of peace. From lreed at west.cscwc.pima.edu Mon Jul 27 00:14:27 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:14:27 -0700 (PDT) Subject: FDR4 Message-ID: <009C9C7C.37572C80.9@west.cscwc.pima.edu> The Polish question was "settled." The formal proposal to hand over eastern Poland YD east of the Curzon line YD was made by Roosevelt himself.102 As to western Poland, Stalin already had a government there named by him and composed of Communists representing no one but Stalin himself. Russia wanted the amount to be 20 billion dollars of which she would take half. It was agreed that labor might be taken as a possible source of reparations. This was just a diplomatic way of authorizing the seizure of human beings to work as slaves after the war ended and is the basis of that dreadful crime perpetrated after hostilities ceased to which the President of the United States agreed. As the conference ended, Roosevelt remained an extra day because Stalin wanted to talk with him. He did so alone. What he wanted settled was "the political aspects of Russia's participation" in the Pacific. This he was able to do very quickly and to his complete satisfaction. In return for Russian participation in the Pacific, Roosevelt agreed that the Kuriles Islands would be handed to Russia, who would also get Sakhalin Island, internationalization of the Port of Darien, the lease of Port Arthur as a naval base and joint operation with China of the Eastern and Southern Manchurian railroads. And Roosevelt promised to use his influence with Chiang to force him to agree. This secret agreement, like the one supporting the use of slave labor, was not made public and was concealed even from Byrnes who was Roosevelt's adviser at alta. He did not hear of it until after Mr. Roosevelt's death. Then he saw a reference to it in a Russian dispatch. By that time he was Secretary of State. He asked President Truman to have the White House records searched for this and any other secret outstanding I.O.U.'s.105 He did suggest that to avoid criticism at home the United States be given three votes too. And Stalin agreed. When Byrnes got back to the United States he found a note from Roosevelt instructing him not to discuss this agreement even in private. Later Roosevelt decided not to ask for the three votes for the United States. Byrnes says he never discovered the reason.106 On the way home General Watson, his military secretary, died suddenly of heart disease. Roosevelt reached Washington the end of February. On March 1 he appeared before a joint session of Congress. He told the Congress that "more than ever before the major allies are closely united," that "the ideal of lasting peace will become a reality." There was no hint that the surrender which was now formally announced with respect to eastern Poland was in fact a major defeat. The disappearance of the Baltic states and practically all the Balkans behind Stalin's iron curtain was not announced in any other terms than as a great forward step in the liberation of Europe. As for western Poland, there were heavy overtones of guilt and frustration unintentionally evident. In two months Roosevelt was dead. Truman became President. Shortly after, in May, the German Army surrendered. The fighting was in the West was over. "Silent, mournful, broken Czechoslovakia recedes into the darkness. She has suffered in every respect by her association with the Western democracies." Chamberlain appeased Hitler and averted war. Churchill got for England both a war and appeasement. Stalin had merely to sit tight, to make known his wishes and Roosevelt laid them in his lap with eager compliance in the notion that he could thus soften Stalin. It is all the more incredible when we remember that the things he was laying in Stalin's lap were the existence of little nations and the rights of little peoples we had sworn to defend. And when Truman and Byrnes went to Potsdam what confronted them was an appalling mess. Roosevelt not only made agreements secret from the people but secret from his closest advisers in the government. He made agreements with Stalin hostile to the objectives of Churchill and kept secret from Churchill. He made secret agreements with Chiang KaiYDshek, secret from both Churchill and Stalin, and secret agreements in derogation of Chiang KaiYDshek's interests without his knowledge. And he made many secret agreements which no one in our State Department knew about until his death and then learned about them the hard way, by having them flung in their faces at embarrassing moments by Molotov. At the end of all this, Russia held in her hands a vast belt of land running from the Baltic sea in the north to the Black Sea in the south, comprising eleven nations with a population of 100 million people. These she held, not as parts of the Soviet Union, but as puppet states, presided over by Red Quislings of Stalin's own selection who represented him and not the people they governed, any more than Quisling represented the people of Norway. The truth is that Roosevelt was a dying man when he was elected, that many of those around him knew it, that the most elaborate care was exercised to conceal the fact from the people and that the misgivings of those who observed it were justified by events, since he died less than three months after his fourth inauguration. The progress of that illness and the means employed to deceive the people must be examined. Rear Admiral Ross T. McIntire, his official physician, felt called upon to put in a book his formal apologia. He was a naval officer employed by the people to watch over the President's health and these statements had the effect of deceiving the employers of the President and of the Admiral YD namely the people. What disease Roosevelt suffered from at Hyde Park and later, that produced such grave consequences, we do not know save upon the statements of Dr. McIntire. Many other doctors were called in to examine the patient, but none of these men has ever made any statements. However, while the illness seemingly began at Hyde Park after the return from Teheran, there is at least some evidence that he was far from sound before that time. Three men have written about the trip to Cairo and Teheran YD Dr. McIntire, Mike Reilly, chief of the President's Secret Service guard, and Elliott Roosevelt. The President went to Cairo by sea. But he wanted to fly from there to Teheran. Reilly tells us that Admiral McIntire "did not want to submit some of the members of the party to the rigors of high altitude flight" but that "the President was not one of these members."112 And McIntire volunteers the information that Roosevelt suffered no discomfort on high altitude flights and had shown no signs of anoxemia when flying at altitudes of 10,000 to 12,000 feet.113 ou might suppose from this Roosevelt was quite a flier. et he had never been in a plane since he flew to Chicago for his first acceptance speech 11 years before until he made the trip to Casablanca YD his only flight while President before Teheran. However, Elliott Roosevelt in his book defeats these yarns. He tells how McIntire was worried about Father's projected flight. "I'm serious, Elliott," says McIntire. "I think he could fly only as far as Basra and then go on by train." Elliott wanted to know what height his father might fly, to which McIntire replied: "Nothing over 7500 feet YD and that's tops."114 Elliott talked to the President's proposed pilot, Major Otis Bryan who, with Mike Reilly, made an inspection flight from Teheran to Basra and back and reported that the trip could be made without going higher than 7000 feet, which, says Elliott, "pleased Father very much."115 Thus McIntire and Reilly are both caught redYDhanded misleading their readers. This was before Teheran. Elliott talked to the President's proposed pilot, Major Otis Bryan who, with Mike Reilly, made an inspection flight from Teheran to Basra and back and reported that the trip could be made without going higher than 7000 feet, which, says Elliott, "pleased Father very much."115 Thus McIntire and Reilly are both caught redYDhanded misleading their readers. This was before Teheran. Whatever malady struck Roosevelt down at Hyde Park in December and kept him pretty much out of circulation until nearly the middle of May, 1944, we know that McIntire at that time caused a heart specialist from Boston to be inducted into the service to remain continuously at Roosevelt's side and that this heart specialist, Dr. Howard Bruenn, said a year later at Warm Springs that he "never let Roosevelt out of his sight," which is a most unusual performance in the case of a patient whose "stout heart never failed him," as Dr. McIntire puts it A great mystery surrounded this illness. . He was dying slowly at first, rapidly later. And at his side as his chief adviser was another dying man YD Harry Hopkins. Hopkins had had a portion of his stomach removed for ulcers and what was known as a gastroYDenterotomy performed. After this his liver troubled him and the gall bladder failed to supply satisfactorily the essential bile necessary to digestion. These two dying men, floating slowly out of life, were deliberately put into power through a fourthYDterm election by a carefully arranged deception practiced upon the American people and upon some, at least, of the party leaders. Here was a crime committed against a great nation which had made tremendous sacrifices and against the peace and security of the world in a moment of the gravest danger. History will pronounce its verdict upon all who were guilty. Dr. McIntire was immediately notified of the stroke in Washington and he, Mrs. Roosevelt and Steve Early left at once by plane for Warm Springs, arriving there at 11 P.M. They immediately decided to have no autopsy. The body was consigned to its coffin and orders issued not to open it. It was taken from Warm Springs next morning at 9 o'clock. It reached Washington next day YD the 14th YD and after lying for a few hours without ever being opened was taken that night to Hyde Park for interment next day. It has been the custom in the past for the remains of deceased Presidents to lie in state in the Capitol. This was not done. Present in the cottage when the President was stricken were the artist, Mrs. Schoumantoff, who was painting his portrait, his two cousins, his valet and several others. The artist, a Russian, was ordered to leave at once. She took a train without delay and was not located until two days later at Locust Valley, L.I. At St. Helena the British government provided its illustrious prisoner, Napoleon I, with a physician. He was Dr. Francesco Antomarchi, a Corsican, who however, did not seem particularly fond of his fallen countryman and who failed signally to win Napoleon's confidence. Dr. Antomarchi persisted to the end in the belief that his royal patient was not seriously ill. Napoleon convinced himself that his physician did not know what he was doing and that the medicines he was prescribing were actually injuring him. Napoleon watched his chance and when the doctor's back was turned, handed the mixture just prepared for him to an aide who swallowed it and was immediately taken with a violent internal disturbance. The Emperor denounced Antomarchi as an assassin. Dr. MacLaurin,126 who has written interestingly of this case, observes that from the symptoms now known to be present and even in the then state of medical knowledge at that period, the veriest blockhead would have known that the Emperor was seriously ill. Napoleon died shortly after the incident described above of cancer of the stomach. In this case, instead of passing up the autopsy, Antomarchi performed one himself in order to prove that there were no symptoms present to inform him of the presence of cancer and he wrote a book upon the subject. He did not restore our economic system to vitality. He changed it. The system he blundered us into is more like the managed and bureaucratized, stateYDsupported system of Germany before World War I than our own traditional order. Before his regime we lived in a system which depended for its expansion upon private investment in private enterprise. Today we live in a system which depends for its expansion and vitality upon the government. This is a preYDwar European importation YD imported at the moment when it had fallen into complete disintegration in Europe. In America today every fourth person depends for his livelihood upon employment either directly by the government or indirectly in some industry supported by government funds. In this substituted system the government confiscates by taxes or borrowings the savings of all the citizens and invests them in nonYDwealthYDproducing enterprises in order to create work. Behold the picture of American economy today: taxes which confiscate the savings of every citizen, a public debt of 250 billion dollars as against a preYDRoosevelt debt of 19 billions, a government budget of 40 billions instead of four before Roosevelt, inflation doubling the prices and reducing the lowerYDbracket employed workers to a state of pauperism as bad as that of the unemployed in the depression, more people on various kinds of government relief than when we had 11 million unemployed, Americans trapped in the economic disasters and the political quarrels of every nation on earth and a system of permanent militarism closely resembling that we beheld with horror in Europe for decades, bureaucrats swarming over every field of life and the President calling for more power, more priceYDfixing, more regulations and more billions. Does this look like the traditional American scene? Or does it not look rather like the system built by Bismarck in Germany in the last century and imitated by all the lesser Bismarcks in Europe? He changed our political system with two weapons YD blankYDcheck congressional appropriations and blankYDcheck congressional legislation. In 1933, Congress abdicated much of its power when it put billions into his hands by a blanket appropriation to be spent at his sweet will and when it passed general laws, leaving it to him, through great government bureaus of his appointment, to fill in the details of legislation He used it to break down the power of Congress and concentrate it in the hands of the executive. The end of these two betrayals YD the smashing of our economic system and the twisting of our political system YD can only be the Planned Economic State, which, either in the form of Communism or Fascism, dominates the entire continent of Europe today. The capitalist system cannot live under these conditions. The capitalist system cannot survive a Planned Economy. Such an economy can be managed only by a dictatorial government capable of enforcing the directives it issues. The only result of our present system YD unless we reverse the drift YD must be the gradual extension of the fascist sector and the gradual disappearance of the system of free enterprise under a free representative government. how has it advanced the cause of democracy? We liberated Europe from Hitler and turned it over to the mercies of a far more terrible tyrant and actually tried to sell him to the people as a savior of civilization. Behold Europe! Does one refer to the wreckage there as liberation and salvation? Is anyone so naive as to suppose that democracy and free capitalism have been restored in Europe? Fascism has departed from Germany, but a hybrid system of socialism and capitalism in chains has come to England, which is called social democracy but is on its way to Fascism with all the controls without which such a system cannot exist. And in America the price of the war is that fatal deformity of our own economic and political system which Roosevelt effected under the impact of the war necessities. The war rescued him and he seized upon it like a drowning man. By leading his country into the fringes of the war at first and then deep into its center all over the world he was able to do the only things that could save him YD spend incomprehensible billions, whip up spending in the hot flames of war hysteria, put every man and his wife and grandparents into the war mills, while under the pressure of patriotic inhibitions, he could silence criticism and work up the illusion of the war leader. Look up the promises he made, not to our own people, but to the Chinese, to Poland, to Czechoslovakia, to the Baltic peoples in Lithuania and Latvia and Estonia, to the Jews out of one side of his mouth and to the Arabs out of the other side. He broke every promise. The figure of Roosevelt exhibited before the eyes of our people is a fiction. There was no such being as that noble, selfless, hardYDheaded, wise and farseeing combination of philosopher, philanthropist and warrior which has been fabricated out of pure propaganda and which a small collection of dangerous cliques in this country are using to advance their own evil ends. ~~~~~~~~~~~~~~~~~~~~~~~~~~~ In June the longYDawaited invasion of the continent was launched. With this we will not concern ourselves. The other subject that occupied Roosevelt's mind was his plan to have himself renominated for a fourth time. The President had lost his head, at least a little. Congress was slipping away from him. A growing section of his party, particularly in the Senate, was moving out of that collection of incongruous elements called the Third New Deal. It was crawling with Reds and their gullible allies who got themselves into key positions in all the bureaus and were talking with great assurance about what they were going to do with America and the world. The Communists had all become antiYDfascists and everybody who was against the Communists was, therefore, a fascist. A group of organizations financed by undisclosed benefactors was riding roughshod through the country smearing everybody who questioned the grandiose plans of the Great Leader for remaking America and the world. Nobody was getting a hotter dose of this smearing than the American Congress. The radio and the frightened press and magazines kept up a barrage against the members of the President's own party in both houses. It was a Democratic bill and the blast that exploded in his face brought him up with a jerk. In the upper house, Senator Barkley, Democratic leader, Roosevelt's own representative there, rose to upbraid him. He said the message was "a calculated and deliberate assault upon the legislative integrity of every member of Congress." He cried: "I do not propose to take it lying down," as Democratic and Republican senators united in a roar of applause. He ended his philippic with an announcement that made headlines in every paper in the country. He declared that after seven years of carrying the New Deal banner for the President, he now resigned his post as Democratic majority leader and he called on every member of the Congress to preserve its selfYDrespect and override the veto. The Senate overrode it 72 to 14 and the House 299 to 95. It brought Roosevelt tumbling off his high horse. He sent Steve Early running to Barkley's home that very night to beg him not to quit. Barkley yielded. McIntire was a naval doctor in 1932 and was recommended to Roosevelt as White House physician by Admiral Grayson. McIntire was an eye, ear and nose specialist. He got along famously with Roosevelt, was elevated by him to the grade of admiral and made head of the Naval Hospital Service. Thus once again the problem of disease entangled itself in the making of history. It had happened after the First World War when the President was stricken by a brain hemorrhage that paralyzed his body and impaired his mind and, worse than this, disturbed his normal mental balance. What might have been the course of history had Woodrow Wilson's mental and physical powers survived must be a matter of speculation. We have seen how the Communist party had successfully penetrated the unions organized by the Congress of Industrial Organizations YD the CIO YD and how John L. Lewis and David Dubinsky had got out of it for this reason, leaving Sidney Hillman in complete control. We have also seen how the war brought Hillman to the top in White House circles when he and William Knudsen became the directors of the economic war effort. Knudsen departed in good time, but Hillman remained close to the White House. . By 1943, Earl Browder, Communist leader, had about completed the discovery that there was no hope for a proletarian revolution in America. The party got nowhere preaching Communism. The people just wouldn't listen. But it learned that it could getyYYY !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXZ[\]^_`abcdefghijklmno pqrstuvwxyz{}yYYY~Y~ very far by using a different technique. After all, Communist revolutionaries know that before they can introduce Communism they must destroy the political and economic system of the country in which they conspire. t fascism YD the Planned Capitalist Economy YD is merely a decadent phase of capitalism. For this reason the Communist party had been promoting with great success RedYDfront organizations and inducing the most important people, like Mrs. Roosevelt, Henry Wallace and scores of prominent leaders in education and public life, to work with them. As 1944 opened, Browder decided to liquidate the Communist party. It would go out of politics. It would become a mere educational association. This was done, and Browder and Sidney Hillman teamed up to capture the American Labor Party. This had been formed originally in New ork City to provide a political vehicle for Fiorello LaGuardia in his local politics. It had all sorts of people in it. There were a lot of Reds, a lot of socialists and a lot of parlor and campus pinks of all sorts, plus a lot of social reformers and welfare reformers. It had corralled a lot of votes YD enough to swing an election in New ork State YD by giving or withholding its vote from the Democrats. It supported Lehman in 1940 and elected him on the Democratic ticket. It refused to endorse the Democratic candidate, Bennett, for governor in 1942 and the Democratic vote, without it, was insufficient and thus Dewey became governor. Now Browder and Hillman joined forces and decided to take over the American Labor Party. They met resistance from the mixed collection of pinks who had control, but in a bitter battle Browder and Hillman took it over. Actually Browder dominated this team because it was Communist votes that did the trick. In addition to this, Hillman had organized in 1943 a new political labor group called the CIO Political Action Committee. The CIO had violated the law by supporting candidates in various primary elections and to get around this Hillman formed this Political Action Committee and pressure was put on members of CIO unions to compel them to join. This organization was now being used as a club in the Democratic party to bludgeon Democratic congressmen and officials generally to play ball with Hillman, Wallace and their crowd, while Hillman and Browder did business as a team in New ork State in the newly reYDformed Communist American Labor Party. The Democratic party could win if it could carry the Southern states and in addition New ork, Massachusetts, Illinois, Michigan and New Jersey. These states could be carried with the support of Sidney Hillman's Political Action Committee and Browder's American Labor Party, but not without them and Roosevelt was the only possible candidate who could get this support. The Democrats had to nominate Roosevelt or lose the election. There were some Democrats who thought it was better to lose the election, but not enough of them. Accordingly when the convention assembled in Chicago on July 19, Sidney Hillman was there, not as a delegate YD he was not even a member of the party YD but to see that the subservient Democrats behaved to his satisfaction and to the satisfaction of his friend and partner, Browder. To this pass had Roosevelt's personal political ambitions brought the Democratic party of Jefferson, Cleveland and Wilson. Hillman had a headquarters there. He wasn't worried about Roosevelt's nomination. That was settled. He wasn't worried about the platform. That was written to his satisfaction before the convention assembled by Sam Rosenman. He had one more demand. He wanted Henry Wallace nominated again for Vice President. Harry Hopkins and Henry Wallace and, of course, Sidney Hillman knew. They knew that Roosevelt was doomed and that if they could name Henry Wallace Vice President this time, the government would be in their hands. But Chicago had a visitor about whom nothing was known until later. On the evening of July 14, Roosevelt left Washington with great secrecy on a special train. It reached Chicago on Saturday the 15th. That same day, Robert E. Hannegan, Democratic national chairman, got to Chicago. Reporters awaited him at the station. But he slipped out through a rear door of his train and into Mayor Kelly's policeYDescorted automobile and vanished. Reporters frantically hunted him all over town. He remained out of sight until the next day. But in the meantime he had made a visit to Roosevelt's train, secretly parked on a remote railroad siding. There poor Wallace's goose was cooked. Hannegan, too, got a letter. It said the President would be happy to have either Harry Truman or William Douglas as his running mate. And as Hannegan was leaving the train, Roosevelt warned him "to clear everything with Sidney." The Presidential approval of Truman was no good until Sidney O.K.'d it Truman was nominated with 1100 votes to only 66 for Wallace. But not until Sidney Hillman had approved the change. His first speech was not made until September 24 to a dinner given by the International Teamsters' Union dominated by Daniel Tobin YD an AFL union. Its purpose was to put some emphasis on the support of the AFL in view of the bitter feeling among AFL leaders because of the dominant role Sidney Hillman's CIO was playing in Roosevelt's councils and particularly in its favored position before Roosevelt's Labor Board ~~~~~~~~~ Secret Service Page- The first occurred on February 1, 1933, in Miami, Florida Giuseppe Zangara fired five shots a President-elect Franklin D. Roosevelt, who was making an impromptu speech while sitting in an open car that had stopped momentarily. Although none of the shots hit President Roosevelt, Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit four other people, including a Secret Service agent. On February 15, 1933, Zangara attended a speech given by Roosevelt at Bayfront Park in Miami, Florida. When Roosevelt had finished his talk and was preparing to leave, Zangara pulled out a pistol and opened fire. A bystander deflected the assassin's aim by pushing his arm into the air. Zangara wounded five people who had been near the president-elect, two of them seriously. Most critically injured was Chicago Mayor Anton Cermak, who was struck by the bullet in the chest which then lodged in his spine. Zangara was immediately charged with four counts of attempted murder. He was not charged initially with the wounding of Cermak, as authorities waited to see if the mayor's wounds would prove fatal. The State charged Zangara for attempting to murder Franklin Roosevelt, Russell Caldwell, Margaret Kruise, and William Sinnott. Zangara was found guilty on each count and sentenced to four consecutive twenty year terms. On March 6, Mayor Cermak died from complications stemming from the shooting. The same day Zangara was indicted by a grand jury and charged with first degree murder in the death of Cermak. His trial began on March 9 and ended on March 11 with a guilty verdict and a death sentence. The prisoner was transported to the Florida State Prison at Raiford, where he was executed on March 20, 1933. The parade car moved slowly down the street as President-elect Roosevelt and Mayor Cermak smiled and waved. The car stopped and President-elect Roosevelt gave a speech while sitting on the back of the car. A man named Guiseppe Zangara pushed through the crowd. He fired five shots at the President-elect. The bullets hit four people and Mayor Cermak. The mayor fell out of the car and called out "The President, get him away!" But Roosevelt ordered his car to stop and that Mayor Cermak be put in with him. President-elect Roosevelt held Mayor Cermak all the way to the hospital. Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His body was taken back to Chicago and buried in the Bohemian National Cemetery. Guiseppe Zangara was executed in the electric chair on March 21, 1933. That was only 13 days after Mayor Cermak died. It was not always thus. Consider the case of Guiseppe Zangara, who was executed in 1933 for the attempted assassination of President-elect Franklin D. Roosevelt in which Chicago Mayor Anton J. Cermak was fatally shot. Zangara pleaded guilty in state court on March 10, was sentenced to death, and was executed on March 20 -- an interval of 10 days! Kenneth J. Davis, FDR: The New ork ears 1928-1933 (Random House, 1985) at 427-435. After Roosevelt had delivered a speech in Florida on February 14, 1938, Guiseppe Zangara, an unemployed bricklayer, fired six sbots from a handgun at Roosevelt from twelve yards away. The president elect, who was sitting in an open car, was uninjured but five other people were shot, including Chicago mayor Anton Cernak, who was killed. Zangara, who had a pathological hatred for rich and powerful figures, was found guilty of murder and electrocuted.February 15, 1933, Guiseppe Zangara rose early in Miami, Florida to assassinate Franklin Delano Roosevelt, president-elect. In the past weeks, FDR's popularity had increased. That warm, reassuring voice, that ready grin and tilted cigarette holder, had reached out to touch millions of folks all over America. Zangara did not share these emotions. Pushing his way through the crowd, Zangara shouted out "There are too many people starving to death!" He fired shot after shot at FDR, but a woman's quick move knocked the gun upward. The bullets hit several bystanders and mortally wounded Mayor Cermak of Miami. From lreed at west.cscwc.pima.edu Mon Jul 27 00:14:49 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:14:49 -0700 (PDT) Subject: FDR5 Message-ID: <009C9C7C.4404B7E0.11@west.cscwc.pima.edu> On March 21, 1933, Zangara marched into the execution chamber shouting against the "capitalists" and expressing disappointment that no news camera-men were permitted to witness his execution. "Goodbye, adios to the world," were his last words. 3 FDR's Looking Forward published FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe Zangara, 15 February Giuseppe Zangara was sentenced to serve 80 years for shooting at President elect Franklin Roosevelt in 1933. Though Roosevelt was missed, five bystanders, including Chicago Mayor Anton Cermak, were struck. Three weeks after the attack, Cermak died of complications. Zangara's sentence was then changed to death sentence. Thirty-three days after the attack, Zangara was strapped into the electric chair at Florida's Raiford Prison. He glared at his executioners and declared, "Goodbye, adios to all the world." His unclaimed body was buried in an unmarked prison grave. In 1989, as part of an effort by court officials to recover missing court files of historical significance, he filed an FOIA request with the U.S. Secret Service seeking to get back court files concerning assassin Giuseppe Zangara. Zangara, a 32-year-old bricklayer, fired four shots at President-elect Franklin Roosevelt's motorcade in 1933 in Miami. Chicago Mayor Anton Cermak was killed and four people were wounded. Roosevelt escaped unharmed. Zangara was found guilty of murder and was executed about a month later. Winslow said a Miami court order showed that a Secret Service agent had checked out Zangara's death warrant and some other court documents in 1954 but never had returned them. Unfortunately, he said, the FOIA request failed to turn up the missing documents. GIUSEPPE ZANGARA pleaded guilty and was executed March 20, 1933 for the March 7, 1933 death of Chicago Mayor Anton Cermak, who was fatally wounded in an attempt on the life of President-elect Franklin D. Roosevelt in Miami on Feb. 15, 1933. LE MONDE DIPLOMATIQUE - May 1998 by DOMINIQUE VIDAL National and/or social liberation movements worldwide are equally affected. The ideology and power bloc which used to be their mainstay, whether they liked it or not, has disappeared. The various movements and causes have dropped out of the international spotlight and are no longer up for grabs in the East West confrontation. In fact, amid general indifference, they have largely forfeited their means of action and political leverage. With its main enemy out of the way, along with the economic, ideological and military threat it represented, the West, led by the United States, has now become the master of the world. A damaging result of this new world order has been the beginning of the process of globalisation. It is no paradox to say it probably began on 9 November 1989 with the fall of the Berlin Wall, or in August 1991 when Mikhail Gorbachev rallied to the American crusade in the Gulf, or indeed on 8 December 1991, the date of the dissolution of the Soviet Union For decades, every socialist project was contrasted with its only existing embodiment: so-called "real" socialism. And, among revolutionary forces themselves, the process of devising a plausible radical alternative was tragically limited by the Soviet horizon. So, despite the consequences described at the beginning, the fall of communism removes a severe handicap. Far from presaging the end of history and the irrelevance of radical thought, it actually gives a whole new lease of life to ideas of utopia. Future generations will have the freedom to conceive a different kind of society without having to define themselves in terms of a communist model. Of course, there is no going back to a clean slate. However, with the passing of time, it should be possible to learn lessons from the failure of communism and - in other forms and for other reasons - social-democratic reformism. The human imagination must find a new way of thinking based on what men and women need, rather than theoretical or dogmatic concepts to be "implemented". The questions we must ask ourselves may have a familiar ring. How are democracy, pluralism, rights and freedoms to be revitalised, but sheltered from totalitarian intent? How is equality of opportunity and social justice to be guaranteed and the security to which people are entitled assured, without a general "dumbing down" and stifling of initiative? How can the fulfilment of basic social needs be made into a priority for the economy without affecting its development? How can the necessary resources be found for a new balance between work, training, family and community life, and leisure activities when people's time is at last freed up? How can the ground be laid for a distribution of wealth which, worldwide, respects the right of all peoples to development? How can the role of the state be made to serve all these objectives while at the same time the independence of each citizen and each local community is assured? In short, how is the relationship between individuals and society to be reinvented? To these and many other questions, there are no longer any ready-made answers. However, the way is now open and the ground ready to be cleared. At last. Translated by Sally Blaxland IGNACIO RAMONET Last January, the corridors of a number of European airports were adorned with a poster in the style of the Chinese cultural revolution. It showed a row of demonstrators at the head of a march, their faces shining, their colourful banners blowing in the wind. The slogan they were chanting was "Capitalists of the world, unite!" For Forbes, America's magazine for millionaires, this was more than a jibe at the 150th anniversary of the publication of Marx and Engels' Communist Manifesto. It was a way of making two things clear. Apparently without fear of contradiction, as the posters were not torn down or defaced. The first is that nobody is afraid of communism any longer. The second is that capitalism has gone over to the attack. capitalism's new-found arrogance. The triumphal tone became apparent after the fall of the Berlin Wall, when the Soviet Union collapsed in a welter of political obtuseness reflecting the emptiness of shattered illusions. The sudden revelation of the full consequences of decades of state control in the countries of the former Eastern bloc produced a sort of mental upheaval. The tragic absurdity of a system lacking basic freedoms and a market economy was starkly exposed, as were all the injustices that had followed in its wake. Socialist thinking seemed to subside, along with the belief in progress and a future subject to rational planning. The sole ideological basis of the traditional right had been its anti communism. The collapse of the Soviet system and the implosion of socialism cut the ground from under its feet. Neoliberalism, which had been flagging since the beginning of the century, was left alone in the field, the sole victor of the East-West confrontation. With its main rivals removed, it has re-emerged on all sides, stronger than ever. Its supporters dream of imposing their vision - a neoliberal utopia admitting of no alternative - on the whole world. This campaign of conquest goes by the name of globalisation. It is the outcome of the increasing interdependence of all countries, brought about by the lifting of all controls on the movement of capital, the removal of customs barriers and administrative restrictions, and the intensification of international commerce and free trade; all this under the auspices of the World Bank, the International Monetary Fund, the Organisation for Economic Cooperation and Development, and the World Trade Organisation. The financial economy has become entirely divorced from the real economy. The sum total of daily financial transactions throughout the world is about $1,500 billion, but a mere 1 % involves the creation of new wealth. Even in the most developed countries, the dramatic advance of neoliberalism has significantly reduced the role of parliaments and other public players. At the same time, the growth of new information technologies is proceeding without any reference to the idea of social progress. The enormous strides in molecular biology since the early 1960s, coupled with the immense calculating power provided by computer science, have shattered the stability of the technological matrix which public authorities are finding it harder and harder to control. Politicians can no longer assess the risks involved in the acceleration of science and technology (1). Here too, they are increasingly dependent on unelected experts, who direct the government decision-making process behind the scenes. The information revolution has torn our society apart. It has overturned the established pattern of trade, opening the way for the expansion of the global and information economy. Not all the countries of the world have yet been forced into one unit. But the global economy is imposing a single economic model by networking the entire planet. In this new system of liberal social relations, humankind has been reduced to a collection of isolated individuals stranded in a universe of hypertechnology. These brutal changes are causing us to lose our bearings; there is ever-growing uncertainty, the world appears unintelligible and history seems to defy rational interpretation. The crisis we are experiencing is what Gramsci had in mind when he spoke of the old order dying while the new hesitates to be born. We are reminded of Tocqueville's phrase: "When the past no longer illuminates the future, the spirit walks in darkness." And yet, many people are trying to inject some measure of humanity into the relentless machinery of neoliberalism. They feel the need for responsible involvement and collective action. In an age when power has become abstract, invisible, distant and impersonal, they want to confront those responsible face to face, to direct their anger, fears and frustration at clearly identified adversaries of flesh and blood. They would still be prepared to believe that politics has an answer to everything, even though politicians find it increasingly difficult to propose straightforward solutions to the complex problems of society. And they all feel the need to erect a barrier against the tidal wave of neoliberalism in the form of a coherent ideology that can be opposed to the currently dominant model. To formulate that ideology is no easy matter. There is practically nothing left to build on. Previous utopias based on the idea of progress have all too often sunk into authoritarian rule and oppression. Once again, there is a need for dreamers who can think and thinkers who can dream. The answer will not be a neatly packaged, custom-built project. It will be a way of looking at things, of analysing society, leading gradually to the development of a new ideology that will break the stranglehold of anarcho-liberalism. *** sog *** Neoliberal ideology is busily building a society of selfishness based on fragmentation. To preserve the future, we have to strengthen the collective dimension (3). And collective action is now as much a matter of single-issue campaigns as of parties and unions. *** AoD *** France has seen a proliferation of campaigning groups in recent years. The issues range from food for the homeless (les Restos du Coeur) and the fight against AIDS (Act Up), to unemployment (Action contre le ChYmage - AC!) and housing rights (Droit au Logement - DAL). There has also been considerable growth in local branches of large NGOs like Greenpeace, Amnesty International, MYdecins du Monde and Transparency. Political parties have two particular attributes which detract from their credibility. First, they are all-embracing, claiming to be able to solve all society's problems. Second, they are geographically restricted, i.e. they can act only within the frontiers of a single country. Campaigning groups have exactly the opposite properties. On the one hand they are thematic, i.e. concerned with single issues such as unemployment, housing and the environment. On the other, they are international, i.e. their field of action is the whole planet (4). For many years the supporters of these two different approaches have been at odds with each other, but recently there have been signs of convergence. It is vital that they join forces. This is one of the key problems of political renewal. Campaigning groups are grass-roots organisations, testifying to the richness of social initiative. {John Doe Society - sog} It is therefore essential to build strong links between campaigning organisations and political parties. Campaigning organisations have preserved the belief in the possibility of changing the world, a belief based on a radical conception of democracy. They are the probable source of a renewal of political activity in Europe. . "Today's utopia is tomorrow's reality", as Victor Hugo said. Lamartine agreed that utopias are simply "realities whose time is not yet ripe." It is the committed activists of campaigning organisations who are likely to prove them right. They will resurface tomorrow under other banners. They will be involved in struggles to restore the United Nations' role as the central instrument of international law, to turn it into an organisation that can take real decisions, act decisively and impose lasting peace; to establish international tribunals that can judge crimes against humanity, democracy and the common good; to prevent manipulation of the masses and to end discrimination against women. They will be present in campaigns to secure new legislation on protection of the environment and to establish the principle of sustainable development. In the fight to ban tax havens and promote an economic system based on solidarity. And in many others. Translated by Barry Smerin Return of the Rebels The working classes have not given up the fight despite both overt and covert repression, a weakened and divided trade union movement and media indifference or outright hostility. by CHRISTIAN DE BRIE Alongside the trade union movement, an astonishing wealth and diversity of associations is springing up to challenge the new world order. From local community groups to international non-governmental organisations - there are several hundred thousand of them in all - mobilising hundreds of millions of activists. As the Peoples' Global Action against "Free" Trade and the World Trade Organisation, which met in Geneva in February 1998, stated in their manifesto, direct action against globalisation is the most important thing. "Only a global alliance of peoples' movements, respecting autonomy and facilitating action-oriented resistance, can defeat this ... monster. ... We assert our will to struggle ... against all forms of oppression" (3). Translated by Sally Blaxland THERE IS ANOTHER, BETTER WORLD The hazards of internationalism Billions of men and women, rendered powerless by the fragmentation of the social struggle, are pinning their hopes on a new universalism that does not leave the delicate fabric of the world entirely in the hands of the money men. by ALAIN GRESH We live in extraordinary times. Globalisation is carrying all before it, our means of communication allow us contact in real time with any place you care to name, more people than ever before are travelling the world, yet paradoxically the media space devoted to "foreign affairs" is shrinking to vanishing point. All the research bears this out. Be it in Paris, Washington (1), London or Madrid, television and press coverage of international problems has been substantially reduced. However, there is an exception to every rule and we are informed instantly of any drop in the Nikkei index in Tokyo, invited to rejoice at the new heights reached by the Dow Jones on Wall Street or worry about exchange rate fluctuations in Seoul. Stock exchange news has become the only social glue binding the global village together. Alain Badiou observes in a stimulating reflection on universalism (3), this "process of fragmentation into separate and isolated identities" is only another aspect of a "world that has finally been given a configuration, as a market, a world market. Nothing", he continues, "lends itself more to the invention of new patterns for a uniform monetary system than a community and its territory or territories. What endless opportunities for trade and investment" these innumerable new communities offer as they arise. The many separate states that have replaced ugoslavia or the Soviet Union offered no resistance to the juggernaut of the free market economy. As Alain Badiou observes, "at a time of general movement and the dream of instant cultural exchange, more and more laws and regulations are being introduced everywhere to curtail people's freedom of movement ... Free movement for things that can be counted, by all means, especially for capital, the very essence of such things. But free movement for things that cannot be counted, for the infinite value represented by an individual human life, never! As regards the real life of people and what happens to them", there is - and we must never forget it - "a detestable complicity between the globalised logic of capital and the French mania to preserve their identity". the nation-state - a recent and transitory historical phenomenon (7) - is clearly not the symbolic ideal construct some sentimental elements of the left like to imagine. It has been a key factor in colonial wars, opposition to the labour movement, enforcing moral order, discrimination against women, the marginalisation of minorities, and so on and so on. And the current drift into authoritarian attitudes vis-Y-vis "dangerous elements" and immigrants is unacceptable, even in the name of a self-styled "republican order". How are we to find new forms of rebellion, of dissidence, to meet the new global challenges? With modern means of communication, especially the Internet, it is easy to establish worldwide networks, mobilise, act. But to act locally and on a world scale, to "think global", it is necessary to rediscover universalism, a universalism that is not confined to the values of Western White men, who fall into a trance at the sight of a young girl in a veil and whose real aim in life, to quote Alain Badiou, is "the uniform imposition of what they imagine to be modern". Humanitarian action or laissez-faire? The stagnation of the Soviet system and the collapse of the communist utopia brought discredit on a certain version of internationalism. Even the humanitarianism, which rallied millions of men and women to the cause of emergency aid in time of war and natural disaster, rapidly ran out of steam. No-one was quicker than the organisers of M_dicins sans fronti_res, the organisation that exemplifies that approach, to condemn the political authorities' use of "humanitarian" aid to justify a laissez faire attitude towards the crimes in Bosnia or the genocide in Rwanda. And yet, in the face of fundamentalism, hardening attitudes on identity, or confrontations between increasingly insulated ethnic groups (which do not prevent their foot-soldiers from drinking Coca Cola, their intellectuals from using Microsoft software, and their leaders from calling on the resources of international capital), the peoples of the world have got to find new ways of "living together" and "fighting together". They have nothing to lose from embracing this ideal and, to quote Marx and Engels, "they have a world to win". Translated by Barbara Wilson The US is, in fact, operated as a fascist state by bureaucrats. ~ Bill Payne ~ John Hancock Security to the persons and properties of the governed is so obviously the design and end of civil government, that to attempt a logical proof of it would be like burning tapers at noonday, to assist the sun in enlightening the world; and it cannot be either virtuous or honorable to attempt to support a government of which this is not the great and principal basis; and it is to the last degree vicious and infamous to attempt to support a government which manifestly tends to render the persons and properties of the governed insecure. Some boast of being friends to government; I am a friend to righteous government, to a government founded upon the principles of reason and justice; but I glory in publicly avowing my eternal enmity to tyranny. They have declared that they have ever had, and of right ought ever to have, full power to make laws of sufficient validity to bind the Colonies in all cases whatever. They have exercised this pretended right by imposing a tax upon us without our consent; and lest we should show some reluctance at parting with our property, her fleets and armies are sent to enforce their mad pretensions. it was easy to foresee the consequences which so naturally followed upon sending troops into America to enforce obedience to acts of the British Parliament, which neither God nor man ever empowered them to make. It was reasonable to expect that troops, who knew the errand they were sent upon, would treat the people whom they were to subjugate, with a cruelty and haughtiness which too often buries the honorable character of a soldier in the disgraceful name of an unfeeling ruffian. they thought it not enough to violate our civil rights, they endeavored to deprive us of the enjoyment of our religious privileges, to vitiate our morals, and thereby render us deserving of destruction. But what, my countrymen, withheld the ready arm of vengeance from executing instant justice on the vile assassins? Perhaps you feared promiscuous carnage might ensue, and that the innocent might share the fate of those who had performed the infernal deed. But were not all guilty? Were you not too tender of the lives of those who came to fix a yoke on your necks? From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:12 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:15:12 -0700 (PDT) Subject: FDR6 Message-ID: <009C9C7C.5221FFE0.13@west.cscwc.pima.edu> And though the murderers may escape the just resentment of an enraged people; though drowsy justice, intoxicated by the poisonous draught prepared for her cup, still nods upon her rotten seat, yet be assured such complicated crimes will meet their due reward. Standing armies are sometimes (I would by no means say generally, much less universally) composed of persons who have rendered themselves unfit to live in civil society; who have no other motives of conduct than those which a desire of the present gratification of their passions suggests; who have no property in any country; men who have given up their own liberties, and envy those who enjoy liberty; who are equally indifferent to the glory of a George or a Louis; who, for the addition of one penny a day to their wages, would desert from the Christian cross and fight under the crescent of the Turkish Sultan. From such men as these, what has not a State to fear? With such as these, usurping Caesar passed the Rubicon; with such as these, he humbled mighty Rome, and forced the mistress of the world to own a master in a traitor. These are the men whom sceptred robbers now employ to frustrate the designs of God, and render vain the bounties which his gracious hand pours indiscriminately upon his creatures. By these the miserable slaves in Turkey, Persia, and many other extensive countries, are rendered truly wretched, though their air is salubrious, and their soil luxuriously fertile. By these, France and Spain, though blessed by nature with all that administers to the convenience of life, have been reduced to that contemptible state in which they now appear But since standing armies are so hurtful to a State, perhaps my countrymen may demand some substitute, some other means of rendering us secure against the incursions of a foreign enemy. But can you be one moment at a loss? Will not a well-disciplined militia afford you ample security against foreign foes? We want not courage; it is discipline alone in which we are exceeded by the most formidable troops that ever trod the earth. A well-disciplined militia is a safe, an honorable guard to a community like this, whose inhabitants are by nature brave, and are laudably tenacious of that freedom in which they were born. >From a well-regulated militia we have nothing to fear; their interest is the same with that of the State. When a country is invaded, the militia are ready to appear in its defense; they march into the field with that fortitude which a consciousness of the justice of their cause inspires; they do not jeopard their lives for a master who considers them only as the instruments of his ambition, and whom they regard only as the daily dispenser of the scanty pittance of bread and water. No; they fight for their houses, their lands, for their wives, their children; for all who claim the tenderest names, and are held dearest in their hearts; they fight pro aris et focis, for their liberty, and for themselves, and for their God. I cannot here forbear noticing the signal manner in which the designs of those who wish not well to us have been discovered. The dark deeds of a treacherous cabal have been brought to public view. ou now know the serpents who, whilst cherished in your bosoms, were darting the envenomed stings into the vitals of the constitution. But the representatives of the people have fixed a mark on these ungrateful monsters, Surely you never will tamely suffer this country to be a den of thieves. Break in sunder, with noble disdain, the bonds with which the Philistines have bound you. Suffer not yourselves to be betrayed, by the soft arts of luxury and effeminacy, into the pit digged for your destruction. Despise the glare of wealth. That people who pay greater respect to a wealthy villain than to an honest, upright man in poverty, almost deserve to be enslaved; they plainly show that wealth, however it may be acquired, is, in their esteem, to be preferred to virtue. The virtuous asserter of the rights of mankind merits a reward, which even a want of success in his endeavors to save his country, the heaviest misfortune which can befall a genuine patriot, cannot entirely prevent him from receiving. {Timothy McVeigh - sog} ~~~~~~~~~~~~~~~~~~ Secret Service the start of the Spanish-American War led to the first legal use of the Secret Service for Presidential protection. A detail of four agents, operating under special emergency was fund, was assigned to the Executive Mansion to guard McKinley around the clock. They were stationed on the first and second floors of the Mansion and on the White House grounds. [13] [13 During the Spanish-American War, the Secret Service also served as the primary intelligence agency for the War Departnent. It gathered intelligence and conducted counter espionage activities both domestically and abroad.] 72 After the war, Secret Service operatives continued to serve at the White House at least part of the time. In addition, operatives regularly accompanied McKinley during his travels. With the expiration of the emergency war fund these activities once again exceeded the Secret Service's statutory authority. However, Secret Service Chief John Wilkie felt obligated to provide the protection anyway. President McKinley received a large number of threats, which seemed particularly credible in light of a series of political assassinations that took place in Europe during this period. In 1901, President McKinley was shot and fatally wounded by anarchist Leon Czolgosz while standing in a receiving line at the Pan American Exposition in Buffalo, New ork. Three Secret Service operatives were guarding him at the time, along with eighteen exposition policemen, eleven members of the Coast Guard, and four Buffalo city detectives. One of the Secret Service operatives was out of position when Czolgosz approached President McKinley, because the president of the exposition d requested the spot directly next to MdCinley, where the operative normally stood. , in 1906, Congress quietly included language in the Sundry Civil Expenses Act authorizing the Secretary of the Treasury to use funds for "the protection of theperson of the President of the United States." {Treasury=Money=Illuminatti - sog} Since the Secret Service was officially authorized to provide protective services in 1906, only one person has been killed under its watch - President John F. Kennedy, who was fatally wounded by Lee Harvey Oswald while riding in a motorcade through Dallas, Texas, on November 22, 1963. Since the inception of the Secret Service, however, there also have been six other potentially deadly assaults on Secret Service protectees. The first occurred on February 1, 1933, in Miami, Florida Giuseppe Zangara fired five shots a President-elect Franklin D. Roosevelt, who was making an impromptu speech while sitting in an open car that had stopped momentarily. Although none of the shots hit President Roosevelt, Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit four other people, including a Secret Service agent. From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:36 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:15:36 -0700 (PDT) Subject: FDR7 Message-ID: <009C9C7C.5CABC0E0.15@west.cscwc.pima.edu> The Manchurian Candidate ~ Raymond Shaw 1901 McKinley is assassinated by anarchist; he is succeeded by Theodore Roosevelt 1911 FDR receives degree of Master Mason conferred by Holland Lodge No. 8, New ork City, 28 November 1913 FDR is appointed assistant secretary of the Navy, April 1919 FDR travels to Europe to supervise naval establishment, January-February 1919 -- Adolph Hitler joins the Thule Society in Germany. In the Thule Society, the 'black sun' played a prominent role as a 'sacred' symbol of the Aryans. The inner core within the Thule Society are all Satanists. 1927 FDR founds the Georgia Warm Springs Foundation, therapy center for the treatment of polio victims Stalin becomes Soviet dictator {FDR given quarter-million to run - sog} 1928 FDR again placed in nomination at Democratic National Convention B Governor Alfred E. Smith FDR is elected governor of New ork, opposed by Alfred Ottinger, by 50.3 percent of the vote, 6 November 1933 FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe Zangara, 15 February FDR is inaugurated as 32nd president, 4 March U.S. recognizes the USSR and resumes trade The Twenty-First Amendment repeals prohibition 1945 FDR dies, Warm Springs, Georgia, 12 April; buried Hyde Park, New ork, 15 April Mussolini is killed Hitler commits suicide, Germany surrenders He fired shot after shot at FDR, but a woman's quick move knocked the gun upward. The bullets hit several bystanders and mortally wounded Mayor Cermak of Miami. {Cermak was standing *beside* FDR-gun knocked upward would not change hit targets - sog} In assassination cases, there has always existed the dilemma of establishing the murderer's sanity. Authorities are uncomfortable to admit that sane people kill government leaders. At the same time, many feel that if the assassin is deemed insane, he will escape "proper" punishment. It is much easier to lock upon the assassin as a steely-eyed, cold blooded killer, who is a threat to society...and only half crazy. Nineteen days after Fromme's failed attempt, Sara Jane Moore fired a shot at President Ford, but missed. Prior to the attack, she wrote the following poem: "Hold-Hold, still my hand. Steady my eye, chill my heart, And let my gun sing for the people. Scream their anger, cleanse with their hate, And kill this monster." While most assassins have deep, emotional problems, few are truly insane, unable to distinguish between right and wrong. Defendants are presumed to be sane and responsible for their crimes until the contrary can be proven. In order to establish insanity, it must be proved that, at the time of the offense, the defendant was laboring under such a defect or disease of the mind so as not to know the nature and quality of the act or did not know that it was wrong. This is referred to as the McNaughton Rule, and it is based on an 1843 assassination case. John Schrank was convicted of shooting former-President Theodore Roosevelt in 1912. Roosevelt recovered from the wound and carried Schrank's bullet in his chest for the rest of his life John W. Hinckley Jr. was acquitted by reason of insanity for shooting President Ronald Reagan in 1981. He has been held in St. Elizabeth's Hospital since his trial and has petitioned the courts to win his release. {Cermak-Brady - sog} In 1935, Dr. Carl Weiss shot and killed Senator Huey Long outside the governor's office of the Louisiana State Capitol Building in Baton Rouge. Long's bodyguards opened fire on Weiss, killing him instantly. He suffered more than 50 bullet wounds. There is evidence that suggests Long was accidentally shot and killed by one of his own guards.ods are those with high rates of female-headed families, welfare dependency and labor force and school dropouts. In 1990, in the typical "bad behavior" white underclass tract, 55 percent of the men did not participate in the work force and 42 percent of the residents had dropped out of school; the corresponding figures for black tracts were 62 percent and 36 percent... They are easy for politicians to manipulate and are no threat to do anything very imaginative or even act in concert in defense of their own interests without outside leadership. They also constitute a talking point. Politicians can talk about taking steps to correct the problem and improve conditions for these "victims of society." Humans are social beings, they require an emotional and spiritual bond to their society, with that society viewed as a collective entity. Intellectuals spend their lives constructing and tinkering with their identities. the educational system of the United States. It is clearly inadequate, since ordinary people in an advanced industrial society should be able to handle abstract reasoning It is not that the system has failed at what it set out to do. One cannot be said to have failed at something one has never attempted. It is important to keep ordinary people in their place If ordinary people were able to reason effectively and draw conclusions about matters outside of their day to day experience, then they might start asking questions that politicians would have difficulty answering. t the belief in lack of ability tends to bring about that lack of ability. What one must keep in mind in regard to this stereotype is that it constitutes an assertion as to fact. In other words, it is not a moral principle, it is not a value judgement, and it is not, in itself, an expression of prejudice. If one were to assert it, knowing and believing that it was false, then it would be an expression of prejudice. One can only be truly equal if one accepts the same burdens and responsibilities as everyone else. . One, of course, needs to throw in the sexual stereotypes also, since they played a similar role in building identity. The main problem is to understand the function of ethnic identity in a society. sense of duty and obligation. One cannot feel such a sense of duty without a clear understanding of one's place in the world. That is what identity is all about. The collective identity, which the people of Oaxaca have, is what makes each individual accountable to society. Peer pressure, as one sees in operation in the case of Mr. Santiago, is the means by which a fully functional society influences and modifies the behavior of its members. In the United States, such outpourings of ethnic sentiment on the part of the dominant culture are discouraged There is to be no expression of ethnic identity not approved by the intellectual establishment. The government must seek to suppress any alternative means of social control. All legitimate power must be held by the government, even to the point of making every member of society a criminal. *** {TCM tag-line - sog} *** e sum total of the effort. Attacks on certain forms of religious expression are part of it also, but it is the "Civil Rights Movement" that provides an excuse for government to intrude into all kinds of interpersonal relationships. The more the government can do this, the more people are alienated from society. People are no longer accountable to one another but to a vast impersonal bureaucracy. One must recall that this is the basic premise of Totalitarian social organization. The purpose of this effort is to crush all opposition to the agenda of the ruling oligarchy. The democratic forms are meaningless in the absence of a willingness on the part of the population in general to assume collective responsibility for the maintenance of social order. All power ultimately lies in the hands of those who perform that function. The people in general can only do this by means of imposing their collective identity in the ways the author has described. If one can destroy the emotional and spiritual bonds that provide the sort of collective identity which U.S. society once had, then one has only millions of sheep and a few wolves. . From a recent book on the human brain one has: The sexes are different because their brains are different. The brain, the chief administrative and emotional organ of life, is differently constructed in men and in women; it processes information in a different way, which results in different perceptions, priorities and behavior. human behavior in general is much more biologically driven than was believed previously. What this means, among other things, is that human behavior cannot be modified beyond certain limits. It is not possible, for instance, to fundamentally change the nature of the male/female relationship The problem in this Detroit neighborhood is not that welfare benefits are too low. After all, these people are very wealthy compared to Mr. Santiago. What they have not received from society is a strong sense of ethnic identity. As a result, they have rejected society and have set out to make their own. One sees them assuming the responsibility for the maintenance of social order but in an antisocial context. The gang symbols and mode of dress are a typical male effort to impose their identity on the environment, just as Mr. Santiago was doing in placing flowers at the statue of the patron saint. In the matter of the gang symbols, however, one sees a pattern of social disintegration. In the case of Americans, great efforts are made in the form of entertainment, bizarre religious activities (The Branch Davidians, for example), appeals to great collective efforts (Save the Whale), self improvement (lose weight), and many other artificial undertakings to give life meaning and purpose. The problem with American society is precisely this artificiality. If one rejects ethnic identity and the social cohesion that it provides, then one must resort to coercion. Unfortunately, there is an end to that twisted path. In order to survive, a society must conform itself to the psychological needs of the average person and not attempt to coerce people into conforming to some false ideology. the government is a big part of the cause of the problem in that it has set out to undermine identity 1927 Despite international protest and allegations of perjury, evidence tampering, and judicial prejudice, Anarchists Nicola Sacco and Bartolomeo Vanzetti are executed for robbery and murder. 1966 Eagle Scout and ex-Marine Charles Whitman opens fire from atop the 27-story tower at the University of Texas at Austin. He kills 21 people and wounds nearly 30 before being killed by police. THE OMEGA FILE: [Greys, Nazis, Underground Bases, and the New World Order] by Branton they have taken control of much of the 'underground black budget empire' -- a vast network of interconnected underground military-industrial bases and cities that have been constructed with the assistance of TRILLIONS [yes, I said TRILLIONS] of dollars siphoned from the American economy via taxes, drugs, organized crime, etc., money which has literally gone 'down the tubes', leaving our economy in a state of chaos. {Is it reasonable to believe that those who monitor 'all' communications, and control banking & finance become 'stupid' when it comes to Trillions of dollars of black-market income? Duhhh... - sog} 510410 - Truman relieves General MacArthur of his command and replaces him with Gen. Ridgeway, a CFR member. MacArthur earlier disobeys U.N. directives by initiating a secret attack on the Communist stronghold at Inchon [leading to a quick end of the war], after he and other military leaders suspected the pro-Socialist U.N. officials of betraying their battle plans to the North Koreans. Truman goes into hiding at Camp David for two weeks following MacArthur's return, fearing that the highest-ranking military general in the United States would arrest him for treason. After Truman fires MacArthur for his unauthorized military action, he recieves much condemnation from confused and angered patriotic Americans who criticize Truman for his decision. 521104 - NSA: Presidential Executive Orders exempts NSA from all laws. National Security Agency imputed with even more power and influence than CIA. 530000 - Dwight Eisenhower becomes president. Eisenhower appoints Nelson Rockefeller to group on Govt. reorganization. It was Rockefeller, in collaboration with 'Nazi' agents, who assisted in the establishment of MJ-12, the NSA and CIA as fronts for Bavarian Intelligence, a 'secret government' within the Constitutional government. Many who have gotten close to the CIA's ultimate secret -- that is the Nazi S.S. controlling factor -- are murdered by CIA assassins. Allan Dulles, CIA Director, approves mind control project MKDELTA. {Post-War Presidents / Navy / CIA / NSA - sog} 740000 - Gerald Ford becomes President. Nelson Rockefeller becomes Vice-president. (Note: Here is an alternative to a famous parable: "A fool and his money are soon elected"! - Branton) 1919 -- Adolph Hitler joins the Thule Society in Germany. In the Thule Society, the 'black sun' played a prominent role as a 'sacred' symbol of the Aryans. The inner core within the Thule Society are all Satanists. 1919 FDR travels to Europe to supervise naval establishment, January-February 1934 -- the vast Rockefeller financial empire, in an effort to back German racial superiority and eugenics, financially supports Nazi Germany in collaboration with Prescott Bush [George Bush's father]. In 1929 the German Ernst Rudin enacts German Sterilization Laws. {Eugenics was Policy forerunner of Planned ParentHoods - sog} 1943 -- General Reinhard Gehlen infiltrates Soviat intelligence. Gehlen forms a partnership with Allen Dulles [a Bavarian Illuminist and American 'Nazi'], which results in the creation of the CIA [and some years later the more powerful NSA] from a core of Nazi SS intelligence officers brought to the US under the auspices of Operation Sunrise, Overcast, and Paperclip On April 12, Roosevelt dies and Harry Truman, a high Mason as was Roosevelt, becomes President of the United States. On May 7, 1945, Germany surrenders. Whether Truman was directly aware of the fact that his sponsors, the German-American Rockefellers, had financed the Bolshevik and Nazi revolutions, is uncertain. 1952 -- Reinhard Gehlen and Allen Dulles are dubbed Knights of Malta by the VATICAN. Jesus of Nazareth - the Christ - or Melchizedek The following are some of the subjects that radio personality David Emory has covered on his talk-radio broadcasts in California: -- The pivotal role that Nazi and fascist elements played in the assassination of President Kennedy... evidence that American and German "Neo-Nazis", the Gehlen spy organization and Nazi rocket specialists working under Werner Von Braun figured prominently in the killing. -- The support American industrialists and financiers gave to Hitler's Germany and how this affected the allied military policy during the war as well as the incorporation of the Third Reich's intelligence forces into the CIA at the conflict's conclusion. -- The SS origin of the Green Berets, the re-establishment of Nazi elements in West Germany after the war, as well as Nazi influences on Senator Joe McCarthy, Interpol and the Alger Hiss case. -- The pivotal role in the Cold War played by Hitler's most important spymaster and his Nazi Eastern Front intelligence organization... the Gehlen organization's incorporation into the CIA; its role in establishing Radio Free Europe AND the first Palestinian terrorist groups as well as Gehlen's personal political ideology. -- The evolution of American fascism from the 1930's to the present... -- The assassination program which eliminated the democratic leadership of Weimar Germany paving the way for Hitler's rise to power... the formation of the Nazi Party as a front for German military intelligence. -- The Third Reich's extermination programs from the "mercy killing" of handicapped children to the Auschwitz death factory. The Nazi liquidation's are exposed as a direct outgrowth of the international eugenics and mental hygiene movements, both mainstream movements with important implications for contemporary society. -- Circumstantial evidence suggesting that then vice-president George Bush may have been involved with the attempt on the life of former President Reagan... the close connections between the family of convicted would-be assassin John Hinckley and the Bush family as well as Hinckley's Nazi background. -- Livin' In The USA: The Search for Nazi War Criminals. In 1985, the San Francisco Examiner listed ten Third Reich fugitives considered to be the "most wanted" of all war criminals... the fact that most of them worked for U.S. intelligence after the war. -- Adolf Hitler's escape from Germany at the end of World War II using information contained in previously classified U.S. intelligence archives, accessed by a London Times journalist and discussed in a military history quarterly. --(Note: It is indeed curious that the American Psychiatric Association initially contained over 2,000 German 'immigrant' members following World War II. The APA also was/is involved in GUN CONTROL lobbying. Branton) -- From the www.buildfreedom.com website we read: "A principle player in the 1974 foundings of both HCI [then called the National Council to Control Handguns] and the NCBH [National Coalition to Ban Handguns, now renamed the Coalition Against Gun Violence] was Ed Wells, who was A 25-EAR VETERAN OF THE COVERT OPERATIONS DIVISION OF THE CIA... There was also a fund raiser for NCBH hosted by the man Nixon appointed as CIA Director, William Colby... HCI spokesman Greg Risch -- incredibly -- admitted that "SURE THERE ARE A LOT OF CIA PEOPLE IN IT [HCI]", and also stated that there are quite a few "EX-CIA WHO DONATE TO US." -- Several reasons for American's lack of awareness of fascism, its history and its methodology: lowering American educational standards and the deliberate obfuscation of the historical connection between powerful industrial and financial interests and fascism. Both have significantly undermined contemporary understanding of the political forces which produced Hitler and Mussolini... -- the clandestine methodology of fascism, in particular the underground organizational structure of fascist movements and its effectiveness in subverting established democracies... In the aftermath of World War I, the German Nazis learned that anti communism could be used to achieve strategic leverage over Germany's prospective enemies such as Great Britain and the United States. The Third Reich sought to escape the full consequences of military defeat in World War II by playing the anti-Communist card again. Although a few of the more obvious and obnoxious elements of Nazism were removed, Nazis were returned to power at virtually every level and in almost every capacity in the Federal Republic of Germany. In its American incarnation, liberation theory called for "rolling back" communism out of Eastern Europe and the break-up of the Soviet Union into its constituent ethnic Republics. {We give half of Europe to the Soviets and then immediately declare them the Great Enemy, and strive to 'free' the same countries we handed them. Duuhhh... -sog} the United States badly compromised its democratic institutions during the Cold War, possibly beyond repair. Mind Control - or if the phrase "remember to forget" has a great significance to you, you may want to read on & consider contacting me. {Elvis / "I Forgot To Remember To Forget" - sog} "Oswald Acted Alone, But Elvis Was Part Of The Conspiracy" Although Texas law required an immediate autopsy in Dallas, the site of the crime, Crenshaw insisted that a swarm of Secret Service agents entered the hospital and demanded that the autopsy be performed out of state. It is interesting that the Secret Service of the U.S. and other countries are reportedly patched directly into the highest levels of Scottish Rite Masonry, or the Bavarian Illumiati. Every witness who could shed light on the Kennedy murders has been systematically hunted down and murdered. [I seek information from those who were in it. I believe I already know one who was. ou might know something about it if you recognize the code name BLACKHAWK. Other victims of assassination by the Group whose names will be recognized include Franklin D. Roosevelt, Marilyn Monroe, Mahatma Gandhi, Anwar Sadat & Olof Palme. There have been many thousands more. Dwight D. Eisenhower -- whose campaign was sponsored by the Rockefellers and through whose administration many of the national socialist policies of the Rockefellers were implemented within the U.S. Intelligence Agencies They want to impose on this planet a centralized world oligarchy - not a democracy -- akin to a FASCIST state in which there will be genocide on a massive scale, total state control over all aspects of human behavior and communication and control of the human mind and spirit through manipulation of the world's major religions, genetic engineering, drugs, tightly-controlled media and by other means. {We are 'part-time' defenders against genocide,etc. - sog} {Part-time defenders against DrugLordsWhoHaveConnectionsToBush - sog} Brave New World. Huxley apparently knew about the plan from his brother. In addition, a good part of the funding over the years has come from large-scale diversions of funds from all major treasuries in the western world. The 'skim' appears to be about .5% of all incoming funds. one of Gen. Gehlen's specialties in WWII Nazi intelligence -- divert attention to the "Red menace." What the Group wanted by the time of the "incubation period" [1995 2000] was a society that was uneducated, amoral, uncommitted to democratic institutions, living in fear, with a sudden and very drastic reduction in spendable income simultaneous with societal chaos. dramatically increased media [TV] portrayal of violence and joblessness [role models have no jobs, bad guys live in big houses, etc.; begin your reading with 'The Early Window', by Liebert & Sprafkin], reduced the standards of education and early training for rational thought {Roosevelt's Spending War --> Cold Spending War --> War Spending On Drugs --> War On InterNetCrimePedophileTerrorists - sog} (Remember that the 'root' of the 'New World Order' agenda can be traced back to the secret occultic societies connected to Bavaria, Germany -- the Illuminati, Thule, Nazis, Vril, Rosicrucian, Black Gnostics, Skull & Bones, Cult of the Serpent, Templars, Babylon Mystery Cult, O.T.O., Golden Dawn, Jesuits, and all of the many lesser-known inter locking secret societies which grew out of the occult-military core of the early Roman Empire and the later 'Holy Roman Empire' [HO.R.E.] -- a core that had its center of power not only in Rome but also in Germany. - Branton) They kill on command. THE ARE ARTIFICIALL-PRODUCED 'MULTIPLE' PERSONALITIES. One of the top people in their development appears to have been Sirhan Sirhan's psychiatrist, DR. DIAMOND. the United Nations Organization or UNO is deeply involved in this fascist global conspiracy. Just note the controversy surrounding former U.N. Secretary General and Austrian Kurt Waldheim concerning his Nazi past and allegations that he is a war criminal secret Nazi S.S.-connected Society which reputedly has retrieved the "Spear of Destiny" which so fascinated Adolph Hitler On the outside Nazism and Communism may seem to be in conflict, however it was the Rockefellers and the German Black Nobility cults who created BOTH movements. Tyranny is tyranny, whether it be National Socialism or Global Socialism. Perhaps the Bavarians created two types of Socialism: Global Socialism -- as a means to tear down the international competition; and National Socialism -- as a means to build up the German empire. We should NEVER forget that Lenin, the Communist Revolutionist, was an agent of the GERMAN government. What is not commonly known is that Stalin murdered nearly 6 million Jews during the World War II period, as did Hitler. the Rockefeller's -- according to Economics expert and advisor Antony Sutton and others -- had financially backed BOTH the Bolsheviks AND the Nazis We must remember that National Socialism [Nazism] IS 'Socialism' Col. W.J. Heimlich, former Chief, United States Intelligence, at Berlin, stated for publication that he was in charge of determining what had happened to Hitler and after a thorough investigation his report was: "There was no evidence beyond that of HEARSA to support the THEOR of Hitler's suicide." He also stated, "On the basis of present evidence, no insurance company in America would pay a claim on Adolph Hitler." I still have the September, 1948, issue of a magazine called "The Plain Truth" with the headline article: "IS HITLER ALIVE, OR DEAD?," subtitled: "Here is summarized the conclusions of an exhaustive three year investigation -- together with reasons for believing Hitler may be alive and secretly planning the biggest hoax of all history." Another article in November, 1949, says "The Nazis went underground, May 16, 1943!" and details a meeting at the residence of Krupp von Bohlen-Halbach, the head of I.G. FARBEN, etc., at which they planned "FOR WORLD WAR III." The June, 1952, issue of "The Plain Truth" is headlined: "HITLER 'May Be Alive!'" The article states: "Now, NEW FACTS, or purported facts, leak out. It's reported now that in 1940 the Nazis started to amass tractors, planes, sledges, gliders, and all sorts of machinery and materials IN THE SOUTH POLAR REGIONS -- that for the next 4 years Nazi technicians built, on an almost unknown CONTINENT, Antarctica, the Fuhrer's SHANGRILA -- a new Berchtesgaden." {HWA/GTA/SOG - sog} in spite of Glasnost and the new freedom of access to Russian files, the files on Hitler are still some of the most highly classified items of the Soviets. {The citizen as Schillple...we let Them hide the Truth and then ridicule anyone with an opinion/view which contadicts the Official Story. - sog} {Even when The Facts obviously/blatantly contradict the Official Story...as per, Hitler not proven dead...ever see *that* in the school history books? - sog} Harry Dexter White [real name Weiss] under Henry Morgenthau When J. Edgar Hoover went to President Truman with all the evidence that the Assistant Secretary of the Treasury was a Communist spy and thief, TRUMAN of course removed Weiss [White] from his job -- and PROMOTED HIM to head of the International Monetary Fund. I kid you not, look it up. (This tells you whose side Truman was really on. - Branton) The story has a rather common ending -- when a controversy developed in the press concerning this incident, Weiss became a "suicide." {AKA/VFoster/SOP - sog} "Martin Bormann, Nazi in Exile" by Paul Manning The Russians were NATIONALISTS, as opposed to [the] Bolsheviks who took their country away from them. The [so-called] Bolsheviks were trained in the lower East Side of New ork City and financed by New ork and London bankers. They invaded Russia, killed the Tzar and many Nationalists and took over the government. {Those with $ and planning win...EoStory. Where do honest people get funding and support in a corrupt worlds? - sog} In 1932, the British-led "Eugenics'' movement designated the Rockefellers' Dr. Rudin as the president of the worldwide Eugenics Federation. The movement called for the killing or sterilization of people whose HEREDIT made them a public burden. A few months later, Hitler took over Germany and the Rockefeller-Rudin apparatus became a section of the Nazi state. The regime appointed Rudin head of the Racial Hygiene Society. Rudin and his staff, as part of the Task Force of Heredity Experts chaired by SS chief Heinrich Himmler, drew up the sterilization law. Described as an American Model law, it was adopted in July 1933 and proudly printed in the September 1933 Eugenical News [USA] with Hitler's signature. The Rockefeller group drew up other race laws, also based on existing Virginia statutes. The 'T4'' unit of the Hitler Chancery, based on psychiatrists led by Rudin and his staff, cooperated in creating propaganda films to sell mercy killing [euthanasia] to German citizens. The public reacted antagonistically: Hitler had to withdraw a tear-jerker right-to-die film from the movie theaters. The proper groundwork had not yet been laid. Under the Nazis, the German chemical company I.G. FARBEN and Rockefeller's STANDARD [EXXON] OIL of New Jersey were effectively a SINGLE FIRM, merged in hundreds of cartel arrangements. I.G. FARBEN was led up until 1937 by the Warburg family, Rockefeller's partner in banking and in the design of Nazi German eugenics. Following the German invasion of Poland in 1939, Standard Oil pledged to keep the merger with I.G. Farben going even if the U.S. entered the war. This was exposed in 1942 by Sen. Harry Truman's investigating committee, and President Roosevelt took hundreds of legal measures during the war to stop the Standard - I.G. Farben cartel from supplying the enemy war machine. In 1940-41, I.G. Farben built a gigantic factory at Auschwitz in Poland, DR. MENGELE... In 1943, Otmar Verschuer's assistant Josef Mengele was made medical commandant of Auschwitz. As wartime director of Rockefeller's Kaiser Wilhelm Institute for Anthropology, Eugenics and Human Heredity in Berlin, Verschuer secured funds for Mengele's experiments at Auschwitz from the German Research Council. (Remember, the Rockefellers were originally German immigrants to America. - Branton) In 1936, Rockefeller's Dr. Franz Kallmann interrupted his study of hereditary degeneracy and emigrated to America because he was half Jewish. Kallmann went to New ork and established the Medical Genetics Department of the New ork State Psychiatric Institute. The SCOTTISH RITE of Freemasonry published Kallman's study of over 1,000 cases of schizophrenia, which tried to prove its hereditary basis. In the book, Kallmann thanked his long-time boss and mentor Rudin. Kallmann's book, published in 1938 in the USA and Nazi Germany, was used by the T4 unit as a rationalization to begin in 1939 the murder of mental patients and various "defectives" {ForeRunner to genetic/cloning/'grafting' technology - sog} {Hitler was *scapegoat* for excesses of SOP - sog} From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:56 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 00:15:56 -0700 (PDT) Subject: FDR8 Message-ID: <009C9C7C.68C856E0.17@west.cscwc.pima.edu> In the 1950s, the Rockefellers reorganized the U.S. eugenics movement in their own family offices, with spinoff population-control AND abortion groups The Eugenics Society changed its name to the "Society for the Study of Social Biology", its current name. With support from the Rockefellers, the Eugenics Society [England] set up a sub-committee called the INTERNATIONAL PLANNED PARENTHOOD FEDERATION, which for 12 years had no other address than the Eugenics Society. (Note: Margaret Sanger plays a central role in this PLANNED PARENTHOOD network. In her book 'PIVOT OF CIVILIZATION', in reference to free MATERNIT care for the poor, Sanger states: "Instead of DECREASING and aiming to ELIMINATE THE STOCKS that are most detrimental to the future of the race and the world it tends to render them to a menacing degree dominant.") {PILOT Of Civilization(?) - sog} Rockefellers, who played a major role in grooming the agents of the Communist-Socialist revolution in Russia AND the agents of the National Socialist revolution in Germany. Whether it is left-handed Socialism or right-handed Socialism -- Socialism either way you look at it is TOTALITARIANISM! - Branton). "...How many of you have seen the book 'BLANK CHECK'?... It is not a UFO book. I strongly recommend that you read the book 'BLANK CHECK' so that you can understand something about how these projects are funded without your say so, indeed WITHOUT THE SA SO OF CONGRESS. Garrison might have convicted Clay Shaw if not for the fact that Garrison's star witness David Ferry was killed a few days before he was to testify at Clay Shaw's trial. *** FEMA / FEMA / FEMA *** (Most do not realize that Adolph Hitler's second book, after he wrote MEIN KAMPF, was titled -- believe it or not -- "THE NEW WORLD ORDER". - Branton) SPECULATE NO MORE ON THE SUSPICIOUS SUICIDE OF ADMIRAL MICHAEL BOORDA [FORMER DIRECTOR OF THE U.S. NAVAL FORCES]. I WAS INFORMED HE WAS TERMINATED BECAUSE OF HIS REFUSAL TO COOPERATE IN THE COVERT PLAN B OUR TRAITOROUS NWO FORCES WITHIN OUR OWN GOVERNMENT TO ASSIST IN THE COMING INVASION OF AMERICA. {America is in perfect position to serve as the Great Beast of the World which must be destroyed, like Nazi Germany. - sog} The following information is c1997, Andrew H. Hochheimer, and may not be reposted without written permission. {es it can... - sog} I think it is important that people start reading 'The Full Story' when pursuing any fringe topic like Ufology, the Bermuda Triangle, etc. There are plenty of paranoid delusionists writing books like "Aliens told me 'Humans taste like chicken...'" file:///C|/New Deal/Dave Emory/Nazi Roosevelt.txt Topic 203 Hitler won gn:peacenews News from War Resisters International 7:18 PM Apr 25, 1995 by MILAN RAI First the empire, second the war against Nazism -- and even that only to secure "our interests". The historical record after the war bears out these priorities. Throughout the world, the British and US governments installed those willing to cater to their "interests", even when these were fascists or collaborators who the war had supposedly been against. Throughout the world, Britain and the USA destroyed those who stood in the way of their plans for control, even when these resisters were the democrats and anti-fascists who had fought alongside the Anglo-American forces. Subject: "... would cause us to look at this person as a threat" Date: Tue, 12 May 1998 11:45:14 -0700 From: Tim May To: cypherpunks at cyberpass.net I just saw this on one of the newsgroups: "A cultist is one who has a strong belief in the Bible and the Second Coming of Christ; who frequently attends Bible studies; who has a high level of financial giving to a Christian cause; who home schools for their children; who has accumulated survival foods and has a strong belief in the Second Amendment; and who distrusts big government. Any of these may qualify [a person as a cultist] but certainly more than one [of these] would cause us to look at this person as a threat, and his family as being in a risk situation that qualified for government interference." -Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994 No wonder the government views so many people as threats. How does "qualified for government interference" square with the First, Second, and Fourth Amendments? (No doubt Janet also believes that belief in that pesky Fifth Amendment, not to mention the rest of the Constitution, will cause the government to look at these wackos as threats and worth of "government interference." I'm looking forward to the ear 2000 Meltdown. This fucked up country needs a low-level reformatting. And a million government criminals and welfare addicts sent to the wall. --Tim May "The tree of liberty must be watered periodically with the blood of tyrants...." ---------:---------:---------:---------:---------:---------:------ --:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Licensed Ontologist | black markets, collapse of governments. Long ago and far away, Adolf Hitler was talking to Hermann Rauschning and said, "The people about us are unaware of what is really happening to them: They gaze fascinated at one or two familiar superficialities, such as possession and income and rank and other outworn conceptions. As long as these are kept intact, they are quite satisfied. But in the meantime they have entered a new relation: a powerful social force has caught them up. They themselves are changed. What are ownership and income to that? Why need we trouble to socialize banks and factories? We socialize human beings." I see someone has made a TV movie of "Brave New World." Are we to view it as a work of fiction, or a Scribean foreshadowing of what looms in the very near future? Geoff Metcalf "War is a matter of vital importance for the state; it is the province of life and death, the road which leads to survival or elimination. It is essential to study it in depth". Sun Tzu, "The Art of War" http://www.monde-diplomatique.fr/md/en/1997/08-09/marcos.html The fourth world war has begun In Chiapas, the Zapatista National Liberation Army issued no directives about the elections, choosing instead to withdraw to the sheltering greenery of the Lacandona Forest. >From this sanctuary the head of the ZNLA, Sub-Commandant Marcos, sent us this original and geostrategic analysis of the new world picture. by Sub-Commandant Marcos * Zapatista National Liberation Army, Chiapas, Mexico The defeat of the "evil empire" has opened up new markets, and the struggle over them is leading to a new world war - the fourth. Unlike the third world war, in which the conflict between capitalism and socialism took place over a variety of terrains and with varying degrees of intensity, the fourth world war is being conducted between major financial centres in theatres of war that are global in scale and with a level of intensity that is fierce and constant. The third world war showed the benefits of "total war" for its victor, which was capitalism. In the post-cold war period we see the emergence of a new planetary scenario in which the principal conflictual elements are the growing importance of no-man's-lands (arising out of the collapse of the Eastern bloc countries), the expansion of a number of major powers (the United States, the European Union and Japan), a world economic crisis and a new technical revolution based on information technology. Thanks to computers and the technological revolution, the financial markets, operating from their offices and answerable to nobody but themselves, have been imposing their laws and world-view on the planet as a whole. Globalisation is merely the totalitarian extension of the logic of the finance markets to all aspects of life. Where they were once in command of their economies, the nation states (and their governments) are commanded - or rather telecommanded - by the same basic logic of financial power, commercial free trade. And in addition, this logic has profited from a new permeability created by the development of telecommunications to appropriate all aspects of social activity. At last, a world war which is totally total! The new international capitalism renders national capitalism obsolete and effectively starves their public powers into extinction. The blow has been so brutal that sovereign states have lost the strength to defend their citizens' interests. The fine showcase inherited from the ending of the cold war - the new world order - has shattered into fragments as a result of the neoliberal explosion. It takes no more than a few minutes for companies and states to be sunk - but they are sunk not by winds of proletarian revolution, but by the violence of the hurricanes of world finance. The son (neoliberalism) is devouring the father (national capital) and, in the process, is destroying the lies of capitalist ideology: in the new world order there is neither democracy nor freedom, neither equality nor fraternity. The planetary stage is transformed into a new battlefield, in which chaos reigns. Megalopolises are reproducing themselves right across the planet. Their favourite spawning ground is in the world's free trade areas. In North America, the North American Free Trade Agreement between Canada, the United States and Mexico is a prelude to the accomplishment of an old dream of US conquest: "America for the Americans". Are megalopolises replacing nations? No, or rather not merely that. They are assigning them new functions, new limits and new perspectives. Entire countries are becoming departments of the neoliberal mega-enterprise. the financial centres are working on a reconstruction of nation states and are reorganising them within a new logic: the economic has the upper hand over the social. In this new war, politics, as the organiser of the nation state, no longer exists. Now politics serves solely in order to manage the economy, and politicians are now merely company managers. The world's new masters have no need to govern directly. National governments take on the role of running things on their behalf. This is what the new order means - unification of the world into one single market. The unification produced by neoliberalism is economic: in the giant planetary hypermarket it is only commodities that circulate freely, not people. What we have here is a destruction of the material bases of nation states, but we also have a destruction of history and culture. Neoliberalism thus imposes the destruction of nations and of groups of nations in order to fuse them into one single model. The war which neoliberalism is conducting against humanity is thus a planetary war, and is the worst and most cruel ever seen. What we have here is a puzzle. The first of these pieces is the two-fold accumulation of wealth and of poverty at the two poles of planetary society. The second is the total exploitation of the totality of the world. The third is the nightmare of that part of humanity condemned to a life of wandering. The fourth is the sickening relationship between crime and state power. The fifth is state violence. The sixth is the mystery of megapolitics. The seventh is the multiple forms of resistance which humanity is deploying against neoliberalism. Piece no. 1: The concentration of wealth and the distribution of poverty The earth has five billion human inhabitants: of these, only 500 million live comfortably; the remaining 4.5 billion endure lives of poverty. The gap between rich and poor is enormous: far from decreasing, social inequalities are growing. Piece no. 2: The globalisation of exploitation the world capitalist system is "modernising" the production, circulation and consumption of commodities. The new technological revolution (information technology) and the new revolution in politics (the megalopolises emerging from the ruins of the nation state) produce a new social "revolution". This social revolution consists of a rearrangement, a reorganisation of social forces and, principally, of the workforce. The world's economically active population (EAP) went from 1.38 billion in 1960 to 2.37 billion in 1990. A large increase in the number of human beings capable of working and generating wealth. But the new world order arranges this workforce within specific geographical and productive areas, and reassigns their functions (or non-functions, in the case of unemployed and precarious workers) within the plan of world globalisation. The world's economically active population by sector (EAPS) has undergone radical changes during the past 20 years. Agriculture and fishing fell from 22 % in 1970 to 12 % in 1990; manufacture from 25 % to 22 %; but the tertiary sector (commercial, transport, banking and services) has risen from 42 % to 56 %. In developing countries, the tertiary sector has grown from 40 % in 1970 to 57 % in 1990, while agriculture and fishing have fallen from 30 % to 15 % (2). This means that increasing numbers of workers are channelled into the kind of activities necessary for increasing productivity or speeding up the creation of commodities this "modern" capitalist production continues to rely on child labour. Out of 1.15 billion children in the world, at least 100 million live on the streets and 200 million work The globalised market is destroying small and medium- sized companies. With the disappearance of local and regional markets, small and medium producers have no protection and are unable to compete with the giant transnationals. All this combines to create a specific surplus: an excess of human beings who are useless in terms of the new world order because they do not produce, do not consume, and do not borrow from banks. In short, human beings who are disposable. Each day the big finance centres impose their laws on countries and groups of countries all around the world. They re-arrange and re-order the inhabitants of those countries. And at the end of the operation they find there is still an "excess" of people. Piece no. 3: Migration, a nightmare of wandering there is a proliferation of "regional wars" and "internal conflicts"; capital follows paths of atypical accumulation; and large masses of workers are mobilised. Result: a huge rolling wheel of millions of migrants moving across the planet. As "foreigners" in that "world without frontiers" which had been promised by the victors of the cold war, they are forced to endure racist persecution, precarious employment, the loss of their cultural identity, police repression, hunger, imprisonment and murder. The fourth world war - with its mechanisms of destruction/depopulation and reconstruction/reorganisation - involves the displacement of millions of people. Their destiny is to wander the world, carrying the burden of their nightmare with them, so as to constitute a threat to workers who have a job, a scapegoat designed to make people forget their bosses, and to provide a basis for the racism that neoliberalism provokes. Piece no. 4: Financial globalisation and the generalisation of crime With the beginning of the fourth world war, organised crime has globalised its activities. The criminal organisations of five continents have taken on board the "spirit of world cooperation" and have joined together in order to participate in the conquest of new markets. They are investing in legal businesses, not only in order to launder dirty money, but in order to acquire capital for illegal operations. Their preferred activities are luxury property investment, the leisure industry, the media - and banking. According to a UN report, the involvement of crime syndicates has been facilitated by the programmes of structural adjustment which debtor countries have been forced to accept in order to gain access to International Monetary Fund loans (3). So here we have the rectangular mirror within which legality and illegality exchange reflections. On which side of the mirror is the criminal? And on which side is the person who pursues him? Piece no. 5: Legitimate violence of illegitimate powers In the cabaret of globalisation, the state performs a striptease, at the end of which it is left wearing the minimum necessary: its powers of repression. With its material base destroyed, its sovereignty and independence abolished, and its political class eradicated, the nation state increasingly becomes a mere security apparatus in the service of the mega-enterprises which neoliberalism is constructing. Instead of orienting public investment towards social spending, it prefers to improve the equipment which enables it to control society more effectively. What is to be done when the violence derives from the laws of the market? Where is legitimate violence then? And where the illegitimate? The monopoly of violence no longer belongs to nation states: the market has put it up for auction. However, when the monopoly of violence is contested not on the basis of the laws of the market, but in the interests of "those from below", then world power sees it as "aggression". This is one of the (least studied and most condemned) aspects of the challenges launched by the indigenous peoples in arms and in rebellion of the Zapatista National Liberation Army against neoliberalism and for humanity. The new world police wants national armies and police to be simple security bodies guaranteeing order and progress within the megalopolises of neoliberalism. Piece no. 6: Megapolitics and its dwarfs But neoliberalism does not conduct its war solely by "unifying" nations and regions. Its strategy of destruction/depopulati on and reconstruction/reorganisation also produces a fracture or fractures within the nation state. This is the paradox of this fourth world war: while ostensibly working to eliminate frontiers and "unite" nations, it actually leads to a multiplication of frontiers and the smashing apart of nations. The elimination of trade frontiers, the explosion of telecommunications, information superhighways, the omnipresence of financial markets, international free trade agreements - all this contributes to destroying nation states and internal markets. Paradoxically, globalisation produces a fragmented world of isolated pieces, a world full of watertight compartments which may at best be linked by fragile economic gangways. Mega-politics globalises national politics - in other words it ties them to a centre which has world interests and which operates on the logic of the market. It is in the name of the market that wars, credits, buying and selling of commodities, diplomatic recognition, trade blocs, political support, laws on immigration, breakdowns of relationships between countries and investment - in short, the survival of entire nations - are decided. The world-wide power of the financial markets is such that they are not concerned about the political complexion of the leaders of individual countries: what counts in their eyes is a country's respect for the economic programme. Financial disciplines are imposed on all alike. These masters of the world can even tolerate the existence of left-wing governments, on condition that they adopt no measure likely to harm the interests of the market. However, they will never accept policies that tend to break with the dominant model. Piece no. 7: Pockets of resistance "To begin with, I ask you not to confuse resistance with political opposition. Opposition does not oppose itself to power but to a government, and its fully-formed shape is that of an opposition party; resistance, on the other hand, cannot be a party, by definition: it is not made in order to govern but... to resist." (TomY s Segovia, "Alegatorio", Mexico, 1996) The apparent infallibility of globalisation comes up hard against the stubborn disobedience of reality. While neoliberalism is pursuing its war, groups of protesters, kernels of rebels, are forming throughout the planet. The empire of financiers with full pockets confronts the rebellion of pockets of resistance. es, pockets. Of all sizes, of different colours, of varying shapes. Their sole common point is a desire to resist the "new world order" and the crime against humanity that is represented by this fourth world war. Whereas the ZNLA fights to defend national sovereignty, the Mexican Federal Army functions to protect a government which has destroyed the material bases of sovereignty and which has offered the country not only to large-scale foreign capital, but also to drug trafficking. The possible shapes are as numerous as the forms of resistance themselves, as numerous as all the worlds existing in this world. So draw whatever shape you like. In this matter of pockets, as in that of resistance, diversity is a wealth. THE WHITE HOUSE Office of the Press Secretary ________________________________________________________________________ For Immediate Release May 12, 1998 INTERNATIONAL CRIME CONTROL STRATEG BACKGROUND International crime is a serious and potent threat to the American people at home and abroad. Drug and firearms trafficking, terrorism, money laundering, counterfeiting, illegal alien smuggling, trafficking in women and children, advanced fee scams, credit card fraud, auto theft, economic espionage, intellectual property theft, computer hacking, and public corruption are all linked to international criminal activity and all have a direct impact on the security and prosperity of the American people. Americans spend billions of dollars annually on cocaine and heroin, all of which originates abroad; in 1997, there were 123 terrorist attacks against U.S. targets worldwide, including 108 bombings and eight kidnappings; each year, approximately one billion dollars worth of stolen cars are smuggled out of this country; annually, U.S. companies lose up to $23 billion from the illegal duplication and piracy of films, compact discs, computer software, pharmaceutical and textile products, while U.S. credit card companies suffer losses of hundreds of millions of dollars from international fraud; and several hundred U.S. companies and other organizations have already suffered computer attacks in 1998, resulting in millions of dollars of losses and significant threats to our safety and security. PURPOSE The International Crime Control Strategy (ICCS) addresses this increasing threat by providing a framework for integrating all facets of the federal government response to international crime. This first ever strategy reflects the high priority accorded international crime by this Administration and builds on such existing strategies as the National Drug Control Strategy and the Presidential Directives on alien smuggling, counter-terrorism and nuclear materials safety and security. The ICCS is also an important initiative in terms of enhancing the ability of U.S. law enforcement officials to cooperate effectively with their overseas counterparts in investigating and prosecuting international crime cases. At the upcoming Birmingham Summit, G-8 leaders will discuss international crime as one of the most pressing issues related to increasing globalization and rapid technological and economic change. President Clinton will highlight the new ICCS in underscoring the U.S. commitment to close cooperation with all nations who are mobilizing to confront this increasing threat. OVERVIEW The ICCS is a plan of action containing eight broad goals with thirty implementing objectives. The ICCS expresses President Clinton's resolve to combat international crime aggressively and substantially reduce its impact on the daily lives of the American people. The Strategy's eight goals and related objectives are: 1. Extend the First Line of Defense Beyond U.S. Borders by (a) preventing acts of international crime planned abroad before they occur, (b) using all available laws to prosecute select criminal acts committed abroad, and (c) intensifying activities of law enforcement, diplomatic and consular personnel abroad. 2. Protect U.S. Borders by (a) enhancing our land border inspection, detection and monitoring capabilities, (b) improving the effectiveness of maritime and air smuggling interdiction efforts, (c) seeking new, stiffer criminal penalties for smuggling activities, and (d) targeting enforcement and prosecutorial resources more effectively against smuggling crimes and organizations. 3. Deny Safe Haven to International Criminals by (a) negotiating new international agreements to create a seamless web for the prompt location, arrest and extradition of international fugitives, (b) implementing strengthened immigration laws that prevent international criminals from entering the United States and provide for their prompt expulsion when appropriate, and (c) promoting increased cooperation with foreign law enforcement authorities. 4. Counter International Financial Crime by (a) combating money laundering and strengthening enforcement efforts to reduce inbound and outbound movement of criminal proceeds, (b) seizing the assets of international criminals, (c) enhancing bilateral and multilateral cooperation against all financial crime, and (d) targeting offshore centers of international fraud, counterfeiting, electronic access device schemes and other financial crimes. 5. Prevent Criminal Exploitation of International Trade by (a) interdicting illegal technology exports, (b) preventing unfair and predatory trade practices in violation of U.S. criminal law, (c) protecting intellectual property rights, (d) countering industrial theft and economic espionage of U.S. trade secrets, and (e) enforcing import restrictions on certain harmful substances, dangerous organisms and protected species. 6. Respond to Emerging International Crime Threats by (a) disrupting new activities of international organized crime groups, (b) enhancing intelligence efforts against criminal enterprises, (c) reducing trafficking in human beings and crimes against children, (d) increasing enforcement efforts against high tech and computer-related crime, and (e) continuing to identify and counter the vulnerabilities of critical infrastructures and new technologies in high tech areas. 7. Foster International Cooperation and the Rule of Law by (a) establishing international standards, goals and objectives to combat international crime and by actively encouraging compliance, (b) improving bilateral cooperation with foreign governments and law enforcement authorities, and (c) strengthening the rule of law as the foundation for democratic government and free markets in order to reduce societies' vulnerability to criminal exploitation. 8. Optimize the Full Range of U.S. Efforts by (a) enhancing executive branch policy and operational coordination mechanisms to the risks of criminal threats and to integrate strategies, goals and objectives to combat those threats, (b) mobilizing and incorporating the private sector into U.S. government efforts, and (c) developing measures of effectiveness to assess progress over time. ICCS INITIATIVES Highlighted below are ten Administration initiatives to further our efforts to fight international crime. 1. International Crime Control Act of 1998: Proposed legislation containing significant new law enforcement tools for the fight against international crime. 2. Comprehensive Threat Assessment: A comprehensive assessment of the threat to the American people posed by international crime, to be completed within six months. 3. International Conference on Upholding Integrity Among Justice and Security Officials: An international conference to address upholding integrity among key justice and security officials worldwide, to be organized by the Vice President within the next six months. 4. High Tech Crime: An action plan, building on the work of the G 8 justice and interior ministers and the creation of the U.S. National Infrastructure Protection Center, to protect interconnected U.S. communications and information systems from attack by international criminals. 5. Border Law Enforcement: A program to enhance border law enforcement through deployment of advanced detection technology and investment of new resources. 6. Financial Crimes: A commitment to employ aggressively new tools to deny criminals access to U.S. financial institutions and to enhance enforcement efforts against financial crimes. 7. International Asset Forfeiture and Sharing: A U.S. call for new criminal asset forfeiture regimes worldwide and new asset forfeiture sharing agreements with our international partners. 8. OAS Treaty Against Illicit Trafficking in Firearms: A program to work with our OAS partners to implement fully a hemispheric convention to combat the illicit manufacturing of and trafficking in firearms, ammunition and explosives. 9. Economic Espionage and Theft of Industrial Property: A commitment to use the Economic Espionage Act to increase U.S. investigations and prosecutions of individuals and companies who attempt to steal U.S. proprietary information. 10. Strategic Communications Plan: A plan to engage the private sector in assessing the impact of international crime on that sector and in determining its appropriate role in countering this threat. From cory4321 at yahoo.com Mon Jul 27 01:11:23 1998 From: cory4321 at yahoo.com (Cory) Date: Mon, 27 Jul 1998 01:11:23 -0700 (PDT) Subject: Stego program for jpg or wav? (dos/win) Message-ID: <19980727080953.16123.rocketmail@send1e.yahoomail.com> I'm looking for a steganogrophy program for dos/win that supports wav and one that supports jpg files. Any help? _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com From alan at clueserver.org Sun Jul 26 10:33:59 1998 From: alan at clueserver.org (Alan Olsen) Date: Mon, 27 Jul 1998 01:33:59 +0800 Subject: [FP] NHTSA - Digital Image Photo Licenses In-Reply-To: <3.0.3.32.19980726120135.03892610@rboc.net> Message-ID: <3.0.5.32.19980726102743.04234220@clueserver.org> At 12:01 PM 7/26/98 -0400, Robert A. Costner wrote: > >The following is taken from today's SCAN newsletter. > >====================================================================== >SCAN THIS NEWS >7/26/98 > >Following is a brief excerpt from the - > >"U.S. Department of Transportation" >"National Highway Traffic Safety Administration" > >"The Highway Safety Desk Book" > >regarding digitized driver's license photos. [snip] >The implications for law enforcement go far beyond these obvious benefits. >With a central image database of every driver in a state, the public safety >community has a ready-made storehouse of photos to be used in criminal >investigations..... Oregon already has this. (We seem to be an official beta test site for every draconian measure or propaganda campaign they want to implement on a national scale.) The digital licensing program hear was VERY expensive and full of cost over-runs. If your state legislature tells you it can be done inexpensivly or is a "cost cutting measure" they are lying their asses off. --- | "That'll make it hot for them!" - Guy Grand | |"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: | | mankind free in one-key-steganography-privacy!" | Ignore the man | |`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.| | http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com| From mitch at duzen.com.tr Mon Jul 27 01:56:32 1998 From: mitch at duzen.com.tr (S. M. Halloran) Date: Mon, 27 Jul 1998 01:56:32 -0700 (PDT) Subject: The Plot In-Reply-To: <009C9C13.3FFFC220.15@west.cscwc.pima.edu> Message-ID: <199807270750.KAA15929@ankara.192.168.3.5> > > > 2. Presidents and other political figures seem to die at > particular junctures of time wherein they have already > served their purpose to the Controllers. (Note: 'die' > either physically or politically. > i.e. - FDR croaking shortly after getting Truman > elected as the hand-picked replacement of shadowy > figures. > > 3. Ronald Reagan and FDR were both 'front men' for their > wives, and/or those in their wives shadowy background. > FDR, through the efforts of Elanor and her cohorts, > was paid A QUARTER OF A MILLION DOLLARS in order to > enter the New ork governor's race. If Linda finds out that you have hacked her mail account and are using it as a platform in which to be bizarre beyond belief, she just might have the wherewithal to track you down to the ends of the earth and give us all cause to believe your demise is yet another conspiracy among those you have already listed. :) Mitch Halloran Research (Bio)chemist Duzen Laboratories Group Ankara TURKEY mitch at duzen.com.tr Happiness is an activity of the soul in accordance with perfect virtue --from one translation of Aristotle's Nichomachean Ethics From Nina.Huupponen at DataFellows.com Mon Jul 27 04:35:27 1998 From: Nina.Huupponen at DataFellows.com (Nina Huupponen) Date: Mon, 27 Jul 1998 04:35:27 -0700 (PDT) Subject: Data Fellows Announces F-Secure Workstation Suite 3.0 Message-ID: <3.0.3.32.19980727124728.009eac60@smtp.datafellows.com> For immediate release 27 July 1998 DATA FELLOWS ANNOUNCES F-SECURE WORKSTATION SUITE 3.0 The World�s First Suite Product with Strong Encryption Provides Corporations with a Complete Security Solution HELSINKI, FINLAND, July 27, 1998 -- Data Fellows, a leading developer of data security solutions, today announced F-Secure Workstation Suite. The product provides a reliable and easy-to-manage solution for most data security concerns of modern corporations. "F-Secure Workstation Suite provides centralized management of most corporate security aspects," says Mr. Risto Siilasmaa, Chief Executive Officer of Data Fellows. "It combines world-class protection against malicious code with unobtrusive file and network encryption. F-Secure Workstation Suite is easily integrated into the enterprise�s management system. The Suite is also totally unobtrusive for the corporate end-users." F-Secure Workstation Suite is the only product to combine world-class anti-virus protection with strong encryption for network traffic and files stored on the hard disk. Competing offerings from Network Associates and Symantec are not available world-wide with strong encryption. They also lack the centralized policy based management features announced for F-Secure Workstation Suite 4.0. Unparalleled Virus Protection The components of F-Secure Workstation Suite utilize the absolute latest technology in the field. Malicious code detection and removal is based on the F-Secure Anti-Virus product line, the first anti-virus in the world to use multiple scanning engines simultaneously through its revolutionary CounterSign architecture. Its detection rates are unparalleled, and automated updates to the whole network further enhance its reliability. Real-Time File Encryption and IPsec-Based Network Encryption F-Secure Workstation Suite is the only suite product currently available to offer strong encryption all over the world. The product uses an encryption key length of 128 bits or more. The administrator can choose from supported algorithms, including RSA, 3DES and Blowfish. All the most widely used authentication methods are supported. Should the authorized user forget his/her password, the product also contains a safe and easy administrative key retrieval function. "The file encryption component of F-Secure Workstation Suite provides real-time protection for confidential data. F-Secure FileCrypto automatically encrypts all open and temporary files. Not only is encryption completely unobtrusive to the end-user, but it is also extremely secure: there is no way the user can accidentally store confidential information in plain text," explains Mr. Siilasmaa. F-Secure Workstation Suite�s network encryption, F-Secure VPN+, is based on the latest IPsec standards. The F-Secure VPN+ is fully scalable: it contains three components (Client, Server and Gateway) which can be combined to build all major types of virtual private networks. These include connections between organizations and their partners, home offices, or employees on the road. F-Secure VPN+ is also fully transparent to the end-user, as it uses IP protocol at the network level, which is invisible at the application level. The F-Secure Workstation Suite product contains the client component of F-Secure VPN+. The Server and Gateway components are available separately. Availability The first version of F-Secure Workstation Suite will operate in the Microsoft Windows NT environment. The product will be available from the Data Fellows resellers around the world in August 1998. Prices will start from $68 per seat for a 100-user license. The 4.0 version will be available in early fourth quarter 1998. This version will be a fully integrated, policy-based security solution, making it possible to manage data security issues in accordance with the corporate security policy. The product will be based on a three tier management architecture with considerable scalability advantages in a large organization. In addition to Microsoft Windows NT, it will also operate in the Microsoft Windows 95 and Windows 98 environments. All users of F-Secure Workstation Suite 3.0 will receive a free upgrade to the 4.0 version as it ships. Easy-to-Use Management and Scalability The installation of F-Secure Workstation Suite 4.0 requires no work at the actual workstation, and no configuration from the end-user after the installation. The entire corporate system can be managed centrally. Thus the management of vital security issues is effective but completely transparent to the end-user. F-Secure Workstation Suite supports the industry-standard SNMP protocol, integrates with Microsoft Systems Management Server (SMS) and will include agents for leading enterprise management products, such as CA Unicenter, IBM Tivoli and HP OpenView. F-Secure Workstation Suite 4.0 comes bundled with F-Secure Administrator, a Pure Java based graphical console for managing the security policies for the whole enterprise network. About Data Fellows Data Fellows is one of the world�s leading developers of data security products with offices in San Jose, California and Espoo, Finland. Its groundbreaking F-Secure product family is a unique combination of globally available strong encryption and revolutionary anti-virus software. The integrated F-Secure product range provides complete security solutions for enterprises of any size. It includes file encryption and IPsec communication encryption products, VPN gateways, SSH based secure remote management software, easy-to-use solutions for distributed DNS management, and a full range of anti-virus products for workstations, servers and gateways. Data Fellows is also the developer of the award winning F-PROT Professional anti-virus product, the scanning engine of which is now an integral part of the multi-engine structure of F-Secure Anti-Virus. Data Fellows is privately owned. Since its foundation in 1988, the company�s annual growth in net sales has been 90%. Data Fellows offers a worldwide network of technical support, training and distribution in over 80 countries. Data Fellows belongs to an elite group of companies with a triple-A rating from Dun&Bradstreet. For further information, please contact USA: Data Fellows Inc. Mr. Pirkka Palomaki, Product Manager Tel. +1 408 938 6700, Fax +1 408 938 6701 E-mail: Pirkka.Palomaki at DataFellows.com Finland: Data Fellows Ltd. Mr. Ari Hypponen, Director of Development Tel. +358 9 859 900, Fax. +358 9 8599 0599 E-Mail: Ari.Hypponen at DataFellows.com or visit our web site at http://www.DataFellows.com/ From nobody at replay.com Mon Jul 27 06:16:10 1998 From: nobody at replay.com (Anonymous) Date: Mon, 27 Jul 1998 06:16:10 -0700 (PDT) Subject: No Subject Message-ID: <199807271316.PAA14820@replay.com> Has anyone consider the possibility that the dude who shot his way into the Capitol did so as a result of his mental infirmities being _healed_ by DC water? Has any family member been quoted as saying, "Thank God! He's finally come to his senses." JustWonderingMonger From lreed at west.cscwc.pima.edu Mon Jul 27 08:07:16 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 08:07:16 -0700 (PDT) Subject: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <009C9CBE.41EC8040.19@west.cscwc.pima.edu> Canadian Customs Warning - SPACE ALIENS HIDE M DRUGS!!! ________________________________________________________ Although the Reptilian Nazis making preparations in the lavoratories of their SecretUnderGroundBunkers pose an eventual threat to the safety and security of humanity itself, there are many more immediate dangers present in our lives which can bring serious consequences to anyone who remains unaware of them. Thus, I feel that it is important for everyday, average citizens to issue travel warnings for those who may be thinking in venturing into some of the more corrupt areas of the world, such as Canada, where they may find themselved subject to arbitrary and capricious actions by the heavy-handed Canadian Customs BorderGuards before even being allowed to enter the country, after which they will be subject to whatever illegal acts and measures that the Royal Canadian Mounted Police choose to perpetrate upon them. It is particularly important to be wary of entering through certain Customs ports, such as Regway, Saskatchewan, which have a long history of abuse of authority and criminal malefeasance. Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has been known to steal thousands of dollars worth of goods from those passing through while he is on duty, while being extremely evasive when asked about the legality of his conduct, as well as being very inept at hiding the fact that he is a lying, scumbag piece of shit who is not intelligent enough to tell even halfway believable lies. Although I normally advise people to make what effort they can to get whatever measure of Justice they can through normal legal channels, in the case of countries such as Canada, where even high-ranking political figures are known to be corrupt, where many of the Judges have histories of corruption, substance abuse and complicity in the illegal activities of law enforcement officials, I certainly could not find fault with anyone who surveyed the situation they found themselves in and decided that their best option was to used armed force to prevent becoming a victim of the oppressive, unethical and illegal actions of armed bandits working under the cover of Canadian Government Authority. As well, although one might morally and ethically be perfectly justified in putting a bullet through the brain of armed Canadian Government Bandits who have been trained to deal violently with any person who resists their attempts at enforcing their alleged authority, even when doing so in an unethical and illegal manner, it would be unwise for them to act hastily, since one must be prepared to follow through in regard to such an action, by also eliminating any other government agents who may be present and would constitute an immediate or future threat to the individual who refuses to be subjected to illegal and unethical government actions. Although I suppose that one might make a case for being 'better safe than sorry' when entering Canada through a port such as Regway, and just going ahead and whacking out the whole lot of them, so that they don't have a chance to get the jump on you, before proceeding into the country, I personally think that if one has prepared in advance for dealing with the danger that the Regway Customs OffalSlurs represent, then this option should not be necessary. Of course, I realize that I, myself, am a rather conservative person, so I would certainly not pass judgement on those who are more of a 'take the BullShit by the horns' type of individual. Being, as I say, rather conservative by nature, I don't usually feel it necessary to immediately put to death violent armed Canadian Government Thugs for their crimes against myself or other citizens, even though doing so might well help to prevent future criminal abuses by violent, armed people in positions of authority, since there area variety of other routes that one might take in extracting a measure of Justice or EqualizationOf TheAnalSexualBalanceOfTheTao. As always, anyone who chooses to attempt to receive redress for the crimes committed against them by those in authoritative government positions will be fighting a battle in which the Canadian Justice System is stacked against them. Even though Judge Lee, a notorious drunkard who has performed GodOnlyKnows how many travesties of justice while rendering legal judgements while totally ShitFaced, has retired, many of the other Canadian judges, while perhaps not being as totally out-of-control, are nonetheless known to rubber-stamp pretty much every instance of criminal] abuse perpetrated on the citizenry, as a matter of course. Likewise, the Saskatchewan Justice Department is well-known by the citizens to be a FuckingJoke (TM), and that any person who dares to file a complaint against members of the Canadian Legal Community can expect to be subjected to ridicule and abuse by Justice Department Investigators, as well as perhaps finding themselves the target of further persecution by those being WhiteWashed by their Justice Department BumBuddies. Realizing that any citizen who shot and killed an armed intruder in his home who was attempting to rob HimOrHer of thousands of dollars worth of personal propery would likely be regarded as a hero, while a citizen who shot and killed an ArmedCanadianGovernmentThug who was doing the same, would be the immediate subject of villification by all arms of Canadian Opinon/Reality Creating Agencies, my own preference is to set a goal of returning (1,000)Tit-for-(1)Tat. Being, as I say, a pretty conservative fellow, I have refrained, for the most part, over the years, from extracting a large measure of revenge or retribution for the unethical and illegal TravestiesOfJustice that I have been subjected to by various CanadianAuthorities. Having gone to great lengths to act with reason and civility in the face of oppression and persecution for quite some length of time, and at considerable personal expense to both my finances and my psyche, I can see no reason to have any qualms of conscience in regard to henceforth requiring AThousandEyesForAnEye (TM) as a BalanceOfPayments for acts of thievery and illegality against my person by ArmedCanadianGovernmentThugs. Naturally, if anyone feels that they can offer good, solid advice in regard to why it might be more ethical or justified for me to just keep on TakingItInTheAssTimeAndTimeAgain without complaint or retribution, then I would be more than happy to forward them some advice I received from S.M. Halloran, who works as a Biochemical Researcher at a Spooky Drug Laboratory in AssassAnkara, Turkey: _________________________________________________________________ * To: cypherpunks at Algebra.COM * From: "S. M. Halloran" * Organization: User RFC 822- and 1123-compliant _________________________________________________________________ ou are a lunatic. No question about it. Can you possibly make an appointment with your doctor and make sure your lithium dose is not greater than it ought to be? Mitch Halloran Research (Bio)chemist Duzen Laboratories Group AssassAnkara TURKE mitch at duzen.com.tr _________________________________________________________________ I have been following, with great mirth, a current thread on the CPUNX list which expresses great concern over the possible implications to the issues of freedom and privacy by the plans of the Russian Government and/or Military implimenting a StateOfTheArt Monitoring/Surveillance System designed to make BigWolfInBigGrandmothersClothing's ears very, very large indeed. [WAS: "The better to hear EveryOneAndEveryThing with."] I find it interesting that there should be such great concern over the possibility of EvilThings happening in Russia that are already happening in AmeriKaKa, when few Citizens or NetIzens in this country seem to be inclined to actually *do* anything in regard to making an effort to hold accountable those involved in the unethical and criminal persecution of our own DigitalPrisonersOfWar behind Amerika's ElectroMagnetic Curtain. What reason is their to be 'concerned' about matters that one is going to submissively submit to like a LemmingLamb waiting to rush over the cliff and into the BigMouthBigTeeth of BigBrother? James Dalton Bell got RailRoaded, ScrewedBluedAndTattoo'd, SetUp, Fucked Over, and SoldDownTheFuckingRiver for the diabolical crime of openly discussing the same types of concepts and issues that our Founding Fathers wrote about (although they were taking their medication regularly and had the good sense to publish much of their work via anonymous reprinters). ALunaticWhoLooksALotLikeMe got HisorHer computers, and those of family members, confiscated, HisOrHer Sympatico WebSite deleted, and subjected to the threat of years of imprisonment, as a result of putting up an 'RCMP HATE PAGE' parody dedicated the belief that making fun of Dudley DoRight's abuse, persecution and murder of human beings of Native American ancestry was less of a crime than the actual performance of those types of criminal misdeeds. Unless one is prepared to actually take action to prevent the abuse of authority, and to hold those responsible for high-handed, unethical and illegal actions against the Citizens, then the process of 'discussion' on these issues is mere Philosophical Masturbation. The rEvolution is NOW! All that really needs to be said, is "BOOM!" NEWS FLASH!!! If, after someone ButtFucks you, you give them a really great BlowJob, they don't have a whole lot of incentive not to do it again. If the CriminalFuckers are incapable of understanding that "NO Means NO" then perhaps they are capable of understanding that "BOOM Means NO." The willingness of WeTheSheeple to submissivly submit to the atrocious lies, abuses, criminal and unethical behavior of the Rulers&Contollers can be explained, to my mind, by nothing other than BrainWashing. The Truth (TM) of the matter is, the ThugsAndThieves who are in control of this and other countries, are, for the most part, GutLessCowards who are capable of maintaining their intrusive and excessive hold over the lives of the citizenry only by virtue of OrganizedMobRuleOfForce over a ComplacentCitizenry. Upon losing the support system of OfficiallyAuthorizedOrganizedCrime, most of these GutLessCowards fold like a BustedFlush. On the extremely rare occassions where the GutLessCowards are called to account for their criminal behavior and abuse of power, They turn in mass fear on one another, until they have spilled enough of each other's blood, and hacked off enough internal heads, that the citizens are appeased. et the MindsOfTheMasses have become so controlled by the PuppetMasters that, after brief displays of sanity and integrity, they again accept the dichotomic exhortations of the LeftOverLiars&Thieves that everything is now "Different/BackToNormal." "We stopped destroying the minds of unwitting victims of our criminal mind-control experiments esterDay (TM). The IRS is going to cease engaging in high-handed, unethical abuse of the citizens Tomorrow (TM)." The Reason The Government Is Incapable of Dealing With The Present: "The rEvolution is NOW!" "The President you elected has been murdered, but you will not be allowed to know why, or by whom. That is TopSecret information that can only be accessed by those who may have been involved in his murder." "We don't have the time or resources to bring to Justice all of the important and politically connected people who became grotesquely rich while illegally draining BillionsOfDollars from the Savings and Loan system, but we *do* have the time and resources to imprison millions of DarkSkinnedAmericans (and a few LightSkinnedAmericans) for willingly ingesting pharmecutical substances which our own agents illegally put into the bodies of *unwilling* people, without a single one of them being subject to criminal proceedings, even when their actions caused the death of their unwitting victims." "es, we Fucked Jim Bell Silly! So the fuck what? "We got away with it, didn't we? So you can bet your sweet ass that we're going to do it again, and again, at any time we please, and to whoever we please. "If you DumbSchmucks want to sit by placidly while we pick you off OneAtATime, then it doesn't really matter that we're GutLessCowardlyFucks, does it?" From goorio82 at msn.com Mon Jul 27 08:35:49 1998 From: goorio82 at msn.com (ld) Date: Mon, 27 Jul 1998 08:35:49 -0700 (PDT) Subject: 7.8 cents/min. Long Distance & 800 Message-ID: <199807272529NAA22376@post.qc.ca> Act now! 10 cents per minute IS NOT good enough anymore. .078 CENTS PER MINUTE for Long Distance, 800 Service, and Cellular Long Distance, and ONLY .012Min for Call Card. 6 Second Call Rounding. No Setup Fee's or Monthly Charges. Sign Up Now on-line at http://www.aptg.com or contact us at sales at aptg.com FACT: .078 IS 22% LESS THAN .10/MINUTE, AND 48% LESS THAN .15/MIN. Special promotion: If you sign up now you will receive 90 days of FREE WEBSITE HOSTING SERVICES through our affiliated company Znetwork. For details go to: http://www.znetwork.net/freeweb.htm ******************************************  From stuffed at stuffed.net Mon Jul 27 08:54:31 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Mon, 27 Jul 1998 08:54:31 -0700 (PDT) Subject: Bitch Spice/Miss Vagina 1998 Message-ID: <19980727132322.14543.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/27/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From mgraffam at mhv.net Mon Jul 27 09:29:27 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 27 Jul 1998 09:29:27 -0700 (PDT) Subject: Fw: my thoughts for this list In-Reply-To: Message-ID: On Sun, 26 Jul 1998, kryz wrote: > I guess you mean PGP? > Just have patience... maybe a little prayer will help. And the other guy said .. > > I have been getting this list for a few days. I subscribed to this list in > > the hopes I could learn something about crypto, in particular the GPG > > project. GPG = GNU Privacy Guard. GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents, but once they run out, GPG will use it. I think it uses Blowfish (and CAST?) for the symmetric algorithms, and probably 3DES too. I dunno about IDEA .. I have my doubts due to the patents. Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc "..the isle is full of noises, sounds and sweet airs that give delight and hurt not. Sometimes a thousand twangling instruments will hum about mine ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest" From kimh_26 at hotmail.com Mon Jul 27 09:41:54 1998 From: kimh_26 at hotmail.com (kimh_26 at hotmail.com) Date: Mon, 27 Jul 1998 09:41:54 -0700 (PDT) Subject: Oxygen Message-ID: <199807271641.JAA21978@toad.com> The time is now to reach out to all the people on the Internet,with target e-mail. It's your business,how are you going to advertise your product or service over the Internet? Direct email puts you in front of millions of people who want to know about your product or service.The most cost effective way to make your business explode! Never before has it been possible to reach so many for so little. We are the leaders in direct email because we do what we say.Our data banks have email buyers for every business. Don't worry we will help you with a subject and letter that will work for you. . Guaranteed CALL 1-800-600-0343 ext,1669 leave message. From nobody at sind.hyperreal.art.pl Mon Jul 27 09:52:44 1998 From: nobody at sind.hyperreal.art.pl (HyperReal-Anon) Date: Mon, 27 Jul 1998 09:52:44 -0700 (PDT) Subject: anonymicer is not trustworthy Message-ID: <19980727165008.4317.qmail@serek.arch.pwr.wroc.pl> http://anonymicer.home.ml.org/news is not trustworthy. none of the service. From jf_avon at citenet.net Mon Jul 27 10:01:03 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Mon, 27 Jul 1998 10:01:03 -0700 (PDT) Subject: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!! Message-ID: <199807271716.NAA07974@cti06.citenet.net> On Mon, 27 Jul 1998 08:08:53 MST, Linda Reed--PCC West Campus CSC wrote: >Canadian Customs Warning - SPACE ALIENS HIDE MDRUGS!!! >________________________________________________________ > > It is particularly important to be wary of entering through certain >Customs ports, such as Regway, Saskatchewan, which have a long history >of abuse of authority and criminal malefeasance. > Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has >been known to steal thousands of dollars worth of goods from those passing >through while he is on duty, while being extremely evasive when asked >about the legality of his conduct, as well as being very inept at hiding >the fact that he is a lying, scumbag piece of shit who is not intelligent >enough to tell even halfway believable lies. Linda, here is a tidbit of information that you might get interested in... The National Firearms Association has several times put a leash and curbed thoses rabbid dogs. They procure you with ample legal information; just to point out to any govt bully how, per the letter of the law, they are committing a criminal act and how they could get charged. THe thing is, if somebody comes from the states, it is unlikely that a) he/she will know Kanadian law and b) she/he will lay criminal charges. The pertaining Kanadian laws should be widespread in the USA and maybe a cross-border entity could exist to promote the proper conduct of govt bully? In any case, I suggest you ask the NFA about the whole thing of goods confiscation and criminal charges at the border. Recently, there was a US citizen that entered Kanada with a handgun in his toolbox in his car trunk. Oh, what a mess. Here in Kanada, where the good Liberal dictators are convinced that Man is an intrinsically rabbid animal that will kill as soon as he has the means to layed criminal charges and seized this poor US chap cars and belongings and put him in the klink for a while. Of course, in the US, a handgun could legitimately be carried in your toolbox and it is normal not to think of it as a *big thing* (tm), so it is legitimate to not think of it at the moment of border crossing. Anyways, that's it, what happenend happened. The NFA, I think, is working on it. My telling of the story is subject to all sort of distortions and should not be considered reliable... :-) Contact the NFA and the Canadian Firearms Digest home page for more details... Canadian Firearms Digest: http://www.sfn.saskatoon.sk.ca/ Dave Tomlinson: e-mail: nfadat at telusplanet.net NFA Calgary e-mail: nfa_calgary at iname.com Web site: http://nfa.ca/ Ciao jfa Jean-Francois�Avon,�Pierrefonds�(Montreal),�Canada Unregistered�Firearms�in�the�hands�of�honest�citizens:�Liberty's�Teeth Strong�Cryptographic�tools�in�the�hands�of�honest�citizens:�Liberty's�Voice He�who�beats�his�sword�into�a�ploughshare�will�get�coerced�to�plow�for� those�who�don't... PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891� PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C From CTIA_Daily_News at um2.unitymail.com Mon Jul 27 10:22:55 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Mon, 27 Jul 1998 10:22:55 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 27, 1998 Message-ID: <199807271659.LAA17200@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com� =========================================== From ajelder at dylan.imation.com Mon Jul 27 10:28:12 1998 From: ajelder at dylan.imation.com (Angie Elder) Date: Mon, 27 Jul 1998 10:28:12 -0700 (PDT) Subject: MORE Message-ID: <3.0.32.19980727102706.00912150@dylan.luminous.com> More From honig at m7.sprynet.com Mon Jul 27 11:05:09 1998 From: honig at m7.sprynet.com (David Honig) Date: Mon, 27 Jul 1998 11:05:09 -0700 (PDT) Subject: encrypted FM radio hiss Message-ID: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> On the subject of RNGs. Thinking about conditioning. Suppose you have a "poor" random number stream, e.g., FM hiss digitized at say 8 Ksamples/sec. Can you get a crypto-secure random-number stream by "whitening" the stream with a good block cipher? This scheme uses the RNG to "kick" the cipher out of the deterministic cycle its in, which is determined by the cipher key and initialialization vector. Poor RNG ----> XOR ----> BlockCipher ----> improved RNG? ^ | |____________________| The output of a good block cipher in feedback mode will pass Diehard tests, though it is not crypto-secure. >From an information theoretic perspective, in the above scheme, you are slowly adding entropy to the output stream, at a rate determined by the actual number of bits/iteration and the bits/symbol of your poor random numbers. If you fed 64 bits of pure random values into a 64 bit cipher you would have a true RNG, filtered by the xor/ciphering, but still crypto-secure. With fewer true bits, you have a 'smooth' way to introduce variable amounts of true entropy. If your RNG is 'stuck at' a constant value you are back to a deterministic PRNG. How do you cryptanalze the mix of a keyed PRNG and a true entropy source here? Is there any mathematical literature on this? Thanks honig at alum.mit.edu "Speech is not protected simply because it is written in a language" Federal Misjudge Gwin on the Bernstein Case From lreed at west.cscwc.pima.edu Mon Jul 27 11:25:18 1998 From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC) Date: Mon, 27 Jul 1998 11:25:18 -0700 (PDT) Subject: MItSchill Millhouse Holler'in Message-ID: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu> Mitch Halloran, unwitting schill of the TrilateralCPU, digitized: > I neglected to take into consideration that this attempt at > revisionist history of the greatest President of the US in the > 20th Century, perhaps in US history...this raving and ranting > to take the name of FDR in vain...this dribble to take all of > humanity's name in vain...this project to develop the Mother > of All Conspiracy Theories, including figuring out a way to > show the Big Bang is/was, all of it, every last bit, a > conspiracy... > ...well, it could be ciphertext for which I have not received > the key for making into plaintext. Someone please forward the > key to me. Working in a Drug Lab, I would imagine that the key required to make sense of SPACE ALIENS HIDE MY DRUGS!!! is easily within reach...check the 500 ml beaker to your immediate left... To tell the truth, most of my ranting and raving in regard to the InfernalTruths EreuIndicted in SAHMD is done out of kindness towards those who are the target of both my BarbLess Wit and my WitLess Barbs, since merely revealing the NakedTruth about many of these individuals might result in the Reader having an eye put out, although HeOrShe would still have one good eye left to see that the person who was giving rise to the BluntNosed Sword of Truth was not the individual's wife. ReVisionIst, to me, indicates someone who takes another look at what was previously seen with the aid of colour-glossy photos and pie-charts provided by the people who threatened to imprison your parents if they failed to send you to government-sponsered IndoctrinationCamps justified under the ruse of FreeEducation, which sometimes seem mostly geared for reinforcing in our minds how lucky we are to live in a country where the government is kind enough to provide us with FreeIncomeTaxReturnForms. Son of Mother Of All Chapters, as presented to the CypherPunks list, quite simply provides a plethora of Official Versions of the events surrounding the murder of one of Franklin Roosevelt's political enemies, Anton Cermak. Those perusing the material may come to the conclusion that if a wide variety of official news sources and official law enforcement agencies don't seem to have a fucking clue as to the time, date or sequence of events surrounding the murder, the death of Cermak, the trial or the execution, then perhaps one would be remiss in too hasty in accepting the same people's conclusions that Roosevelt, and not Cermak, was the target, it would be hard to fault their logic. As far as Roosevelt, or anyone else, being "the greatest President" of any era, it would be more accurate to describe their being the GreatestBullShitter of the era, or of having the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era. It is a matter of speculation to what extent Roosevelt's actions were responsible for the recovery of the American economy after the collapse of the banking sector, but it is a matter of *fact*, supported by the testimony of even those who were part of FDR's political entourage, that Roosevelt took steps to ensure the *complete* collapse of America's financial institutions while Hoover was still President, in order to put himself in a position to extort as much money and power as possible out of Congress. Perhaps the massive suffering and financial losses that he caused in his power-grab might be justified as being 'for the greater good,' except that, had he used his position as President-elect to help restore confidence in the economy, instead of destroying it, America would not have required nearly as much 'saving' as it subsequently needed. It is a shame that I had not been born in an age when I could have run for President against Roosevelt, and won. Had I done so, then I, like FDR, would have granted myself a license to print money, and I also would have spent three times as much of the taxpayer's money as the previous 31 Presidents, combined, but *I* would have spent it all on beer and scotch, thus resurrecting the American economy without creating a HugeGovernmentMonster filled with political patronage appointees and employees who I had bought and owned with imaginary money that taxpayers would be responsible for repaying. Also, being drunk all of the time, there would have been little chance of me turning America into a PlannedSociety via a New Deal in which all of the cards being dealt were Red. > By the way, I'm really one of you guys. I am just working a > cover among the people who call themselves sane until you guys > who really know the truth can get into a position reveal these > eternal truths to the unbelievers. he-he! We appreciate your efforts. Due to the limited space in the HomeForTheCriminallyInsane, it is important for us to have half-witting schills secretly infiltrating organizations which are too ignorant of Truth&Reality (TM) to realize that the NewCrayolaColours are part of the WorldWide Plot, even when spelled without the 'u.' ~ ICould'aBeenAContend'aMonger ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From cons0005 at *algonquinc.on.ca Mon Jul 27 11:35:30 1998 From: cons0005 at *algonquinc.on.ca (Your Yashy) Date: Mon, 27 Jul 1998 11:35:30 -0700 (PDT) Subject: Spam Help Message-ID: <199807271834.OAA16760@deathstar.comnet.ca> I was wondering if I could get some help setting up a filter. I'd liketo create a folder called "SPAM". Then all email that are in the spam folder, I would like forwarded to abuse@ that it was sent from. I'm using Pegasus Email 3.01b thnx in advance. "I, of course, deny I called judge Santiago Campos a FASCIST PIG" -bill payne June 19, 1998 HTTP://www.comnet.ca/~yashy 100 YashDollars to first person to try every link. (including links derived from links) p.s. SPAM PROOF Email address. Remove the "*" to reply. From attila at hun.org Mon Jul 27 12:02:43 1998 From: attila at hun.org (attila) Date: Mon, 27 Jul 1998 12:02:43 -0700 (PDT) Subject: FDR In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5> Message-ID: On Mon, 27 Jul 1998, S. M. Halloran wrote: >Actually, attila, or Linda, or whoever you are...you are right. > >I neglected to take into consideration that this attempt at revisionist >history of the greatest President of the US in the 20th Century, perhaps >in US history... > are you really calling this cretinous, brain dead sorry excuse for a human being who was not worth being spat upon by the crippled camel of a third-world pepophilic dictator with poor table manners, the greatest President in our history? man, you're one sick puppy. are we talking about the same President? really? FDR? the man who sold our country into perpetual slavery on 08 Mar 33? 4 days after he was inaugerated in a speech where he "warned" he was asking for emergency powers, even stronger than war time powers? who managed to coerce a Congress, not even given a chance to read what they were signing, into a declaration of national emergency so this so called American could suspend the constitution, amend the WWI "trading with the enemy" act so the citizens of what was once the USA were also included among the enemy...? who pledged -us- and all our property into the servitude of the Federal Reserve and its private owners, of which more than 50% is foreign? the same man who forfeited our good faith and credit to the bankers in bamkruptcy so the U.S. is now subject to Admiralty law and flies the gold fringed flag of martial law in all its courtrooms? the same man who inaugerated the Executive Order provision which gives the President and Secretary of the Treasury the power to rule without Congress? and to enshrine the executive order into part of the US Code (USC 963, I believe)? who contracted with the international bankers to print paper money as Federal Reserve notes for which he owed the bankers the cash he had just printed plus interest while they used the cash to buy the T-bills (the instrument of indebtedness)? --and confiscated private gold at $20 an Oz --later setting the standard at $34/Oz so the insiders made a killing? the same man who tried to pack the Supreme Court? the same man who ran for a third term on an isolationist platform romising every mother that her sons would not fight a foreign war then diplomatically left Japan no option but to go to war? the same man who left Pearl Harbor out of loop with no code books for the Red or Purple code so the defining act to start America in the war wasted the Pacific Fleet with its ammo in the warehouses to be blown up, 2,000+ dead, and battleships lying on the bottom? the same man who violated the law and defied Congress with the Lend-Lease program, gave away half of Europe to Russia, handed Russia Berlin? the same man whose two closest advisers were communists? I always wanted to believe Alger Hiss was innocent as his son Tony was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs as the CIA had cracked the code but would not show it in court --they even knew who handed over the trigger mechanism (never punished and he left the U.S. after the Manhattan project and taught for many years at Oxford). yep, good Ol' Uncle Joe Stalin's best friend, along with bankers like Schiff who financed the Russians. it's no conspiracy that Prescott Bush was complicite, but left holding the bag. when the U.S. in '42 confiscated Union Bank which was started by George's grandfather Herbert Walker -that's why George ran away from home, joined the air corps and became a war hero at 18. why was the bank grabbed --Union was a front for A.G. Farber and for Hitler --Walker and his friends had been funding Hitler since the early twenties --why? greed and power. it's no conspiracy; it's history, in black and white Universal news reels. FDR, the incestuous son of bitch (Eleanor was is cousin) should have been shot for treason --along with Eleanor. McCarthy, a scum-bag if there ever was one, was far closer to the truth than he ever knew. wake up and smell the roses! they've been fertilized by the shit of Eleanor Roosevelt for many years --she's still crapping in the White House garden for the first bitch to read the tea rose leaves. there are no conspiracies, just men behaving like they always do; the vulture capitalists is that they only back off when their fear exceeds their greed. politicians arent smart enough to back off their greed and their thirst for power as they blasphemously take take the oath of office. >this raving and ranting to take the name of FDR in >vain...this dribble to take all of humanity's name in vain...this project >to develop the Mother of All Conspiracy Theories, including figuring out a >way to show the Big Bang is/was, all of it, every last bit, a conspiracy... > there are no conspiracies; it's nothing more than man fouling his own nest; the normal progression of history which no-one learns so they repeat the same mistakes --the well-fed populace is too lazy to take an interest in their own government until it is too late. there is no left and right; there is no moral government; it's all about power and staying in power. ever notice how reformers only stay reformers until they need to run for reelection and the money goes to those who play ball? >...well, it could be ciphertext for which I have not received the key for >making into plaintext. Someone please forward the key to me. > what key? there is no key... except "mene, mene, tikel, upharrison" (or whatever it was on the wall). just open your eyes and view the sewer around you. the fertilizer in the fields is now distributing "radioactive" waste --effluent courtesy of your politicians. the U.S. is already an oligarchy, next comes the plutocracy, followed by the triumvirate, and then the emporer (maybe with clothes) -then there will be a winnowing and anarchy followed by tribal states. welcome to history, but few will live to see it run its course --America, the universally hated, will be the first to be plowed under when she can no longer bully or buy the -pax americanus-. and the men in power know that a hungry disorganized populace can be subjugated by a well fed army. >By the way, I'm really one of you guys. I am just working a cover among >the people who call themselves sane until you guys who really know the >truth can get into a position reveal these eternal truths to the >unbelievers. he-he! > >Really. > >[if you think you see a crazy person, consider the very real possibility >that what you are seeing is really a crazy person] > sorry, I really am crazy, but it's better to be crazy than insane. > >Mitch Halloran >Research (Bio)chemist >Duzen Laboratories Group another Brit/American selling his ass to the world.... >Ankara TURKEY >mitch at duzen.com.tr > >An ass with a golden saddle is still an ass. --Turkish proverb > yeah, but he's a rich ass... __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From nobody at replay.com Mon Jul 27 12:46:30 1998 From: nobody at replay.com (Anonymous) Date: Mon, 27 Jul 1998 12:46:30 -0700 (PDT) Subject: No Subject Message-ID: <199807271945.VAA26183@replay.com> From nobody at nsm.htp.org Mon Jul 27 13:05:26 1998 From: nobody at nsm.htp.org (nobody at nsm.htp.org) Date: Mon, 27 Jul 1998 13:05:26 -0700 (PDT) Subject: Spam Help In-Reply-To: <199807271834.OAA16760@deathstar.comnet.ca> Message-ID: <19980727200504.11080.qmail@nsm.htp.org> On Mon, 27 Jul 1998 14:35:05 -0400 "Your Yashy" wrote: > I was wondering if I could get some help setting up a filter. I'd >liketo create a folder called "SPAM". Then all email that are in the >spam folder For fuck sake. If is isn't AOL, it is some of lame fuck asking for help with filters. Where do people get the idea that the toaderpunks can help with all these problems? We've had baseball signatures, lost people and now some idiot who really wants the pegasus list or something <--hint cypherpunkseeker From kent at songbird.com Mon Jul 27 14:13:12 1998 From: kent at songbird.com (Kent Crispin) Date: Mon, 27 Jul 1998 14:13:12 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com> Message-ID: <19980727141055.63396@songbird.com> On Wed, Jul 22, 1998 at 06:18:30AM -0700, John Gilmore wrote: > > One lesson I plan to observe - don't encrypt known plaintext unless you > > have to ! > > The EFF DES Cracker cracks more than just known plaintext (though it's > the easy case). It occurs to me that an interesting use for the eff des cracker would be the following: since the government asserts that DES is safe, then a DES encrypted archive of crypto code should be exportable. So the next time someone feels the need to export something that is currently not exportable, simply encrypt it, along with some plaintext, with DES, trash the key, export it, and send the plaintext and the encrypted plaintext to the EFF... This is not a practical use, but it would make an interesting test case in court. -- Kent Crispin, PAB Chair "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From vicki28 at uswest.com Mon Jul 27 17:32:11 1998 From: vicki28 at uswest.com (vicki28 at uswest.com) Date: Mon, 27 Jul 1998 17:32:11 -0700 (PDT) Subject: IN DEBT WE CAN HELP YOU!!! Message-ID: <199807272323.SAA15776@charon.vitalimages.com>

Subject: Re:  Are you in debt?


           If you are then we can help. Qualifying is now at your
fingertips and there are no long distance calls to make or travel
plans to arrange.

FREE loan evaluation:http://www.amesconsultants.com/ins/127.html


We are American Capital Mortgage Services, we specialize
 in helping homeowners establish ONE easy LOW monthly
 payment with the added benefit of not needing any equity in your
 home.  American Capital is constantly working with other lenders
 throughout the U.S. to provide you with the best interest rate
 possible.  We have a number of different companies that we work
 with and this is at NO cost to you EVER.  We are simply a referral
 agency.

           As you may have seen in our ad you can be loaned up to
125% of the value of your home or $100,000.00 even if you have
NO equity in your home. There are no up-front or advanced fees of
any kind. You can be approved within 24 hours and have your cash
in one weeks time.

           In order for us to provide you with a FREE loan evaluation,
Please go to http://www.amesconsultants.com/ins/127.html



           Put us to the test� I know we can Help You.
Kindest Regards.





















From JBrown4330 at aol.com Mon Jul 27 18:08:45 1998 From: JBrown4330 at aol.com (JBrown4330 at aol.com) Date: Mon, 27 Jul 1998 18:08:45 -0700 (PDT) Subject: Republicans Message-ID: Hey: Who made up the term "Politically Correct"? Not Christians and not Republicans. Your side did. How does wanting a smaller government, less taxes, the freedom to CHOOSE to pray in schools, the rights of the un-born( of course you probably think they have no rights- just as slave owners thought about their slaves), and who acts like the thought police?????? CHOKE ON IT YOU HYPOCRITE From ulf at fitug.de Mon Jul 27 18:26:33 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Mon, 27 Jul 1998 18:26:33 -0700 (PDT) Subject: ACM CCCS '98: Anonymity on the Internet Message-ID: The ACM CCCS'98 conference (November 1998) has recently been announced on cryptography at c2.net. There will be a panel on "Anonymity on the Internet", moderated by Paul Syverson. There's also a paper discussing the attacks nym.alias.net has had to face: David Mazi�res and M. Frans Kaashoek. The design, implementation and operation of an email pseudonym server. In Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998. ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz From mgraffam at mhv.net Mon Jul 27 18:32:55 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 27 Jul 1998 18:32:55 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <19980727141055.63396@songbird.com> Message-ID: On Mon, 27 Jul 1998, Kent Crispin wrote: > It occurs to me that an interesting use for the eff des cracker would > be the following: since the government asserts that DES is safe, then > a DES encrypted archive of crypto code should be exportable. No. Encrypting with DES, or any symmetric cipher does not destroy the information, which is what is controlled. Even losing the key does not destroy the information, as we all know: keys can be recovered it is just a matter of the work involved. Encrypting with an OTP is interesting at first .. but considering that distributing a crypto archive or the completed works of Shakespeare amount to the same thing after an OTP has been used, I am not convinced it has much meaning. The _spirit_ of the law is that no crypto device can be exported. Programs are considered to be devices.. as is evidenced by the recent decision in the Bernstein case. We don't need encrypted archives floating around.. we need to show that, like cars, crypto devices (programs or otherwise!) are useful even if they can be used by bad people for bad purposes. Abstract things like exporting a hunk of random crap and arguing about it don't achieve this, and will never do so in the minds of laymen with no real interest in crypto. As for me, I prefer the position of my countryman, Henry David Thoreau .. civil disobedience: Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html #!/bin/perl -sp0777i You have received this message because at some time in the past your name was submitted to our e-mail mailing list database. If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove at rpkusa.com ---------------------------------------------------------------------------------------------------------- FOR IMMEDIATE RELEASE CONTACT Paula Miller Lyn Oswald Nadel Phelan, Inc. RPK Security, Inc. 408-439-5570 x277 212-488-9891 paulam at nadelphelan.com lynoswald at rpkusa.com RPK SECURITY ANNOUNCES "ENCRYPTONITE�": THE POWERFUL PUBLIC KEY ENCRYPTION TOOLKIT The RPK Encryptonite� Software Toolkit Version 3.0 Allows Developers to Easily Add Strong Security to Internet, Software, Hardware and Communications Applications SAN FRANCISCO, CA. July 27, 1998 � RPK Security, Inc., announced today the release of its RPK Encryptonite Software Toolkit version 3.0. Now with C++ implementations and a Delphi VCL component, the RPK Toolkit provides integrators, developers and engineers with everything they need to quickly and easily incorporate fast public key encryption and strong security into their applications without extensive knowledge of cryptography. RPK Security is a technology leader in strong and fast public key encryption for software, hardware and Internet applications. With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong security solution that is available globally unlike competing products that are restricted by U.S. export regulations. The RPK Toolkit, a software implementation of the RPK Encryptonite Engine, allows developers to build custom applications with embedded strong encryption for information sensitive applications and industries such as the Internet, communications, legal, health care and financial services. The Toolkit provides a dramatic 40 percent improvement in engine initialization (compared with V2.1), which results in remarkably better application response times. In addition, the Toolkit will include in future releases a new "packet encryption" technique which is well suited for broadcast and multi-cast applications, especially on the Internet. The RPK Toolkit is easy to use and manage, making it an attractive and readily accessible solution for developers of new applications. The RPK Toolkit includes sample applications, complete source code and comprehensive documentation. The core technology of the RPK Toolkit leverages the same mathematics behind Diffie-Hellman Key Exchange, a widely used algorithm for creating secure network-based communications systems, and is highly respected by security experts. more RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT PG. 2 OF 3 "I have reviewed the RPK public key cryptosystem and believe the algorithm to be secure and suitable for use in secure applications," said Fred Piper, cryptographer, Codes & Ciphers Ltd. The RPK Encryptonite Engine provides a method of encrypting (also known as encoding) computer data or digital electronic signals to protect its contents against unauthorized surveillance. RPK Encryptonite Engine is unique in that it combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links. "In response to customer requests for a variety of software implementations as well as custom hardware (chips), we now offer developers and engineers a multi-platform premium encryption product that is easy to use and offers flexible and scalable levels of security and performance," said Jack Oswald, president and CEO of RPK Security. "Because the RPK Toolkit is developed outside of the U.S., it is not subject to U.S. export laws which gives a tremendous advantage to international customers, allowing them to produce secure, fast and flexible systems." Features of RPK Encryptonite Software Toolkit 3.0: Eighty different levels of encryption security Global availability with strong encryption Faster encryption and decryption of data files and streams Based on proven mathematics of Diffie-Hellman Key Exchange algorithm Easy to use object-oriented design Extremely well suited to embedded applications Less expensive to implement than competing products more RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT PG. 3 OF 3 Pricing and Availability: The RPK Encryptonite Software Toolkit is now available for licensing worldwide. Pricing starts at $695 per developer (development only). Deployment license fees are based upon custom configurations. For sales information, contact Kevin Shannon, vice president, sales at (610) 399-7999, or via e-mail at sales at rpkusa.com The RPK Encryptonite Software Toolkit includes: highly portable, cross-platform, C++ class libraries with full source code for use with Win 95, 98, NT and Linux, and VCL component for Borland's Delphi 3.0/2.0 running under Microsoft Windows 95 and NT. It was compiled and tested with Microsoft's Visual C++, Borland C++ Builder, gnu/g++ and Borland Delphi 2.0/3.0. Windows DLL and ActiveX will be available by August 15, 1998. C source library, Solaris and HP/UX ports, and Java implementations will be available by August 31, 1998. ABOUT RPK SECURITY Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography. Its flagship RPK Encryptonite� Engine, a strong and uniquely fast public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms. RPK solutions are ideal for electronic communications, financial transactions, Internet banking, smart cards, streaming audio-video, telecommunications and more. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications. RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA. Visit RPK's website at www.rpkusa.com or call (212) 488-9891. From kent at songbird.com Mon Jul 27 18:46:06 1998 From: kent at songbird.com (Kent Crispin) Date: Mon, 27 Jul 1998 18:46:06 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <19980727141055.63396@songbird.com> Message-ID: <19980727184320.50687@songbird.com> On Mon, Jul 27, 1998 at 09:20:10PM -0400, mgraffam at mhv.net wrote: > On Mon, 27 Jul 1998, Kent Crispin wrote: > > > It occurs to me that an interesting use for the eff des cracker would > > be the following: since the government asserts that DES is safe, then > > a DES encrypted archive of crypto code should be exportable. > > No. Encrypting with DES, or any symmetric cipher > does not destroy the information, which is what is controlled. > Even losing the key does not destroy the information, as we all know: > keys can be recovered it is just a matter of the work involved. Apparently we are talking at cross purposes. Currently, there are rather large ftp crypto archives that are "protected" by a scheme using randomly generated directory names. This is considered acceptable by the export authorities. The export authorities would have a hard time, therefore, arguing that an archive protected by encrypting the files with DES would not be sufficiently protected. It would be a stunt, of course. Merely another stunt to illustrate the inconsistencies in the export laws. [...] > We don't need encrypted archives floating around.. we need to show that, > like cars, crypto devices (programs or otherwise!) are useful even if > they can be used by bad people for bad purposes. > > Abstract things like exporting a hunk of random crap and arguing about > it don't achieve this, and will never do so in the minds of laymen > with no real interest in crypto. I quite disagree. Frequently a clever stunt does engage the layman -- at least the intelligent laymen. -- Kent Crispin, PAB Chair "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From whgiii at openpgp.net Mon Jul 27 19:43:22 1998 From: whgiii at openpgp.net (William H. Geiger III) Date: Mon, 27 Jul 1998 19:43:22 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: Message-ID: <199807280239.WAA01586@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In , on 07/27/98 at 09:20 PM, mgraffam at mhv.net said: >The _spirit_ of the law is that no crypto device can be exported. >Programs are considered to be devices.. as is evidenced by the recent >decision in the Bernstein case. That was the Junger case. In the Bernstein case the principles of Free Speach and the 1st Amendment were upheld by the 9th District court (Patel). - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Windows done RIGHT! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNb07gY9Co1n+aLhhAQHstwQApoCNdr8viSr0BSNMz3UE3t2dMKeUTkL8 xGL3u5RQIk/5GQo68Rc+Tvftl/VNsPLoMZISpW6Lx5uPHQLS4zj6VlUaEvfNpc9J eGba5PEEbQr7XS3/cqjyi2SfpVzihmgd5/808g8uonZK5B/9TAljt7XvIjmiD4Ku HOoQW/2AAhY= =D2K7 -----END PGP SIGNATURE----- From mgraffam at mhv.net Mon Jul 27 19:54:56 1998 From: mgraffam at mhv.net (mgraffam at mhv.net) Date: Mon, 27 Jul 1998 19:54:56 -0700 (PDT) Subject: John Gilmore and the Great Internet Snake Drive In-Reply-To: <199807280239.WAA01586@domains.invweb.net> Message-ID: On Mon, 27 Jul 1998, William H. Geiger III wrote: > -----BEGIN PGP SIGNED MESSAGE----- > > In , on 07/27/98 > at 09:20 PM, mgraffam at mhv.net said: > > >The _spirit_ of the law is that no crypto device can be exported. > >Programs are considered to be devices.. as is evidenced by the recent > >decision in the Bernstein case. > > That was the Junger case. In the Bernstein case the principles of Free > Speach and the 1st Amendment were upheld by the 9th District court > (Patel). You're absolutably right. My bad.. I don't know what I was thinking. I guess this shows my pessimissim and lack of trust in our establishment, doesn't it :) Michael J. Graffam (mgraffam at mhv.net) http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html #!/bin/perl -sp0777i HERE IT IS!! The earnings pontential you have been looking for! We will provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all fresh addresses with no duplications. They are all sorted and ready to be mailed. This is the best deal anywhere today for email lists! Imagine selling a product for only $10 and getting only a 1/100 response. That's $150,000!!! Money making plans, reports, lists, jewelry, art, etc. Whatever you wish to sell! People are making millions of dollars right now by doing the same thing! That is why you get so much email from people selling you their product....it works! These 1.5 Million email addresses are yours to keep, so you can use them over and over and they can be downloaded right from the internet or sent by mail on disk....your choice. If you do not have a program capable of sending bulk email, don't worry! We also send you links to sites where you can download one for free! We will also show you how you can avoid using your ISP's SMTP mail server for mailing by using software that turns your personal computer into your very own personal mail server! Simply print out and complete this order form and send it to us along with your check or money order made payable to: FTWI for only $15. Send addresses via (circle one): DOWNLOAD MAIL (add $3 for shipping and handling) Name: _____________________________ Street Address: ________________________City: _______________ State: ________________Zip:_____________ Phone number:__________________________ Email:_______________________________ Returned checks are subject to $25 NSF Fee Send your order and payment to: FTWI. 4019 Goldfinch, Ste. J San Diego, CA 92103 THANK YOU!!! Thank you!!! From LookBelow at msn.com Tue Jul 28 00:02:28 1998 From: LookBelow at msn.com (LookBelow at msn.com) Date: Tue, 28 Jul 1998 00:02:28 -0700 (PDT) Subject: Beat The IRS & PAY-NO-MORE Message-ID: <199807280624.BAA05367@sw.crfc.com> ==================================================== - PLEASE READ - *************** The Founding Fathers of The United States of America wrote our Con- stitution, Bill of Rights and Declaration of Independence to set us FREE from TYRANNY and TAXATION. Our Founding Fathers did not want our government to make you pay INCOME TAXES. If you study the Constitution, and the IRS tax laws, you will find that paying income taxes is not mandatory. It is based on a voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND THEIR JURISDICTION.. "Our tax system is based on individual self assessment and VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner "OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145 It is very EASY and LEGAL to volunteer out of the IRS tax system, but you must know the EXACT PROCESS REQUIRED to do this simple task. If you don�t know the correct way to do this, you could be FINED $500 by the IRS. If you will spend JUST $35.00 we will send you our report: "BEAT THE IRS & PAY-NO-MORE". Our report will SET YOU FREE LEGALLY! After reading our report and filling out a simple form you will be FREE from the IRS BANDITS and the graduated Federal INCOME TAX ... FOREVER. Our report is guaranteed to STOP FEDERAL INCOME TAX WITHHOLDING from your pay check!!! You will never have to pay Federal income taxes again. You will never have to file a 1040 Form again. You will never have to keep personal expense or income records. You will be completely FREE from the Federal income tax and the IRS. We send you absolute PROOF you do not have to file a return. After reading our report and following simple instructions your pay check will be free from those nasty income tax deductions. This will put an extra $20 to $200 in your pocket every week!. "ISN�T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH?" Now is the time to fight back. Please read on!!! ********************************************** "BEAT-THE-IRS & PAY-NO-MORE" Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of 1040 Form, & STOP THE IRS EXTORTION PERMANENTLY! This works for all Citizens that are not government employes, don't deal in Alcohol, Tobacco, or fire arms, or own a corporation or own a business where you are under a duty to withold from your employes paycheck. ------------------------------------------------------------------- The IRS Federal Income Tax System is based on VOLUNTARY COMPLIENCE... We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM! ------------------------------------------------------------------- Your Success is ABSOLUTELY Unconditionally GUARANTEED! Our methods work every time for everybody if you were born in and live in one of the 50 Republic States and are not a government employee. Also you can not live or work on Government Property such as a Mili- tary base, Washington, D.C., Guam, Semoa, Virgin Islands, etc. Our method is 100% legal, honest and ethical. We will pay anybody $1,000 if they can prove our method is ILLEGAL, DISHONEST or UNETHICAL!!! Our method has worked for every person who has ever bought this package without exception. NOBODY HAS EVER FAILED!!! - Our PACKAGE includes a LIFETIME, FREE, 40% PAY OUT Dealership, PLUS ALL the marketing material master copies you will ever need. YOUR PAYCHECKS WILL BE 10% TO 35% BIGGER EVERY WEEK, within 2 weeks of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITU- TIONAL RIGHTS. SET YOURSELF FREE! ------------------------------------------------------------------- Your package includes unlimited FREE phone consultations, a copy of the U.S. Constitution, The Bill of Rights, forms, affidavits, and much, much more! --------------------- ORDER FORM - CUT ---------------------------- TO ORDER BY MAIL: Send this order form plus your Name, Address, Phone # and a $35+$3 S&H (Money Order Only) to: LINKCO --Dept. # 00001 -- POB 66781 -- Phoenix, AZ 85082 Phone: (602)267-9688 Thanks for reading this message! -(Unconditional Money Back Guarantee)- - Copyright 1996 Linkco - ================================================================== To be REMOVED from this list type REMOVE in the subject area of a new e-mail and send to: Action944 at usa.net ================================================================== From bill.stewart at pobox.com Tue Jul 28 00:05:04 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 28 Jul 1998 00:05:04 -0700 (PDT) Subject: Fw: my thoughts for this list In-Reply-To: Message-ID: <3.0.5.32.19980727235810.00934840@popd.ix.netcom.com> At 12:19 PM 7/27/98 -0400, mgraffam at mhv.net wrote: >GPG = GNU Privacy Guard. > >GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents, >but once they run out, GPG will use it. I think it uses Blowfish (and >CAST?) for the symmetric algorithms, and probably 3DES too. I dunno >about IDEA .. I have my doubts due to the patents. Actually, GPG has been a PGP-look-similar-but-not-interoperate-like rather tha a workalike. Unless GPG has been updated lately, GPG keys tend to do Very Crashy Things to my PGP 5.5.x Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From sosechal at easynet.fr Tue Jul 28 01:25:55 1998 From: sosechal at easynet.fr (laurent breton) Date: Tue, 28 Jul 1998 01:25:55 -0700 (PDT) Subject: Frozen shrimp and sole from senegal (west africa) Message-ID: <199807280825.BAA14739@toad.com> Date : 28/July/98 FIND OFFER ON FROZEN SEAFOOD, SHRIMPS (PENAEUS DUORARUM) AND SOLES (CYNOGLOSSUS) - ORIGINE SENEGAL (WEST AFRICA) INVENTORY IN PARIS (FRANCE) - PRICES ARE FOB PARIS, OUR COLSTORE WE CAN ALSO PRODUCE FOR YOU STARTING SEPT/98. SHRIMPS CREVETTES DECORTIQUEES CRUES-DEVEINEES-BLOCK-BOITES DE 2 KGS, MASTER 18 KGS) PTO RAW - P&D - BLOCK - (MASTER 18KGS, 9 X 2 KGS BOXES) 140/180 KG - 60/80 LB 58.00 FF/KG 4,31$/LB CREVETTES ENTIERES CUITES - (BOITES DE 2 KGS, MASTER 12 KGS) SHRIMPS HEAD ON COOKED - (MASTER 12KGS, 6 X 2 KGS BOXES) 80/100/kg - 35/45/lb 39.00 FF/KG 2,90$/LB 100/120/kg - 45/55/lb 35.00 FF/KG 2,60$/LB CREVETTES DECORTIQUEES CUITES-IQF-(12 SACHETS DE 0.500 KGS, MASTER 6 KGS) SHRIMPS PUD COOKED IQF - (MASTER 6KGS, 12 X 0.5 KGS PLASTIC BAGS) 110/140 KG - 50/65 LB 57.00 FF/KG 4,24$/LB 140/180 KG - 65/80 LB 52.00 FF/KG 3,87$/LB 180/250 KG - 80/115 LB 47.00 FF/KG 3,49$/LB 250/300 KG - 115/135 LB 42.00 FF/KG 3,12$/LB CREVETTES DECORTIQUEES CRUE - DEVEINEES - IQF (12 SACHETS DE 0.5KGS, MASTER 6 KGS) SHRIMPS PUD RAW IQF - (MASTER 15KGS, 30 X 0.5 KGS PLASTIC BAGS) 140/180 KG - 65/80 LB 67.00 FF/KG 4,98$/LB POISSONS - FISH FILET DE SOLE TROPICALE - (BOITES DE 2 KGS, MASTER 12 KGS) TROPICAL SOLES FILETS - (MASTER 12KGS, 6 X 2 KGS BOXES) 60/90 44.50 FF/KG 3,31$/LB 90/120 45.50 FF/KG 3,38$/LB FILET DE TURBOT TROPICAL - (BOITES DE 2 KGS, MASTER 12 KGS) L. NAME : PSETTODES BELCHERI TROPICAL TURBOT FILET - (MASTER 12KGS, 6 X 2 KGS BOXES) 80/160 29.00 FF/KG 2,16$/LB TURBOT TROPICAL H&G - (MASTER 22 KGS) L. NAME : PSETTODES BELCHERI - H&G 400/1500g 10.00 FF/KG 0.75$/LB SOLE PAC - (HEAD ON, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS) 175/225g 31.00 FF/KG 2,30$/LB SOLE PAN - (HEAD OFF, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS) 175/225g 33.00 FF/KG 2,45$/LB EN ESPERANT VOTRE INTERET SALUTATIONS email send by Mr Laurent Breton SOSECHAL-CRUSTAGEL RUE DU COMMERCE ZIGUINCHOR - SENEGAL FRENCH OFFICE RUHLMANN SA 46 ALLEE ST. MALO, MAREE 132 94519 RUNGIS CEDEX FRANCE PHONE : 33 1 46 86 40 10 FAX#1 : 33 1 45 60 05 88 FAX#2 : 33 1 46 87 01 99 MOBILE : 33 6 80 84 77 08 E at MAIL : SOSECHAL at EASYNET.FR From mok-kong.shen at stud.uni-muenchen.de Tue Jul 28 01:41:06 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Tue, 28 Jul 1998 01:41:06 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <35BD8E9A.799466A6@stud.uni-muenchen.de> David Honig wrote: > The output of a good block cipher in feedback mode will pass Diehard tests, > though it is not crypto-secure. I often see the phrase 'pass Diehard test' though I don't see from the documents of Diehard how to evaluate the volumenous printout of Diehard to say exactly whether the test is passed or not. Furthermore the component asc2bin.exe of Diehard is buggy. M. K. Shen From wcts at globalvisionexpo.com Tue Jul 28 03:51:03 1998 From: wcts at globalvisionexpo.com (wcts at globalvisionexpo.com) Date: Tue, 28 Jul 1998 03:51:03 -0700 (PDT) Subject: Your literature on our world tour Message-ID: <199807281050.DAA16195@toad.com> From: Charles H. Borden President, GlobalVision Sarasota, Florida Please kindly direct to the Sales and Marketing Decision Maker We are GlobalVision. We'll generate export sales for you while you stay home. Please accept a space for your firm's standard promotional literature on our upcoming World Tour of our exclusive 'Direct from the USA' catalog expos. Your catalog or brochure will be professionally presented to qualified import buyers, distributors, agents, joint venture partners and government purchasing agents in the countries of your choice. This tour includes commercial and World Trade Centers in Australia, Japan, S. Africa, Singapore, Spain, Mexico, Canada, Argentina, Colombia, Venezuela and Brazil. We have been featured in a Success Magazine cover story and are a "final five" recipient of the 1998 SBA/Chamber of Commerce 'Young Business of the Year' award. We also have an excellent D&B rating of 3A1. Fees range from just $375-$695 per expo with a money back guarantee. Registration deadline is in 2 1/2 weeks. If you wish to have your products or services promoted in the world's best markets, while you stay home, please respond by E-mail today. Simply hit your reply button and send us a short note. Please be sure to include your NAME, COMPANY, AREA CODE and PHONE NUMBER. Susan Khrystal, our V.P., will contact you by PHONE during business hours. If you have received this message in error, please accept our apology. If you wish to be excluded from future mailings, simply press your reply button and send us the word "remove" in the subject line. Sincerely, Charles Borden President, GlobalVision From nobody at samson.ml.org Tue Jul 28 05:21:38 1998 From: nobody at samson.ml.org (Samson) Date: Tue, 28 Jul 1998 05:21:38 -0700 (PDT) Subject: "Where's Toto?" In-Reply-To: Message-ID: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org> On Mon, 27 Jul 1998 17:57:20 -0700 Tim May wrote: > >Where's Toto? > > Toto has been bombing us for weeks. Or did you think "Linda Reed" is really > a woman, rather than a small dog? Shit! There goes that fantasy! For weeks I've dreamt about how kewl it would be to fuck a female cypherpunk. I guess I'll have to become a fed... at least I can fuck Jim Bell. gurlmonger From Vox9869 at aol.com Tue Jul 28 06:21:03 1998 From: Vox9869 at aol.com (Vox9869 at aol.com) Date: Tue, 28 Jul 1998 06:21:03 -0700 (PDT) Subject: window stickers Message-ID: <8a1bc0a4.35bdd008@aol.com> I'm looking for Lynrd Skynrds Freebird on a window sticker for my car. Do you know where I can find one? From stuffed at stuffed.net Tue Jul 28 06:36:56 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Tue, 28 Jul 1998 06:36:56 -0700 (PDT) Subject: $200,000 pussy for sale/Double Ds make me sneeze Message-ID: <19980728081100.25776.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/28/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From billp at nmol.com Tue Jul 28 07:20:52 1998 From: billp at nmol.com (bill payne) Date: Tue, 28 Jul 1998 07:20:52 -0700 (PDT) Subject: Fisher’s ORDER of July 22, 1998 Message-ID: <35BDDD11.4186@nmol.com> Tuesday 7/28/98 7:34 AM John Young Morales and I met for lunch yesterday. We formulated our response to Fisher�s ORDER of July 22, 1998. We will get it out this week. Wayland wants to meet this morning to talk BUSINESS. I attach what I wrote for Wayland's and his Texas A&M buddies SBIR proposal. I am also working on the techie side of the digital FX. I am getting 8051 machines working AGAIN. Thank goodness I wrote a book documenting what we did. I have to study my own book to TRY TO figure out what is going wrong! Our phone conversation when you told me about some SCARY people you met some years ago reminds me of Sandian James Gosler. Sandia transferred me into Robert Ewing�s division to break electronic locks for the FBI. Gosler was then made Ewing�s projects boss. It was at this time that Gosler told me that my abilities were being wasted breaking locks for the FBI. Gosler told me he was going to transfer me to an NSA project. I refused. NSA requires signed one�s civil liberties away to work on their projects. http://www.jya.com/nsa-sun.htm After I just met Bob Wayland, Wayland told me to keep away from Gosler. Wayland told me - and others too - that one of Gosler�s female employees invited Gosler to her home after work. Gosler raped her, I was told. Gosler threatened to kill her if she revealed the rape, I was told. My former department manager, Kent Parsons, and Forth advocate told me that he thought that Gosler was �one of Sandia�s true crazies.� Gosler is the supervisor to told me When Payne balked, his supervisor said Payne "did not choose his jobs. Rather, Sandia assigns duties to" him. http://www.jya.com/whp1.htm What scares me is that guys like Gosler are working for our government. Let�s all hope for settlement before this matter gets WORSE. Later bill WEED KILLER computer interface proposal section 7/27/98 10:11 AM Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer running a version of the Windows operating system to the WEED KILLER analog/digital hardware. Windows is not a real-time operating system, therefore microcontroller controller/collector hardware interface must be installed between a Wintel PC and the WEED KILLER hardware. Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt usually between 70 to 150 microseconds. In rare occasions the interrupt latency may extend to 1.5 milliseconds or even longer. A microcontroller responds to an interrupt in several microseconds. Wintel hardware controller interface is even more difficult than collection for the reason that the Windows operating system only gives control to an application when Windows decides. In the collection, mode at least a hardware interrupt signals Windows that the application wants control. However, the microcontroller can send the Wintel an interrupt asking the applications code whether there is any message it needs to send the microcontroller. Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to analog and digital hardware. An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons. 1 The 80C32 will do the job. 2 Multiple vendors of 80C32 guarantee future supply at a competitive price. Current suppliers include Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI, ATMEL, ... 3 High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications hardware between an 80C32 and PC is in the final stage of development. 4 IEEE 1284 hardware drivers are supplied with Windows NT. Custom assembler dll drivers are available for 9x and 3.x. 5 A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm Hardcover book further documenting 5 is available from Academic Press. http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 Only a Wintel machine is required for both hardware and software for the WEED KILLER project. Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and, infrequently, an oscilloscope. Reason is the INTERACTIVE control of the hardware and software from a PC keyboard and diagnostic information easily printed to a PC monitor. Justification for assertion made in the above paragraph comes from Internet. NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/ Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0 to locate wrecks of the Titanic, Bismarck, and Yorktown. http://www.nationalgeographic.com/features/98/midway Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/ Adobe Postscript is a version of Forth. http://www.mactech.com/articles/mactech/language/forth-postscript.html Video game software are written mostly in Forth. The Wintel side of the WEED KILLER project will be most-likely written in a small amount of assembler interface code and Visual Basic. While Forth threaded code software technology is extremely valuable in some settings, it is not in others. Java is a variation of Forth. http://www.mrl.nyu.edu/meyer/jvmref/ Future of Java on Wintel machines is unclear at this time. For example, The hottest items among techies is a browser called Opera. This is a $40 shareware program that in speed and compact size buts both IE and Communicator to shame. It has a slightly different interface from either of the majors - an interface some find refreshing while other find less than useful. As it's shareware, you can try and then buy if you like it. One reason for its speed is that it ignores Java - the Internet's Bandwidth Pig (IBP). The Rumor Mill by Paul Cassel ComputerScene Magazine July 1998 Forth executes code High-level at about 10% the speed of a compiled high-level language. Speed of execution of small applications is not effected by Forth�s slow execution. Reason is that initial code is written in high-level Forth. Inner loops are then translated into Forth assembler. Speed is maintained with the advantage that data structures are created an maintained in high-level language while the interactive operating system is retained for trouble shooting both hardware and software problem. Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k. Hardware design is estimated at 1 month labor at $50/hr for a total of $8k. Software development on the 80C32 side in Forth and Forth assembler, software on the Wintel side in Visual Basic and assembler, documentation, and training is estimated to be 4 months for a total of $32k /\/\/\ end Counterfeiting Wiegand Wire Access Credentials Bill Payne October 16,1996 Abstract Wiegand wire access credentials are easy and inexpensive to counterfeit. Access Control & Security Systems Integration magazine, October 1996 [http://www/securitysolutions.com] published the article, Wiegand technology stands the test of time by PAUL J. BODELL, page 12 Many card and reader manufacturers offer Wiegand (pronounced wee-gand) output. However, only three companies in the world make Wiegand readers. Sensor Engineering of Hamden Conn., holds the patent for Wiegand, and Sensor has licensed Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, Germany, to manufacture Wiegand cards and readers. ... A Wiegand output reader is not the same thing as a Wiegand reader, and it is important to understand the differences. In brief, Wiegand reader use the Wiegand effect to translate card information around the patented Wiegand effect in which a segment of a specially treated wire generates an electronic pulse when subjected to a specific magnetic field. If the pulse is generated when the wire is near a pick-up coil, the pulse can be detected by a circuit. Lining up several rows of wires and passing them by a cold would generate a series of pulses. Lining up two rows of wires - calling on row "zero bits" and the other "one bits" - and passing them by two different coils would generate two series of pulses, or data bits. These data bits can then be interpreted as binary data and used to control other devices. If you seal the coils in a rugged housing with properly placed magnets, and LED and some simple circuitry, you have a Wiegand reader. Carefully laminate the special wires in vinyl, and artwork, and hot-stamp a number on the vinyl, and you have a Wiegand card. IN THE BEGINNING Wiegand was first to introduce to the access control market in the late 1970s. It was immediately successful because it filled the need for durable, secure card and reader technology. Embedded in the cards, Wiegand wires cannot be altered or duplicated. ... Bodell's Last statement is incorrect. Tasks for EASILY counterfeiting Wiegand wire cards are 1 Locate the wires inside the card to read the 0s and 1s. 2 Build an ACCEPTABLE copy of the card. Bodell's clear explanation of the working of a Wiegand card can be visualized zero row | | | one row | | binary 0 1 0 0 1 representation Solutions to Task 1 A X-ray the card B MAGNI VIEW FILM, Mylar film reads magnetic fields ... Edmunds Scientific Company, catalog 16N1, page 205, C33,447 $11.75 is placed over the top of the Wiegand card. COW MAGNET, Cow magnetics allow farmers to trap metal in the stomachs of their cows. Edmunds, page 204, C31,101 $10.75 is placed under the card. Location of the wires is easily seen on the green film. Mark the position of the wires with a pen. Next chop the card vertically using a shear into about 80/1000s paper-match-sized strips. Don't worry about cutting a wire or two. Note that a 0 has the pen mark to the top. A 1 has the pen mark at the bottom. Take a business card and layout the "paper match"-like strips to counterfeit the card number desired. Don't worry about spacing. Wiegand output is self-clocking! Tape the "paper-match - like" strips to the business card. Only the FUNCTION of the card needs to be reproduced! History Breaking electronic locks was done as "work for others" at Sandia National Laboratories beginning in 1992 funded by the Federal Bureau of Investigation/Engineering Research Facility, Quantico, VA. The FBI opined that this work was SECRET/NATIONAL SECURITY INFORMATION. Details of the consequences of this work are covered in Fired Worker File Lawsuit Against Sandia Specialist Says He Balked When Lab Sought Electronic Picklock Software, Albuquer Journal, Sunday April 25, 1993 State-sanctioned paranoia, EE Times, January 22, 1996 One man's battle, EE Times, March 22, 1994 Damn the torpedoes, EE Times, June 6, 1994 Protecting properly classified info, EE Times, April 11, 1994 DOE to scrutinize fairness in old whistle-blower cases, Albuquerque Tribune, Nov 7 1995 DOE boss accelerates whistle-blower protection, Albuquerque Tribune, March 27, 1996 DOE doesn't plan to compensate 'old' whistle-blowers with money, Albuquerque Tribune September 27, 199 From attila at hun.org Tue Jul 28 08:31:11 1998 From: attila at hun.org (attila) Date: Tue, 28 Jul 1998 08:31:11 -0700 (PDT) Subject: FDR In-Reply-To: <9807272025.AA16791@mentat.com> Message-ID: On Mon, 27 Jul 1998, Jim Gillogly wrote: >Woops, cryptography relevance inadvertently embedded in a farrago by Attila: > >> I always wanted to believe Alger Hiss was innocent as his son Tony >> was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs >> as the CIA had cracked the code but would not show it in court --they >> even knew who handed over the trigger mechanism (never punished and he >> left the U.S. after the Manhattan project and taught for many years at >> Oxford). > >For one thing, the CIA didn't crack the VENONA ciphers: it was the >Signal Intelligence Service at Arlington Hall, a predecessor of the >NSA, and NSA continued the cracks for the next three decades. > you are absolutely correct --my gaffe. CIA has never worked code to my knowledge. in fact, the old man who was the lead mathematician on the Verona project just died, did he not? >While the VENONA decrypts do indeed establish the Rosenbergs' guilt >beyond reasonable doubt, the evidence about Alger Hiss is more >tenuous. The only relevant evidence released is a single decrypt at >http://www.nsa.gov:8080/docs/venona/docs/Mar45/30_Mar_1945_R3_m4_p1.gif >about an interview with a Communist agent code-named ALES. A footnote >says ALES is "Probably Alger Hiss". The text of the message says that >ALES was at the Yalta conference (Alger Hiss was in fact there) and >went on to Moscow (I don't know whether Hiss did this or not, nor how >many others of the rather large American team did so). > I believe he went on to Moscow since he was one of FDR's two or three top people. I would need to reread the rather long paper on the various people involved and just how close McCarthy was to a truth he could not prove --didn't make McCarthy any less of a scumbag, though. I read the Alger Hiss portions of the documen- tation rather carefully because of the personal friendship I had with Tony who was a very genuine, refined individual (we were on the Harvard Crimson editorial staff together). I will also check your reference on Verona, but I believe there is more in the open records which ties it down. what is interesting is the number of intelligent individuals who not only believe in the concept of socialism/communism, but were essentially apologists for Lenin, Trotsky, Stalin, etc. through the period 1917-1950. it was if the pain of Russia's people was just a catharsis on the road to Utopia --by 1950, the apologia wore rather thin... the guilt of the man who passed the trigger from White Sands is confirmed beyond a doubt by Verona also. > >In any case, the identification is less than certain, and much less >definitive than the Rosenberg data. > granted, but with the outside information, sufficient I believe to raise more than an eyebrow and Alger Hiss certainly should not have been in the position of trust and power that he was. part of the evidence is based on process of elimination --if not Hiss, who was standing at FDR's side in incident or "give-up" time and time again? with or without the McCarthy Red scare, I think the evidence was sufficient to convict, but then and again, I am known to be wrong --as above... __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ From honig at m7.sprynet.com Tue Jul 28 09:37:57 1998 From: honig at m7.sprynet.com (David Honig) Date: Tue, 28 Jul 1998 09:37:57 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <3.0.5.32.19980728093729.007deb30@m7.sprynet.com> At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote: >David Honig wrote: > >> The output of a good block cipher in feedback mode will pass Diehard tests, >> though it is not crypto-secure. > >I often see the phrase 'pass Diehard test' though I don't see from >the documents of Diehard how to evaluate the volumenous printout >of Diehard to say exactly whether the test is passed or not. Furthermore >the component asc2bin.exe of Diehard is buggy. > >M. K. Shen > My rough understanding: the 'P' value is a measure on the hypothesis that the test sample is a truly random sample, where truly random is defined by the expected statistical properties being measured. Eg in 100 bits you expect to find 50 1's; if you count 48, is your 100-bit sample consistant with it being unpredictable? If you get values near 1.0 your sample is not likely taken from a random pool. Try this: generate 10Meg from a block cipher feeding back on itself. Diehard will pass these. (Diehard needs 10M samples) Now run FM hiss into your soundcard. Sample this at 8Khz (to avoid temporal correlation) and save to a file til you have 10Meg. Diehard will reject this. Make a larger file, and then gzip it down to 10Meg. (That it shrinks indicates its symbols don't carry a full bit.) Run Diehard on this. It will pass more tests but not all. Take the FM hiss, feed it into a stream cipher, and start burning those OTPs. Do this with a detuned *video* tuner for more bandwidth. honig at alum.mit.edu "Speech is not protected simply because it is written in a language" Federal Misjudge Gwin on the Bernstein Case From mitch at duzen.com.tr Tue Jul 28 09:49:22 1998 From: mitch at duzen.com.tr (S. M. Halloran) Date: Tue, 28 Jul 1998 09:49:22 -0700 (PDT) Subject: FDR In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5> Message-ID: <199807281533.SAA25475@ankara.192.168.3.5> Someone assuming the personality of attila about yesterday (who is he today? ask him--you might like the answer) wrote while in a mental state that could be characterized as perceiving reality for only the very briefest of moments: [humongous snip of recycled rumors, shameless fabrications, hypocritical innuendo, outright slander, and maybe a paucity of conceded-by-all- including-the-man-himself historical fact] > there is no left and right; there is no moral government; it's all > about power and staying in power. ever notice how reformers only > stay reformers until they need to run for reelection and the money > goes to those who play ball? So learn to play the game. Yeah, no one, even the icons we build, is a born angel. There are relative levels of the good and bad in our society. Do you see the word "relative"? It means no absolutes. If you want absolutes, check out the Bible readers for whom every word is sacred. One of my rotating tag lines talks (another Turkish proverb) addresses the very issue you bring up: power. I hope it shows up at the end of this message. > > the U.S. is already an oligarchy, next comes the plutocracy, followed > by the triumvirate, and then the emporer (maybe with clothes) -then > there will be a winnowing and anarchy followed by tribal states. welcome > to history, but few will live to see it run its course --America, the > universally hated, will be the first to be plowed under when she can > no longer bully or buy the -pax americanus-. and the men in power know > that a hungry disorganized populace can be subjugated by a well fed > army. Well, that's what we call human history. Nations and empires rise and fall, birth and death, a natural progression. The only thing you need worry about while living in this kennel called the planet Earth is to be top dog. > sorry, I really am crazy, but it's better to be crazy than insane. You're sure about that, are you? Mitch Halloran Research (Bio)chemist Duzen Laboratories Group Ankara TURKEY mitch at duzen.com.tr A woman without a husband is like a horse without reins. --Turkish proverb From jya at pipeline.com Tue Jul 28 10:10:46 1998 From: jya at pipeline.com (John Young) Date: Tue, 28 Jul 1998 10:10:46 -0700 (PDT) Subject: DoD on Infosec and Crypto Message-ID: <199807281710.NAA25500@camel7.mindspring.com> DoD released today a July 21 speech by John Hamre to a gathering of Fortune 500 CIOs of which about half dealt with infosec and encryption issues: http://jya.com/dod072198.htm (53K) Mentioned: the EFF DES crack, PGP, offshore products, the need for expensive hardware to bolster cheap code, Eligible Receiver, the difficulty of DoD meshing its legacy decrepit systems with cutting edge warfighting technology, concern about foreign Y2K, the need to slaughter when no one volunteers to help. DoD boosts strong encryption as the primary means to protect mil and com info but insists on "balancing" the needs of privacy and law enforcement. Questioners bluntly challenged equating the two. From mitch at duzen.com.tr Tue Jul 28 10:33:21 1998 From: mitch at duzen.com.tr (S. M. Halloran) Date: Tue, 28 Jul 1998 10:33:21 -0700 (PDT) Subject: MItSchill Millhouse Holler'in In-Reply-To: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu> Message-ID: <199807281629.TAA25772@ankara.192.168.3.5> Someone having looked over the shoulder of one Linda Reed--PCC West Campus CSC, getting her password, and then using her mail account, drooled with paralytic tongue as follos: > ReVisionIst, to me, indicates someone who takes another look > at what was previously seen with the aid of colour-glossy photos > and pie-charts provided by the people who threatened to imprison > your parents if they failed to send you to government-sponsered > IndoctrinationCamps justified under the ruse of FreeEducation, > which sometimes seem mostly geared for reinforcing in our minds > how lucky we are to live in a country where the government is > kind enough to provide us with FreeIncomeTaxReturnForms. What color are your glossy glasses, by the way? In addition to "FreeIncomeTaxReturnForms", they also let me urinate in the national forests too. > > As far as Roosevelt, or anyone else, being "the greatest > President" of any era, it would be more accurate to describe > their being the GreatestBullShitter of the era, or of having > the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era. Doesn't that count for something? Be all you can be, right? Excellence in being immoral is certainly better than being mediocre at being immoral. > It is a matter of speculation to what extent Roosevelt's > actions were responsible for the recovery of the American > economy after the collapse of the banking sector, but it is > a matter of *fact*, supported by the testimony of even those > who were part of FDR's political entourage, that Roosevelt > took steps to ensure the *complete* collapse of America's > financial institutions while Hoover was still President, > in order to put himself in a position to extort as much > money and power as possible out of Congress. Is this sort of like Reagan arranging with the Iranians that the Tehran 52 could come home for Christmas, but not before? And while having mentioned the cheese head, could you possibly do a piece on Reagan, by the way? Now *that* is something I could enjoy reading. And really let loose with the prose, if you please: the more insane, the more tangential, the better. > Perhaps the massive suffering and financial losses that > he caused in his power-grab might be justified as being > 'for the greater good,' except that, had he used his position > as President-elect to help restore confidence in the economy, > instead of destroying it, America would not have required > nearly as much 'saving' as it subsequently needed. Well, the implementation never really does live up to the grand design now, does it? Ask any computer programmer here on this list. > It is a shame that I had not been born in an age when I > could have run for President against Roosevelt, and won. It is a shame that we'll all just have to endure. > Had I done so, then I, like FDR, would have granted > myself a license to print money, and I also would have > spent three times as much of the taxpayer's money as the > previous 31 Presidents, combined, but *I* would have spent > it all on beer and scotch, thus resurrecting the American > economy without creating a HugeGovernmentMonster filled > with political patronage appointees and employees who I > had bought and owned with imaginary money that taxpayers > would be responsible for repaying. Maybe you're not so crazy after all. You know, it's not too late to enter the race for 2000. It's a good year to start on, and because of your intimate connections with people who are information technology-aware, you could make some programmers fabulously wealthy by scamming people on the Y2K problem. > Also, being drunk all of the time, there would have been > little chance of me turning America into a PlannedSociety > via a New Deal in which all of the cards being dealt were > Red. US Grant was also a lush. How prosperous were those times when he could pick himself off the floor? > ICould'aBeenAContend'aMonger > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ I really am enjoying this. I had apparently a great deal of spare time in the dog days of summer to humor the paranoids of the list although I was rather dreading the consequences. *** Object Lesson: NEVER ARGUE WITH AN INSANE INDIVIDUAL *** 1. You can never come to a compromise or even win: it requires that the two sides be possessed of reason, and you have only half of what you need. 2. There is a risk that you just might start believing what that individual believes, especially when you start conceding small points that appear to be the truth. (Don't be fooled.) 3. It reduces you to a less dignified state before your peers. And appearance is everything. Remember: Style, not substance. Form, not structure. Mitch Halloran Research (Bio)chemist Duzen Laboratories Group Ankara TURKEY mitch at duzen.com.tr While in substance it is generally all the same, it still amazes the observer that one will find that smelling one's own is somehow less disgusting than smelling someone else's. --Anonymous From attila at hun.org Tue Jul 28 11:19:21 1998 From: attila at hun.org (attila) Date: Tue, 28 Jul 1998 11:19:21 -0700 (PDT) Subject: "Where's Toto?" In-Reply-To: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org> Message-ID: y'al are missing the tornado: "Toto" is a small dog. rather territorial in fact. now, since I have literally made the acquaintance of both "Toto" and his master/mistress, I shall leave the reader to solve the exercise of "who is the master?" clue: it's not attila! clue: all truth can be found in "Alice in Wonderland" attila out... On Tue, 28 Jul 1998, Samson wrote: >On Mon, 27 Jul 1998 17:57:20 -0700 Tim May wrote: > >> >Where's Toto? >> >> Toto has been bombing us for weeks. Or did you think "Linda Reed" is really >> a woman, rather than a small dog? > >Shit! There goes that fantasy! For weeks I've dreamt about how kewl >it would be to fuck a female cypherpunk. > >I guess I'll have to become a fed... at least I can fuck Jim Bell. > > >gurlmonger > > > > > > __________________________________________________________________________ go not unto usenet for advice, for the inhabitants thereof will say: yes, and no, and maybe, and I don't know, and fuck-off. _________________________________________________________________ attila__ To be a ruler of men, you need at least 12 inches.... There is no safety this side of the grave. Never was; never will be. From CTIA_Daily_News at um2.unitymail.com Tue Jul 28 11:56:38 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Tue, 28 Jul 1998 11:56:38 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 28, 1998 Message-ID: <199807281818.NAA13019@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com� =========================================== From whgiii at openpgp.net Tue Jul 28 12:00:32 1998 From: whgiii at openpgp.net (William H. Geiger III) Date: Tue, 28 Jul 1998 12:00:32 -0700 (PDT) Subject: DoD on Infosec and Crypto In-Reply-To: <199807281710.NAA25500@camel7.mindspring.com> Message-ID: <199807281900.PAA03283@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199807281710.NAA25500 at camel7.mindspring.com>, on 07/28/98 at 01:05 PM, John Young said: >DoD boosts strong encryption as the primary means to >protect mil and com info but insists on "balancing" >the needs of privacy and law enforcement. Questioners >bluntly challenged equating the two. You know I almost feel sorry for these guys. They *must* know that they come off looking like complete fools with this line of "you need strong crypto but not too strong that we can't snoop". I did say *almost*. :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Logic, not magic. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNb4hUI9Co1n+aLhhAQFG9AQAgB6okm0WN2Ws/t4DAiMf5mXcCmX9i7Oz mJH7kSwReK0qmCAmnsv3MNP71VjdqZXiYD+mrTGIiiUP4+k8Br6oVBvuPl8DsFot QcdxWjcGkLFDFPLUCFxV2WYbWju1RcClt2OlwKas/koKtTqUWtRmt2hznZdblC0w XNjxeRFQEu0= =esV/ -----END PGP SIGNATURE----- From attila at hun.org Tue Jul 28 12:22:56 1998 From: attila at hun.org (attila) Date: Tue, 28 Jul 1998 12:22:56 -0700 (PDT) Subject: MItSchill Millhouse Holler'in In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5> Message-ID: On Tue, 28 Jul 1998, S. M. Halloran wrote: [smoke the balderdash] > >I really am enjoying this. I had apparently a great deal of spare time in >the dog days of summer to humor the paranoids of the list although I was >rather dreading the consequences. > are you paranoid? "dread" is a contributing factor to paranoia. dog days of summer --are you nuts? or just referring to Toto again? >*** Object Lesson: NEVER ARGUE WITH AN INSANE INDIVIDUAL *** > yes, I see you are arguing with yourself. how do you look in the mirror? have you found the Mad Hatter and the gerrymanderer? if the gerrymanderer cuts your "table" in two, which half will you be? you did not learn the most important lesson of the series: you must resort to the state of "crazy" to avoid going "insane". they give the insane Haldol if they are lucky, a lobotomy if that doesnt settle them down --witness Ken Kesey's "Cuckoo". >1. You can never come to a compromise or even win: it requires that the >two sides be possessed of reason, and you have only half of what you need. > you got that one right! why dont you have _any_ reason for your intransigence? is it true you're several cards short of a full deck? and, there was some question as to your response to: "...and you said the last time you beat your wife was last Saturday?" >2. There is a risk that you just might start believing what that >individual believes, especially when you start conceding small points that >appear to be the truth. (Don't be fooled.) > are you trying to imply that small lies are the foundation blocks of great truths? cowardly. see Dorothy for counseling. great truths are built on small truths and fallacies are destroyed with small lies that the little boy in Holland did not cover with his finger. >3. It reduces you to a less dignified state before your peers. And >appearance is everything. Remember: Style, not substance. Form, not >structure. > aaahh, I see you are the emporer with your new clothes! > >While in substance it is generally all the same, it still amazes >the observer that one will find that smelling one's own is somehow less >disgusting than smelling someone else's. --Anonymous > a disgusting comment which fits a research (bio)chemist in Turkey where birth control reminds me of: the father of the bride, who was marrying a Turk, told her that she was not required to submit to the Turkish indecencies, and if her about to be husband told her to "roll over", she should refuse. everything was fine for about a year until one night the husband told her to "roll over" --she refused; and when questioned, she told him what her father had said. his reply was quite simple: "but you do wish to become pregnant, dont you?" __________________________________________________________________________ To be a ruler of men, you need at least 12 inches.... _________________________________________________________________ attila__ From attila at hun.org Tue Jul 28 14:42:13 1998 From: attila at hun.org (attila) Date: Tue, 28 Jul 1998 14:42:13 -0700 (PDT) Subject: and the number of the beast is.... In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5> Message-ID: see: http://cgi.pathfinder.com/netly/0,2326,201980727-14191,00.html Paul may be a kook to some, but he has the courage to stand against the forces who wish to take all our liberties --or should I say, those few we have been permitted to keep. Is it only a coincidence that the Social Security Admistration published the new requirements for the national ID in Section 666 of the code? "...and I looked, and behold a pale horse: and his name that sat on him was Death, and Hell followed with him." [RV 6-8] "and he causeth all, both small and great, rich and poor, free and bond, to receive a markin their right hand, or in their foreheads; [Rv13-16] "and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name; [Rv13-17] "Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six Hundred threescore and six" [Rv13-18] OK, Mitch, it says it all in Revelation --and it is happening. See the article on defending yourself from Federal conspiracy charges which was posted to the list a few minutes ago by anonymous. I always define conspiracy as three guys getting drunk at a bar while discussing the idea of robbing the bank across the street. one passes out and the other two go across the street and attempt to rob the bank; all three are tried and convicted: two for robbing the bank; and three for conspiracy to rob the bank. so, be careful who you associate with; in Turkey you just might get rolled over.... attila out... one more time. From bbt at mudspring.uplb.edu.ph Tue Jul 28 18:20:10 1998 From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado) Date: Tue, 28 Jul 1998 18:20:10 -0700 (PDT) Subject: Rinda Leed In-Reply-To: Message-ID: What the?!?! I'm amazed, this site is not only about "encrypt...." but for the creep also!? =============================================================================== You give the words you have spoken, it is not lended and are not taken back. It is like what The Corrs sung "...your forgiven not forgotten...." bbt at mudspring.uplb.edu.ph bbt at peak-two.uplb.edu.ph metaphone at altavista.net On Wed, 29 Jul 1998, kryz wrote: > Guys (and Girls), > Not looking OverShoulder but BetweenLegs (both "TM") I found out (through > European North-Sea Channel) that Rinda Leed aka Linda Reed is suffering a > severe form of Post-Menstruation-Disorder. > Also her Labia Majora are inflamed and bleedy so she can't sit on her > keyboard without clottering it while typing. > FDR... Fucking De Republic? > Let's pray for Hur. > > > Chris Harwig > Nieuwegein, United Netherlands > > > From jf_avon at citenet.net Tue Jul 28 19:35:02 1998 From: jf_avon at citenet.net (Jean-Francois Avon) Date: Tue, 28 Jul 1998 19:35:02 -0700 (PDT) Subject: Fw: 1998-07-28 VP Statement on the Growing Digital Divide Message-ID: <199807290250.WAA11287@cti06.citenet.net> On Wed, 29 Jul 98 01:19:56 -0000 (DST), kryz wrote: >> Office of the Vice President >> ________________________________________________________________________ >> For Immediate Release July 28, 1998 >> >> >> >> STATEMENT BY VICE PRESIDENT GORE >> ON DEPARTMENT OF COMMERCE REPORT ABOUT >> THE GROWING DIGITAL DIVIDE >> The data shows that, although many more Americans now own computers, >> minorities and low-income households are still far less likely to have >> personal computers or on-line access to the Internet than white or more >> affluent households. Geee... who would have suspected that?!? >> and Internet access -- with the deepest discounts going to the poorest >> urban and rural schools. > >> In short, the E-Rate program will enable all of our children to mine >> the riches Yeah, mine the rich, just like "milk the cows" ... >> will have access to the same universe of knowledge as a child in the >> most affluent suburb. But what about the child of the rich that got just a little less rich for making the unrich richer and by being unrich, cannot make or affort the latest "save the world gizmo" who would have made us all more richer? >> Now is the time to bridge the digital divide, prevent those who can >> benefit the most from falling through the net, and move forward with the Three cheers for Komrad Gore! Ciao JFA " There can be no compromise on basic principles. There can be no compromise on moral issues. There can be no compromise on matters of knowledge, of truth, of rational conviction." -Ayn Rand "The government has no source of revenue, except the taxes paid by the producers. To free itself -for a while- from the limits set by reality, the government initiates a credit con game on a scale which the private manipulator could not dream of. It borrows money from you today, which is to be repaid with money it will borrow from you day after tomorrow, and so on. This is known as "deficit financing." It is made possible by the fact that the government cuts the connection between goods and money. It issues paper money, which is used as a claim check on actually existing goods-but that money is not backed by any goods, it is not backed by gold, it is backed by nothing. It is a promissory note issued to you in exchange for your goods, to be paid by you (in the form of taxes) out of your future production." -Ayn Rand From BagbyHtSpg at aol.com Tue Jul 28 20:57:09 1998 From: BagbyHtSpg at aol.com (BagbyHtSpg at aol.com) Date: Tue, 28 Jul 1998 20:57:09 -0700 (PDT) Subject: vehicle plate owner registration Message-ID: Hi- whether the law has changed or not, what is the status of getting lists of oregon license plate owner's perhaps from previous sources? If this is either very illegal, or no longer possible please let me know thank you. From nobody at nsm.htp.org Tue Jul 28 21:45:30 1998 From: nobody at nsm.htp.org (nobody at nsm.htp.org) Date: Tue, 28 Jul 1998 21:45:30 -0700 (PDT) Subject: none Message-ID: <19980729044501.314.qmail@nsm.htp.org> BagbyHtSpg at aol.com wrote: > > Hi- whether the law has changed or not, what is the status of getting lists of > oregon license plate owner's perhaps from previous sources? If this is either > very illegal, or no longer possible please let me know thank you. Sure, no problem. Just send fifty bucks per plate, money orders only (do not fill in the "pay to the order of" part) to me, Sammy, at: Oregon State Penitentiary 2004 Coastal Hwy. Portland, Oregon 89002 Attn: Sammy Polinski A 44E52J (Block 9) That's $50.00 per address/plate, no questions asked. Nice doin business withdya. Sammy From prolinemarketing at email.msn.com Tue Jul 28 23:15:40 1998 From: prolinemarketing at email.msn.com (Art1Carol) Date: Tue, 28 Jul 1998 23:15:40 -0700 (PDT) Subject: Spamming Message-ID: <000101bdbad1$11dbf180$cd58fed0@default> I do not spam! I don't think....The Government Lets it's post office's around the country spam everyone every day, for the postage Don't we wish we had a delete button for that? As a matter of fact when Uncle Bill and the henchmen in Washington can figure out how to make a profit off of email, "and they will" there won't be any spamming laws because uncle Tax will be making a windfall of money. I do believe each provider should have a block for unsolicited email and instruct their customers how to use it, and if they don't, Spam Away... The people who cry about spamming, don't know what they are going to create, wait til they send thier loved ones an email and get charged for it, then they'll wish they would have shut up and used the delete button....Thanks Art smith From nulo66 at interaktiv.design.no Wed Jul 29 00:54:47 1998 From: nulo66 at interaktiv.design.no (nulo66 at interaktiv.design.no) Date: Wed, 29 Jul 1998 00:54:47 -0700 (PDT) Subject: No Subject Message-ID: <199807292318UAA12018@127.70.34.15> They're Young ! They're Fresh ! They're Beautiful ! They're L I V E !!! And They are yours FREE for 1 week. Stop by and take a look: http://207.212.128.4/newteenpics/xxxteen/enter.html  From mok-kong.shen at stud.uni-muenchen.de Wed Jul 29 01:01:46 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Wed, 29 Jul 1998 01:01:46 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <35BED6DF.F2EF9BC5@stud.uni-muenchen.de> David Honig wrote: > > At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote: > >David Honig wrote: > > > >> The output of a good block cipher in feedback mode will pass Diehard tests, > >> though it is not crypto-secure. > > > >I often see the phrase 'pass Diehard test' though I don't see from > >the documents of Diehard how to evaluate the volumenous printout > >of Diehard to say exactly whether the test is passed or not. Furthermore > >the component asc2bin.exe of Diehard is buggy. > > My rough understanding: the 'P' value is a measure on the hypothesis that > the test sample is a truly random sample, where truly random is defined by > the expected > statistical properties being measured. Eg in 100 bits you expect to find > 50 1's; > if you count 48, is your 100-bit sample consistant with it being > unpredictable? My concrete problem is: With the bunch of p-values how does one (in accordance with the intention of the designer of the package) go about to determine that the test is passed at a certain confidence level. I don't see anything in the documents instructing the user to do this. Maybe I indeed missed something. Please point that out in this case. M. K. Shen From cognitus at earthlink.net Wed Jul 29 05:47:38 1998 From: cognitus at earthlink.net (Richard Storey) Date: Wed, 29 Jul 1998 05:47:38 -0700 (PDT) Subject: infant SSN assignment (whoops) In-Reply-To: Message-ID: <35BF1A96.BC2DBCF5@earthlink.net> I remember discussing the changes with a friend around 1991. At the time I was reading the changes noted to the law in IRS publication no. 17. I believe it is also noted on Form 1040 (look in the area used for children's SSN, it should be ref. in the instructions). Between the two of these, you should get a pointer to the code, and all of these are available online. The IRS is the only agency, that I have know, of using this law and, again, I think that congress made it law c. '91. Richard Storey Mark Hedges wrote: > > Could someone kindly point toward an authoritative resource which proves > assignment of SSN's to newborns is mandatory? Gratzi. -hedges- From stuffed at stuffed.net Wed Jul 29 07:43:49 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Wed, 29 Jul 1998 07:43:49 -0700 (PDT) Subject: My hubby smears curry on my breasts/17in willy too heavy to carry Message-ID: <19980729122608.6650.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/29/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From serpent at rths.rochelle.net Wed Jul 29 09:42:41 1998 From: serpent at rths.rochelle.net (Kurt Wolter) Date: Wed, 29 Jul 1998 09:42:41 -0700 (PDT) Subject: Free NNTP server question... Message-ID: <35BF528E.E3912B86@rths.rochelle.net> Hi cypherpunks, I grabbed your email address of an html posting of this newsgroup - in other words, your my randomly selected answer person(s). My question: My isp doesn't have an NNTP Server, but I'm under the impression that I can use a "free" news server somehow. I need to be pointed in the direction of how to set up news with a server other than my isp. Thanks, serpent at rths.rochelle.net From cognitus at earthlink.net Wed Jul 29 10:05:21 1998 From: cognitus at earthlink.net (Richard Storey) Date: Wed, 29 Jul 1998 10:05:21 -0700 (PDT) Subject: present president In-Reply-To: <9807291631.AA06499@mentat.com> Message-ID: <35BF56FA.31872612@earthlink.net> Jim Gillogly wrote: > > However, SSN abuse seems like pretty thin [ice?] grounds, and not specifically attributable to the current President. > Jim Gillogly Yes, perjury, conspiracy, and other possible felonies seem to be much more in evidence--for now. Richard Storey From honig at m7.sprynet.com Wed Jul 29 10:45:32 1998 From: honig at m7.sprynet.com (David Honig) Date: Wed, 29 Jul 1998 10:45:32 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <3.0.5.32.19980729104423.007c3780@m7.sprynet.com> At 10:01 AM 7/29/98 +0100, Mok-Kong Shen wrote: > >My concrete problem is: With the bunch of p-values how does one >(in accordance with the intention of the designer of the package) >go about to determine that the test is passed at a certain confidence >level. I don't see anything in the documents instructing the user >to do this. Maybe I indeed missed something. Please point that out >in this case. > >M. K. Shen I don't believe the depth of info you want is in Marsaglia's distribution notes. You want to talk to a real statistician... honig at alum.mit.edu "Speech is not protected simply because it is written in a language" Federal Misjudge Gwin on the Bernstein Case From CTIA_Daily_News at um2.unitymail.com Wed Jul 29 11:18:36 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Wed, 29 Jul 1998 11:18:36 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 29, 1998 Message-ID: <199807291804.NAA26214@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com� =========================================== From jya at pipeline.com Wed Jul 29 14:16:26 1998 From: jya at pipeline.com (John Young) Date: Wed, 29 Jul 1998 14:16:26 -0700 (PDT) Subject: NSA Losing Crypto Experts Message-ID: <199807292116.RAA13371@camel14.mindspring.com> >From Government Executive, August, 1998: The National Security Agency is losing ground in the fight to keep hard-to-find cryptography experts from being lured to greener pastures. By Richard Lardner Price Waterhouse didn't become a force in the consulting world by ignoring market trends. So it was no surprise when the firm decided to expand its information security operation. After all, the Internet has completely changed the way business is done: Paper is out, electrons are in. But just as electronic commerce is skyrocketing, so too are the odds that sensitive corporate information might be tampered with as it travels through cyberspace. With the private sector beginning to recognize that the digital door swings both ways, there's growing demand for the "risk management" services Price Waterhouse and other companies are offering to help keep the hackers at bay. To snare these potential clients, the company needed to hire hundreds of information technology professionals. Trouble is, information protection may be a huge growth area, but the talent pool is mighty shallow. So officials at Price Waterhouse did what many other commercial enterprises have done, and continue to do. They targeted a group of employees at the Defense Department's secretive National Security Agency, where thousands of the federal government's best and brightest spend their days eavesdropping on other countries while at the same time ensuring that U.S. information networks are secure. Because of the highly sensitive missions the agency performs, companies like Price Waterhouse know they are getting employees who are extremely good at what they do and are solid citizens too-NSA is picky about whom it hires and conducts thorough background investigations. Full text: http://www.jya.com/nsa-loss.htm From mmotyka at lsil.com Wed Jul 29 15:38:08 1998 From: mmotyka at lsil.com (Michael Motyka) Date: Wed, 29 Jul 1998 15:38:08 -0700 (PDT) Subject: Amused but still looking for... Message-ID: <35BFA4BF.2A17@lsil.com> I love the SPACE ALIENS stuff : it's like the X-files on a druggie's version of a Long Island Iced Tea. The politics are agreeable and predictable. The up-to-the-minute news and the entertainment is fun but there's really not much that is technical happening here. Is there a coderpunks mail archive available anywhere? The URL that I've found has been down for too long. How about a list of ongoing projects? When is the next CP meeting? Mike "Just because a taste of freedom made you lose your lunch doesn't mean it should be removed from the menu." From remailer at htp.org Wed Jul 29 16:05:31 1998 From: remailer at htp.org (Anonymous) Date: Wed, 29 Jul 1998 16:05:31 -0700 (PDT) Subject: Spamming Message-ID: <19980729230502.23037.qmail@nsm.htp.org> On Wed, 29 Jul 1998, Art1Carol wrote: > > I do not spam! I don't think....The Government Lets it's post office's > around the country spam everyone every day, for the postage Don't we wish we > had a delete button for that? Hello, McFly? Anybody home? McFly! When somebody sends mail through the postal service, they pay postage. It costs the recipient nothing and, if anything, is actually useful for getting a fire started in the winter. When somebody spams through the Internet, they pay virtually nothing, yet everybody else gets to pay to deliver, store, and filter the shit. Then there are the morons who connect to other peoples' machines and use those to relay mail; that's quite obviously theft. Take your spam, for instance. You go out and pay MSN a bit of money for some account. You mail the Cypherpunks list with your ad for porn or whatever it was. The list operators then have to deliver it to a few thousand people. You steal the resources of the CDR operators to deliver it. You steal the resources of the Cypherpunks to store it. You steal CPU time all over the place to filter it. You steal bandwidth all over the place to deliver it. This is obvious to anybody with more than a few dozen brain cells to rub together. Then again, this kind of grammatically-challenged and logically invalid garbage is what I've come to expect from users of lame services like AOL, Prodigy, MSN, Hotmail, et al. It goes with the territory for sites which cater to the lowest common denominator. > I do believe each provider should have a block for unsolicited email and > instruct their customers how to use it, and if they don't, Spam Away... Right, and they still get to pay for the transmission, temporary storage, filtering, etc. Let's see. Say I filter it. My ISP gets the spam. It has to store it. I log into the POP3 server to get my mail. I have to transfer it. After it's been stored on the ISP for quite a while, after it's been transmitted, after it's eaten my bandwidth, and after I've waited around for it to transfer, I have to blow CPU time to filter it. Yeah, like in postal junk mail the sender is really the one paying, not the recipient. Your clue check has bounced. [Remainder of drivel snipped.] Copy to MSN. Copy to the Cypherpunks list for the other lamers who like to spam it. From ulf at fitug.de Wed Jul 29 16:18:21 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Wed, 29 Jul 1998 16:18:21 -0700 (PDT) Subject: cryptographic signatures Message-ID: A few months ago I posted statistics of the types of digital signatures used on Usenet and in mailings lists. It turns out that the moderators' signatures in a moderated newsgroup were tabulated for the individual posters, resulting in somewhat too big figures for one particular version of PGP. Here are the current figures: 56.6% PGP 2.* 33.7% PGP 5.* 3.6% other OpenPGP implementations 4.0% S/MIME The sample contains 249 unique (e-mail address, software version) pairs taken from various international and local newsgroups and mailing lists that happen to be available in my news spool (consisting of some 24,000 articles). Perhaps someone with a full newsfeed -- whatever that is in these days -- would like to try the same? These are the PGP Version headers: 55 2.6.2 24 2.6.3i 19 2.6.3ia 17 PGPfreeware 5.5.3i for non-commercial use 15 2.6.3in 14 PGP for Personal Privacy 5.0 10 PGP for Personal Privacy 5.5.3 9 2.6.3a 8 PGPfreeware 5.0i for non-commercial use 7 PGP 5.5.5 6 2.6.2i 4 PGP for Personal Privacy 5.5.5 4 2.6.3a-sha1 3 PGP for Personal Privacy 5.0.1iRu 3 PGP for Business Security 5.5 3 2.6.3 2 PGPfreeware 5.5.5 for non-commercial use 2 PGPfreeware 5.5.3i for non-commercial use 2 PGP for Business Security 5.5.6 2 PGP for Business Security 5.5.2 2 PGP Cyber-Knights Templar build 5.5.3ckt 2 GNUPG v0.3.1 (GNU/Linux) 2 GNUPG v0.3.0 (GNU/Linux) 2 CTCDOS 0.1 1 Version 2.0.0 1 PGPfreeware 5.5.3i for non-commercial use 1 PGPfreeware 5.5.3 for non-commercial use 1 PGPfreeware 5.5.2 for non-commercial use 1 PGPfreeware 5.0 for non-commercial use 1 PGP for Personal Privacy 5.5 1 PGP 5.5.3 It's not only for cool looking messages! 1 PGP 5.0i 1 PGP 5.0 1 GNUPG v0.3.2a (GNU/Linux) 1 GNUPG v0.3.2 (GNU/Linux) 1 GNUPG v0.3.1a (GNU/Linux) 1 4.0 Business Edition 1 2.7.1 1 2.7 1 2.6.i 1 2.6.3uin 1 2.6.1 1 2.6 From CLCTCHR at aol.com Wed Jul 29 18:07:01 1998 From: CLCTCHR at aol.com (CLCTCHR at aol.com) Date: Wed, 29 Jul 1998 18:07:01 -0700 (PDT) Subject: MORE!!!! Message-ID: <407bc87c.35bfc6d9@aol.com> More! From Babybee390 at aol.com Wed Jul 29 18:25:14 1998 From: Babybee390 at aol.com (Babybee390 at aol.com) Date: Wed, 29 Jul 1998 18:25:14 -0700 (PDT) Subject: vinyl stickers Message-ID: <57a0eea8.35bfcae7@aol.com> do you have music vinyl stickers , if so , could i get them wholesale? From wombat at mcfeely.bsfs.org Wed Jul 29 18:44:35 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Wed, 29 Jul 1998 18:44:35 -0700 (PDT) Subject: vinyl stickers In-Reply-To: <57a0eea8.35bfcae7@aol.com> Message-ID: No, but we do offer clues. To qualify, you must memorize the cybernomicon, and help Tim find his shoes. On Wed, 29 Jul 1998 Babybee390 at aol.com wrote: > do you have music vinyl stickers , if so , could i get them wholesale? > > From bill.stewart at pobox.com Wed Jul 29 23:45:25 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 29 Jul 1998 23:45:25 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <3.0.5.32.19980729164034.008dc100@popd.ix.netcom.com> At 11:04 AM 7/27/98 -0700, David Honig wrote, about (Real, not Pseudo) RNGs: >Poor RNG ----> XOR ----> BlockCipher ----> improved RNG? > ^ | > |____________________| >The output of a good block cipher in feedback mode will pass Diehard tests, >though it is not crypto-secure. >From an information theoretic perspective, in the above scheme, you are >slowly adding entropy to the output stream, at a rate determined by the >actual number of bits/iteration and the bits/symbol of your poor random >numbers. It's an interesting problem, and I doubt there's a consensus on strength, in particular, on how much randomness is left after you take a random sample out of the system. I'd feel much better if you also ran the output through a keyed hash before giving it to anyone (e.g. run pairs or triples of 64-bit blocks plus a private salt through MD5.) With a perfectly strong RNG, the output should also be perfectly strong, though with a weak RNG, the block cypher does add some correlation. You definitely should trash the initial outputs, until you've added enough bits of real randomness that the block chaining step has probably accumulated a whole block's worth of randomness. Otherwise, the first round of block cypher is an ECB on a small set of input data (e.g. 64 possible values of one 1 and 63 0s fed into a DES cracker.) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Thu Jul 30 00:22:20 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 30 Jul 1998 00:22:20 -0700 (PDT) Subject: Amused but still looking for... In-Reply-To: <35BFA4BF.2A17@lsil.com> Message-ID: <3.0.5.32.19980730002024.0095d100@popd.ix.netcom.com> At 03:39 PM 7/29/98 -0700, Michael Motyka wrote: >Is there a coderpunks mail archive available anywhere? The URL that I've >found has been down for too long. > >How about a list of ongoing projects? > >When is the next CP meeting? Meetings are the second Saturday of the month (for the Bay Area). Directions and agenda will be posted early next week; volunteers for talks are always welcome. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From mok-kong.shen at stud.uni-muenchen.de Thu Jul 30 05:11:58 1998 From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen) Date: Thu, 30 Jul 1998 05:11:58 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <35C06305.DE28A900@stud.uni-muenchen.de> David Honig wrote: > I don't believe the depth of info you want is in Marsaglia's distribution > notes. > You want to talk to a real statistician... It may be of some interest for you to know that the designer of Diehard has the rather uncommon habit of never answering mails with questions on his package. A bug report of mine was without answer. Later I learned that others have had the same experience. M. K. Shen From quickfacts9 at hotmail.com Thu Jul 30 06:17:59 1998 From: quickfacts9 at hotmail.com (quickfacts9 at hotmail.com) Date: Thu, 30 Jul 1998 06:17:59 -0700 (PDT) Subject: They Can Even Steal Your Identity! Message-ID: ARE YOU BEING INVESTIGATED? Has your personal and credit information been stolen? Has someone assumed your identity? Would you like to locate an old friend, relative, military buddy or sweetheart? Do you want to find a person's assets to collect a debt or judgement? Would you like to check a person's criminal record before renting them space or giving them employment? Would you like to fix up your credit bureau report, create a new identity or even disappear? Are you going to have surgery? Would you like to know how many malpractice suits have been filed against your doctor? Now you can learn all this plus much, much more with our brand new 45 page report "INTERNET SLEUTH"! Learn the Internet tools and resources that are used to investigate you, your relatives, friends, neighbors, enemies, employees or anyone else! We will give you thousands of Internet locations to look up people, credit, social security, current or past employment, driving records, criminal records, medical information, military records, addresses, phone numbers, immigration, divorce, labor and criminal laws! We will also give you sources to find missing children and parents, hazardous waste sites, how to do Freedom of Information Act information searches, how to do skip tracing and backround checks on prospective dates, brides or grooms, employees, renters, vendors, new clients and competitors! You will also learn about and where to get surveillance and spy devices, private mail forwarding and annonymous email forwarding sites, search for copyrights, patents and court cases and how to make your assets untraceable! We will show you how to get copies of credit reports, adoption databases, information on drugs, poisons and how to get your share of government programs and benefits! Can you find this information by using the Internet Search Engines? The answer is MAYBE if you get lucky and if you want to spend many hours going through 25,000 plus hits per subject! We and our staff have spent hundreds of hours and many thousands of dollars compiling this information for you! Now you can have it on a silver platter for LESS THAN TWENTY BUCKS during this special email promotion! You frequently hear over the media, television, radio, the newspapers, how personal information is being used, traded and sold over the Internet...usually without your permission or knowledge. Our report will show you HOW IT IS DONE!!! Would you like to find that old romantic flame...find telephone, address or email information on almost anyone...even unlisted phone numbers? How about your family "tree"? We will teach you how to turn years of work into hours of fun! Military? Check Army, Navy, Air Force and Marine records. extensive Vietnamese war records, MIA info, much more! Looking for a job? Find the job you are seeking...even in another state or another country! We will teach you how! Looking for a new love interest or spouse or even sex partner? We will show you where to look for fast results! Want up-to-the-minute health and medical information? Learn how to cure fears and phoebias, the latest drugs and treatments for almost any ailment or desease from the drug companies themselves as well as from universities and the Center for Desease Control. Want to learn the most effective way to loose weight? It's all here in our report! If you believe that the information compiled about you should be as available to you as to the people that compile it about you without your knowledge or permission than you must order "THE INTERNET SLEUTH REPORT" immediately! Our "INTERNET SLEUTH REPORT" is normally sold by direct mail for $39.95 and will soon be in book stores for $29.95. However, to generate publicity and "get the word out" we are making this 10 day Email Special Offer of our Complete 45 Page Report for only $19.95 plus $3 for shipping and handling [total $22.95]. Sold with our 10 Day Money Back Guarantee! This is the biggest bargain on the Internet and the information it will give to you will give you great power! It can really change your life in a positive way. Order Now! The Complete 45 page "INTERNET SLEUTH REPORT" only $19.95 plus $3 shipping and handling - total $22.95. Shipped in plain wrapper by First Class Mail. Add $5 for priority mail delivery. Add $20 for overnight Express! We accept Visa, MasterCard, American Express or Discover. We can also accept your check by phone or Fax. You may order by phone 9 am to 10 pm [NY Time] by phoning [718] 287-3800 You may order by fax 24 hours per day by phoning our fax line at [718] 462-5920. You can fax your credit card information or your check To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD Send email to our special email address below: instantinfo2 at juno.com [Note: If you order by email and do not receive an email confirmation within 24 hours, please phone our office at 718-287-3800] You can also order by mail by sending $22.95 cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to TCPS, INC. 4718 18th Ave. Suite 135 Brooklyn, NY 11204 Make Checks & Money Orders Payable to TCPS, Inc. New York State Residents Please Add $1.70 for Sales Tax The Following Order Form is for Your Convenience! Use it by Mail, Fax or Email! ............................................................................................................. Please ship me ________copies of the INTERNET SLEUTH Report at $19.95 each plus $3.00 for shipping and handling [$22.95] Signature______________________________________________ Credit Card #____________________________Exp date______ Ship to: Name_________________________________________ Address________________________________________________ City________________________State___________Zip________ Area Code and Home Phone [ ]___________________________ Fax # [ ]______________________________________________ Email Address___________________________________________ To remove your name from our mailing list, send us an email with remove in the subject line. This is a one time offer and you should not hear from us again! TCPS,Inc., 4718 18th Ave., Suite 135, Brooklyn, NY 11204 Office [718] 287-3800 Fax [718] 462-5920 24 hours [9am to 10pm NY Time] [c] Copyright 1998 TCPS, Inc. All Rights Reserved. From stuffed at stuffed.net Thu Jul 30 10:14:09 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Thu, 30 Jul 1998 10:14:09 -0700 (PDT) Subject: In and out brothel/My wife lays eggs like a chicken Message-ID: <19980730151300.21245.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/30/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From honig at m7.sprynet.com Thu Jul 30 11:23:46 1998 From: honig at m7.sprynet.com (David Honig) Date: Thu, 30 Jul 1998 11:23:46 -0700 (PDT) Subject: encrypted FM radio hiss In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com> Message-ID: <3.0.5.32.19980730093354.007bc4d0@m7.sprynet.com> At 02:11 PM 7/30/98 +0100, Mok-Kong Shen wrote: >David Honig wrote: > >> I don't believe the depth of info you want is in Marsaglia's distribution >> notes. >> You want to talk to a real statistician... > >It may be of some interest for you to know that the designer of >Diehard has the rather uncommon habit of never answering mails with >questions on his package. A bug report of mine was without answer. >Later I learned that others have had the same experience. > >M. K. Shen Hmm. What packages or tests do any experimentalists out there use for entropy measurements? I've used Diehard. Also I look at compressability (gzip). I've found spectrogramming utilities. I think Walker has a utility, not yet looked at. honig at alum.mit.edu "Speech is not protected simply because it is written in a language" Federal Misjudge Gwin on the Bernstein Case From CTIA_Daily_News at um2.unitymail.com Thu Jul 30 13:35:06 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Thu, 30 Jul 1998 13:35:06 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 30, 1998 Message-ID: <199807301716.MAA24997@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com =========================================== From howree at cable.navy.mil Thu Jul 30 17:51:37 1998 From: howree at cable.navy.mil (Reeza!) Date: Thu, 30 Jul 1998 17:51:37 -0700 (PDT) Subject: MORE!!!! In-Reply-To: <407bc87c.35bfc6d9@aol.com> Message-ID: <3.0.5.32.19980731003949.008bfc60@205.83.192.13> At 09:05 PM 29 07 98 EDT, CLCTCHR at aol.com wrote: >More! > More What? Stupidity? Idiocy? Spam? Irrelevant posts with meaningless contextless drivelous foulness? GO THE FUCK AWAY, ALL AOL'ers. This list is not about 3l33tnEZZ, or being *K3WL*. Reeza! From howree at cable.navy.mil Thu Jul 30 17:51:38 1998 From: howree at cable.navy.mil (Reeza!) Date: Thu, 30 Jul 1998 17:51:38 -0700 (PDT) Subject: vinyl stickers In-Reply-To: <57a0eea8.35bfcae7@aol.com> Message-ID: <3.0.5.32.19980731005235.008bfc60@205.83.192.13> At 09:22 PM 29 07 98 EDT, Babybee390 at aol.com wrote: >do you have music vinyl stickers , if so , could i get them wholesale? > This is not the first sticker request to be sent to the CypherPunks list. Could you please tell us, where did you here about CypherPunks, and what made you think we could help you with your sticker request? This is only so we can serve you better,,,,, Reeza! From nobody at replay.com Thu Jul 30 23:55:36 1998 From: nobody at replay.com (Anonymous) Date: Thu, 30 Jul 1998 23:55:36 -0700 (PDT) Subject: Resources on how to track spammers Message-ID: <199807310655.IAA08821@replay.com> These are two address I thought might be useful. This is a guide on tracking down real addresses in usenet faked posts. Once you find the real addresses or at least have a couple good guesses on what provider they use reply to their message and cc: it to the postmaster and technicle contact of all the ISP's you think it might be. They can use message ID's and logs to check where the message originated from. http://newdata.box.sk/neworder/harmless/GTMHH1-4.TXT this is the same for forged e-mail. http://newdata.box.sk/neworder/harmless/GTMHH1-5.TXT The reason I'm sending this is because of the fact that I almost never get spam. When I do I respond quickly and appropriately and the spam dies out. When I joined and then posted to this list I was flooded with mail. Personally I this has to be one of the stupided lists to spam. How many technical peopl that are interested in crypto are really gaing to respond to some of these stupid ads From jya at pipeline.com Fri Jul 31 06:06:24 1998 From: jya at pipeline.com (John Young) Date: Fri, 31 Jul 1998 06:06:24 -0700 (PDT) Subject: Cracking DES 1-4 Message-ID: <199807311306.JAA24187@dewdrop2.mindspring.com> We offer Chapters 1-4 of EFF's "Cracking DES:" http://jya.com/cracking-des.htm (110K + 9 images) URLs to other parts welcomed. From dac at zurich.ibm.com Fri Jul 31 07:02:07 1998 From: dac at zurich.ibm.com (Marc Dacier) Date: Fri, 31 Jul 1998 07:02:07 -0700 (PDT) Subject: RAID98: Call For Registration Message-ID: <9807311401.AA36670@selun.zurich.ibm.com> Call For Registration - RAID'98 First International Workshop on the Recent Advances in Intrusion Detection Sponsored by the IBM Emergency Response Service (http://www.ers.ibm.com) and the Joint Research Centre of the EC (Institute for Systems, Informatics and Safety) (http://ntsta.jrc.it) September 14-16, 1998 Louvain-la-Neuve, Belgium *********************************************************************** Visit our web site http://www.zurich.ibm.com/~dac/RAID98 for on-line information regarding the preliminary program, the registration forms, accommodations, maps, etc.. *********************************************************************** RAID'98 is the first in an anticipated annual series of international workshops that will bring together leading figures from academia, government, and industry to ponder the current state of intrusion detection1 technologies and paradigms from the research and commercial perspectives. Its aim is to further progress in intrusion detection by promoting the exchange of ideas among researchers, system developers, and users and by encouraging links between these groups. RAID'98 will be held in Louvain-la-Neuve, Belgium, on 14-16 September 1998. RAID'98 will be held in the same location as CARDIS'98 (http://www.dice.ucl.ac.be/cardis98) and ESORICS'98 (http://www.dice.ucl.ac.be/esorics98), at the same time as the former and just prior to the latter. A registration discount is available to those attending both the ESORICS conference and the RAID workshop. Registration is now open, and will continue until 21 August 1998. Late registration will continue until 4 September 1998, but only on a space-available basis, and will include a penalty of 2000 BEF. If you need more information regarding registration or accommodations, please take contact with Catherine Rouyer E-mail: Rouyer at tele.ucl.ac.be RAID Secretariat UCL/TELE (Mrs. Catherine Rouyer) Place du Levant, 2 B-1348 Louvain-la-Neuve Belgium ************************** PRELIMINARY PROGRAM ************************* **** html version available: http://www.zurich.ibm.com/~dac/RAID98 **** MONDAY SEPTEMBER 14,1998 ======================== 8:00 9:00 Transfers from hotels, coffee service and participant check-in Session 1 (Session Chair: Kathleen Jackson) ------------------------------------------- 9:00 - 9:20 Welcome and Introduction Marc Dacier (IBM ZRL, Switzerland), Jean-Jacques Quisquater (UCL, Belgium). 9:20 - 9:40 The Rome Labs Experience Kevin Ziese (Cisco Systems, Inc., USA) 9:40 - 10:00 Intrusion Detection and Legal Proceedings Peter Sommer (London School of Economics and Political Science, UK) 10:00 - 10:20 Lessons Learned in the Implementation of a Multi-Location Network Based Real Time Intrusion Detection System Michael Puldy (IBM Emergency Response Service, USA) 10:20 - 10:40 Break - Coffee service Session 2 (Session Chair: Baudouin Le Charlier) ------------------------------------------------ 10:40 - 11:00 GASSATA, A Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis Ludovic Me (SUPELEC, France) 11:00 - 11:20 Using Bottleneck Verification to Find Novel New Attacks with a Low False Alarm Rate Richard Lippmann (MIT Lincoln Laboratory, USA) 11:20 - 11:40 The Use of Information Retrieval Techniques for Intrusion Detection Ross Anderson (University of Cambridge, UK) 11:40 - 12:00 Tools for Intrusion detection: Results and Lessons Learned from the ASAX Project Abdelaziz. Mounji (Computer Science Institute, Belgium) 12:00 - 13:30 Lunch Session 3 (Session Chair: Yves Deswarte) ------------------------------------------- 13:30 - 13:50 Dependability of Large-scale Infrastructures and Challenges for Intrusion Detection Marc Wilikens (Institute for Systems, Informatics and Safety, Italy) 13:50 - 14:10 How Re(Pro)active Should An IDS Be? Richard Overill (King's College London, UK) 14:10 - 14:30 Contribution of Quantitative Security Evaluation to Intrusion Detection Yves Deswarte (LAAS-CNRS & INRIA, France) 14:30 - 14:50 Intrusion Detection in Telecommunication Hai-Ping Ko (GTE Laboratories Incorporated, USA) 14:50 - 15:10 Break - Beverages Session 4 (Session Chair: TBD) --------------------------------- 15:10 - 15:30 Problems with Network�based Intrusion Detection for Enterprise Computing Thomas Daniels (Purdue University, USA) 15:30 - 15:50 Transitioning IDS Research Into a Viable Product Mark Crosbie (Hewlett-Packard Corporation, USA) 15:50 - 16:10 Enhanced Network Intrusion Detection in a Smart Enterprise Environment Ricci Ieong (Hong Kong University of Science and Technology, Hong Kong) 16:10 - 16:30 Integrating Intrusion Detection into the Network/Security Infrastructure Mark Wood (Internet Security Systems, Inc, USA) 16:30 - 16:50 Break - Refreshments Session 5 (Panel Chair: Rowena Chester) --------------------------------------- 16:50 - 18:00 The Nature and Utility of Standards Organizations for the Intrusion Detection Developers Community Participants Dick Brackney (NSA) Rowena Chester (Chair NCITS (ANSI) T4 Committee) Roger French (Compaq) Walter Fumy (Chair ISO SC27) Larry Nelson (AT&T) Vern Paxson (LBNL) Gene Spafford (Purdue University) Mark Zalewski (Chair TC68) 18:00 - 19:30 Transfers to and from hotels 19:30 - 22:00 Banquet 22:00 Transfers to hotels TUESDAY SEPTEMBER 15,1998 ========================= 8:00 9:00 Transfers from hotels and coffee service Session 6 (Session Chair: Timothy Grance) -------------------------------------------- 9:00 - 9:20 Measuring Intrusion Detection Systems Roy Maxion (Carnegie Mellon University, USA) 9:20 - 9:40 The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation Richard Lippmann (MIT Lincoln Laboratory, USA) 9:40 - 10:00 Securing Network Audit Logs on Untrusted Machines Bruce Schneier (Counterpane Systems, USA) 10:00 - 10:20 Intrusion Detection and User Privacy - A Natural Contradiction? Roland Bueschkes (Aachen University of Technology, Germany) 10:20 - 10:40 Break - Coffee Service Session 7 (Session Chair: Marc Dacier) ---------------------------------------- 10:40 - 11:00 Design and Implementation of an Intrusion Detection System for OSPF Routing Networks Y. Frank Jou (MCNC, USA) 11:00 - 11:20 Designing IDLE: The Intrusion Data Library Enterprise Ulf Lindqvist (Chalmers University of Technology, Sweden) 11:20 - 11:40 Design and Implementation of a Sniffer Detector Stephane Grundschober (IBM Zurich Research Laboratory, Switzerland) 11:40 - 12:00 The Application of Artificial Neural Networks to Misuse Detection: Initial Results James Cannady (Georgia Tech Research Institute, USA) 12:00 - 13:30 Lunch Session 8 (Session Chair: Deborah Frincke) --------------------------------------------- 13:30 - 13:50 AAFID: Autonomous Agents for Intrusion Detection Diego Zamboni (Purdue University, USA) 13:50 - 14:10 Research Issues in Cooperative Intrusion Detection Between Multiple Domains Deborah Frincke (University of Idaho, USA) 14:10 - 14:30 A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis Ming-Yuh Huang (The Boeing Company, USA) 14:30 - 14:50 NIDAR: The Design and Implementation of an Intrusion Detection System Ong Tiang Hwee (DSO National Laboratories, Singapore) 14:50 - 15:10 Break - Beverages Session 9 (Session Chair: Peter Sommer) ------------------------------------------ 15:10 - 15:30 A UNIX Anomaly Detection System using Self-Organising Maps Albert Hoeglund (Nokia Research Center, Finland) 15:30 - 15:50 Evaluating a Real-time Anomaly-based Intrusion Detection System Tobias Ruighaver (University of Melbourne, Australia) 15:50 - 16:10 Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior Andreas Wespi (IBM Zurich Research Laboratory, Switzerland) 16:10 - 16:30 An Immunological Approach to Distributed Network Intrusion Detection Steven A. Hofmeyr (University of New Mexico, USA) 16:30 - 16:50 Break - Refreshments Session 10 (Session Chair: Kevin Ziese) ---------------------------------------- 16:50 - 17:10 The Limitations of Intrusion Detection Systems on High Speed Networks Joe Kleinwaechter (Internet Security Systems, Inc, USA) 17:10 - 17:30 CERN Network Security Monitor Paolo Moroni (CERN, Switzerland) 17:30 - 17:50 HAXOR - A Passive Network Monitor/Intrusion Detection Sensor Alan Boulanger (IBM Watson Research Center, USA) 17:50 - 18:10 Using Bro to detect network intruders: experiences and status Vern Paxson (Lawrence Berkeley National Laboratory, USA) 18:10 - 19:30 Reception 19:30 Transfers to hotels WEDNESDAY SEPTEMBER 16,1998 =========================== 8:00 - 8:40 Transfers from hotels and coffee service Session 11 (Panel Chair: Gene Spafford) ---------------------------------------- 8:40 - 10:00 Intrusion Detection in the Large Participants Dick Brackney (NSA) Deborah Frincke (University of Idaho) Michel Miqueu (CNES) Jean-Jacques Quisquater (UCL, Belgium) Gene Spafford (Purdue University) Marc Wilikens (Institute for Systems, Informatics and Safety) Kevin Ziese (Cisco/Wheelgroup) 10:00 Adjourn From stuffed at stuffed.net Fri Jul 31 07:31:41 1998 From: stuffed at stuffed.net (STUFFED/EUREKA!) Date: Fri, 31 Jul 1998 07:31:41 -0700 (PDT) Subject: Better living through masterbation/Digestible Dildos Message-ID: <19980731081100.3170.qmail@eureka.abc-web.com> Welcome to today's issue of Stuffed. To read it you should click on the URL below. If it is not made clickable by your email program you will need to use your mouse to highlight the line, copy it and then paste it into your browser (then press Return). http://stuffed.net/98/7/31/ If you have an email program that can display web pages you will find today's front cover should have already been disp- layed and can be clicked on to take you straight to Stuffed. This email is never sent unsolicited. Stuffed is the supplement for the Eureka newsletter you subscribed to. Full instructions on unsubscribing are in every issue of Eureka! From beverly357 at hotmail.com Fri Jul 31 07:34:16 1998 From: beverly357 at hotmail.com (beverly357 at hotmail.com) Date: Fri, 31 Jul 1998 07:34:16 -0700 (PDT) Subject: World Record Sex! Message-ID: Attention! Warning! Adults Only! Warning! Adults Only! If you are under 21 years of age, or not interested in sexually explicit material... please hit your keyboard delete button now and please excuse the intrusion. Removal instructions appear at the end of this email. Available NOW for only $9.95! Next 10 Days Only! WORLD RECORD SEX! Be There! See It Now On Video! Unbelievable ...But True! You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show] "The World's Biggest Gang Bang" See sexy Annabel Chong as she sets the world Gang Bang Record in this fantastic video documentary that chronicles her 24 hour sexathon with 251 men engaging in sexual intercourse and oral sex with her! Don't worry, you won't have to stay up 24 hours to watch it all. We've selected only the most exciting and red hot scenes for you...all in breathtaking living color with plenty of extreme close-ups! This video is guaranteed to knock your socks off and leave you breathless! You've never seen anything like it! Annabel takes on five men at a time! 90 minutes! Order Today! Only $9.95 plus $3 shipping and handling [Total $12.95]. "GANG BANG II" The Record Breaker!!! Starring Jasmin St. Claire! See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's gang bang record by taking on 300 men in one 24 hour sex session! You won't believe your eyes at all the hot firey action that you will see as the new world record is established before your eyes as Jasmin takes on five men at a time for sexual intercourse and oral sex! Your friends will break down your door to see this video! You'll be the most popular guy in town! The action is truly unreal and you will see the best of it in living life-like color! Order Today and see Jasmin break the record! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95]. Also Available... The Uncensored Authentic Underground... Pamela Anderson Lee & Tommy Lee Sex Video Tape! Everyone is talking about this exciting video! See Pam and Tommy engaging in sexual intercourse and oral sex in the car, on the boat and much, much more! A real collectors video! 30 minutes. Only $9.95 plus $3 shipping and Handling [total $12.95] "Tonya Harding Wedding Night Sex Video" Now see the beautiful Ice Skating Shame of the Olympics Tonya Harding engaging in sexual intercourse and oral sex on her wedding night with husband Jeff Gillooly! This "Bad Girl" is Hot! Don't miss this video! 30 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] "Traci...I Love You" Starring Traci Lords Now see the most beautiful and popular porn star in her last adult video before she hit the big time! It's the blockbuster of the year...sensual...fiery and exposive! Traci Lords in her most erotic and controversial film ever! Don't Miss It! 90 minutes. Only $9.95 plus $3 shipping and handling [total $12.95] EMAIL SPECIAL! ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!! Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper. For Priority Mail - Add $5 For Overnight Express - add $15 You can order by Phone, Fax, Mail or Email. We accept all Major Credit Cards and checks by phone or fax. Visa - MasterCard - American Express - Discover 10 Day Money Back Guarantee! We know that you will be pleased with these Videos! To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD Send email to our special email address below: quickstudy at juno.com [Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at 718-287-3800] Phone our office 9am to 10 pm [eastern time] [718] 287-3800 to Order By Phone for FASTEST SERVICE! We can accept your credit card or check by phone Fax Your Order 24 hours per day to [718] 462-5920 You can fax your credit card information or your check Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to TCPS, INC. 4718 18th Ave. Suite 135 Brooklyn, NY 11204 Make Checks & Money Orders Payable to TCPS, Inc. New York State Residents Please Add 85 cents for Sales Tax per Video! You must be over 21 years of age to order and give us your date of birth with your order! The Following Order Form is for Your Convenience! ............................................................................................................. Please ship me the following video tape[s]! Qty___________Annabel Chong "World's Biggest Gang Bang" Qty__________"Gang Bang II" Jasmin St. Claire Qty___________"Pamela & Tommy Lee Sex Video Tape" Qty_________ "Tonya Harding Wedding Night Sex Video Tape" Qty__________"Traci I Love You" Traci Lords at $9.95 each plus $3.00 for shipping and handling per tape [$12.95 per video or "SPECIAL $51.80 for ALL FIVE"! Credit Card #______________________________Exp Date___ I hereby represent that I am over 21 years of age. My date of birth is_________________________________ Signature______________________________________________ Ship to: Name_______________________________________ Address____________________________________________ City________________________State___________Zip________ Area Code and Home Phone [ ]___________________________ Fax # [ ]______________________________________________ Email Address___________________________________________ To remove your name from our mailing list, send us an email with remove in the subject line. This is a one time offer and you should not hear from us again! FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world. By deleting your unwanted E-Mail you waste one keystroke, yet by throwing away paper mail you waste our planet! SAVE THE TREES and support internet E-Mail instead of paper mail! [C] Copyright TCPS 1998 From attila at hun.org Fri Jul 31 07:52:26 1998 From: attila at hun.org (attila) Date: Fri, 31 Jul 1998 07:52:26 -0700 (PDT) Subject: FC: Libertarian Party asks for Clinton impeachment In-Reply-To: Message-ID: On Fri, 31 Jul 1998, Declan McCullagh wrote: > > Libertarians to Congress: Impeach Clinton for Bad Net Policy > By Declan McCullagh > > [snip] > and then they wonder why they received less than 1% of the vote in '96. good enough reasons if they do the trick, but I would rather they not impeach him; an impeachment hearing will put the ice pack on the market... and by the time the Senate can get around to finishing the deed, Clinton will have turned the government over to FEMA for some flim-flam excuse. better start getting ready to quarter the UN barbarian troops in your house. From toto at fhouse.org Fri Jul 31 07:59:41 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 07:59:41 -0700 (PDT) Subject: SECRET.AS7 Message-ID: *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** SECRET.AS7 -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00000.bin Type: application/octet-stream Size: 11697 bytes Desc: "" URL: From toto at fhouse.org Fri Jul 31 08:05:01 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 08:05:01 -0700 (PDT) Subject: TOP TEN1 / .hfx / PASSWORD: ultimatesecurity Message-ID: *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** TOPTEN1.ASC -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00001.bin Type: application/octet-stream Size: 27203 bytes Desc: "" URL: From toto at fhouse.org Fri Jul 31 08:06:23 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 08:06:23 -0700 (PDT) Subject: Pima Community College / PASSWORD: ibrokepgp Message-ID: *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** PIMA1.ASC -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00002.bin Type: application/octet-stream Size: 6505 bytes Desc: "" URL: From billp at nmol.com Fri Jul 31 08:19:05 1998 From: billp at nmol.com (bill payne) Date: Fri, 31 Jul 1998 08:19:05 -0700 (PDT) Subject: Cracking DES earlier Message-ID: <35C1DF28.4B71@nmol.com> Friday 7/31/98 8:23 AM John Young I am reading parts of http://www.jya.com/cracking-des.htm#foreword. Bill Goldrick and I talked on the phone several days ago. Goldrick had been reading about Cracking DES at jya.com. Goldrick reminded me that in the late 1980s that NSA employee Mark Unkenholtz told me and others at Sandia that NSA had broken DES. Unkenholtz is the �Mark� mentioned at http://jya.com/da/whpda.htm Appendix S. Amy Johnston, cc, was Mark Unkenholtz�s fiancee. I faxed the Hern DRAFT letter to her for reason that NSA did not have an unclassified fax machine readily available. For those who might want to get Sandia crypto history right "The First Ten Years of Public Key Cryptography," Proceedings of the IEEE, 76(5), May 1988. referenced at http://www.aci.net/kalliste/nukearse.htm, Goldrick 1 was supervisor of Mark Schaefer who build the second CTBT seismic data authenticator http://jya.com/da/whpda.htm I used Schaefer�s TEMPEST design schematics. 2 supervised deployment of the seismic stations in Hamar Norway. This is detailed in William Burrows book Deep Black. 3 supervised Jim Walkup who was responsible for placing the CTBT data authenticator described at http://jya.com/da/whpda.htm in the field. date: September 11, 1991 to: Bill Payne, 9236 [Signature] from: James Walkup, 9233 subject: DSVS authenticator records 4 handled recall of some CLASSIFIED algorithm eprom chips that somehow made their way into the field in 3. NSA believes that the STEP size and non-linear feedback function are CLASSIFIED SECRET/NSI. http://jya.com/da/whpda.htm The NSA R register feedback function is classified. For each data bit processed, both the F and R registers are stepped multiple times. The number of steps is classified. But we ALL now know the CLASSIFIED SECRET/NSI value is 31. http://jya.com/nsasuit.txt 5 rejected NSA employee Donald Simard�s http://jya.com/nsasuit.txt order to deploy the classified algorithm. Simard told Goldrick that NSA would DECLASSIFY Benincasa's algorithm LATER. Let�s all hope for settlement of the unfortunate matter before it gets WORSE. I want to revise my book http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 It has been over about 27 years since I directed any Ph.D. students http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html http://www.friction-free-economy.com/ http://www.mhpcc.edu/general/john.html Perhaps I should get back into the business of directing and participating in Ph.D thesis work? I have some GREAT Ph.D. thesis topic ideas in the area of FORTH is applicable to hardware intensive projects implemented by one, two, or three workers. Robots, computer numerical controlled machines, weapons programmers, cryptographic processors, engine controllers, unmanned observatories, computer hardware debuggers, laser printer graphics controllers, video games, work station device drivers, writing BASICs are all candidates for FORTH software technology. FORTH is a one of the top choices for embedded controller applications. Later bill From toto at fhouse.org Fri Jul 31 10:45:14 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 10:45:14 -0700 (PDT) Subject: CC - SAHMD / Password: convectionalencryption Message-ID: *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** COCK1.ASC -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00003.bin Type: application/octet-stream Size: 3283 bytes Desc: "" URL: From CTIA_Daily_News at um2.unitymail.com Fri Jul 31 10:48:06 1998 From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News) Date: Fri, 31 Jul 1998 10:48:06 -0700 (PDT) Subject: CTIA Daily News from WOW-COM - July 31, 1998 Message-ID: <199807311730.MAA25935@mailstrom.revnet.com> ========================================== Welcome to today's edition of the CTIA Daily News from WOW-COM.� Please click on the icon / attachment for the most important news in wireless communications today. A new multi-billion dollar industry is here! Be at CTIA's WIRELESS I.T. '98 where personal computing and communications converge! Don't Miss Your Chance -- October 12-14, 1998 Bally's Las Vegas, Las Vegas, NV For more information, visit http://www.wirelessit.com� =========================================== From toto at fhouse.org Fri Jul 31 10:58:22 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 10:58:22 -0700 (PDT) Subject: Secret Service With A Smile - SAHMD!!! Message-ID: The 'Secret Service With A Smile' chapter of SPACE ALIENS HIDE MY DRUGS!!! was sent to the CypherPunks Disturbed Male LISP as secret.as1 --> secret.as7 earlier today. It is a DOS .prn file, which is the only type of copy I could save with the FAX software I am using. I was forced to delete the original text file from the computer I was using, but the Secret Service has copies of it, so anyone who wishes the original text file can contact: United States Secret Service Jeremy A.C. Sheridan Special Agent 300 West Congress, Room 4V Tucson, AZ 85701 Phone 520-670-4730 Fax 520-670-4826 Toto ~~~~ *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** From toto at fhouse.org Fri Jul 31 11:07:04 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Fri, 31 Jul 1998 11:07:04 -0700 (PDT) Subject: Top Ten - SAHMD!!! Message-ID: Top Ten Things You Don't Want To Tell The Secret Service When They Visit _____________________________ SPACE ALIENS HIDE MY DRUGS!!! 10. You're here about the VOICES, aren't you? They *told* me you were coming... 9. Look, pal, I don't even know who the President *was*... I mean...*is*... Uuhhh...is it 10:15 in DC yet? 8. Do either of you guys know where the 'yellow' wire goes? 7. The First Lady's butt looks pretty good through a 'scope', eh? 6. You must have me confused with my brother, MadDog...the *good* son... 5. Could you put this around my forearm, give it a twist, and then pull it really tight? Hey, don't bump the spoon! 4. *Which* death threat? Unless you're going to be more specific, you're just wasting my time and yours. 3. 'One Bullet, One Vote' bumperstickers are meant as *humor*? You're schitting me, right? 2. Next time you're guarding the President at a White House speech, do you think you could stand just a tad further to the left? 1. "Cuckoo-Cuckoo" *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** From billp at nmol.com Fri Jul 31 11:13:25 1998 From: billp at nmol.com (bill payne) Date: Fri, 31 Jul 1998 11:13:25 -0700 (PDT) Subject: From: dac@zurich.ibm.com (Marc Dacier) Message-ID: <35C20839.43A1@nmol.com> Friday 7/31/98 11:40 AM John Young I am looking at http://www.jya.com/raid98.htm Dacier asked me why NSA/Sandia was concerned about what each bit in an executable image did when I was in his office in Zurich in April 1997. Spiking, of course. A SECRET OTHER FUNCTION to a device. http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm NSA/Sandia doesn�t trust its own employees! On the other hand, NSA/Sandia employees don�t trust NSA/Sandia either. The REAL WORLD again. IBM Zurich was BIG into Java. Network World, July 20, 1998 page 6 The incredible shrinking Java alliance By Chris Nerney and Andy Eddy A year ago there were four of them, members of a new alliance touting a potent new weapon designed to end Microsoft Corp.'s growing dominance in the computing industry. Now the Java Gang of Four is the Gang of Two and a Half. Java creator Sun Microsystems, Inc., of course, is still fully committed to the programming language, as is IBM. ... Not looking good for Java future. Java is similar to FORTH. FORTH executes super-slow on high-level in most machines. About 10% of the speed of a compiled-language program - such as Visual Basic. Specialized Forth and Java machine can be made to run fast. http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/ But I am not confident Java or Forth machines are going anywhere. May be hard to get parts in the future. But I'm confident about the 80C32 supply! http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets settled soon so that we can move on to constructive projects. Later bill /\/\/\ Marc Since I was working the OTHER SIDE of Recent Advances in Intrusion Detection for the FBI, I might be able to give a nice talk about what the US government is REALLY UP TO on defeating intrusion detection! I am not reading e-mail. best bill Hi Matthias! Counterfeiting Wiegand Wire Access Credentials Bill Payne October 16,1996 Abstract Wiegand wire access credentials are easy and inexpensive to counterfeit. Access Control & Security Systems Integration magazine, October 1996 [http://www/securitysolutions.com] published the article, Wiegand technology stands the test of time by PAUL J. BODELL, page 12 Many card and reader manufacturers offer Wiegand (pronounced wee-gand) output. However, only three companies in the world make Wiegand readers. Sensor Engineering of Hamden Conn., holds the patent for Wiegand, and Sensor has licensed Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, Germany, to manufacture Wiegand cards and readers. ... A Wiegand output reader is not the same thing as a Wiegand reader, and it is important to understand the differences. In brief, Wiegand reader use the Wiegand effect to translate card information around the patented Wiegand effect in which a segment of a specially treated wire generates an electronic pulse when subjected to a specific magnetic field. If the pulse is generated when the wire is near a pick-up coil, the pulse can be detected by a circuit. Lining up several rows of wires and passing them by a cold would generate a series of pulses. Lining up two rows of wires - calling on row "zero bits" and the other "one bits" - and passing them by two different coils would generate two series of pulses, or data bits. These data bits can then be interpreted as binary data and used to control other devices. If you seal the coils in a rugged housing with properly placed magnets, and LED and some simple circuitry, you have a Wiegand reader. Carefully laminate the special wires in vinyl, and artwork, and hot-stamp a number on the vinyl, and you have a Wiegand card. IN THE BEGINNING Wiegand was first to introduce to the access control market in the late 1970s. It was immediately successful because it filled the need for durable, secure card and reader technology. Embedded in the cards, Wiegand wires cannot be altered or duplicated. ... Bodell's Last statement is incorrect. Tasks for EASILY counterfeiting Wiegand wire cards are 1 Locate the wires inside the card to read the 0s and 1s. 2 Build an ACCEPTABLE copy of the card. Bodell's clear explanation of the working of a Wiegand card can be visualized zero row | | | one row | | binary 0 1 0 0 1 representation Solutions to Task 1 A X-ray the card B MAGNI VIEW FILM, Mylar film reads magnetic fields ... Edmunds Scientific Company, catalog 16N1, page 205, C33,447 $11.75 is placed over the top of the Wiegand card. COW MAGNET, Cow magnetics allow farmers to trap metal in the stomachs of their cows. Edmunds, page 204, C31,101 $10.75 is placed under the card. Location of the wires is easily seen on the green film. Mark the position of the wires with a pen. Next chop the card vertically using a shear into about 80/1000s paper-match-sized strips. Don't worry about cutting a wire or two. Note that a 0 has the pen mark to the top. A 1 has the pen mark at the bottom. Take a business card and layout the "paper match"-like strips to counterfeit the card number desired. Don't worry about spacing. Wiegand output is self-clocking! Tape the "paper-match - like" strips to the business card. Only the FUNCTION of the card needs to be reproduced! History Breaking electronic locks was done as "work for others" at Sandia National Laboratories beginning in 1992 funded by the Federal Bureau of Investigation/Engineering Research Facility, Quantico, VA. The FBI opined that this work was SECRET/NATIONAL SECURITY INFORMATION. Details of the consequences of this work are covered in Fired Worker File Lawsuit Against Sandia Specialist Says He Balked When Lab Sought Electronic Picklock Software, Albuquer Journal, Sunday April 25, 1993 State-sanctioned paranoia, EE Times, January 22, 1996 One man's battle, EE Times, March 22, 1994 Damn the torpedoes, EE Times, June 6, 1994 Protecting properly classified info, EE Times, April 11, 1994 DOE to scrutinize fairness in old whistle-blower cases, Albuquerque Tribune, Nov 7 1995 DOE boss accelerates whistle-blower protection, Albuquerque Tribune, March 27, 1996 DOE doesn't plan to compensate 'old' whistle-blowers with money, Albuquerque Tribune September 27, 199 From jya at pipeline.com Fri Jul 31 12:09:45 1998 From: jya at pipeline.com (John Young) Date: Fri, 31 Jul 1998 12:09:45 -0700 (PDT) Subject: Cracking DES 9-12 Message-ID: <199807311909.PAA21158@camel7.mindspring.com> We've added Chapters 9-12, same URL: http://jya.com/cracking-des.htm (146K + 9 images) No prohibited code, yet. From cognitus at earthlink.net Fri Jul 31 12:27:43 1998 From: cognitus at earthlink.net (Richard Storey) Date: Fri, 31 Jul 1998 12:27:43 -0700 (PDT) Subject: Comments on this Pentagon opinion...not a new debate In-Reply-To: Message-ID: <35C21B6F.449E12C1@earthlink.net> Tim May wrote: > > At 10:01 AM -0700 7/31/98, Harvey Rook (Exchange) wrote: [...body of text snipped...] > > The latest crypto proposals have brought nothing new to the debate. Indeed. It strikes me as alarming at times, when considering the condition of civil liberties in this country and just how close government tries to shave off freedoms that are not *explicit* in the bill of rights, how poorer our liberties would be defended without those ten, basic amendments; and further, that they were added as an after thought, ridiculed by many, demanded by some, but they have proven to be one of the last lines of defence between our liberties and this centralised, law making den in Washington. These ten are not nearly enough. Richard Storey From nobody at replay.com Fri Jul 31 12:52:54 1998 From: nobody at replay.com (Anonymous) Date: Fri, 31 Jul 1998 12:52:54 -0700 (PDT) Subject: Secret Service With A Smile - SAHMD!!! / Pwd: lco Message-ID: <199807311953.VAA25070@replay.com> -----BEGIN PGP MESSAGE----- Version: 2.6.2 pgAAELXsZgReAbEClp5168CLlu62mpECtSLDXTGLlW+SYRNTGPyS09TMctiofbIR 2zy38inRjNY4vkSrOgJ1lxOxuN7faSYBrkL3r6Dl71DxYW5rCol15DS1ykIl32Ky YPWKrBM+FQKLfPFpIirppk5soiWQDbf8mZQi1s4vHHuoUAseDA0NwXGqKfZICnkP +MXytUgvhrSjN/XfrvM0YKZn7QlC+MerDjpZXCjuB8PmNj6rQzORd4fwaw8ox/Ji I0iFwHRY2kn7+Xbr26uXLBl8C3g5pmkdQEu9D6D325bJJjTNg9XcJCGEpThrIKRE 0fjzsszK5jJGY2F5Imf0DvXMdDrqQXHtwy07HPhPTRxy8MeUI1C/UtApXu/6jKrw ov4I7nygud5nCQ8a+IC0e8k7wMUjiCs4QfOofKCRwqSk/BB+QY805mmk0+CYrZzJ mtAZzgVVoh6lQf+F05gEPPDVXCovctP3g8FOI5T3chs0x7A2XdzF5AMiH98+sL5n kdTuwK2AhfF1PmT2i6m7kMfMjhm/k29JbcvVC4mbZagQPxN6xVpbW42dJTLiQZi4 3qYd54975oRQefse9wCwQilGB+kYDmzuGYAZH+KEd/d9W/ZYiIkHMyMTu1xehsDL O/U2glUbJAFbVOlOU/y3IDgDKTTWiLJKI8pMmtXvCu6V9p+dp+FVxFdJWzl6Raa3 9Zytr67H1Xecynujj5O2B1zN9NRaW4i25FOfdGVT69Kz4HktyrQzDfLwddic/Cwd PzCO3NZnWuQ+Ogp/TQLGXpFdoAoZeqoITAO4yB/0YmtlUo2kL8h5aLs6DUz7bU8x agHOlOnttX4Ea8QqqKP+NQl9ut65u2n3b/47F7QiTzDdIlWpkzWnc2gGxQBlVAo6 JSzp1YrpP2GnRrALiju7UXy6wvo30BOHqmuo6itBB4SR9bbHdiooyy2JUaDOLPai 5Los2bxibFU/hKrIMFNYhpyhD0DLk9qY4/AcY15+r+JKJuwZBzM99+O+bW+PqZoy zaQBxmPZsxrZPy0qI7QpwsJyBMgBzBI+L25IdlUdAYQ/IiuNXE2Nwx+TTHNdFeOX 6GQ1h4tbQ2OIRplQAjKfn6mQKc5u4FLys+eXRhxRltaNhrlF1tZ5ZqyOQxCmefMX Us3odPBUew/OdiWloc2Lw20Ti7rrTd1cxpJvoGu4Qs7V/TwInhfamkm+DuJ2RoaF /NK8YPrPrgJNn//DcmS/QRmNgsTQt6IpMGL+4QR8OS9AOmxkI2NRhT7fjJ/QGEhK SbnUeTFB/agCie0eWp5TWkJzwfns4lwEE4Jm7joROoq25c6Lx7i3mU32TnoLFCXJ LFEq9dzID2gkKC05+QdezElNtWQyiu2GcZWijT7WkC3fGTzDECEi4F2+/xesCVbG HiHoigbci5DlfFW5oGwrpeaisamxbL+BxsO3L73khxgb1ahYiZ672Hvnf8SYVhwq AqwGX+YieCEqLfcNEO/RZDQBR/KYAVIS/m5Ulv8kJKtKwAxQ+qhdvMXgpcBFwSKr ZBrG09p9lIdz4AzL0Wx+dVn/+McLdyTB/qE+3sytOqBYVx0hjIh9NLasrdDIahWv JsEpsrybWnWTEwbxI3tsDhRDSKwltpC++0/BFfejihZEQbaZSXL1DxRZR70ww0AM hGsOjew2Yq4K7k7t9gwT3KhACOBwlV9fvdRfqq1Ho81FROh3O6/0odmSiEleSkur mGPfNxKophQbiKf8RTpEbq4Uj2oJE7StHko/V1dO2TvcMvBV4hyqOx13fOuh4idB MepK9RpQXc7VNJ+UByPtF6tmdVrJNzjm6UlmfPtkNqSyj+8qtKn/0KQ3rDgLckMc ulDBdz7uratiMPBnA7LbY7AsEJ7UtSq1g6M80/RHBq/huzbkGBNxNUlhtYv7dSYV P123bRw/f+Y6awzMnEwrEWdw4DChPQ0cyLcFVzd+YyDlpMntezuk0/xNdqrlye67 7ZsDWcYWzuCIF6Gq9KKJx5LH18qzw9zufEyAjmUNX21k40EvWpbJuZyz30bJRWWJ 3ECTlEvGlOw1w/eZQQBbuPSKNnL2HYz8GtN92OE4BN7T2bS1f0vWGDghA0MVF98p u3D3ejro1fctaQNST/P4xltd6FVh9jWWU8VEh6HyO3kMAkFLA5PJ+jrGtM+dyP1E Hmjz6h8mZ0rX26ME24pPOSMBjD2OnKQjuuG8Kjg2AGP9nip5Mogq0da5yAf5pNeI bR8BtWm+o2umKhzDmvJqSlw1E1m1PFzjdS9D2Gr5hQ8cLvy+t0ZgNT0mL8KxLS2T 825dVDbvekH3X/IhRCOPmZviL/acAuwyHcgk6j+7wmNrgY9OQOLa/69RKT3ojylh VCCcJ2EPsRhIdX3M1p+WnZqBjr4J9X+w2X0F7xuG6Rby6n7yzbf0GoUkK0NcJ6Kn A2hXfedbmiLz875DiGktBuruAcRKCx2zM4R4w2VEf/ezuOXTnE/VQANVIoU2vvwa HtIkQjn4/U8cmSSXOxI5xqJSm03H+XY2u5jbJAXMMITJvkOPh5xnjIBfdexrEjO6 MbbKwgtwfXnOIIhYTn0kSo7HXX76b2wKV3XNcboEAEybw2TIAOnCuUBb8NEl9D7B lTO4GadU1ez3VBDzCaicR1wMEpinVcxVu1PDS3CKQEZlStYLEzhFAkxyj7R+1x3N pv5xMJmeo5nB2fCWZkwlYFiwhTDWME2gBtbe6DfZA1UV6vxY/0LanvF8L5q0P8hv XszAuYEFSkjtSeJS2yRqftU1Slo2dxJgSaAbkS4Uo7I492V71nRuF/xN4z6mDKos D3aInDhf2hMregHUosTfejmfRkQMgLM1jgwNiyVb6K5GnKtUPsEy9bDwr8zeVbas hCn85CKP1cYMi3yLdyBYEIfxnpePaxfHTUE9R3f63LtcYJZVZQEKFSlxPvbk1oge tiwmd5H2Q4yuSMqQQyE5fsHIN/mq5RHxZTl1sY0CqPn+X8BEphhtvwSjMPSEtvEW x2JKW44go0oJvRIH9AYMUodnlDFu14dnfQOfRmsC/l6sVFQerxBBXLt3Tm+X5iXb dqk+KaN99BMkmkG/KwEGhw1teX94Jx7RLetLMO657Itg0KEm6vOyjkUBYgrrGHd/ 3LVKj1Sw/w48pLDDzHu7L19zsj2hpIvkE/GMbaP1tI6jo+gFX7sLe+zW/x4GK5/2 d9uRaO7vo1L5pdNwxmrhUL8ViGwL5cfMNuOCF1voHJhINH0ng7ZL1qgIzu0Zs35t +b2i5NNh/7ZFe75PJNsIsqjV/gAW0s22GrJTC7nwG5SWzatPGRLRa4s0GbbJJ1s4 k+Aa/fVypfXwcbdUECgKhs2xPMgJVQjkMCIqEViXVsN+LBHXnxfLuR0nCqBY7F3z nnznRIVgRmKOzznjLTUi5iqNM5Qc1Ho+zJXlrLdY/uYbBx7InOVf93kRKHbp+5HK GM7jAXImPfI20jdeu7Iw1aBFUPF21iRMWXIof32hIF1nr4OnALMmiWRKOZ24Ip6k NG1tt9S888WfxEz3+pH7ToY9j17h2fKbDOlj+F6JFNPdGutIXt7yFTJBHSi7XFi0 KcoSHeFtXEkDWxiVhls7j7VTeErtVxAFgMw53AwwafuoQ6NuKTqWl0PW9rjNuswh WyznYmKJT+tbgiICQ8yGL1ZQMMHhOHfY8HjPu0MxYj6PyprvzZ7ortYQnJAZVzBz lswurpdkpqtTjFce+3N79Nj6qJhyVHrimLftNqCDpDY0bjPgEwNVUstMRyauY+JJ 1fRtXWWZ6KB+kAWz3YpLgiPNU1QheyHUkgDPqUn2jyxa1emn08lid5erAQDKwRo0 IfdVkCJys/5GsJtZIwZsgROyLktr5cJjwiekpf6bYl3VHjOsJts8F3NKrjA6LNri FtjgIRMb8Ei1itf/wXCwMnS+TM0N5tlwHXRsXp47NTbuoYM32nzBkqT0HrQzlU4/ w+J6JVGGvPG068S2uapuRHsjTYL+5Nvs+9SK8ElNHqEBkMBu1khwT03K5i0iZ4Vk pEmFpsolKx4NRzuqCmjrcZx3I0dbXAWpmTjdfFgv5hyH1XcTUVHAvdl7NguxCabB sWFhiEdYUwNvB1Hr16/wIRYoG5kQTOQvr4Sp/plhprx41QAQ3t1k7p2VoETc3UM5 AVtcl9BPzP8XszCfOL/UQvvdplv/qsy69Z+1tzD5syXnad8Yj8k+qg2D+gg3m+G7 NcWAEu9vkfOq41tFl4gyN4rjNgLZ+xG7IuhsOme06FN9OvPsdvh0AsRoaoZ89KDp mZUAngeuW2JESTUYWuz7g0sE/qjs1vsMaCpr+g5Nf7mEkwsF9hDsjSGEa68cPln7 NAZM8cp8KLtL+OCi8aYX0UNBvudOa35GTKWePSHVn+GISjKzc8Vcf4Aw5Szye5ow 27Ot+H3QVUcqPYceVyFj7HSrw9YaTPx0vk1MJRPIUf8Gvs6AegmmFrpxZI/n8Rvz 9bTuEb5TSrKe7D8HMfv0dvntRNqufgYMya66qK9a2MSscW5/aSp62cWyYktG2oJW Ce/awTDyr3a7PKsupzoYEyptarZdu+84o/uTNnfwAEk/gLVIP41dGTvHvOCl9vsm QSsAGDH2ZLgL61fv2uQwHbcyQnErDRHf4SW/Qeb94F4YnqYIC6MkY0n0Tj9IOG9N bWwppzsr0BEXkPEQ0VdBUvWDwmnvQquHBkVhQVSPlZaQxy4b4AgR2HmfnVwniEHZ I5B8y6BcyIEFrRHxKwUhCFsUsltRFvY5Q+nujXFpqJI72X8v2gOm95oDYUWPokuC obg9ADnDLAaYSyjemlN88rcWCtPpVDbx7QRrPM6JL82aC4Dt5TUeByNkqdApliHv o6MgHn15o9eRqT1bqFDsoJ17D/JL/7xR+LaPFt19+QaQMRl2BoJDKRsxlBwN377O IXRhUO0nNSEVXdhrlAitRhfebQPMDIRY30x0528PspiM32Cxcst6nyA+EMGLqt+7 2ZB6jQuRjKa31wbwbKn+IgvgaBMg+FhjbU7+Amwq2C55voW8HWBTvvNJ5u+Q4ij1 R/BRRRk6dhO+wEe+lzJPNBrih2Al4rtpiLPcR4D8ykFOnWZzae1QMDi8nQTfvz8F cZ0GnvP3+DZ7shqCUj25loFociJPmnFrf0rW0yFKUA3hBFwpo5hnI4CGp31OG5wu hxzfjW7fqJmh37RYwyHMoRW86qQTgU3lyDL20xzQZDn/ulJOrHRsSXNjCmBGFFwl XKciV/aoWgTO4eqIgw7yGxOFK3N4BSz66RCMI3Py0uAj4J5aUs7I8GSWeoVDzyZ3 yY3WpN4mqIjKQj+5cdQDhtUV/Gu4QkV9DqD1rCjTyU4yToiPli+DvYE1NSbrAqZ4 PwBN1ws2Sshqi8dcz2f2nveANVwEkndPWcLHoF0XkTg3DzFQMuuu2Vf7j8k3nHw5 XDiv5lbxNCAzZsSu0vGz4wOax2uhKB5IHCsuCDeXtk3NPQpaoa1U2//FrB9JQhWD czYyXMR9n9jc6/MFEI9tgkbo7bTCi3l8fUvq44sXWun6g54A4Xx00lpQZtK9iBWB piapqITLneqkMTmrfu9hSHl/7FPyUx588DFkg8OcWmAK3yWM1p4npMHtHjTxNOou a9Cw4x2yBQlocLOmJJlIdSAKQqB8ewDOdLiZbhEcdORxCNpRuSb1nFdPsJsLh5vC cCpuMp0VbewsOQ== =i0Ix -----END PGP MESSAGE----- *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** From honig at m7.sprynet.com Fri Jul 31 13:54:05 1998 From: honig at m7.sprynet.com (David Honig) Date: Fri, 31 Jul 1998 13:54:05 -0700 (PDT) Subject: Refining entropy In-Reply-To: <199807302045.WAA19934@replay.com> Message-ID: <3.0.5.32.19980731134616.007c42d0@m7.sprynet.com> This essay addresses the question, How can we improve the output of a bad true RNG? By "true RNG" I mean a source of unpredictability, which necessarily derives from an analog measurement. By "bad" RNG I mean that its output does not carry one bit of information per binary symbol. This means that not all output symbols are equiprobable. Methods to improve various properties of RNGs are called conditioning algorithms. I had begun by thinking that, since the output of a block cipher in feedback mode (ie, a stream cipher) is uniformly distributed ("white") that it would be sufficient conditioning to feed a bad RNG into a block cipher with feedback. Here, the bad RNG would kick the cipher out of the fixed, but key-dependant, sequence it would otherwise generate. But it bothered me that I was producing more apparently-random bits than I actually had negentropy. On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers. A hash is like a cipher in that changing any input or key bit changes the output unpredictably, but a hash is irreversible because there are fewer output bits than input bits. The simplest hash is a one-bit parity; MD5 is a more expensive keyed hashing function used for message authentication. Thinking about a hash instead of a cipher was interesting because now we reduce the number of output bits, which if done right, could improve the information carried by each binary digit. We take the MAC of an imperfect random number and toss the original random, retaining the MAC as our better random value. Can we get an analytic handle on this? Let's take Mr. Shannon's measure of information over a discrete alphabet. The average amount of information per symbol is the (negation of the) sum of the probabilities of each symbol times the log base 2 of that probability. If we have two symbols, A and B, and each occurs half the time, we have 1/2 * log (1/2) + 1/2 * log(1/2) = -1 = 1 bit, which is what we expect. If symbol A occurs, say, 3 times more often than B, we get: 3/4* log(3/4) + 1/4*log(1/4) = 3/4(log 3 - 2) + -2/4 = 3/4 log 3 - 6/4 - 2/4 = 3/4 log 3 - 2 = 2- 3/4*log 3 bits/symbol after handling the minus sign. This is less than the optimum 1 bit/symbol, achieved when the symbols are equiprobable as above. So now we have demonstrated how to use Shannon to measure the actual entropy carried by each imperfectly random symbol. We now use this to measure the result of XORing two such imperfect values. We continue to use the imperfect RNG source where A occurs 3/4 time, B occurs 1/4 time. We take two of these badbits and XOR them: A.A=A, A.B=B, B.A=B, B.B=A. We now compute the liklihood of each output symbol: A.A 3/4 * 3/4 = 9/16 (A) A.B 3/4 * 1/4 = 3/16 (B) B.A 1/4 * 3/4 = 3/16 (B) B.B 1/4 * 1/4 =1/16 (A) So the output has symbol A 10/16 of the time, and B 6/16 of the time. The difference in frequency has decreased; the distribution becomes more uniform, which means that the information content of the output has increased. The information content of the whole system can only decrease; but if you destroy the inputs the output carries their entropy. The exact amount of information per symbol in the 10:6 distribution is 10/16 * log(10/16) + 6/16 * log(6/16) = 10/16 * (log10 - 4) + 6/16*(log6 -4) = 10/16 log 10 - 40/16 + 6/16 log 6 - 24/16 = 10/16 log 10 + 6/16 log 6 - 4 the negative of which is 4 - (10log 10 + 6 log 6) / 16 Which is less than 1 but more than the content of each of the 2 bits we started with. Intuitively, we have gone from this distribution: ---- ------------ crossed with itself, yields this distribution of states: - --- --- --------- which when collapsed yields this: ------ ---------- So: we can use Shannon's analytic measure to look at entropy collection through a combination of imperfect input bits. It shows us that we'll never get perfectly uniformly distributed symbols by combining arbitrary quantities of nonuniformly distributed symbols, but we can get arbitrarily close. All we need is more input. Quantity vs. quality. A video ADC acquires say 8 bits resolution at 4 msamples/sec. This might condense down to 4 Mbits/sec true negentropy, which is about half the rate of regular Ethernet. honig at alum.mit.edu "Speech is not protected simply because it is written in a language" Federal Misjudge Gwin on the Bernstein Case From merata at sums.ac.ir Fri Jul 31 14:00:31 1998 From: merata at sums.ac.ir (Anooshiravan Merat) Date: Fri, 31 Jul 1998 14:00:31 -0700 (PDT) Subject: From: dac@zurich.ibm.com (Marc Dacier) In-Reply-To: <35C20839.43A1@nmol.com> Message-ID: <35C22BB0.398F875A@sums.ac.ir> STOP SENDING ME EMAILS MR PAYNE STOOOPPPP IITTTT!!!!!! bill payne wrote: > Friday 7/31/98 11:40 AM > > John Young > > I am looking at http://www.jya.com/raid98.htm > > Dacier asked me why NSA/Sandia was concerned about what > each bit in an executable image did when I was in his office in > Zurich in April 1997. > > Spiking, of course. A SECRET OTHER FUNCTION to a device. > > http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm > > NSA/Sandia doesn�t trust its own employees! > > On the other hand, NSA/Sandia employees don�t trust NSA/Sandia either. > > The REAL WORLD again. > > IBM Zurich was BIG into Java. > > Network World, July 20, 1998 page 6 > > The incredible shrinking Java alliance > > By Chris Nerney and Andy Eddy > > A year ago there were four of them, members of a new alliance > touting a potent new weapon designed to end Microsoft Corp.'s > growing dominance in the computing industry. > Now the Java Gang of Four is the Gang of Two and a Half. > Java creator Sun Microsystems, Inc., of course, is still fully > committed to the programming language, as is IBM. ... > > Not looking good for Java future. > > Java is similar to FORTH. FORTH executes super-slow on high-level > in most machines. About 10% of the speed of a compiled-language > program - such as Visual Basic. > > Specialized Forth and Java machine can be made to run fast. > http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/ > > But I am not confident Java or Forth machines are going anywhere. > May be hard to get parts in the future. > > But I'm confident about the 80C32 supply! > http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2 > > Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets > settled soon so that we can move on to constructive projects. > > Later > bill > > /\/\/\ > > Marc > > Since I was working the OTHER SIDE of > > Recent Advances in Intrusion Detection > > for the FBI, I might be able to give a nice talk about what the US > government is REALLY UP TO on defeating intrusion detection! > > I am not reading e-mail. > > best > bill > > Hi Matthias! > > ------------------------------------------------------------------------ > Counterfeiting Wiegand Wire Access Credentials > > Bill Payne > > October 16,1996 > > Abstract > > Wiegand wire access credentials are easy and > inexpensive to counterfeit. > > Access Control & Security Systems Integration magazine, October > 1996 [http://www/securitysolutions.com] published the article, > > Wiegand technology stands the test of time > > by PAUL J. BODELL, page 12 > > Many card and reader manufacturers offer Wiegand (pronounced > wee-gand) output. However, only three companies in the > world make Wiegand readers. Sensor Engineering of Hamden > Conn., holds the patent for Wiegand, and Sensor has licensed > Cardkey of Simi Valley, Calif., and Doduco of Pforzheim, > Germany, to manufacture Wiegand cards and readers. ... A > Wiegand output reader is not the same thing as a Wiegand > reader, and it is important to understand the differences. > > In brief, Wiegand reader use the Wiegand effect to > translate card information around the patented Wiegand > effect in which a segment of a specially treated wire > generates an electronic pulse when subjected to a specific > magnetic field. If the pulse is generated when the wire is > near a pick-up coil, the pulse can be detected by a circuit. > Lining up several rows of wires and passing them by a cold > would generate a series of pulses. Lining up two rows of > wires - calling on row "zero bits" and the other "one bits" > - and passing them by two different coils would generate two > series of pulses, or data bits. These data bits can then be > interpreted as binary data and used to control other > devices. If you seal the coils in a rugged housing with > properly placed magnets, and LED and some simple circuitry, > you have a Wiegand reader. Carefully laminate the special > wires in vinyl, and artwork, and hot-stamp a number on the > vinyl, and you have a Wiegand card. > > IN THE BEGINNING > > Wiegand was first to introduce to the access control > market in the late 1970s. It was immediately successful > because it filled the need for durable, secure card and > reader technology. > Embedded in the cards, Wiegand wires cannot be altered or > duplicated. ... > > Bodell's Last statement is incorrect. > > Tasks for EASILY counterfeiting Wiegand wire cards are > > 1 Locate the wires inside the card to read the 0s and 1s. > > 2 Build an ACCEPTABLE copy of the card. > > Bodell's clear explanation of the working of a Wiegand card can > be visualized > > zero row | | | > > one row | | > > binary 0 1 0 0 1 > representation > > Solutions to Task 1 > > A X-ray the card > > B MAGNI VIEW FILM, Mylar film reads magnetic fields ... > Edmunds Scientific Company, catalog 16N1, page > 205, C33,447 $11.75 > > is placed over the top of the Wiegand card. > > COW MAGNET, Cow magnetics allow farmers to trap metal in the > stomachs of their cows. Edmunds, page 204, C31,101 $10.75 > is placed under the card. > > Location of the wires is easily seen on the green film. > > Mark the position of the wires with a pen. > > Next chop the card vertically using a shear into about 80/1000s > paper-match-sized strips. > > Don't worry about cutting a wire or two. > > Note that a 0 has the pen mark to the top. A 1 has the pen mark > at the bottom. > > Take a business card and layout the "paper match"-like strips to > counterfeit the card number desired. > > Don't worry about spacing. Wiegand output is self-clocking! > > Tape the "paper-match - like" strips to the business card. > > Only the FUNCTION of the card needs to be reproduced! > > History > > Breaking electronic locks was done as "work for others" at Sandia > > National Laboratories beginning in 1992 funded by the Federal > Bureau of Investigation/Engineering Research Facility, Quantico, > VA. > > The FBI opined that this work was SECRET/NATIONAL SECURITY > INFORMATION. > > Details of the consequences of this work are covered in > > Fired Worker File Lawsuit Against Sandia > Specialist Says He Balked When Lab Sought Electronic > Picklock Software, Albuquer Journal, Sunday April 25, 1993 > > State-sanctioned paranoia, EE Times, January 22, 1996 > > One man's battle, EE Times, March 22, 1994 > > Damn the torpedoes, EE Times, June 6, 1994 > > Protecting properly classified info, EE Times, April 11, > 1994 > > DOE to scrutinize fairness in old whistle-blower cases, > Albuquerque Tribune, Nov 7 1995 > > DOE boss accelerates whistle-blower protection, Albuquerque > Tribune, March 27, 1996 > > DOE doesn't plan to compensate 'old' whistle-blowers with > money, Albuquerque Tribune September 27, 199 From cognitus at earthlink.net Fri Jul 31 14:41:01 1998 From: cognitus at earthlink.net (Richard Storey) Date: Fri, 31 Jul 1998 14:41:01 -0700 (PDT) Subject: Comments on this Pentagon opinion...not a new debate In-Reply-To: Message-ID: <35C23AA4.4E9C460B@earthlink.net> Jim Burnes wrote: > > Just remember that, in any conceivable interpretation of the > constitution, the federal government has *already* vastly overstepped > their allocated powers. Why are you so suprised that they would try > to eliminate the few remaining liberties the sheeple have? Irony. > These ten are more than enough. Jeffeson himself said, paraphrased, > that when the state starts violating these basic liberties, then > its time to call out the militia, start putting up tents and making > war plans. > I take a view of liberty as I believe it exists under natural law. Some people view the constitution and bill of rights as the alpha and omega of liberty on earth. I am not one of them. > If Jefferson were alive today he would be arrested for conspiracy > if he simply thought out loud. Most likey you're right. In fact, most of the "founders" would be as well, especially Patrick Henry! ;-) Richard Storey From whgiii at openpgp.net Fri Jul 31 17:17:30 1998 From: whgiii at openpgp.net (William H. Geiger III) Date: Fri, 31 Jul 1998 17:17:30 -0700 (PDT) Subject: From: dac@zurich.ibm.com (Marc Dacier) In-Reply-To: <35C20839.43A1@nmol.com> Message-ID: <199808010015.UAA11260@domains.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <35C20839.43A1 at nmol.com>, on 07/31/98 at 12:08 PM, bill payne said: >Java is similar to FORTH. FORTH executes super-slow on high-level in >most machines. About 10% of the speed of a compiled-language program - >such as Visual Basic. FORTH 10% of VB!! ROTHLMAO!!!! Obviously whoever wrote that doesn't have a clue when it comes to FORTH. I have old FORTH code I wrote years ago and even running interpreted (and yes FORTH can be compiled) it is faster than anything the brain-dead Micky$loth crowd could ever dream of writting in VB. Add to the fact that your average FORTH programmer has a much higher skill set than your typical VB programmer and is capable of writting fast, tight code (when have you ever heard fast, tight code used to describe a VB program?) why am I not surprised to see yet another "journalist" clue-impaired. - -- - --------------------------------------------------------------- William H. Geiger III http://www.openpgp.net Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html - --------------------------------------------------------------- Tag-O-Matic: Windows? Homey don't play that! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNcJf049Co1n+aLhhAQGzCwP/eBpCcTNbaqWTdl7lUVTz7UuV53J3r0FZ +VZLGBmpJYCo/wZZVMahM4LZ4KFgOGFBBiydapLeaoztT21vRtNwraWe8JQFjmUA oa6EtM5bdKYBgaaO0kzplCf4e7qLQ8whiVc0PekscZqM6tSV43jJs3wO6LbL54T6 5FpeP2ir+iE= =hQxK -----END PGP SIGNATURE----- From caj at math.niu.edu Fri Jul 31 18:49:38 1998 From: caj at math.niu.edu (Xcott Craver) Date: Fri, 31 Jul 1998 18:49:38 -0700 (PDT) Subject: From: dac@zurich.ibm.com (Marc Dacier) In-Reply-To: <199808010015.UAA11260@domains.invweb.net> Message-ID: > >Java is similar to FORTH. FORTH executes super-slow on high-level in > >most machines. About 10% of the speed of a compiled-language program - > >such as Visual Basic. > FORTH 10% of VB!! ROTHLMAO!!!! Rolling on the hearth? Rolling off the house? Ripping out tiny hairs? Running over the hamster? You sadistic F@#%. > Obviously whoever wrote that doesn't have a clue when it comes to FORTH. It reads especially weirdly to anyone who remembers that BASIC was traditionally interpreted, too. What crazy times we live in. And anyone who wants to claim VB superior to FORTH has to earn the right by transferring first a FORTH-made binary, then a VB-made binary, from one computer to another via floppy disks. > VB. Add to the fact that your average FORTH programmer has a much higher > skill set than your typical VB programmer and is capable of writting fast, > tight code That's because writing in FORTH is like spending the day solving brain-teasers. Not that that's a bad thing; I figure programmers would get paid a lot more for much higher quality work if they were required to be in extreme brain-on mode 24/7. But at least we have C++, huh? -Caj From nobody at replay.com Fri Jul 31 20:59:58 1998 From: nobody at replay.com (Anonymous) Date: Fri, 31 Jul 1998 20:59:58 -0700 (PDT) Subject: No Subject Message-ID: <199808010400.GAA04134@replay.com> > I had begun by thinking that, since the output of a block cipher in > feedback mode (ie, a stream cipher) is uniformly distributed ("white") that > it would be sufficient conditioning to feed a bad RNG into a block cipher > with feedback. Here, the bad RNG would kick the cipher out of the fixed, > but key-dependant, sequence it would otherwise generate. I don't quite parse what you're saying here...? (more reply below) ... > On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers. > A hash is like a cipher in that changing any input or key bit changes the > output unpredictably, but a hash is irreversible because there are fewer > output bits than input bits. The simplest hash is a one-bit parity; MD5 > is a more expensive keyed hashing function used for message > authentication. > > Thinking about a hash instead of a cipher was interesting because now > we reduce the number of output bits, which if done right, could > improve the information carried by each binary digit. We take the MAC > of an imperfect random number and toss the original random, retaining > the MAC as our better random value. The problem with XORing is that you might have a generator where bits are interdependent in a way that causes entropy to be lost in the XOR. You generally don't have this problem with the more involved mixing functions. If the construction you use for distilling the RNG's output to a random number works as a collision-free hash function, you can place a lower bound on the amount of entropy in the output based on how long it takes to simulate the biases in the RNG (I posted a somewhat confuberated description of the reasoning to coderpunks -- basically, if the hash of the simulation's output has little enough entropy, it means you can break the hash; since you can't break the hash, the output can't have that little entropy). Normally, though, you can get away with using pretty much any nonlinear mixing function, even if it's not a good hash function. An "entropy pool" setup where you can put entropy in and pull keys out at will gets slightly more hairy...if you want to do that, I suggest you try to contact someone who knows what he/she's doing. :) Should that prove infeasible, key a stream cipher with the mixed entropy, and, when you want to pull a key out, grab some stream cipher output; when you want to drop entropy in, mix some stream cipher output with your new entropy and rekey the stream cipher with the result (to save time, I'd only do the rekeying right before I want a key containing the new entropy). Probably a lot more complicated and slow than it needs to be, but I think it lets you add any amount of entropy you want without fear of an attacker somehow interfering with the generation. ... From h0uugi93 at galaxylink.com.hk Fri Jul 31 23:20:24 1998 From: h0uugi93 at galaxylink.com.hk (h0uugi93 at galaxylink.com.hk) Date: Fri, 31 Jul 1998 23:20:24 -0700 (PDT) Subject: Look At This Message-ID: <199808010905.CAA16485@palm.telegraph.net>

AMERICA'S # HOME BUSINESS TELEMARKETING GOES MLM No Selling No recruiting Great Income Call Now, You have nothing to Lose I am making $1,000.00 per day, this is my second day Call 1 888 443 8971 ID# 2085

The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer

From nobody at replay.com Fri Jul 31 23:43:35 1998 From: nobody at replay.com (Anonymous) Date: Fri, 31 Jul 1998 23:43:35 -0700 (PDT) Subject: Where do you roam? Message-ID: <199808010643.IAA15232@replay.com> SC>At 5:28 AM -0400 7/31/98, Michael Hohensee wrote: SC>>Source: Handgunner Magazine, Sept./Oct. 1998, page 154: SC>Paladin sought to reverse the ruling of the U.S. Court of Appeals for the SC>Fourth Circuit, whichfound that the book Hit Man: A Technical Manual for SC>Independent Contractors enjoyed no FirstAmendment protection because, in SC>that court's opinion (based in part on the stipulations of theparties), a SC>jury could find that the book's content amounted to the aiding and abetting SC>of criminalconduct. I've been reading the Bible lately, and it's content has been aiding and abetting me in all kinds of criminal misconduct, like murdering a crapload of Arabs and other assorted non-Jewish darkies. Anybody think that the U.S. Court of Appeals for the Fourth Circuit is prepared to refrain from being hypocritical, and rule that the Bible does not enjoy FirstAmendment protection? Tojohoto, The ApplePie Murderer *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org *********** From toto at fhouse.org Fri Jul 31 23:28:30 1998 From: toto at fhouse.org (toto at fhouse.org) Date: Sat, 1 Aug 1998 14:28:30 +0800 Subject: From: dac@zurich.ibm.com (Marc Dacier) Message-ID: ME>STOP SENDING ME EMAILS MR PAYNE ME>STOOOPPPP IITTTT!!!!!! ME>bill payne wrote: ME>> Friday 7/31/98 11:40 AM ME>>...[EVERYTHING IN THE WHOLE WORLD, NOT LEAVING OUT A SINGLE WORD]... Yo BadBillyP, You know, as a result of the massive amounts of on-topic SPAM/RANTS you send to the CypherPunks Disturbed Male LISP, many CPUNX are finding it hard to find time to find and read the multiple CHAPTER/SPAMS of SAHMD!!! that I hack out with my Cleaver, since the Secret Service took away my ChainSaw. Well, BadBillyP, not only does the Bienfait Nutly News not mind the competition you provide for the time and attention of the CypherPunks ReaderShip Market (despite the fact that you have a natural advantage, not having spent six years getting through Grade 4, as a result of 'problems' with math), but welcome your efforts drive other targets of your missives, such as Mr. Merata, Esq., crazy enough to become potential subscribers to the CypherPunks Disturbed Male LISP. I am prepared to offer you 25% of all CypherPunks Anarchist Union Dues that are collected from KmartTargets of your missives who join up and pay their dues in Cash/UnmarkedNonSequentialSmallBills. TruthMonger p.s. - THE REASON THAT ALL MATHEMATICIANS EVENTUALLY GO !!!CRAZY!!! IS THAT THEY SPEND THEIR WHOLE LIVES WORKING WITH NUMBERS WHICH ONLY COME IN !CAPITALS!1234567890!!1234567890!!!1234567890! p.p.s - I won't send this post directly to you, since I noticed from a recent post of yours, that you don't read your email. Go figure... *** The Fire House Inn *** Come visit us Telnet: fhouse.org WWW: fhouse.org ***********